Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nZNmWqwnpr

Overview

General Information

Sample Name:nZNmWqwnpr (renamed file extension from none to dll)
Analysis ID:631910
MD5:828a9b1007dc45671d8a58e240c7c973
SHA1:8214993bb314d0f4c1889e507f88beeb3f6e5b63
SHA256:b59f16ee5e524814316a8be8ef54ea02f9a496267555e65eeb585e4ade85ffec
Tags:exetrojan
Infos:

Detection

Emotet
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for domain / URL
Machine Learning detection for sample
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7048 cmdline: loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7056 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 7080 cmdline: rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • WerFault.exe (PID: 3368 cmdline: C:\Windows\system32\WerFault.exe -u -p 7080 -s 336 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • regsvr32.exe (PID: 7068 cmdline: regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6208 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 7088 cmdline: rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 1816 cmdline: C:\Windows\system32\WerFault.exe -u -p 7088 -s 328 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 7152 cmdline: rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4548 cmdline: rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 3348 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6560 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3008 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5808 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5188 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5940 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000000.452085701.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000004.00000000.452594179.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000004.00000000.449463120.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000004.00000000.449875064.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000008.00000002.959360306.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 11 entries
            SourceRuleDescriptionAuthorStrings
            2.2.regsvr32.exe.b70000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.2.rundll32.exe.1e59c5c0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                8.2.regsvr32.exe.12d0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  2.2.regsvr32.exe.b70000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    3.2.rundll32.exe.13e99710000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 11 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: nZNmWqwnpr.dllVirustotal: Detection: 49%Perma Link
                      Source: nZNmWqwnpr.dllReversingLabs: Detection: 58%
                      Source: https://165.22.73.229/Virustotal: Detection: 6%Perma Link
                      Source: nZNmWqwnpr.dllJoe Sandbox ML: detected
                      Source: nZNmWqwnpr.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BEF0 FindFirstFileW,FindNextFileW,FindClose,8_2_000000018000BEF0

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 165.22.73.229 8080Jump to behavior
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 165.22.73.229 165.22.73.229
                      Source: global trafficTCP traffic: 192.168.2.5:49784 -> 165.22.73.229:8080
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: svchost.exe, 0000001B.00000003.715039476.000002075EB73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 0000001B.00000003.715039476.000002075EB73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 0000001B.00000003.714303149.000002075EB83000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.715039476.000002075EB73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000001B.00000003.714303149.000002075EB83000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.715039476.000002075EB73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: regsvr32.exe, 00000008.00000002.959102799.000000000139C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521612350.000000000139C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.842956672.0000024A18088000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.762250229.000002075EB00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 0000000D.00000002.842956672.0000024A18088000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.762109790.000002075E0EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: svchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229/
                      Source: regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.958979074.0000000001308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/
                      Source: regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/tem
                      Source: svchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000001B.00000003.732764832.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732695709.000002075EB94000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732742125.000002075EBA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 0000001B.00000003.732764832.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732695709.000002075EB94000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732742125.000002075EBA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 0000001B.00000003.732764832.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732695709.000002075EB94000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732742125.000002075EBA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 0000001B.00000003.741783275.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.741717338.000002075EB94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180017C8C InternetReadFile,8_2_0000000180017C8C

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 2.2.regsvr32.exe.b70000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e59c5c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.12d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.b70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.13e99710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.13e99710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e59c5c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.12d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.452085701.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.452594179.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.449463120.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.449875064.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.959360306.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.451694832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.449470100.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.476624176.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.451994029.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.958917594.00000000012D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.450520095.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.472954607.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.449203482.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.477042089.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.476424709.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7080 -s 336
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\PDQmdReNwGSs\ZxyxzMoIe.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\PDQmdReNwGSs\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA532912B02_2_00007FFA532912B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA532953FB2_2_00007FFA532953FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA532968502_2_00007FFA53296850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA5329443C2_2_00007FFA5329443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA53295CAD2_2_00007FFA53295CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA53295E012_2_00007FFA53295E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA53294A702_2_00007FFA53294A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00B600002_2_00B60000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800264102_2_0000000180026410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025C302_2_0000000180025C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011CCC2_2_0000000180011CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D5102_2_000000018001D510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D582_2_0000000180001D58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011E5C2_2_0000000180011E5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C6C82_2_000000018002C6C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C2C82_2_000000018002C2C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026F142_2_0000000180026F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800163202_2_0000000180016320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800013782_2_0000000180001378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018FE82_2_0000000180018FE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ABE82_2_000000018001ABE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800243F42_2_00000001800243F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800083F82_2_00000001800083F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800247FC2_2_00000001800247FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DBFC2_2_000000018001DBFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001100C2_2_000000018001100C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027C282_2_0000000180027C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002143C2_2_000000018002143C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001303C2_2_000000018001303C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A8402_2_000000018002A840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800038402_2_0000000180003840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B4442_2_000000018000B444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F0482_2_000000018000F048
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002AC4C2_2_000000018002AC4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800100502_2_0000000180010050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800030502_2_0000000180003050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000445C2_2_000000018000445C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C85C2_2_000000018000C85C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800034602_2_0000000180003460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029C6C2_2_0000000180029C6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001586C2_2_000000018001586C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000406C2_2_000000018000406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E06C2_2_000000018000E06C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BC702_2_000000018000BC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001447C2_2_000000018001447C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026C802_2_0000000180026C80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010C842_2_0000000180010C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800160882_2_0000000180016088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800028882_2_0000000180002888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017C8C2_2_0000000180017C8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FC8C2_2_000000018000FC8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D0982_2_000000018002D098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800154B82_2_00000001800154B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800064D02_2_00000001800064D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800180D42_2_00000001800180D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800054D82_2_00000001800054D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002CCE02_2_000000018002CCE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800254E42_2_00000001800254E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800184E82_2_00000001800184E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800010E82_2_00000001800010E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E8F02_2_000000018000E8F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A0F82_2_000000018002A0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800199002_2_0000000180019900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800119042_2_0000000180011904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F9082_2_000000018001F908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002490C2_2_000000018002490C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001890C2_2_000000018001890C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003D182_2_0000000180003D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002191C2_2_000000018002191C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D1282_2_000000018001D128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D12C2_2_000000018000D12C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800149302_2_0000000180014930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800085342_2_0000000180008534
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD442_2_000000018001CD44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B9482_2_000000018000B948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000796C2_2_000000018000796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800105902_2_0000000180010590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028D942_2_0000000180028D94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800091A82_2_00000001800091A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800171B82_2_00000001800171B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018DBC2_2_0000000180018DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800141C82_2_00000001800141C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B1D42_2_000000018002B1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023DDC2_2_0000000180023DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800165E42_2_00000001800165E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029DF02_2_0000000180029DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015DF42_2_0000000180015DF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800011F42_2_00000001800011F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FE082_2_000000018000FE08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027E142_2_0000000180027E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B6182_2_000000018000B618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800232202_2_0000000180023220
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020A342_2_0000000180020A34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800076342_2_0000000180007634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022E382_2_0000000180022E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E6382_2_000000018000E638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800102502_2_0000000180010250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026A642_2_0000000180026A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800042642_2_0000000180004264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800136742_2_0000000180013674
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F6782_2_000000018000F678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E2782_2_000000018000E278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180005E7C2_2_0000000180005E7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025E882_2_0000000180025E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002868C2_2_000000018002868C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014E982_2_0000000180014E98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014AA42_2_0000000180014AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800126A82_2_00000001800126A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800036A82_2_00000001800036A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A6BC2_2_000000018002A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CABC2_2_000000018001CABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EAC02_2_000000018000EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B6D42_2_000000018001B6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F2DC2_2_000000018000F2DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800202E02_2_00000001800202E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800226E02_2_00000001800226E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019AF02_2_0000000180019AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BEF02_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012EF82_2_0000000180012EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800297102_2_0000000180029710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800177102_2_0000000180017710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C7402_2_000000018000C740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020F442_2_0000000180020F44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023B482_2_0000000180023B48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800237482_2_0000000180023748
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800217542_2_0000000180021754
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800223582_2_0000000180022358
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029F5C2_2_0000000180029F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B3682_2_000000018002B368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BF702_2_000000018001BF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800253742_2_0000000180025374
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007F742_2_0000000180007F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021F7C2_2_0000000180021F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800197882_2_0000000180019788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001B8C2_2_0000000180001B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800283942_2_0000000180028394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013B942_2_0000000180013B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001479C2_2_000000018001479C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E7A02_2_000000018000E7A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800087A42_2_00000001800087A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017BA82_2_0000000180017BA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EBAC2_2_000000018000EBAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B3B82_2_000000018001B3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012BB82_2_0000000180012BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800257C02_2_00000001800257C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008BC02_2_0000000180008BC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800117C42_2_00000001800117C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800227E02_2_00000001800227E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA532912B03_2_00007FFA532912B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA532953FB3_2_00007FFA532953FB
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA532968503_2_00007FFA53296850
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA5329443C3_2_00007FFA5329443C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA53295CAD3_2_00007FFA53295CAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA53295E013_2_00007FFA53295E01
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA53294A703_2_00007FFA53294A70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000013E997000003_2_0000013E99700000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001E59C5B00004_2_000001E59C5B0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00FD00008_2_00FD0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800264108_2_0000000180026410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000680F8_2_000000018000680F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180025C308_2_0000000180025C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800136748_2_0000000180013674
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180017C8C8_2_0000000180017C8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000A48C8_2_000000018000A48C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180011CCC8_2_0000000180011CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BEF08_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800297108_2_0000000180029710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001D5108_2_000000018001D510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180026F148_2_0000000180026F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180001D588_2_0000000180001D58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002B3688_2_000000018002B368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800013788_2_0000000180001378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800105908_2_0000000180010590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800091A88_2_00000001800091A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180018DBC8_2_0000000180018DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800165E48_2_00000001800165E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180018FE88_2_0000000180018FE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001ABE88_2_000000018001ABE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029DF08_2_0000000180029DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800243F48_2_00000001800243F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180015DF48_2_0000000180015DF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800011F48_2_00000001800011F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800083F88_2_00000001800083F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800247FC8_2_00000001800247FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001DBFC8_2_000000018001DBFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000FE088_2_000000018000FE08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001100C8_2_000000018001100C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180027E148_2_0000000180027E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000B6188_2_000000018000B618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800232208_2_0000000180023220
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180027C288_2_0000000180027C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180020A348_2_0000000180020A34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800076348_2_0000000180007634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180022E388_2_0000000180022E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E6388_2_000000018000E638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002143C8_2_000000018002143C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001303C8_2_000000018001303C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002A8408_2_000000018002A840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800038408_2_0000000180003840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000B4448_2_000000018000B444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000F0488_2_000000018000F048
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002AC4C8_2_000000018002AC4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800100508_2_0000000180010050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800102508_2_0000000180010250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800030508_2_0000000180003050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180011E5C8_2_0000000180011E5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000445C8_2_000000018000445C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000C85C8_2_000000018000C85C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800034608_2_0000000180003460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180026A648_2_0000000180026A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800042648_2_0000000180004264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029C6C8_2_0000000180029C6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001586C8_2_000000018001586C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000406C8_2_000000018000406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E06C8_2_000000018000E06C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BC708_2_000000018000BC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000F6788_2_000000018000F678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E2788_2_000000018000E278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001447C8_2_000000018001447C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180005E7C8_2_0000000180005E7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180026C808_2_0000000180026C80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180010C848_2_0000000180010C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180025E888_2_0000000180025E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800160888_2_0000000180016088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800028888_2_0000000180002888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002868C8_2_000000018002868C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000FC8C8_2_000000018000FC8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002D0988_2_000000018002D098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180014E988_2_0000000180014E98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180014AA48_2_0000000180014AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800126A88_2_00000001800126A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800036A88_2_00000001800036A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800154B88_2_00000001800154B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002A6BC8_2_000000018002A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001CABC8_2_000000018001CABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000EAC08_2_000000018000EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002C6C88_2_000000018002C6C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002C2C88_2_000000018002C2C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800064D08_2_00000001800064D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001B6D48_2_000000018001B6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800180D48_2_00000001800180D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800054D88_2_00000001800054D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000F2DC8_2_000000018000F2DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800202E08_2_00000001800202E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002CCE08_2_000000018002CCE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800226E08_2_00000001800226E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800254E48_2_00000001800254E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800184E88_2_00000001800184E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800010E88_2_00000001800010E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180019AF08_2_0000000180019AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E8F08_2_000000018000E8F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002A0F88_2_000000018002A0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180012EF88_2_0000000180012EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800199008_2_0000000180019900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800119048_2_0000000180011904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001F9088_2_000000018001F908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002490C8_2_000000018002490C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001890C8_2_000000018001890C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800177108_2_0000000180017710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180003D188_2_0000000180003D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002191C8_2_000000018002191C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800163208_2_0000000180016320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001D1288_2_000000018001D128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D12C8_2_000000018000D12C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800149308_2_0000000180014930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800085348_2_0000000180008534
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000C7408_2_000000018000C740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180020F448_2_0000000180020F44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001CD448_2_000000018001CD44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180023B488_2_0000000180023B48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800237488_2_0000000180023748
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000B9488_2_000000018000B948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800217548_2_0000000180021754
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800223588_2_0000000180022358
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029F5C8_2_0000000180029F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000796C8_2_000000018000796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001BF708_2_000000018001BF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800253748_2_0000000180025374
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180007F748_2_0000000180007F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180021F7C8_2_0000000180021F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800197888_2_0000000180019788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180001B8C8_2_0000000180001B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180028D948_2_0000000180028D94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800283948_2_0000000180028394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180013B948_2_0000000180013B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001479C8_2_000000018001479C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E7A08_2_000000018000E7A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800087A48_2_00000001800087A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180017BA88_2_0000000180017BA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000EBAC8_2_000000018000EBAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180012BB88_2_0000000180012BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001B3B88_2_000000018001B3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800171B88_2_00000001800171B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800257C08_2_00000001800257C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180008BC08_2_0000000180008BC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800117C48_2_00000001800117C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800141C88_2_00000001800141C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002B1D48_2_000000018002B1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180023DDC8_2_0000000180023DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800227E08_2_00000001800227E0
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFA53297FF0 appears 31 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFA5329B3B0 appears 148 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFA5329BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFA53297FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFA5329B3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFA5329BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: nZNmWqwnpr.dllVirustotal: Detection: 49%
                      Source: nZNmWqwnpr.dllReversingLabs: Detection: 58%
                      Source: nZNmWqwnpr.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7080 -s 336
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7088 -s 328
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTimeJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTimeJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32Jump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER64B3.tmpJump to behavior
                      Source: classification engineClassification label: mal80.troj.evad.winDLL@23/13@0/3
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029710 CreateToolhelp32Snapshot,Process32FirstW,FindCloseChangeNotification,8_2_0000000180029710
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7088
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7080
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: nZNmWqwnpr.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: nZNmWqwnpr.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006951 pushad ; retf 2_2_0000000180006953
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA532A12E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_00007FFA532A12E3
                      Source: nZNmWqwnpr.dllStatic PE information: real checksum: 0x61dc7 should be: 0x64194
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\PDQmdReNwGSs\ZxyxzMoIe.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 4680Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6456Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 4784Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-12535
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-16499
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 9.5 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 9.5 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BEF0 FindFirstFileW,FindNextFileW,FindClose,8_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_2-16501
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_2-16633
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-12690
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-12537
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: regsvr32.exe, 00000008.00000003.521712233.0000000001370000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.959070313.0000000001370000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP1G6
                      Source: svchost.exe, 0000000D.00000002.842933839.0000024A18062000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521712233.0000000001370000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.959070313.0000000001370000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.842920390.0000024A18051000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.842529310.0000024A12629000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.761308377.000002075E081000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.762016014.000002075E081000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.762109790.000002075E0EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000010.00000002.958955319.000001E82C402000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 00000010.00000002.958992936.000001E82C428000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA5329BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFA5329BE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA532A0215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,2_2_00007FFA532A0215
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA532A12E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_00007FFA532A12E3
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA5329BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFA5329BE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA53293280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFA53293280
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA5329BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FFA5329BE50
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA53293280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FFA53293280

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 165.22.73.229 8080Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA53298900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,2_2_00007FFA53298900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFA53298860 HeapCreate,GetVersion,HeapSetInformation,2_2_00007FFA53298860

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 2.2.regsvr32.exe.b70000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e59c5c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.12d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.b70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.13e99710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.13e99710000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.13e99710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e59c5c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1e59c5c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.12d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.452085701.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.452594179.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.449463120.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.449875064.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.959360306.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.451694832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.449470100.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.476624176.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.451994029.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.958917594.00000000012D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.450520095.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.472954607.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.449203482.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.477042089.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.476424709.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2
                      Native API
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      3
                      Virtualization/Sandbox Evasion
                      LSASS Memory1
                      Query Registry
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                      Process Injection
                      Security Account Manager41
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Ingress Tool Transfer
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS3
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets2
                      Process Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc Filesystem25
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 631910 Sample: nZNmWqwnpr Startdate: 22/05/2022 Architecture: WINDOWS Score: 80 44 Multi AV Scanner detection for domain / URL 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected Emotet 2->48 50 Machine Learning detection for sample 2->50 8 loaddll64.exe 1 2->8         started        10 svchost.exe 9 1 2->10         started        13 svchost.exe 2->13         started        15 4 other processes 2->15 process3 dnsIp4 17 regsvr32.exe 5 8->17         started        20 rundll32.exe 8->20         started        22 cmd.exe 1 8->22         started        24 2 other processes 8->24 36 127.0.0.1 unknown unknown 10->36 process5 signatures6 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->42 26 regsvr32.exe 17->26         started        30 WerFault.exe 9 20->30         started        32 rundll32.exe 22->32         started        process7 dnsIp8 38 165.22.73.229, 49784, 8080 DIGITALOCEAN-ASNUS United States 26->38 52 System process connects to network (likely due to code injection or exploit) 26->52 40 192.168.2.1 unknown unknown 30->40 34 WerFault.exe 20 9 32->34         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      nZNmWqwnpr.dll49%VirustotalBrowse
                      nZNmWqwnpr.dll59%ReversingLabsWin64.Trojan.Emotet
                      nZNmWqwnpr.dll100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      2.2.regsvr32.exe.b70000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.0.rundll32.exe.13e99710000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.0.rundll32.exe.13e99710000.2.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.rundll32.exe.13e99710000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.2.rundll32.exe.1e59c5c0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.0.rundll32.exe.1e59c5c0000.2.unpack100%AviraHEUR/AGEN.1215461Download File
                      8.2.regsvr32.exe.12d0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.0.rundll32.exe.1e59c5c0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://165.22.73.229/7%VirustotalBrowse
                      https://165.22.73.229/0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://165.22.73.229:8080/tem0%Avira URL Cloudsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://165.22.73.229:8080/2%VirustotalBrowse
                      https://165.22.73.229:8080/0%Avira URL Cloudsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://165.22.73.229/regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmptrue
                      • 7%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ver)svchost.exe, 0000000D.00000002.842956672.0000024A18088000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.762109790.000002075E0EA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.tiktok.com/legal/report/feedbacksvchost.exe, 0000001B.00000003.741783275.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.741717338.000002075EB94000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://165.22.73.229:8080/temregsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://help.disneyplus.com.svchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://support.hotspotshield.com/svchost.exe, 0000001B.00000003.732764832.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732695709.000002075EB94000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732742125.000002075EBA5000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://165.22.73.229:8080/regsvr32.exe, 00000008.00000002.959035441.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.521676384.0000000001341000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.958979074.0000000001308000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.hotspotshield.com/terms/svchost.exe, 0000001B.00000003.732764832.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732695709.000002075EB94000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732742125.000002075EBA5000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.pango.co/privacysvchost.exe, 0000001B.00000003.732764832.000002075F002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732695709.000002075EB94000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.732742125.000002075EBA5000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://disneyplus.com/legal.svchost.exe, 0000001B.00000003.737868944.000002075EB94000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          165.22.73.229
                          unknownUnited States
                          14061DIGITALOCEAN-ASNUStrue
                          IP
                          192.168.2.1
                          127.0.0.1
                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:631910
                          Start date and time: 22/05/202222:35:232022-05-22 22:35:23 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 9m 9s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:nZNmWqwnpr (renamed file extension from none to dll)
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:29
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal80.troj.evad.winDLL@23/13@0/3
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 73% (good quality ratio 38.9%)
                          • Quality average: 32.7%
                          • Quality standard deviation: 37.6%
                          HCA Information:
                          • Successful, ratio: 94%
                          • Number of executed functions: 38
                          • Number of non-executed functions: 248
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Override analysis time to 240s for rundll32
                          • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 20.189.173.21, 13.89.179.12, 23.54.113.104, 20.223.24.244
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, onedsblobprdcus17.centralus.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          22:36:55API Interceptor2x Sleep call for process: WerFault.exe modified
                          22:37:07API Interceptor11x Sleep call for process: svchost.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          165.22.73.229W3XqCWvDWC.dllGet hashmaliciousBrowse
                            JtJ50Swtfo.dllGet hashmaliciousBrowse
                              VUzZGNPCim.dllGet hashmaliciousBrowse
                                ZWc3yi399O.dllGet hashmaliciousBrowse
                                  QK2fMdqsA1.dllGet hashmaliciousBrowse
                                    CVVgbFa04U.dllGet hashmaliciousBrowse
                                      HN8n4TeTGO.dllGet hashmaliciousBrowse
                                        VUzZGNPCim.dllGet hashmaliciousBrowse
                                          ZWc3yi399O.dllGet hashmaliciousBrowse
                                            QK2fMdqsA1.dllGet hashmaliciousBrowse
                                              HN8n4TeTGO.dllGet hashmaliciousBrowse
                                                CVVgbFa04U.dllGet hashmaliciousBrowse
                                                  hx0cxL0x56.dllGet hashmaliciousBrowse
                                                    ckjV3enNDr.dllGet hashmaliciousBrowse
                                                      RyxCHM5yNz.dllGet hashmaliciousBrowse
                                                        eoNBU1NB8n.dllGet hashmaliciousBrowse
                                                          dmnhAOheZm.dllGet hashmaliciousBrowse
                                                            hx0cxL0x56.dllGet hashmaliciousBrowse
                                                              ckjV3enNDr.dllGet hashmaliciousBrowse
                                                                RyxCHM5yNz.dllGet hashmaliciousBrowse
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  DIGITALOCEAN-ASNUSW3XqCWvDWC.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  JtJ50Swtfo.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  VUzZGNPCim.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  ZWc3yi399O.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  QK2fMdqsA1.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  CVVgbFa04U.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  HN8n4TeTGO.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  VUzZGNPCim.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  ZWc3yi399O.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  QK2fMdqsA1.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  HN8n4TeTGO.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  CVVgbFa04U.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  FC6cLk6kKz.dllGet hashmaliciousBrowse
                                                                  • 159.65.88.10
                                                                  ViiTOVGM74.dllGet hashmaliciousBrowse
                                                                  • 159.65.88.10
                                                                  69hw6kwGu3.dllGet hashmaliciousBrowse
                                                                  • 104.248.225.227
                                                                  0xnQJ1y1YE.dllGet hashmaliciousBrowse
                                                                  • 134.122.66.193
                                                                  hx0cxL0x56.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  ckjV3enNDr.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  RyxCHM5yNz.dllGet hashmaliciousBrowse
                                                                  • 165.22.73.229
                                                                  nnQLG95Iw5.dllGet hashmaliciousBrowse
                                                                  • 68.183.93.250
                                                                  No context
                                                                  No context
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.3593198815979092
                                                                  Encrypted:false
                                                                  SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                  MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                  SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                  SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                  SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                  Malicious:false
                                                                  Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:MPEG-4 LOAS
                                                                  Category:dropped
                                                                  Size (bytes):1310720
                                                                  Entropy (8bit):0.2494459593111375
                                                                  Encrypted:false
                                                                  SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU42:BJiRdwfu2SRU42
                                                                  MD5:350E7E51EE85D4C9CE2C637486617909
                                                                  SHA1:37BD386501593C088CD673DA09E861BABDA8CDCC
                                                                  SHA-256:682ED1F34B514551258D72C152ED274023F97A9CD5CAF46555653C72F49A82F8
                                                                  SHA-512:E9907CC6902875ABCED0F51A2391C5510FD4AB5884E019EB8939E4CEAC21DD9EEFC3E901D57C4E06AC24B08D32C38113A97893C20BC59BDC2737F2AF83592618
                                                                  Malicious:false
                                                                  Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0770f373, page size 16384, Windows version 10.0
                                                                  Category:dropped
                                                                  Size (bytes):786432
                                                                  Entropy (8bit):0.25068119477366796
                                                                  Encrypted:false
                                                                  SSDEEP:384:C3X+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:C3cSB2nSB2RSjlK/+mLesOj1J2
                                                                  MD5:1480EA214CAB080BEDFC3ED714D746F4
                                                                  SHA1:0EAC25CDC2831C465EA5A04F8871AC0F9C63558B
                                                                  SHA-256:F4E05B52FE784CA576AC6E31DEBE983DC39034BEE1C2A49CA617D658ADE14BF8
                                                                  SHA-512:9356982BE6ECAC443164963AE37D98427645D6A0425AEB2B84D997AF0B9833596F5DE0086F737E8A6B313850204B7F51D08756DB92E04E0EAEB2F8B09D6A310A
                                                                  Malicious:false
                                                                  Preview:.p.s... ................e.f.3...w........................)......(...z...%...z..h.(......(...z....)..............3...w...........................................................................................................B...........@...................................................................................................... ........................................................................................................................................................................................................................................................(...z...................4.O.(...z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):16384
                                                                  Entropy (8bit):0.07547562542474998
                                                                  Encrypted:false
                                                                  SSDEEP:3:S6IllllJ7viAgk3pFlHgKSiBIAzfymltlfAypFlAll3Vkttlmlnl:S9tJriAgcRqAzbFRA3
                                                                  MD5:8FF33FD4A420FF92477534CB8CE25320
                                                                  SHA1:091CE71394F3A44CE7AFC26267BE628A7D183A71
                                                                  SHA-256:0D9EE2910436B74DA503A7A4654096CF94B9A549E619D094EA7BE80EE1224C45
                                                                  SHA-512:61B35872189BC888F21F4BDAAC68FEC3A8390AA0498410D00387197CB7E4BB61FAF3D485EA4BB7342A1C7FCCA4577A04D193459D76E9203137700E9922AB80BE
                                                                  Malicious:false
                                                                  Preview:|.|.....................................3...w...%...z...(...z...........(...z...(...z...y~..(...zWg.................4.O.(...z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.7854483740623535
                                                                  Encrypted:false
                                                                  SSDEEP:96:DgFVgGbiDJJPny8ji55o+7Rl6tpXIQcQ5c6ZucE1cw3CzXaXz+HbHgSQgJPbzIDG:s7iNJKwHXkfGDjV9/u7s1S274ltT
                                                                  MD5:10A3CCFB064C4C0008134CF070C0AD65
                                                                  SHA1:B7584F04137F5C47095AE005A7DBF67C22AD3B8A
                                                                  SHA-256:FD7CCAAD2B49D18EE75090C51929C2859B44509E290D02B0AD3A9BC14A76854E
                                                                  SHA-512:D892BC67A59176C8246B6ECC9AEE1994092EAAE7AFAFEE608632EAF765D55578852D51AC8E73DD949461200B2639EE02CC946F8630EC33D7A6441DD081CEF5AA
                                                                  Malicious:false
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.5.7.8.1.0.1.5.2.8.6.4.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.5.7.8.1.2.6.0.5.9.8.4.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.2.e.8.5.5.d.0.-.7.9.7.0.-.4.c.6.d.-.9.0.b.e.-.c.1.f.7.c.b.0.6.5.1.9.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.5.e.6.a.b.2.-.4.d.b.f.-.4.f.e.7.-.b.a.7.c.-.6.f.e.7.6.b.a.3.8.9.6.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.Z.N.m.W.q.w.n.p.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.b.0.-.0.0.0.1.-.0.0.1.7.-.8.d.c.7.-.7.a.1.4.6.7.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.7843612334473168
                                                                  Encrypted:false
                                                                  SSDEEP:96:u0FqXbiQJPnyMji55o+7Rl6tpXIQcQ5c6ZucE1cw3CzXaXz+HbHgSQgJPbzIDV9+:naiQJKgHXkfGDjV9/u7s1S274ltT
                                                                  MD5:7AED913045EC89E659CE045CEA73813C
                                                                  SHA1:5036C5BCD3A4C2899AA7A94A66C5AE04DAA64730
                                                                  SHA-256:528A73B71E5D9F169CBE3021F130F01B56832D996B0AD9EE488CD62BA7D21C3E
                                                                  SHA-512:9B6557667DCE6FB1C1C4B1831B2896EB7791160264AAEA534398C711EC6F06545A26328573252695267D03FC8F84A3A303568C2653F3243EA3B67B38C996ACC6
                                                                  Malicious:false
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.5.7.8.0.9.9.3.0.9.0.3.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.5.7.8.1.2.3.8.4.0.3.0.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.e.6.0.2.3.2.3.-.b.c.f.2.-.4.b.0.8.-.9.0.0.f.-.9.8.5.1.0.8.d.0.8.2.c.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.7.9.d.8.3.f.9.-.1.e.7.7.-.4.e.9.f.-.a.a.1.4.-.d.0.0.e.d.c.d.7.8.5.6.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.Z.N.m.W.q.w.n.p.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.a.8.-.0.0.0.1.-.0.0.1.7.-.3.a.d.0.-.3.e.1.4.6.7.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 15 streams, Mon May 23 05:36:50 2022, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):64892
                                                                  Entropy (8bit):2.300064149534914
                                                                  Encrypted:false
                                                                  SSDEEP:384:e04cSe2YqH2DCd/3tcldYngZ5ksPckn1Cpz2tfjCnXJ6bEUSoC:efMqH2DCx3t+ME8e
                                                                  MD5:74C9D643CB3A498FE46D0C057027D69A
                                                                  SHA1:55225048E60867841D51769639BE22A1626B9148
                                                                  SHA-256:8CCB4ADBCD420845E115B1B477678B8188CEA755053EF87022E43AEA8C89D8D5
                                                                  SHA-512:007BC05C750C4D72C5058B757856CDC629C6CEC30CE74A2094C88CB82945111CC4BDE7302C3F04131154215D37526397EC629DBB6BC4975AC2DFC9FAB6AD88F2
                                                                  Malicious:false
                                                                  Preview:MDMP....... .......r..b........................................8.......$...d;..........`.......8...........T............................"...........$...................................................................U...........B......P%......Lw..................Q...T...........h..b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 15 streams, Mon May 23 05:36:51 2022, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):65264
                                                                  Entropy (8bit):2.28612973826541
                                                                  Encrypted:false
                                                                  SSDEEP:192:5VKVLM04cqPyowuCSrMV/qkm+s494F1sOC5qCt073S/wmsg3HXdOYXqf1XItVzwi:704cSe2YqH2ACACtns2cldYnzw9OG
                                                                  MD5:4650085A66CEE77078C7A0F4F3FCBC63
                                                                  SHA1:05B8304B00050B702A35DD97770DC07DD341F525
                                                                  SHA-256:BF99D9FC263C89250AC1FD269D0330F8AC27AC7BD5836367E7CB924A16B73120
                                                                  SHA-512:2EB6AB89F891F91C1ABE2E7A96152F62F17212BCC9BB36F14FC8BFF537861F6C85B6D1EFE639E660E5B6B018D90BDCB1A1B714C3C303F319FB27B16D3E406045
                                                                  Malicious:false
                                                                  Preview:MDMP....... .......s..b........................................8.......$...d;..........`.......8...........T...........X................"...........$...................................................................U...........B......P%......Lw.................^....T...........i..b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8652
                                                                  Entropy (8bit):3.696860486924025
                                                                  Encrypted:false
                                                                  SSDEEP:192:Rrl7r3GLNiyjIm3aVh6YfDSDgmfDbSXuCprV89bgqHfeAm:RrlsNiEIm3aVh6YrSDgmfDbSEgifg
                                                                  MD5:F0A6A498E352C9D3F2357A69DC8EFFFA
                                                                  SHA1:C224333CEBE3BC1428C4C05C4A2B70728C42FABD
                                                                  SHA-256:60C8E096886E5CDD826E43084D6D00B8DCAA1C2603A0AB36F0CBE1A9696576CA
                                                                  SHA-512:9D8D7F2BB2ED11A87D8326980A36C5AD2252D714E0657DE45D5EECC24106135ABF88AD47F4D370DA151F0B4E57BD0817A2AD8BC8C7B6778BEF33FD57CDC8F21F
                                                                  Malicious:false
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.8.0.<./.P.i.d.>.......
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8646
                                                                  Entropy (8bit):3.695404074543651
                                                                  Encrypted:false
                                                                  SSDEEP:192:Rrl7r3GLNiajo9IaDX6YCMLgmfDbSXuCprT89bgCHfAAm:RrlsNico9IaDX6YJLgmfDbSCg6f+
                                                                  MD5:644F9078CD7E5D0A6E19370A1E1F2531
                                                                  SHA1:C90B431C35BBFB97EEB3B1E1EF70E01188345E7D
                                                                  SHA-256:149EB0DC890DD50BC591A1750E78454A3EAE36B84BFD30CB51615C12BD1940A6
                                                                  SHA-512:E73DB170EEEF31EA430D07A9BC437DAD2B4B85857FF7CCD76854132FE76A4CFE406BC9B04A54F146D9ABEF6693F9459DC82C2FF284A8B4402A064C36AF5056A2
                                                                  Malicious:false
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.8.8.<./.P.i.d.>.......
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4892
                                                                  Entropy (8bit):4.49728997291251
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwSD8zsOJgtBI98qWgc8sqYjB8fm8M4JCUUCU33nFsVyq8vhU33OZESC5Sad:uITfESLgrsqYqJRiaVW2uVvad
                                                                  MD5:928EA0F3D8EAF23625C894019743EFA6
                                                                  SHA1:0B203361083F47FA052009E94D2F38C5A1307462
                                                                  SHA-256:B3DC63A3F71D2C676D3324E8630505545441B28397045BDE4E54420F1909D507
                                                                  SHA-512:439FF7AEEBFC7B2523DCA5334977346CDEF3253B194074C7A413CB21850644924C0A5D3DB4FDF28CD52A3B01192E3BF7FB4A62E503FE8EB006BD953471D19DDC
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1527287" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4892
                                                                  Entropy (8bit):4.498305108452743
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwSD8zsOJgtBI98qWgc8sqYjv8fm8M4JCUUCU33nFDyq8vhU33gutZESC5S4d:uITfESLgrsqY4JRiFW2XVv4d
                                                                  MD5:E55C5123469E90644C2DA6D071072E0E
                                                                  SHA1:C0419D22B7CDECEF35DCC1D0E58639DBA892287F
                                                                  SHA-256:879F151CD90E93887BD195E51B3384D962F3B2A9102EFD45749AC63D68D20135
                                                                  SHA-512:21CE0A353B0AF16A64FB6FD7B90836B05FC1A92FFA922C537C8EFCF12C7A3C7204D65C2433E9314BA919C82719EB9171F31B3B05F842EF47B8C70FCE1BE4F703
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1527287" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):55
                                                                  Entropy (8bit):4.306461250274409
                                                                  Encrypted:false
                                                                  SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                  MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                  SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                  SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                  SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                  Malicious:false
                                                                  Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                  File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Entropy (8bit):7.1527203772082135
                                                                  TrID:
                                                                  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                  • Win64 Executable (generic) (12005/4) 10.17%
                                                                  • Generic Win/DOS Executable (2004/3) 1.70%
                                                                  • DOS Executable Generic (2002/1) 1.70%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                  File name:nZNmWqwnpr.dll
                                                                  File size:371200
                                                                  MD5:828a9b1007dc45671d8a58e240c7c973
                                                                  SHA1:8214993bb314d0f4c1889e507f88beeb3f6e5b63
                                                                  SHA256:b59f16ee5e524814316a8be8ef54ea02f9a496267555e65eeb585e4ade85ffec
                                                                  SHA512:7519b39dd811c3578e0002d5c4f35b2a6855092978004ecb2ca0030c1550aa3d38b346f83c43eb286ab9e1bf6209050078286ddb8bfea5f1d5dc3efcaafeeeef
                                                                  SSDEEP:6144:hlNuuXQASByX7YxoJcXy16qFHJ7wwD1w3pq6jTK/V9OT0u:hlNu9ASByX7Qy/BJ7rGTK/V3
                                                                  TLSH:34848E46F7F551E5E8F7C13889A23267F9317C948B38A7CB8A44466A4F70BA0E93D701
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik...k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d....{.b.........."
                                                                  Icon Hash:74f0e4ecccdce0e4
                                                                  Entrypoint:0x180003580
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x180000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                  Time Stamp:0x62877BF5 [Fri May 20 11:31:01 2022 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:2
                                                                  File Version Major:5
                                                                  File Version Minor:2
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:2
                                                                  Import Hash:ad5c5b0f3e2e211c551f3b5059e614d7
                                                                  Instruction
                                                                  dec esp
                                                                  mov dword ptr [esp+18h], eax
                                                                  mov dword ptr [esp+10h], edx
                                                                  dec eax
                                                                  mov dword ptr [esp+08h], ecx
                                                                  dec eax
                                                                  sub esp, 28h
                                                                  cmp dword ptr [esp+38h], 01h
                                                                  jne 00007F9D84D5F587h
                                                                  call 00007F9D84D648E7h
                                                                  dec esp
                                                                  mov eax, dword ptr [esp+40h]
                                                                  mov edx, dword ptr [esp+38h]
                                                                  dec eax
                                                                  mov ecx, dword ptr [esp+30h]
                                                                  call 00007F9D84D5F594h
                                                                  dec eax
                                                                  add esp, 28h
                                                                  ret
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  dec esp
                                                                  mov dword ptr [esp+18h], eax
                                                                  mov dword ptr [esp+10h], edx
                                                                  dec eax
                                                                  mov dword ptr [esp+08h], ecx
                                                                  dec eax
                                                                  sub esp, 48h
                                                                  mov dword ptr [esp+20h], 00000001h
                                                                  cmp dword ptr [esp+58h], 00000000h
                                                                  jne 00007F9D84D5F592h
                                                                  cmp dword ptr [00028DE8h], 00000000h
                                                                  jne 00007F9D84D5F589h
                                                                  xor eax, eax
                                                                  jmp 00007F9D84D5F6A4h
                                                                  cmp dword ptr [esp+58h], 01h
                                                                  je 00007F9D84D5F589h
                                                                  cmp dword ptr [esp+58h], 02h
                                                                  jne 00007F9D84D5F5D0h
                                                                  dec eax
                                                                  cmp dword ptr [0001ED99h], 00000000h
                                                                  je 00007F9D84D5F59Ah
                                                                  dec esp
                                                                  mov eax, dword ptr [esp+60h]
                                                                  mov edx, dword ptr [esp+58h]
                                                                  dec eax
                                                                  mov ecx, dword ptr [esp+50h]
                                                                  call dword ptr [0001ED83h]
                                                                  mov dword ptr [esp+20h], eax
                                                                  cmp dword ptr [esp+20h], 00000000h
                                                                  je 00007F9D84D5F599h
                                                                  dec esp
                                                                  mov eax, dword ptr [esp+60h]
                                                                  mov edx, dword ptr [esp+58h]
                                                                  dec eax
                                                                  mov ecx, dword ptr [esp+50h]
                                                                  call 00007F9D84D5F2EAh
                                                                  mov dword ptr [esp+20h], eax
                                                                  cmp dword ptr [esp+20h], 00000000h
                                                                  jne 00007F9D84D5F589h
                                                                  xor eax, eax
                                                                  Programming Language:
                                                                  • [LNK] VS2010 build 30319
                                                                  • [ASM] VS2010 build 30319
                                                                  • [ C ] VS2010 build 30319
                                                                  • [C++] VS2010 build 30319
                                                                  • [EXP] VS2010 build 30319
                                                                  • [RES] VS2010 build 30319
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x2aab00x84.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2a1e40x50.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000x2e9fc.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2f0000xfcc.pdata
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f0000x294.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x220000x298.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x203fa0x20400False0.405439983043zlib compressed data5.75409030586IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x220000x8b340x8c00False0.275474330357data4.41538934251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x2b0000x37980x1400False0.161328125data2.21550179132IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                  .pdata0x2f0000xfcc0x1000False0.5048828125data5.08183440168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x300000x2e9fc0x2ea00False0.887011980563data7.85049584102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x5f0000x6fc0x800False0.21435546875data2.34217115221IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_FONTDIR0x300a00x2e800dataEnglishUnited States
                                                                  RT_MANIFEST0x5e8a00x15aASCII text, with CRLF line terminatorsEnglishUnited States
                                                                  DLLImport
                                                                  KERNEL32.dllGetTimeFormatA, GetDateFormatA, GetThreadLocale, FileTimeToSystemTime, VirtualAlloc, ExitProcess, CloseHandle, CreateFileW, SetStdHandle, GetCurrentThreadId, FlsSetValue, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RtlUnwindEx, EncodePointer, FlsGetValue, FlsAlloc, FlsFree, SetLastError, GetLastError, HeapSize, HeapValidate, IsBadReadPtr, DecodePointer, GetProcAddress, GetModuleHandleW, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, DeleteCriticalSection, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapSetInformation, GetVersion, HeapCreate, HeapDestroy, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, HeapAlloc, GetModuleFileNameW, HeapReAlloc, HeapQueryInformation, HeapFree, WriteFile, LoadLibraryW, LCMapStringW, MultiByteToWideChar, GetStringTypeW, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, RaiseException, RtlPcToFileHeader, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers
                                                                  USER32.dllMessageBoxA
                                                                  ole32.dllCoTaskMemFree, CoTaskMemAlloc, CoLoadLibrary
                                                                  NameOrdinalAddress
                                                                  AddIn_FileTime10x180001140
                                                                  AddIn_SystemTime20x1800010b0
                                                                  DllRegisterServer30x180003110
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 22, 2022 22:37:18.705168009 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:18.747581005 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:18.747788906 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:19.025082111 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:19.067395926 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:19.076613903 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:19.076643944 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:19.076785088 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:19.943077087 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:19.985933065 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:19.986109018 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:20.006026983 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:20.092487097 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:20.257360935 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:20.257524014 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:37:23.259675026 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:23.259701967 CEST808049784165.22.73.229192.168.2.5
                                                                  May 22, 2022 22:37:23.259865999 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:39:07.222834110 CEST497848080192.168.2.5165.22.73.229
                                                                  May 22, 2022 22:39:07.222863913 CEST497848080192.168.2.5165.22.73.229

                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:22:36:39
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\loaddll64.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
                                                                  Imagebase:0x7ff710480000
                                                                  File size:140288 bytes
                                                                  MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:1
                                                                  Start time:22:36:40
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                                                                  Imagebase:0x7ff602050000
                                                                  File size:273920 bytes
                                                                  MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:2
                                                                  Start time:22:36:40
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
                                                                  Imagebase:0x7ff6ddd60000
                                                                  File size:24064 bytes
                                                                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.450520095.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:3
                                                                  Start time:22:36:41
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                                                                  Imagebase:0x7ff6845c0000
                                                                  File size:69632 bytes
                                                                  MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.451694832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.449470100.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.476624176.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.451994029.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.449203482.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.477042089.0000013E99710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:4
                                                                  Start time:22:36:41
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
                                                                  Imagebase:0x7ff6845c0000
                                                                  File size:69632 bytes
                                                                  MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.452085701.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.452594179.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.449463120.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.449875064.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.472954607.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.476424709.000001E59C5C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:5
                                                                  Start time:22:36:45
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
                                                                  Imagebase:0x7ff6845c0000
                                                                  File size:69632 bytes
                                                                  MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:8
                                                                  Start time:22:36:45
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll"
                                                                  Imagebase:0x7ff6ddd60000
                                                                  File size:24064 bytes
                                                                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.959360306.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.958917594.00000000012D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:9
                                                                  Start time:22:36:48
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 7080 -s 336
                                                                  Imagebase:0x7ff76a840000
                                                                  File size:494488 bytes
                                                                  MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:10
                                                                  Start time:22:36:48
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 7088 -s 328
                                                                  Imagebase:0x7ff76a840000
                                                                  File size:494488 bytes
                                                                  MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:11
                                                                  Start time:22:36:49
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
                                                                  Imagebase:0x7ff6845c0000
                                                                  File size:69632 bytes
                                                                  MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:13
                                                                  Start time:22:37:06
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                  Imagebase:0x7ff78ca80000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:16
                                                                  Start time:22:37:19
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                  Imagebase:0x7ff78ca80000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:17
                                                                  Start time:22:37:28
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff78ca80000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:24
                                                                  Start time:22:38:06
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff78ca80000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:25
                                                                  Start time:22:38:29
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff78ca80000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:27
                                                                  Start time:22:38:45
                                                                  Start date:22/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff78ca80000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:8.3%
                                                                    Dynamic/Decrypted Code Coverage:2.4%
                                                                    Signature Coverage:9.9%
                                                                    Total number of Nodes:1865
                                                                    Total number of Limit Nodes:45
                                                                    execution_graph 16201 7ffa53296ff2 16202 7ffa53296ffe 16201->16202 16205 7ffa5329ca00 16202->16205 16204 7ffa53297011 _initterm_e 16206 7ffa5329ca0e 16205->16206 16207 7ffa5329ca23 EncodePointer 16206->16207 16208 7ffa5329ca4b 16206->16208 16207->16206 16208->16204 16233 1800010e8 16236 18001dbfc 16233->16236 16235 180001151 16241 18001dc49 16236->16241 16237 18001f803 16248 18002191c 16237->16248 16240 18001f7d8 16240->16235 16241->16237 16241->16240 16242 1800171b8 16241->16242 16243 1800171da 16242->16243 16246 18001752f 16243->16246 16252 18000d12c 16243->16252 16256 180005e7c 16243->16256 16260 180019af0 16243->16260 16246->16241 16251 180021941 16248->16251 16249 18000c85c CreateProcessW 16250 180021f5a 16249->16250 16250->16240 16251->16249 16251->16250 16255 18000d176 16252->16255 16254 18000db07 16254->16243 16255->16254 16264 18000c85c 16255->16264 16259 180005eb1 16256->16259 16257 18000c85c CreateProcessW 16257->16259 16258 1800064ba 16258->16243 16259->16257 16259->16258 16263 180019b56 16260->16263 16261 18001aa27 16261->16243 16262 18000c85c CreateProcessW 16262->16263 16263->16261 16263->16262 16265 18000c8c2 16264->16265 16268 1800178a8 16265->16268 16267 18000ca47 16267->16254 16269 180017939 16268->16269 16270 180017a02 CreateProcessW 16269->16270 16270->16267 16647 7ffa532991ea 16648 7ffa532991ef 16647->16648 16649 7ffa532974e0 __crtExitProcess 3 API calls 16648->16649 16650 7ffa53299203 16649->16650 18044 7ffa5329d0ea 18045 7ffa5329d0ef 18044->18045 18046 7ffa53297090 _exit 33 API calls 18045->18046 18047 7ffa5329d209 18045->18047 18051 7ffa5329d0fc 18045->18051 18046->18047 18049 7ffa5329d289 18047->18049 18052 7ffa53293d00 RtlEncodePointer 18047->18052 18049->18051 18053 7ffa53299360 LeaveCriticalSection 18049->18053 18052->18049 18053->18051 18054 7ffa532964eb 18055 7ffa532964f8 18054->18055 18058 7ffa53296504 18055->18058 18059 7ffa53299360 LeaveCriticalSection 18055->18059 18057 7ffa53296655 18059->18057 18060 7ffa532a9aeb 18061 7ffa532a9b18 18060->18061 18062 7ffa532a9b2c 18060->18062 18063 7ffa532a9520 19 API calls 18061->18063 18064 7ffa532aab10 17 API calls 18062->18064 18063->18062 18067 7ffa532a9b38 18064->18067 18065 7ffa532a9c04 18066 7ffa532aa1cb 18065->18066 18070 7ffa532a9c23 GetConsoleCP 18065->18070 18068 7ffa532aa205 18066->18068 18069 7ffa532aa8ad WriteFile 18066->18069 18067->18065 18073 7ffa532a9bae GetConsoleMode 18067->18073 18071 7ffa532aa400 18068->18071 18075 7ffa532aa21a 18068->18075 18072 7ffa532aa923 GetLastError 18069->18072 18081 7ffa532a9dd9 _dosmaperr __doserrno 18069->18081 18074 7ffa532a9c4d 18070->18074 18076 7ffa532aa5f3 18071->18076 18077 7ffa532aa40e 18071->18077 18072->18081 18073->18065 18074->18081 18082 7ffa532a9f66 WideCharToMultiByte 18074->18082 18092 7ffa532aa158 GetLastError 18074->18092 18093 7ffa532af330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18074->18093 18094 7ffa532aa06d WriteFile 18074->18094 18096 7ffa532afc00 WriteConsoleW CreateFileW _putwch_nolock 18074->18096 18097 7ffa532aa1b5 GetLastError 18074->18097 18078 7ffa532aa33e WriteFile 18075->18078 18075->18081 18076->18081 18083 7ffa532aa726 WideCharToMultiByte 18076->18083 18090 7ffa532aa7b0 WriteFile 18076->18090 18080 7ffa532aa531 WriteFile 18077->18080 18077->18081 18078->18075 18084 7ffa532aa3ea GetLastError 18078->18084 18079 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18085 7ffa532aa9f5 18079->18085 18080->18077 18086 7ffa532aa5dd GetLastError 18080->18086 18081->18079 18082->18081 18087 7ffa532a9fbf WriteFile 18082->18087 18083->18076 18088 7ffa532aa791 GetLastError 18083->18088 18084->18081 18086->18081 18087->18074 18089 7ffa532aa050 GetLastError 18087->18089 18088->18081 18089->18081 18090->18076 18091 7ffa532aa857 GetLastError 18090->18091 18091->18076 18092->18081 18093->18074 18094->18074 18095 7ffa532aa103 GetLastError 18094->18095 18095->18081 18096->18074 18097->18081 16651 7ffa5329f7f1 16652 7ffa5329f80d 16651->16652 16672 7ffa5329f8de _wcsftime_l 16651->16672 16708 7ffa532a6fb0 16652->16708 16654 7ffa5329fa70 16715 7ffa532a69c0 16654->16715 16656 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16659 7ffa5329f85a OutputDebugStringA 16656->16659 16658 7ffa5329f9f4 16658->16654 16661 7ffa5329d490 std::exception::_Copy_str 17 API calls 16658->16661 16662 7ffa5329f872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 16659->16662 16660 7ffa5329fa8a 16663 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16660->16663 16665 7ffa5329fa43 16661->16665 16668 7ffa5329f8ce 16662->16668 16664 7ffa5329fab7 16663->16664 16669 7ffa5329fb24 16664->16669 16670 7ffa532a69c0 17 API calls 16664->16670 16684 7ffa5329fb6a 16664->16684 16667 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16665->16667 16667->16654 16678 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16668->16678 16671 7ffa532a69c0 17 API calls 16669->16671 16673 7ffa5329faf7 16670->16673 16674 7ffa5329fb3d 16671->16674 16672->16658 16675 7ffa5329f996 16672->16675 16679 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 16672->16679 16676 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16673->16676 16677 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16674->16677 16675->16658 16680 7ffa5329d490 std::exception::_Copy_str 17 API calls 16675->16680 16676->16669 16677->16684 16681 7ffa532a011d 16678->16681 16679->16675 16682 7ffa5329f9c7 16680->16682 16683 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16682->16683 16683->16658 16685 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 16684->16685 16687 7ffa5329fc39 16684->16687 16685->16687 16686 7ffa5329fc97 16728 7ffa532a6970 16686->16728 16687->16686 16688 7ffa5329d490 std::exception::_Copy_str 17 API calls 16687->16688 16689 7ffa5329fc6a 16688->16689 16692 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16689->16692 16692->16686 16693 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 16694 7ffa5329fd6e 16693->16694 16706 7ffa5329fdbb 16694->16706 16731 7ffa532a1640 16694->16731 16696 7ffa5329fd8e 16697 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16696->16697 16697->16706 16698 7ffa5329ffef 16699 7ffa532a0016 16698->16699 16700 7ffa532a0008 OutputDebugStringA 16698->16700 16699->16668 16704 7ffa532a6fb0 _itow_s 17 API calls 16699->16704 16700->16699 16702 7ffa5329ff03 std::exception::_Copy_str 16702->16668 16702->16698 16703 7ffa5329ffaa WriteFile 16702->16703 16703->16698 16705 7ffa532a0065 16704->16705 16707 7ffa53297ff0 _invoke_watson_if_error 16 API calls 16705->16707 16706->16702 16741 7ffa53299360 LeaveCriticalSection 16706->16741 16707->16668 16709 7ffa532a7003 16708->16709 16710 7ffa532a6fd6 16708->16710 16712 7ffa532a7030 _itow_s 17 API calls 16709->16712 16710->16709 16711 7ffa532a6fdd 16710->16711 16742 7ffa532a7030 16711->16742 16714 7ffa5329f82d 16712->16714 16714->16656 16716 7ffa532a69e1 16715->16716 16717 7ffa532a6a42 16716->16717 16719 7ffa532a6a80 _calloc_dbg_impl 16716->16719 16718 7ffa5329bd70 _invalid_parameter 17 API calls 16717->16718 16722 7ffa532a6a76 _calloc_dbg_impl 16718->16722 16720 7ffa532a6b6e 16719->16720 16721 7ffa532a6bac _calloc_dbg_impl 16719->16721 16723 7ffa5329bd70 _invalid_parameter 17 API calls 16720->16723 16724 7ffa532a6ce8 16721->16724 16726 7ffa532a6d26 _calloc_dbg_impl 16721->16726 16722->16660 16723->16722 16725 7ffa5329bd70 _invalid_parameter 17 API calls 16724->16725 16725->16722 16726->16722 16727 7ffa5329bd70 _invalid_parameter 17 API calls 16726->16727 16727->16722 16758 7ffa532a63e0 16728->16758 16730 7ffa5329fd20 16730->16693 16732 7ffa532a1661 16731->16732 16733 7ffa532a16c2 16732->16733 16735 7ffa532a1700 _calloc_dbg_impl 16732->16735 16734 7ffa5329bd70 _invalid_parameter 17 API calls 16733->16734 16737 7ffa532a16f6 _calloc_dbg_impl 16734->16737 16736 7ffa532a17f4 16735->16736 16739 7ffa532a1832 _calloc_dbg_impl 16735->16739 16738 7ffa5329bd70 _invalid_parameter 17 API calls 16736->16738 16737->16696 16738->16737 16739->16737 16740 7ffa5329bd70 _invalid_parameter 17 API calls 16739->16740 16740->16737 16741->16702 16743 7ffa532a7055 16742->16743 16744 7ffa532a70ab 16743->16744 16745 7ffa532a70e9 16743->16745 16746 7ffa5329bd70 _invalid_parameter 17 API calls 16744->16746 16747 7ffa532a714a 16745->16747 16750 7ffa532a7188 _calloc_dbg_impl 16745->16750 16757 7ffa532a70df 16746->16757 16748 7ffa5329bd70 _invalid_parameter 17 API calls 16747->16748 16748->16757 16749 7ffa532a7287 16751 7ffa5329bd70 _invalid_parameter 17 API calls 16749->16751 16750->16749 16753 7ffa532a72c5 16750->16753 16751->16757 16752 7ffa532a7338 16754 7ffa5329bd70 _invalid_parameter 17 API calls 16752->16754 16753->16752 16755 7ffa532a7376 16753->16755 16754->16757 16756 7ffa5329bd70 _invalid_parameter 17 API calls 16755->16756 16755->16757 16756->16757 16757->16714 16759 7ffa532a640e 16758->16759 16760 7ffa532a648e 16759->16760 16764 7ffa532a64cc _calloc_dbg_impl 16759->16764 16761 7ffa5329bd70 _invalid_parameter 17 API calls 16760->16761 16769 7ffa532a64c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 16761->16769 16762 7ffa532a663f 16765 7ffa5329bd70 _invalid_parameter 17 API calls 16762->16765 16763 7ffa532a668e _CrtMemDumpAllObjectsSince 16770 7ffa532a5ea0 16763->16770 16764->16762 16764->16763 16765->16769 16767 7ffa532a66b5 _calloc_dbg_impl 16768 7ffa5329bd70 _invalid_parameter 17 API calls 16767->16768 16767->16769 16768->16769 16769->16730 16771 7ffa532a5ecf 16770->16771 16772 7ffa532a5fae 16771->16772 16773 7ffa532a5f6e 16771->16773 16780 7ffa532a5eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 16771->16780 16775 7ffa532a62e1 _CrtMemDumpAllObjectsSince 16772->16775 16776 7ffa532a5fcf _CrtMemDumpAllObjectsSince 16772->16776 16774 7ffa5329bd70 _invalid_parameter 17 API calls 16773->16774 16774->16780 16777 7ffa532a632f MultiByteToWideChar 16775->16777 16775->16780 16778 7ffa532a60a1 MultiByteToWideChar 16776->16778 16776->16780 16777->16780 16779 7ffa532a610e GetLastError 16778->16779 16778->16780 16779->16780 16782 7ffa532a6154 _CrtMemDumpAllObjectsSince wcsxfrm 16779->16782 16780->16767 16781 7ffa532a6238 MultiByteToWideChar 16781->16780 16782->16780 16782->16781 18140 7ffa532a12e3 LoadLibraryW 18141 7ffa532a1304 GetProcAddress 18140->18141 18149 7ffa532a12fd 18140->18149 18142 7ffa532a132a 7 API calls 18141->18142 18141->18149 18143 7ffa532a13b3 GetProcAddress EncodePointer 18142->18143 18144 7ffa532a13d5 18142->18144 18143->18144 18147 7ffa532a13f9 DecodePointer DecodePointer 18144->18147 18150 7ffa532a1428 DecodePointer 18144->18150 18145 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18146 7ffa532a157a 18145->18146 18147->18150 18149->18145 18150->18149 18151 7ffa53297ae3 18154 7ffa53297af3 18151->18154 18152 7ffa53297ce0 SetHandleCount 18160 7ffa53297c74 18152->18160 18153 7ffa53297c7b 18153->18152 18154->18152 18154->18153 18155 7ffa53297b95 GetStdHandle 18154->18155 18155->18153 18156 7ffa53297bb9 18155->18156 18156->18153 18157 7ffa53297bc8 GetFileType 18156->18157 18157->18153 18159 7ffa53297beb InitializeCriticalSectionAndSpinCount 18157->18159 18159->18153 18159->18160 18165 7ffa532a44e5 18169 7ffa532a445a __SehTransFilter 18165->18169 18166 7ffa532a47d7 18167 7ffa532a485b 18166->18167 18168 7ffa5329cf80 _inconsistency 36 API calls 18166->18168 18168->18167 18170 7ffa532a466c __SehTransFilter 18169->18170 18172 7ffa532a5180 __SehTransFilter 38 API calls 18169->18172 18170->18166 18171 7ffa532a5bb0 __SehTransFilter 36 API calls 18170->18171 18173 7ffa532a4727 18171->18173 18172->18169 18173->18166 18174 7ffa5329e500 __SetUnwindTryBlock 37 API calls 18173->18174 18175 7ffa532a4767 18174->18175 18176 7ffa5329edc0 __SehTransFilter 9 API calls 18175->18176 18176->18166 18177 7ffa532970e6 18178 7ffa53297090 _exit 33 API calls 18177->18178 18179 7ffa532970f0 18178->18179 16788 7ffa5329a7e9 16789 7ffa5329a7f9 16788->16789 16790 7ffa5329a80a 16789->16790 16791 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16789->16791 16792 7ffa5329aa30 16791->16792 16793 7ffa5329c7e9 16794 7ffa5329c80d 16793->16794 16795 7ffa5329c90c EncodePointer EncodePointer 16793->16795 16797 7ffa5329c872 16794->16797 16802 7ffa53294a00 16794->16802 16798 7ffa5329c8ca 16795->16798 16797->16798 16799 7ffa53294a00 _realloc_dbg 30 API calls 16797->16799 16800 7ffa5329c8ce EncodePointer 16797->16800 16801 7ffa5329c8bd 16799->16801 16800->16795 16801->16798 16801->16800 16803 7ffa53294a22 16802->16803 16808 7ffa53294a70 16803->16808 16805 7ffa53294a4c 16819 7ffa53299360 LeaveCriticalSection 16805->16819 16807 7ffa53294a5b 16807->16797 16810 7ffa53294ad4 _realloc_dbg 16808->16810 16818 7ffa53294aae _calloc_dbg_impl 16808->16818 16810->16818 16820 7ffa53296380 16810->16820 16811 7ffa53294f64 16824 7ffa5329bc30 16811->16824 16812 7ffa53294f90 16839 7ffa5329ba60 16812->16839 16815 7ffa53294e2c 16815->16811 16815->16812 16815->16818 16816 7ffa53294fa6 16817 7ffa53294fba HeapSize 16816->16817 16816->16818 16817->16818 16818->16805 16819->16807 16821 7ffa53296395 _CrtIsValidPointer 16820->16821 16822 7ffa53296391 16820->16822 16821->16822 16823 7ffa532963b6 HeapValidate 16821->16823 16822->16815 16823->16822 16825 7ffa5329bc5f 16824->16825 16826 7ffa5329bc50 16824->16826 16827 7ffa5329bc67 16825->16827 16832 7ffa5329bc78 16825->16832 16850 7ffa5329abf0 16826->16850 16856 7ffa5329c020 16827->16856 16830 7ffa5329bcba 16833 7ffa5329abb0 _callnewh DecodePointer 16830->16833 16831 7ffa5329bc9a HeapReAlloc 16831->16832 16832->16830 16832->16831 16834 7ffa5329bce4 16832->16834 16837 7ffa5329abb0 _callnewh DecodePointer 16832->16837 16838 7ffa5329bd1f GetLastError 16832->16838 16836 7ffa5329bc5a _get_errno_from_oserr 16833->16836 16835 7ffa5329bcee GetLastError 16834->16835 16834->16836 16835->16836 16836->16818 16837->16832 16838->16836 16840 7ffa5329ba76 16839->16840 16841 7ffa5329bb07 16840->16841 16842 7ffa5329bacc 16840->16842 16843 7ffa5329bb32 HeapSize HeapReAlloc 16841->16843 16847 7ffa5329bb00 _get_errno_from_oserr 16841->16847 16845 7ffa5329bd70 _invalid_parameter 17 API calls 16842->16845 16844 7ffa5329bb74 16843->16844 16843->16847 16846 7ffa5329bba0 GetLastError 16844->16846 16860 7ffa5329bbd0 HeapQueryInformation 16844->16860 16845->16847 16846->16847 16847->16816 16851 7ffa5329ac4d 16850->16851 16855 7ffa5329ac0a 16850->16855 16852 7ffa5329abb0 _callnewh DecodePointer 16851->16852 16854 7ffa5329ac21 16852->16854 16853 7ffa5329abb0 _callnewh DecodePointer 16853->16855 16854->16836 16855->16853 16855->16854 16857 7ffa5329c03b HeapFree 16856->16857 16859 7ffa5329c039 _get_errno_from_oserr 16856->16859 16858 7ffa5329c05a GetLastError 16857->16858 16857->16859 16858->16859 16859->16836 16861 7ffa5329bb90 16860->16861 16861->16846 16861->16847 16862 7ffa532a75e9 16865 7ffa532a75fb 16862->16865 16867 7ffa532a75f4 16862->16867 16863 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16864 7ffa532a7d85 16863->16864 16866 7ffa5329bd70 _invalid_parameter 17 API calls 16865->16866 16866->16867 16867->16863 18184 7ffa532966da 18185 7ffa53296725 18184->18185 18187 7ffa53296745 18184->18187 18185->18187 18190 7ffa53299a70 18185->18190 18188 7ffa5329677f 18187->18188 18189 7ffa53299b10 __updatetmbcinfo LeaveCriticalSection 18187->18189 18189->18188 18191 7ffa53299a79 _updatetlocinfoEx_nolock 18190->18191 18192 7ffa53299ad8 18191->18192 18194 7ffa53299360 LeaveCriticalSection 18191->18194 18192->18187 18194->18192 16886 7ffa532b13e0 16889 7ffa532aaee0 16886->16889 16890 7ffa532aaf47 LeaveCriticalSection 16889->16890 16891 7ffa532aaef7 16889->16891 16893 7ffa532aaf45 16890->16893 16891->16890 16892 7ffa532aaf0b 16891->16892 16895 7ffa53299360 LeaveCriticalSection 16892->16895 16895->16893 16899 7ffa532aade0 16904 7ffa532afee0 16899->16904 16902 7ffa532aadf9 16914 7ffa532aff00 16904->16914 16906 7ffa532aade9 16906->16902 16907 7ffa532afc70 16906->16907 16913 7ffa532afc86 16907->16913 16908 7ffa532afd59 17001 7ffa53299360 LeaveCriticalSection 16908->17001 16910 7ffa532afd63 16910->16902 16912 7ffa532afd09 DeleteCriticalSection 16912->16913 16913->16908 16913->16912 16990 7ffa532b0580 16913->16990 16915 7ffa532aff22 16914->16915 16916 7ffa532b0042 16915->16916 16917 7ffa532aff47 16915->16917 16947 7ffa53299360 LeaveCriticalSection 16916->16947 16919 7ffa532b003d 16917->16919 16929 7ffa532aae90 16917->16929 16919->16906 16920 7ffa532b004c 16920->16906 16922 7ffa532aff97 16923 7ffa532affbb 16922->16923 16924 7ffa532affe1 16922->16924 16928 7ffa532affd0 16922->16928 16932 7ffa532afd70 16923->16932 16927 7ffa532afd70 _fflush_nolock 25 API calls 16924->16927 16924->16928 16927->16928 16942 7ffa532aaf60 16928->16942 16930 7ffa532aaec8 EnterCriticalSection 16929->16930 16931 7ffa532aaea4 16929->16931 16930->16931 16931->16922 16933 7ffa532afd8a 16932->16933 16934 7ffa532afd81 16932->16934 16948 7ffa532afdf0 16933->16948 16935 7ffa532aff00 _fflush_nolock 25 API calls 16934->16935 16937 7ffa532afd88 16935->16937 16937->16928 16938 7ffa532afd94 16938->16937 16952 7ffa532aafb0 16938->16952 16943 7ffa532aaf74 16942->16943 16944 7ffa532aaf98 LeaveCriticalSection 16942->16944 16989 7ffa53299360 LeaveCriticalSection 16943->16989 16946 7ffa532aaf96 16944->16946 16946->16919 16947->16920 16949 7ffa532afe1f 16948->16949 16951 7ffa532afe5d 16948->16951 16950 7ffa532aafb0 _fflush_nolock 17 API calls 16949->16950 16949->16951 16950->16951 16951->16938 16953 7ffa532aafc1 16952->16953 16954 7ffa532ab04b 16953->16954 16955 7ffa5329bd70 _invalid_parameter 17 API calls 16953->16955 16956 7ffa532b07c0 16954->16956 16955->16954 16957 7ffa532b07d3 16956->16957 16959 7ffa532b07e8 16956->16959 16957->16937 16958 7ffa532b0851 16960 7ffa5329bd70 _invalid_parameter 17 API calls 16958->16960 16959->16958 16961 7ffa532b088f 16959->16961 16960->16957 16962 7ffa532b0913 16961->16962 16963 7ffa532b0951 16961->16963 16966 7ffa5329bd70 _invalid_parameter 17 API calls 16962->16966 16972 7ffa532afae0 16963->16972 16966->16957 16968 7ffa532b0992 FlushFileBuffers 16969 7ffa532b099f GetLastError 16968->16969 16971 7ffa532b09ab __doserrno 16968->16971 16969->16971 16987 7ffa532afbc0 LeaveCriticalSection 16971->16987 16973 7ffa532afb7a 16972->16973 16976 7ffa532afb25 16972->16976 16974 7ffa532afbb1 16973->16974 16975 7ffa532afb81 EnterCriticalSection 16973->16975 16974->16971 16980 7ffa532af900 16974->16980 16975->16974 16977 7ffa532afb3b InitializeCriticalSectionAndSpinCount 16976->16977 16978 7ffa532afb56 16976->16978 16977->16978 16988 7ffa53299360 LeaveCriticalSection 16978->16988 16981 7ffa532af913 __doserrno 16980->16981 16982 7ffa532af935 16980->16982 16981->16968 16983 7ffa532af9e9 __doserrno 16982->16983 16984 7ffa532af99e __doserrno 16982->16984 16983->16981 16986 7ffa5329bd70 _invalid_parameter 17 API calls 16983->16986 16985 7ffa5329bd70 _invalid_parameter 17 API calls 16984->16985 16985->16981 16986->16981 16987->16957 16988->16973 16989->16946 16991 7ffa532b0599 16990->16991 16992 7ffa532b062a 16991->16992 16993 7ffa532b05ef 16991->16993 16994 7ffa532b0623 16992->16994 17002 7ffa532aae10 16992->17002 16997 7ffa5329bd70 _invalid_parameter 17 API calls 16993->16997 16994->16913 16996 7ffa532b0651 17006 7ffa532b0680 16996->17006 16997->16994 16999 7ffa532b065c 17000 7ffa532aaee0 2 API calls 16999->17000 17000->16994 17001->16910 17003 7ffa532aae77 EnterCriticalSection 17002->17003 17004 7ffa532aae27 17002->17004 17005 7ffa532aae3b 17003->17005 17004->17003 17004->17005 17005->16996 17009 7ffa532b0699 17006->17009 17007 7ffa532b072d 17010 7ffa532b0723 17007->17010 17011 7ffa532afdf0 _fflush_nolock 17 API calls 17007->17011 17008 7ffa532b06ef 17012 7ffa5329bd70 _invalid_parameter 17 API calls 17008->17012 17009->17007 17009->17008 17010->16999 17013 7ffa532b0752 17011->17013 17012->17010 17014 7ffa532aafb0 _fflush_nolock 17 API calls 17013->17014 17015 7ffa532b076a 17014->17015 17017 7ffa532b0a20 17015->17017 17018 7ffa532b0a53 17017->17018 17024 7ffa532b0a33 __doserrno 17017->17024 17019 7ffa532b0abc __doserrno 17018->17019 17023 7ffa532b0b05 17018->17023 17021 7ffa5329bd70 _invalid_parameter 17 API calls 17019->17021 17020 7ffa532b0bd2 17022 7ffa532afae0 _fflush_nolock 3 API calls 17020->17022 17021->17024 17025 7ffa532b0bdb 17022->17025 17023->17020 17026 7ffa532b0b89 __doserrno 17023->17026 17024->17010 17029 7ffa532b0c13 17025->17029 17031 7ffa532b0c80 17025->17031 17028 7ffa5329bd70 _invalid_parameter 17 API calls 17026->17028 17028->17024 17044 7ffa532afbc0 LeaveCriticalSection 17029->17044 17032 7ffa532af900 _fflush_nolock 17 API calls 17031->17032 17035 7ffa532b0c91 17032->17035 17033 7ffa532b0d05 17045 7ffa532af7d0 17033->17045 17035->17033 17036 7ffa532b0ce5 17035->17036 17038 7ffa532af900 _fflush_nolock 17 API calls 17035->17038 17036->17033 17037 7ffa532af900 _fflush_nolock 17 API calls 17036->17037 17039 7ffa532b0cf8 CloseHandle 17037->17039 17040 7ffa532b0cd6 17038->17040 17039->17033 17041 7ffa532b0d0f GetLastError 17039->17041 17042 7ffa532af900 _fflush_nolock 17 API calls 17040->17042 17041->17033 17042->17036 17043 7ffa532b0d22 _dosmaperr 17043->17029 17044->17024 17046 7ffa532af7e3 17045->17046 17047 7ffa532af878 __doserrno 17045->17047 17046->17047 17048 7ffa532af87a SetStdHandle 17046->17048 17049 7ffa532af86a 17046->17049 17047->17043 17048->17047 17050 7ffa532af889 SetStdHandle 17049->17050 17051 7ffa532af871 17049->17051 17050->17047 17051->17047 17052 7ffa532af898 SetStdHandle 17051->17052 17052->17047 16527 7ffa53297de0 16528 7ffa53297ded 16527->16528 16531 7ffa53297df2 std::exception::_Copy_str _calloc_dbg 16527->16531 16534 7ffa5329aa40 16528->16534 16529 7ffa53297e0e 16531->16529 16538 7ffa5329d490 16531->16538 16548 7ffa53297ff0 16531->16548 16535 7ffa5329aa4d 16534->16535 16536 7ffa5329aa57 16534->16536 16552 7ffa53299c10 16535->16552 16536->16531 16539 7ffa5329d4b1 16538->16539 16540 7ffa5329d512 16539->16540 16541 7ffa5329d550 _calloc_dbg_impl 16539->16541 16542 7ffa5329bd70 _invalid_parameter 17 API calls 16540->16542 16543 7ffa5329d63e 16541->16543 16546 7ffa5329d67c _calloc_dbg_impl 16541->16546 16544 7ffa5329d546 _calloc_dbg_impl 16542->16544 16545 7ffa5329bd70 _invalid_parameter 17 API calls 16543->16545 16544->16531 16545->16544 16546->16544 16547 7ffa5329bd70 _invalid_parameter 17 API calls 16546->16547 16547->16544 16549 7ffa5329800e 16548->16549 16550 7ffa53298010 16548->16550 16549->16531 16551 7ffa5329be00 _invalid_parameter 16 API calls 16550->16551 16551->16549 16553 7ffa53299c2a 16552->16553 16562 7ffa53299b10 16553->16562 16555 7ffa53299c34 16566 7ffa53299f20 16555->16566 16557 7ffa53299c51 16559 7ffa53299ecd 16557->16559 16572 7ffa5329a000 16557->16572 16559->16536 16560 7ffa53299ce8 16560->16559 16585 7ffa53299360 LeaveCriticalSection 16560->16585 16563 7ffa53299b19 16562->16563 16564 7ffa53299bde 16563->16564 16586 7ffa53299360 LeaveCriticalSection 16563->16586 16564->16555 16567 7ffa53299f49 16566->16567 16568 7ffa53299f5b GetOEMCP 16567->16568 16569 7ffa53299f81 16567->16569 16570 7ffa53299f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16568->16570 16569->16570 16571 7ffa53299f88 GetACP 16569->16571 16570->16557 16571->16570 16573 7ffa53299f20 __initmbctable 2 API calls 16572->16573 16575 7ffa5329a028 16573->16575 16574 7ffa5329a234 16577 7ffa5329a25d IsValidCodePage 16574->16577 16580 7ffa5329a039 __initmbctable 16574->16580 16575->16574 16575->16580 16581 7ffa5329a08e __initmbctable 16575->16581 16576 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16578 7ffa5329a470 16576->16578 16579 7ffa5329a27b GetCPInfo 16577->16579 16577->16580 16578->16560 16579->16580 16584 7ffa5329a295 __initmbctable 16579->16584 16580->16576 16582 7ffa5329a5e0 __initmbctable 19 API calls 16581->16582 16582->16580 16587 7ffa5329a5e0 GetCPInfo 16584->16587 16585->16559 16586->16564 16592 7ffa5329a61f 16587->16592 16597 7ffa5329a7dc 16587->16597 16588 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16589 7ffa5329aa30 16588->16589 16589->16580 16590 7ffa5329a934 16590->16580 16591 7ffa5329f4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 16593 7ffa5329a734 16591->16593 16592->16591 16599 7ffa5329ef00 16593->16599 16595 7ffa5329a788 16596 7ffa5329ef00 __initmbctable 7 API calls 16595->16596 16596->16597 16597->16588 16597->16590 16598 7ffa5329a80a 16597->16598 16598->16580 16600 7ffa5329ef2c _CrtMemDumpAllObjectsSince 16599->16600 16603 7ffa5329efb0 16600->16603 16602 7ffa5329ef8e _LocaleUpdate::~_LocaleUpdate 16602->16595 16604 7ffa5329efd4 __initmbctable 16603->16604 16605 7ffa5329f068 MultiByteToWideChar 16604->16605 16606 7ffa5329f0a5 _CrtMemDumpAllObjectsSince_stat 16605->16606 16611 7ffa5329f0ac malloc _MarkAllocaS 16605->16611 16606->16602 16607 7ffa5329f122 MultiByteToWideChar 16607->16606 16608 7ffa5329f164 LCMapStringW 16607->16608 16608->16606 16609 7ffa5329f1a8 16608->16609 16610 7ffa5329f1b8 16609->16610 16617 7ffa5329f222 malloc _MarkAllocaS 16609->16617 16610->16606 16612 7ffa5329f1d9 LCMapStringW 16610->16612 16611->16606 16611->16607 16612->16606 16613 7ffa5329f2ac LCMapStringW 16613->16606 16614 7ffa5329f2ea 16613->16614 16615 7ffa5329f2f4 WideCharToMultiByte 16614->16615 16616 7ffa5329f341 WideCharToMultiByte 16614->16616 16615->16606 16616->16606 16617->16606 16617->16613 17062 7ffa532abfde 17071 7ffa532ac00c 17062->17071 17063 7ffa532ab99c 17064 7ffa532acc93 17063->17064 17067 7ffa532abada 17063->17067 17065 7ffa5329bd70 _invalid_parameter 17 API calls 17064->17065 17068 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 17064->17068 17065->17068 17072 7ffa5329bd70 _invalid_parameter 17 API calls 17067->17072 17069 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17068->17069 17070 7ffa532acd90 17069->17070 17071->17063 17073 7ffa532ab530 17071->17073 17072->17068 17076 7ffa532ab090 17073->17076 17075 7ffa532ab56c 17075->17071 17077 7ffa532ab0b7 17076->17077 17078 7ffa532ab168 17077->17078 17080 7ffa532ab1a6 _CrtMemDumpAllObjectsSince 17077->17080 17086 7ffa532ab0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 17077->17086 17079 7ffa5329bd70 _invalid_parameter 17 API calls 17078->17079 17079->17086 17081 7ffa532ab347 _CrtMemDumpAllObjectsSince 17080->17081 17087 7ffa532ab1cf 17080->17087 17082 7ffa532ab359 WideCharToMultiByte 17081->17082 17083 7ffa532ab3ab 17082->17083 17084 7ffa532ab3c1 GetLastError 17083->17084 17083->17086 17085 7ffa532ab3d0 _calloc_dbg_impl 17084->17085 17084->17086 17085->17086 17089 7ffa5329bd70 _invalid_parameter 17 API calls 17085->17089 17086->17075 17087->17086 17088 7ffa5329bd70 _invalid_parameter 17 API calls 17087->17088 17088->17086 17089->17086 18222 7ffa532a14e1 18223 7ffa532a14ef DecodePointer 18222->18223 18224 7ffa532a1520 DecodePointer 18222->18224 18223->18224 18226 7ffa532a150f 18223->18226 18225 7ffa532a1540 18224->18225 18227 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18225->18227 18226->18224 18228 7ffa532a157a 18227->18228 16623 7ffa532935e1 16625 7ffa532935f1 16623->16625 16628 7ffa532935ea 16623->16628 16625->16628 16629 7ffa532912b0 16625->16629 16627 7ffa532912b0 14 API calls 16627->16628 16630 7ffa532912de CoLoadLibrary 16629->16630 16637 7ffa53292f8c 16629->16637 16632 7ffa53292f2e VirtualAlloc RtlAllocateHeap 16630->16632 16633 7ffa53292f0f MessageBoxA ExitProcess 16630->16633 16631 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16634 7ffa532930ff 16631->16634 16635 7ffa53292f73 _calloc_dbg_impl 16632->16635 16632->16637 16634->16627 16634->16628 16636 7ffa53292f83 RtlDeleteBoundaryDescriptor 16635->16636 16636->16637 16637->16631 17090 7ffa53293fe1 17091 7ffa53293fea SetLastError 17090->17091 17092 7ffa532a5de0 17097 7ffa53293170 17092->17097 17095 7ffa532a5e86 17098 7ffa532931ac 17097->17098 17099 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17098->17099 17100 7ffa53293263 17099->17100 17100->17095 17101 7ffa53293870 17100->17101 17102 7ffa532939db __SehTransFilter 17101->17102 17103 7ffa532938de __SehTransFilter 17101->17103 17102->17095 17103->17102 17104 7ffa53293a71 RtlUnwindEx 17103->17104 17104->17102 18229 7ffa532a48e0 18230 7ffa532a48f7 std::bad_exception::~bad_exception 18229->18230 18231 7ffa532a490c 18230->18231 18232 7ffa532ad710 _Ref_count LeaveCriticalSection 18230->18232 18232->18231 18233 7ffa532934d5 18234 7ffa532934da _calloc_dbg 18233->18234 18235 7ffa5329350b FlsSetValue 18234->18235 18239 7ffa53293548 18234->18239 18236 7ffa53293520 18235->18236 18235->18239 18237 7ffa53293e30 LeaveCriticalSection 18236->18237 18238 7ffa5329352c GetCurrentThreadId 18237->18238 18238->18239 17105 7ffa532933d6 17108 7ffa532988d0 HeapDestroy 17105->17108 17107 7ffa532933db 17108->17107 18251 7ffa53295ad9 18252 7ffa53295add 18251->18252 18253 7ffa53296380 _CrtIsValidHeapPointer HeapValidate 18252->18253 18255 7ffa53295b3a 18253->18255 18257 7ffa53299360 LeaveCriticalSection 18255->18257 18256 7ffa53295c14 18257->18256 18258 7ffa532968c4 18259 7ffa532968d1 18258->18259 18260 7ffa53296ba6 18259->18260 18263 7ffa532968ed _CrtIsValidPointer 18259->18263 18276 7ffa53299360 LeaveCriticalSection 18260->18276 18262 7ffa53296bb0 18264 7ffa53296976 18263->18264 18265 7ffa5329695e IsBadReadPtr 18263->18265 18275 7ffa5329692f 18263->18275 18266 7ffa53296ad2 18264->18266 18268 7ffa53296a29 18264->18268 18265->18264 18267 7ffa53296add 18266->18267 18271 7ffa53296b2d 18266->18271 18273 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18267->18273 18269 7ffa53296a86 IsBadReadPtr 18268->18269 18270 7ffa53296abe 18268->18270 18269->18270 18269->18275 18272 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18270->18272 18274 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18271->18274 18271->18275 18272->18275 18273->18275 18274->18275 18276->18262 18300 7ffa532abcbd 18301 7ffa532ab99c 18300->18301 18302 7ffa532acc93 18301->18302 18304 7ffa532abada 18301->18304 18303 7ffa5329bd70 _invalid_parameter 17 API calls 18302->18303 18308 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 18302->18308 18303->18308 18307 7ffa5329bd70 _invalid_parameter 17 API calls 18304->18307 18305 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18306 7ffa532acd90 18305->18306 18307->18308 18308->18305 17117 7ffa532a9fba 17125 7ffa532a9c4d 17117->17125 17118 7ffa532aa06d WriteFile 17119 7ffa532aa103 GetLastError 17118->17119 17118->17125 17124 7ffa532a9dd9 _dosmaperr __doserrno 17119->17124 17120 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17122 7ffa532aa9f5 17120->17122 17121 7ffa532a9f66 WideCharToMultiByte 17123 7ffa532a9fbf WriteFile 17121->17123 17121->17124 17123->17125 17127 7ffa532aa050 GetLastError 17123->17127 17124->17120 17125->17118 17125->17121 17125->17124 17126 7ffa532afc00 WriteConsoleW CreateFileW _putwch_nolock 17125->17126 17128 7ffa532aa158 GetLastError 17125->17128 17129 7ffa532af330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 17125->17129 17130 7ffa532aa1b5 GetLastError 17125->17130 17126->17125 17127->17124 17128->17124 17129->17125 17130->17124 18313 7ffa532a76c0 18314 7ffa532a7be3 _CrtMemDumpAllObjectsSince 18313->18314 18315 7ffa532a76cf _CrtMemDumpAllObjectsSince 18313->18315 18316 7ffa532a7cc6 WideCharToMultiByte 18314->18316 18326 7ffa532a76e6 _LocaleUpdate::~_LocaleUpdate 18314->18326 18317 7ffa532a7905 _CrtMemDumpAllObjectsSince 18315->18317 18318 7ffa532a77f5 _CrtMemDumpAllObjectsSince wcsncnt 18315->18318 18315->18326 18316->18326 18319 7ffa532a790f WideCharToMultiByte 18317->18319 18322 7ffa532a7827 WideCharToMultiByte 18318->18322 18321 7ffa532a7965 18319->18321 18320 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18323 7ffa532a7d85 18320->18323 18324 7ffa532a799a GetLastError 18321->18324 18321->18326 18322->18326 18324->18326 18327 7ffa532a79d3 _CrtMemDumpAllObjectsSince 18324->18327 18325 7ffa532a7a05 WideCharToMultiByte 18325->18326 18325->18327 18326->18320 18327->18325 18327->18326 17135 7ffa53296c32 17136 7ffa53296c3c 17135->17136 17137 7ffa53296c7a _CrtMemDumpAllObjectsSince 17136->17137 17138 7ffa53296e25 _LocaleUpdate::~_LocaleUpdate 17136->17138 17141 7ffa5329c260 _CrtMemDumpAllObjectsSince_stat 3 API calls 17137->17141 17142 7ffa53296ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 17137->17142 17139 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17138->17139 17140 7ffa53296e89 17139->17140 17141->17142 17143 7ffa5329c0c0 _swprintf_p 17 API calls 17142->17143 17145 7ffa53296dc7 17143->17145 17144 7ffa53296e12 17145->17144 17146 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 17145->17146 17146->17144 16209 7ffa53293433 16210 7ffa53293437 16209->16210 16211 7ffa53293446 16209->16211 16217 7ffa53297d00 16210->16217 16219 7ffa53297d0e 16217->16219 16218 7ffa5329343c 16221 7ffa53293e00 16218->16221 16219->16218 16220 7ffa53297d87 DeleteCriticalSection 16219->16220 16220->16219 16222 7ffa53293e23 16221->16222 16223 7ffa53293e0d FlsFree 16221->16223 16227 7ffa532990b0 16222->16227 16223->16222 16226 7ffa532988d0 HeapDestroy 16226->16211 16230 7ffa532990be 16227->16230 16228 7ffa532990fd DeleteCriticalSection 16228->16230 16229 7ffa53293441 16229->16226 16230->16228 16231 7ffa5329914d 16230->16231 16231->16229 16232 7ffa53299196 DeleteCriticalSection 16231->16232 16232->16231 17147 7ffa532ac435 17148 7ffa532ac479 _CrtMemDumpAllObjectsSince 17147->17148 17149 7ffa532ac598 DecodePointer 17148->17149 17150 7ffa532ac60d _CrtMemDumpAllObjectsSince 17149->17150 17151 7ffa532ac652 _CrtMemDumpAllObjectsSince 17150->17151 17152 7ffa532ac62b DecodePointer 17150->17152 17153 7ffa532ac676 DecodePointer 17151->17153 17162 7ffa532ac69d std::exception::_Copy_str 17151->17162 17152->17151 17153->17162 17154 7ffa532ab99c 17155 7ffa532acc93 17154->17155 17158 7ffa532abada 17154->17158 17156 7ffa5329bd70 _invalid_parameter 17 API calls 17155->17156 17159 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 17155->17159 17156->17159 17157 7ffa532ab530 wctomb_s 19 API calls 17157->17162 17163 7ffa5329bd70 _invalid_parameter 17 API calls 17158->17163 17160 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17159->17160 17161 7ffa532acd90 17160->17161 17162->17154 17162->17157 17163->17159 18328 7ffa532a9939 18329 7ffa532a9951 __doserrno 18328->18329 18330 7ffa5329bd70 _invalid_parameter 17 API calls 18329->18330 18331 7ffa532a99d7 18330->18331 18332 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18331->18332 18333 7ffa532aa9f5 18332->18333 18345 7ffa5329b12b 18346 7ffa5329b14c 18345->18346 18347 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 18346->18347 18348 7ffa5329b2e0 18346->18348 18347->18348 18349 7ffa5329b33e 18348->18349 18350 7ffa5329d490 std::exception::_Copy_str 17 API calls 18348->18350 18351 7ffa532a0cc0 25 API calls 18349->18351 18353 7ffa5329b311 18350->18353 18352 7ffa5329b358 18351->18352 18354 7ffa5329b37d 18352->18354 18356 7ffa5329cff0 terminate 34 API calls 18352->18356 18355 7ffa53297ff0 _invoke_watson_if_error 16 API calls 18353->18355 18359 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18354->18359 18355->18349 18357 7ffa5329b373 18356->18357 18358 7ffa53297090 _exit 33 API calls 18357->18358 18358->18354 18360 7ffa5329b3a0 18359->18360 18361 7ffa532aff2d 18362 7ffa532aff37 18361->18362 18363 7ffa532b0042 18362->18363 18367 7ffa532aff47 18362->18367 18376 7ffa53299360 LeaveCriticalSection 18363->18376 18365 7ffa532b003d 18366 7ffa532b004c 18367->18365 18368 7ffa532aae90 _lock_file2 EnterCriticalSection 18367->18368 18369 7ffa532aff97 18368->18369 18370 7ffa532affd0 18369->18370 18371 7ffa532affbb 18369->18371 18372 7ffa532affe1 18369->18372 18373 7ffa532aaf60 _unlock_file2 2 API calls 18370->18373 18374 7ffa532afd70 _fflush_nolock 25 API calls 18371->18374 18372->18370 18375 7ffa532afd70 _fflush_nolock 25 API calls 18372->18375 18373->18365 18374->18370 18375->18370 18376->18366 17173 7ffa532ad830 17174 7ffa532ad8aa 17173->17174 17175 7ffa532ad926 17174->17175 17177 7ffa532ad97b 17174->17177 17176 7ffa5329bd70 _invalid_parameter 17 API calls 17175->17176 17182 7ffa532ad95a _LocaleUpdate::~_LocaleUpdate 17176->17182 17178 7ffa532ada43 17177->17178 17179 7ffa532ad9ee 17177->17179 17184 7ffa532aeca1 17178->17184 17186 7ffa532adbb5 17178->17186 17180 7ffa5329bd70 _invalid_parameter 17 API calls 17179->17180 17180->17182 17181 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17183 7ffa532aed9e 17181->17183 17182->17181 17184->17182 17185 7ffa5329bd70 _invalid_parameter 17 API calls 17184->17185 17185->17182 17187 7ffa5329bd70 _invalid_parameter 17 API calls 17186->17187 17187->17182 16284 7ffa53293d30 16302 7ffa53297540 16284->16302 16289 7ffa53293d42 16293 7ffa53293e00 3 API calls 16289->16293 16290 7ffa53293d4e FlsAlloc 16291 7ffa53293d73 _calloc_dbg 16290->16291 16292 7ffa53293d6a 16290->16292 16296 7ffa53293da4 FlsSetValue 16291->16296 16297 7ffa53293db9 16291->16297 16294 7ffa53293e00 3 API calls 16292->16294 16295 7ffa53293d47 16293->16295 16294->16295 16296->16297 16298 7ffa53293dc2 16296->16298 16299 7ffa53293e00 3 API calls 16297->16299 16311 7ffa53293e30 16298->16311 16299->16295 16317 7ffa53293d00 RtlEncodePointer 16302->16317 16304 7ffa53297549 _initp_misc_winsig 16318 7ffa5329cf20 EncodePointer 16304->16318 16306 7ffa53293d39 16307 7ffa53298fe0 16306->16307 16310 7ffa53298ff6 16307->16310 16308 7ffa53293d3e 16308->16289 16308->16290 16309 7ffa53299022 InitializeCriticalSectionAndSpinCount 16309->16308 16309->16310 16310->16308 16310->16309 16312 7ffa53293ead 16311->16312 16319 7ffa53299360 LeaveCriticalSection 16312->16319 16314 7ffa53293ec7 _updatetlocinfoEx_nolock 16320 7ffa53299360 LeaveCriticalSection 16314->16320 16316 7ffa53293dce GetCurrentThreadId 16316->16295 16317->16304 16318->16306 16319->16314 16320->16316 18390 7ffa53293130 18391 7ffa53293170 __GSHandlerCheck 8 API calls 18390->18391 18392 7ffa53293160 18391->18392 17188 7ffa5329e830 17189 7ffa5329e857 17188->17189 17192 7ffa532a3cc0 17189->17192 17193 7ffa532a3cdd 17192->17193 17195 7ffa532a3d82 17193->17195 17197 7ffa532a3ef3 __SehTransFilter 17193->17197 17209 7ffa5329e8e3 17193->17209 17196 7ffa532a3e40 17195->17196 17198 7ffa532a3dc8 17195->17198 17195->17209 17202 7ffa532a3e93 17196->17202 17203 7ffa5329cf80 _inconsistency 36 API calls 17196->17203 17207 7ffa532a3ebd 17196->17207 17197->17209 17234 7ffa532a40b0 17197->17234 17210 7ffa532a3a60 17198->17210 17206 7ffa532a4f20 __SehTransFilter 36 API calls 17202->17206 17203->17202 17204 7ffa532a3e08 17220 7ffa532a4f20 17204->17220 17206->17207 17207->17209 17227 7ffa5329e790 17207->17227 17211 7ffa532a3a7b 17210->17211 17212 7ffa532a3a7d 17210->17212 17214 7ffa5329cf80 _inconsistency 36 API calls 17211->17214 17215 7ffa532a3aa5 17211->17215 17213 7ffa5329cf80 _inconsistency 36 API calls 17212->17213 17213->17211 17214->17215 17215->17204 17216 7ffa5329cf80 DecodePointer 17215->17216 17217 7ffa5329cf9e 17216->17217 17279 7ffa5329cf50 17217->17279 17311 7ffa532a3b70 17220->17311 17222 7ffa5329cf80 _inconsistency 36 API calls 17226 7ffa532a4f55 __SehTransFilter _SetImageBase __SetState 17222->17226 17223 7ffa532a5103 17224 7ffa532a514a __SetState 17223->17224 17225 7ffa5329cf80 _inconsistency 36 API calls 17223->17225 17224->17209 17225->17224 17226->17222 17226->17223 17318 7ffa5329e500 17227->17318 17230 7ffa532a3b40 __StateFromControlPc 36 API calls 17231 7ffa5329e7d0 __SehTransFilter 17230->17231 17232 7ffa532a4f20 __SehTransFilter 36 API calls 17231->17232 17233 7ffa5329e81e 17232->17233 17233->17209 17235 7ffa532a3b40 __StateFromControlPc 36 API calls 17234->17235 17236 7ffa532a40ea 17235->17236 17237 7ffa5329e500 __SetUnwindTryBlock 37 API calls 17236->17237 17238 7ffa532a4110 17237->17238 17323 7ffa532a3c70 17238->17323 17241 7ffa532a4133 __SetState 17326 7ffa532a3c00 17241->17326 17242 7ffa532a4176 17243 7ffa532a3c70 __GetUnwindTryBlock 37 API calls 17242->17243 17244 7ffa532a4174 17243->17244 17246 7ffa5329cf80 _inconsistency 36 API calls 17244->17246 17262 7ffa532a41af _ValidateRead _SetThrowImageBase 17244->17262 17246->17262 17247 7ffa532a47d9 17250 7ffa532a47f3 17247->17250 17251 7ffa532a4847 17247->17251 17255 7ffa532a47d7 17247->17255 17248 7ffa532a4347 17248->17247 17249 7ffa532a43f5 17248->17249 17259 7ffa532a466c __SehTransFilter 17249->17259 17341 7ffa5329ea30 17249->17341 17356 7ffa532a4960 17250->17356 17253 7ffa5329cf50 terminate 35 API calls 17251->17253 17253->17255 17254 7ffa532a4235 17254->17209 17255->17254 17257 7ffa5329cf80 _inconsistency 36 API calls 17255->17257 17257->17254 17258 7ffa532a4450 __SehTransFilter 17258->17259 17346 7ffa532a5180 17258->17346 17259->17255 17260 7ffa532a5bb0 __SehTransFilter 36 API calls 17259->17260 17261 7ffa532a4727 17260->17261 17261->17255 17263 7ffa5329e500 __SetUnwindTryBlock 37 API calls 17261->17263 17262->17248 17262->17254 17264 7ffa5329cf80 _inconsistency 36 API calls 17262->17264 17267 7ffa532a428e 17262->17267 17265 7ffa532a4767 17263->17265 17264->17267 17353 7ffa5329edc0 RtlUnwindEx 17265->17353 17268 7ffa5329cf80 _inconsistency 36 API calls 17267->17268 17269 7ffa532a42fa 17267->17269 17268->17269 17269->17248 17329 7ffa532a5bb0 17269->17329 17272 7ffa532a4340 __SehTransFilter 17272->17248 17273 7ffa532a4393 17272->17273 17274 7ffa532a435a __SehTransFilter 17272->17274 17275 7ffa5329cf50 terminate 35 API calls 17273->17275 17335 7ffa532a4870 17274->17335 17275->17248 17281 7ffa5329cf59 17279->17281 17283 7ffa532a39e0 17281->17283 17284 7ffa532a39fa 17283->17284 17293 7ffa5329d430 DecodePointer 17284->17293 17286 7ffa532a3a09 17289 7ffa532a3a20 17286->17289 17294 7ffa5329cff0 17286->17294 17288 7ffa532a3a42 17306 7ffa53297090 17288->17306 17289->17288 17290 7ffa5329be50 _invalid_parameter 14 API calls 17289->17290 17290->17288 17293->17286 17297 7ffa5329d02a 17294->17297 17295 7ffa5329d1d8 DecodePointer 17296 7ffa5329d1e8 17295->17296 17298 7ffa5329d1f0 17296->17298 17301 7ffa53297090 _exit 33 API calls 17296->17301 17302 7ffa5329d209 17296->17302 17297->17295 17299 7ffa5329bd70 _invalid_parameter 17 API calls 17297->17299 17298->17289 17300 7ffa5329d1ce 17299->17300 17300->17295 17300->17298 17301->17302 17303 7ffa5329d289 17302->17303 17309 7ffa53293d00 RtlEncodePointer 17302->17309 17303->17298 17310 7ffa53299360 LeaveCriticalSection 17303->17310 17307 7ffa53297280 _exit 33 API calls 17306->17307 17308 7ffa532970a9 17307->17308 17308->17204 17309->17303 17310->17298 17312 7ffa532a3b9a 17311->17312 17314 7ffa532a3ba9 17311->17314 17315 7ffa532a3b40 17312->17315 17314->17226 17316 7ffa532a3a60 __StateFromControlPc 36 API calls 17315->17316 17317 7ffa532a3b65 17316->17317 17317->17314 17319 7ffa532a3b40 __StateFromControlPc 36 API calls 17318->17319 17320 7ffa5329e539 17319->17320 17321 7ffa5329e5c2 RtlLookupFunctionEntry 17320->17321 17322 7ffa5329e601 17320->17322 17321->17322 17322->17230 17324 7ffa5329e500 __SetUnwindTryBlock 37 API calls 17323->17324 17325 7ffa532a3c9c 17324->17325 17325->17241 17325->17242 17327 7ffa5329e500 __SetUnwindTryBlock 37 API calls 17326->17327 17328 7ffa532a3c31 17327->17328 17328->17244 17330 7ffa532a5bc6 17329->17330 17331 7ffa532a5bc8 17329->17331 17333 7ffa5329cf50 terminate 35 API calls 17330->17333 17334 7ffa532a5bda __SehTransFilter 17330->17334 17332 7ffa5329cf80 _inconsistency 36 API calls 17331->17332 17332->17330 17333->17334 17334->17272 17366 7ffa532ad4e0 17335->17366 17338 7ffa532ad320 17340 7ffa532ad375 17338->17340 17339 7ffa532ad3ba RaiseException 17339->17248 17340->17339 17342 7ffa532a3b40 __StateFromControlPc 36 API calls 17341->17342 17343 7ffa5329ea6f 17342->17343 17344 7ffa5329cf80 _inconsistency 36 API calls 17343->17344 17345 7ffa5329ea7a 17343->17345 17344->17345 17345->17258 17347 7ffa5329e500 __SetUnwindTryBlock 37 API calls 17346->17347 17348 7ffa532a51c1 17347->17348 17349 7ffa532a51f0 __SehTransFilter 17348->17349 17373 7ffa532a5970 17348->17373 17351 7ffa5329edc0 __SehTransFilter 9 API calls 17349->17351 17352 7ffa532a5259 17351->17352 17352->17258 17354 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17353->17354 17355 7ffa5329eee7 17354->17355 17355->17255 17358 7ffa532a4990 17356->17358 17363 7ffa532a498b 17356->17363 17357 7ffa532a49b2 __SehTransFilter 17359 7ffa532a4a41 17357->17359 17360 7ffa5329cf80 _inconsistency 36 API calls 17357->17360 17357->17363 17358->17357 17390 7ffa53293d00 RtlEncodePointer 17358->17390 17361 7ffa5329ea30 __SehTransFilter 36 API calls 17359->17361 17360->17359 17364 7ffa532a4a8e __SehTransFilter 17361->17364 17363->17255 17364->17363 17365 7ffa532a5180 __SehTransFilter 38 API calls 17364->17365 17365->17363 17369 7ffa532ad660 17366->17369 17370 7ffa532a437d 17369->17370 17371 7ffa532ad676 std::exception::_Copy_str malloc 17369->17371 17370->17338 17371->17370 17372 7ffa5329d490 std::exception::_Copy_str 17 API calls 17371->17372 17372->17370 17374 7ffa532a5998 17373->17374 17377 7ffa532a55f0 17374->17377 17376 7ffa532a59d3 __SehTransFilter __AdjustPointer 17376->17349 17378 7ffa532a561e __SehTransFilter 17377->17378 17379 7ffa532a5765 17378->17379 17380 7ffa532a56fa _ValidateRead 17378->17380 17388 7ffa532a56aa __SehTransFilter __AdjustPointer 17378->17388 17381 7ffa532a577a _ValidateRead 17379->17381 17382 7ffa532a5813 __SehTransFilter 17379->17382 17383 7ffa5329cf80 _inconsistency 36 API calls 17380->17383 17380->17388 17384 7ffa5329cf80 _inconsistency 36 API calls 17381->17384 17381->17388 17385 7ffa532a584d _ValidateRead 17382->17385 17389 7ffa532a58c6 __SehTransFilter _ValidateExecute _ValidateRead 17382->17389 17383->17388 17384->17388 17386 7ffa5329cf80 _inconsistency 36 API calls 17385->17386 17385->17388 17386->17388 17387 7ffa5329cf80 _inconsistency 36 API calls 17387->17388 17388->17376 17389->17387 17389->17388 17390->17357 17391 7ffa532ae424 17392 7ffa532ae469 _CrtMemDumpAllObjectsSince 17391->17392 17393 7ffa532ae588 DecodePointer 17392->17393 17394 7ffa532ae5fd _CrtMemDumpAllObjectsSince 17393->17394 17395 7ffa532ae642 _CrtMemDumpAllObjectsSince 17394->17395 17396 7ffa532ae61b DecodePointer 17394->17396 17397 7ffa532ae666 DecodePointer 17395->17397 17398 7ffa532ae68d std::exception::_Copy_str 17395->17398 17396->17395 17397->17398 17399 7ffa532aeadf 17398->17399 17409 7ffa532ada75 17398->17409 17420 7ffa532aeec0 17398->17420 17424 7ffa532aef10 17399->17424 17402 7ffa532aeafd 17403 7ffa532aeb33 17402->17403 17405 7ffa532aeec0 25 API calls 17402->17405 17404 7ffa532aec29 17403->17404 17418 7ffa532aeb49 _CrtMemDumpAllObjectsSince 17403->17418 17406 7ffa532aebda 17404->17406 17407 7ffa532aef10 25 API calls 17404->17407 17405->17403 17406->17409 17410 7ffa532aeec0 25 API calls 17406->17410 17407->17406 17408 7ffa532aeca1 17411 7ffa5329bd70 _invalid_parameter 17 API calls 17408->17411 17414 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 17408->17414 17409->17408 17413 7ffa532adbb5 17409->17413 17410->17409 17411->17414 17412 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17415 7ffa532aed9e 17412->17415 17417 7ffa5329bd70 _invalid_parameter 17 API calls 17413->17417 17414->17412 17417->17414 17418->17406 17428 7ffa532af000 17418->17428 17435 7ffa532aee40 17418->17435 17422 7ffa532aeed7 17420->17422 17421 7ffa532aee40 25 API calls 17421->17422 17422->17421 17423 7ffa532aef07 17422->17423 17423->17399 17426 7ffa532aef2c 17424->17426 17425 7ffa532aef4d 17425->17402 17426->17425 17427 7ffa532aee40 25 API calls 17426->17427 17427->17426 17429 7ffa532af026 _CrtMemDumpAllObjectsSince wcsxfrm 17428->17429 17433 7ffa532af031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 17428->17433 17430 7ffa532af276 _CrtMemDumpAllObjectsSince 17429->17430 17431 7ffa532af146 _CrtMemDumpAllObjectsSince 17429->17431 17429->17433 17432 7ffa532af29d MultiByteToWideChar 17430->17432 17431->17433 17434 7ffa532af1b5 MultiByteToWideChar 17431->17434 17432->17433 17433->17418 17434->17433 17436 7ffa532aee62 17435->17436 17438 7ffa532aee6e 17436->17438 17439 7ffa532af360 17436->17439 17438->17418 17440 7ffa532af719 17439->17440 17441 7ffa532af399 17439->17441 17443 7ffa532b0170 23 API calls 17440->17443 17474 7ffa532af4f2 17440->17474 17442 7ffa532aafb0 _fflush_nolock 17 API calls 17441->17442 17444 7ffa532af3a6 17442->17444 17443->17474 17446 7ffa532af3ed 17444->17446 17448 7ffa532aafb0 _fflush_nolock 17 API calls 17444->17448 17445 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17447 7ffa532af7c5 17445->17447 17449 7ffa532af4c7 17446->17449 17451 7ffa532aafb0 _fflush_nolock 17 API calls 17446->17451 17447->17438 17450 7ffa532af3b8 17448->17450 17449->17474 17475 7ffa532b0170 17449->17475 17450->17446 17454 7ffa532aafb0 _fflush_nolock 17 API calls 17450->17454 17453 7ffa532af43d 17451->17453 17456 7ffa532af484 17453->17456 17458 7ffa532aafb0 _fflush_nolock 17 API calls 17453->17458 17455 7ffa532af3ca 17454->17455 17457 7ffa532aafb0 _fflush_nolock 17 API calls 17455->17457 17456->17449 17459 7ffa532af561 17456->17459 17457->17446 17460 7ffa532af44f 17458->17460 17461 7ffa532aafb0 _fflush_nolock 17 API calls 17459->17461 17460->17456 17463 7ffa532aafb0 _fflush_nolock 17 API calls 17460->17463 17462 7ffa532af56e 17461->17462 17464 7ffa532af5b8 17462->17464 17466 7ffa532aafb0 _fflush_nolock 17 API calls 17462->17466 17465 7ffa532af461 17463->17465 17464->17440 17468 7ffa532af604 17464->17468 17467 7ffa532aafb0 _fflush_nolock 17 API calls 17465->17467 17469 7ffa532af580 17466->17469 17467->17456 17470 7ffa532ab530 wctomb_s 19 API calls 17468->17470 17469->17464 17471 7ffa532aafb0 _fflush_nolock 17 API calls 17469->17471 17470->17474 17472 7ffa532af592 17471->17472 17473 7ffa532aafb0 _fflush_nolock 17 API calls 17472->17473 17473->17464 17474->17445 17477 7ffa532b0185 17475->17477 17476 7ffa532aafb0 _fflush_nolock 17 API calls 17478 7ffa532b01c7 17476->17478 17477->17476 17480 7ffa532b01dc 17478->17480 17481 7ffa532b0326 17478->17481 17483 7ffa532aab10 17478->17483 17480->17474 17481->17480 17487 7ffa532a9290 17481->17487 17484 7ffa532aab35 17483->17484 17485 7ffa532aab23 17483->17485 17484->17485 17486 7ffa5329bd70 _invalid_parameter 17 API calls 17484->17486 17485->17481 17486->17485 17488 7ffa532a92d8 17487->17488 17495 7ffa532a92b6 __doserrno 17487->17495 17489 7ffa532a938c 17488->17489 17490 7ffa532a9341 __doserrno 17488->17490 17491 7ffa532a945b 17489->17491 17496 7ffa532a9410 __doserrno 17489->17496 17493 7ffa5329bd70 _invalid_parameter 17 API calls 17490->17493 17492 7ffa532afae0 _fflush_nolock 3 API calls 17491->17492 17494 7ffa532a9464 17492->17494 17493->17495 17499 7ffa532a94a6 __doserrno 17494->17499 17501 7ffa532a9520 17494->17501 17495->17480 17498 7ffa5329bd70 _invalid_parameter 17 API calls 17496->17498 17498->17495 17507 7ffa532afbc0 LeaveCriticalSection 17499->17507 17502 7ffa532af900 _fflush_nolock 17 API calls 17501->17502 17503 7ffa532a9545 17502->17503 17504 7ffa532a959d SetFilePointer 17503->17504 17506 7ffa532a9552 _dosmaperr 17503->17506 17505 7ffa532a95c1 GetLastError 17504->17505 17504->17506 17505->17506 17506->17499 17507->17495 17508 7ffa53295a25 17509 7ffa53295a37 17508->17509 17510 7ffa5329bd70 _invalid_parameter 17 API calls 17509->17510 17511 7ffa53295aaf 17510->17511 18393 7ffa53299328 18394 7ffa53299336 EnterCriticalSection 18393->18394 18395 7ffa5329932c 18393->18395 18395->18394 16518 7ffa5329461b 16521 7ffa53294625 _calloc_dbg_impl 16518->16521 16520 7ffa532948be 16522 7ffa53299360 LeaveCriticalSection 16521->16522 16522->16520 18404 7ffa532a4920 18407 7ffa532ad530 18404->18407 18410 7ffa532ad580 18407->18410 18411 7ffa532ad59a std::exception::_Tidy 18410->18411 18413 7ffa532a493d 18410->18413 18412 7ffa532ad660 std::exception::_Copy_str 17 API calls 18411->18412 18411->18413 18412->18413 17512 7ffa532a0215 17513 7ffa532a0231 17512->17513 17519 7ffa532a0302 17512->17519 17583 7ffa532a8c80 17513->17583 17516 7ffa532a0489 17593 7ffa532a2d80 17516->17593 17517 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17521 7ffa532a027e OutputDebugStringW 17517->17521 17520 7ffa532a040d 17519->17520 17590 7ffa532a8c30 17519->17590 17520->17516 17523 7ffa532a1640 17 API calls 17520->17523 17524 7ffa532a0296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 17521->17524 17522 7ffa532a04a3 17525 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17522->17525 17527 7ffa532a045c 17523->17527 17531 7ffa532a02f2 17524->17531 17529 7ffa532a04d0 17525->17529 17530 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17527->17530 17532 7ffa532a053d 17529->17532 17534 7ffa532a2d80 17 API calls 17529->17534 17537 7ffa532a0583 17529->17537 17530->17516 17540 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17531->17540 17533 7ffa532a2d80 17 API calls 17532->17533 17535 7ffa532a0556 17533->17535 17538 7ffa532a0510 17534->17538 17539 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17535->17539 17536 7ffa532a0357 17541 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 17536->17541 17542 7ffa532a03af 17536->17542 17606 7ffa532a1590 17537->17606 17543 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17538->17543 17539->17537 17544 7ffa532a0cae 17540->17544 17541->17542 17542->17520 17545 7ffa532a1640 17 API calls 17542->17545 17543->17532 17547 7ffa532a03e0 17545->17547 17548 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17547->17548 17548->17520 17549 7ffa532a05fa 17550 7ffa532a0652 17549->17550 17551 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 17549->17551 17552 7ffa532a1640 17 API calls 17550->17552 17555 7ffa532a06b0 17550->17555 17551->17550 17553 7ffa532a0683 17552->17553 17554 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17553->17554 17554->17555 17556 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 17555->17556 17557 7ffa532a0769 17556->17557 17558 7ffa5329d490 std::exception::_Copy_str 17 API calls 17557->17558 17570 7ffa532a07bd 17557->17570 17559 7ffa532a0790 17558->17559 17560 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17559->17560 17560->17570 17561 7ffa532a0905 17561->17531 17562 7ffa532a09a4 GetFileType 17561->17562 17575 7ffa532a0a26 17561->17575 17566 7ffa532a09d0 17562->17566 17572 7ffa532a09ce 17562->17572 17563 7ffa532a0ba5 17563->17531 17567 7ffa532a0c23 17563->17567 17569 7ffa532a8c80 _itow_s 17 API calls 17563->17569 17564 7ffa532a0b97 OutputDebugStringW 17564->17563 17568 7ffa532a09dd WriteConsoleW 17566->17568 17610 7ffa5329b470 17567->17610 17571 7ffa532a0a2b GetLastError 17568->17571 17568->17575 17573 7ffa532a0bf6 17569->17573 17570->17561 17609 7ffa53299360 LeaveCriticalSection 17570->17609 17571->17572 17571->17575 17576 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 17572->17576 17577 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17573->17577 17575->17563 17575->17564 17578 7ffa532a0ab5 17576->17578 17577->17567 17579 7ffa532a0b26 WriteFile 17578->17579 17581 7ffa532a0ad0 17578->17581 17579->17575 17582 7ffa532a0add WriteFile 17581->17582 17582->17575 17584 7ffa532a8cd3 17583->17584 17585 7ffa532a8ca6 17583->17585 17586 7ffa532a8d00 _itow_s 17 API calls 17584->17586 17585->17584 17587 7ffa532a8cad 17585->17587 17588 7ffa532a0251 17586->17588 17636 7ffa532a8d00 17587->17636 17588->17517 17652 7ffa532a86b0 17590->17652 17592 7ffa532a8c74 17592->17536 17595 7ffa532a2da1 17593->17595 17594 7ffa532a2e02 17597 7ffa5329bd70 _invalid_parameter 17 API calls 17594->17597 17595->17594 17596 7ffa532a2e40 _calloc_dbg_impl 17595->17596 17598 7ffa532a2f34 17596->17598 17602 7ffa532a2f72 _calloc_dbg_impl 17596->17602 17600 7ffa532a2e36 _calloc_dbg_impl 17597->17600 17601 7ffa5329bd70 _invalid_parameter 17 API calls 17598->17601 17599 7ffa532a30b5 17603 7ffa5329bd70 _invalid_parameter 17 API calls 17599->17603 17600->17522 17601->17600 17602->17599 17604 7ffa532a30f3 _calloc_dbg_impl 17602->17604 17603->17600 17604->17600 17605 7ffa5329bd70 _invalid_parameter 17 API calls 17604->17605 17605->17600 17607 7ffa532a86b0 _snwprintf_s 17 API calls 17606->17607 17608 7ffa532a15de 17607->17608 17608->17549 17609->17561 17611 7ffa5329b48d 17610->17611 17612 7ffa5329b4c4 17611->17612 17613 7ffa5329b4ce GetModuleFileNameW 17611->17613 17616 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17612->17616 17614 7ffa5329b4f2 17613->17614 17620 7ffa5329b538 17613->17620 17615 7ffa532a1640 17 API calls 17614->17615 17617 7ffa5329b50b 17615->17617 17618 7ffa5329ba58 17616->17618 17619 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17617->17619 17618->17531 17619->17620 17624 7ffa5329b5f2 17620->17624 17674 7ffa532a0fd0 17620->17674 17622 7ffa5329b5c5 17623 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17622->17623 17623->17624 17625 7ffa532a1590 _snwprintf_s 17 API calls 17624->17625 17626 7ffa5329b940 17625->17626 17627 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 17626->17627 17628 7ffa5329b998 17626->17628 17627->17628 17629 7ffa532a1640 17 API calls 17628->17629 17632 7ffa5329b9f6 17628->17632 17630 7ffa5329b9c9 17629->17630 17631 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17630->17631 17631->17632 17632->17612 17633 7ffa5329cff0 terminate 34 API calls 17632->17633 17634 7ffa5329ba2b 17633->17634 17635 7ffa53297090 _exit 33 API calls 17634->17635 17635->17612 17638 7ffa532a8d25 17636->17638 17637 7ffa532a8d7b 17639 7ffa5329bd70 _invalid_parameter 17 API calls 17637->17639 17638->17637 17641 7ffa532a8db9 17638->17641 17649 7ffa532a8daf 17639->17649 17640 7ffa532a8e1a 17642 7ffa5329bd70 _invalid_parameter 17 API calls 17640->17642 17641->17640 17643 7ffa532a8e58 _calloc_dbg_impl 17641->17643 17642->17649 17644 7ffa532a8f5d 17643->17644 17646 7ffa532a8f9b 17643->17646 17645 7ffa5329bd70 _invalid_parameter 17 API calls 17644->17645 17645->17649 17647 7ffa532a900e 17646->17647 17650 7ffa532a904c 17646->17650 17648 7ffa5329bd70 _invalid_parameter 17 API calls 17647->17648 17648->17649 17649->17588 17650->17649 17651 7ffa5329bd70 _invalid_parameter 17 API calls 17650->17651 17651->17649 17654 7ffa532a86e6 17652->17654 17653 7ffa532a873c 17655 7ffa5329bd70 _invalid_parameter 17 API calls 17653->17655 17654->17653 17656 7ffa532a877a 17654->17656 17664 7ffa532a8770 _calloc_dbg_impl 17655->17664 17657 7ffa532a884c 17656->17657 17658 7ffa532a880e 17656->17658 17656->17664 17659 7ffa532a8992 17657->17659 17660 7ffa532a8862 17657->17660 17661 7ffa5329bd70 _invalid_parameter 17 API calls 17658->17661 17662 7ffa532a8350 _snwprintf_s 17 API calls 17659->17662 17667 7ffa532a8350 17660->17667 17661->17664 17665 7ffa532a88b1 _calloc_dbg_impl 17662->17665 17664->17592 17665->17664 17666 7ffa5329bd70 _invalid_parameter 17 API calls 17665->17666 17666->17664 17669 7ffa532a839b 17667->17669 17668 7ffa532a83f1 17670 7ffa5329bd70 _invalid_parameter 17 API calls 17668->17670 17669->17668 17671 7ffa532a842f 17669->17671 17673 7ffa532a8425 17670->17673 17672 7ffa5329bd70 _invalid_parameter 17 API calls 17671->17672 17671->17673 17672->17673 17673->17665 17676 7ffa532a0ff7 17674->17676 17678 7ffa532a0ff0 __SehTransFilter 17674->17678 17675 7ffa532a1055 17677 7ffa5329bd70 _invalid_parameter 17 API calls 17675->17677 17676->17675 17679 7ffa532a1093 _calloc_dbg_impl 17676->17679 17677->17678 17678->17622 17679->17678 17680 7ffa532a111a 17679->17680 17682 7ffa532a1158 17679->17682 17681 7ffa5329bd70 _invalid_parameter 17 API calls 17680->17681 17681->17678 17682->17678 17683 7ffa5329bd70 _invalid_parameter 17 API calls 17682->17683 17683->17678 17684 7ffa5329ae14 17685 7ffa5329b390 17684->17685 17686 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17685->17686 17687 7ffa5329b3a0 17686->17687 17688 7ffa53297816 17689 7ffa53297826 _calloc_dbg 17688->17689 17692 7ffa53297a32 InitializeCriticalSectionAndSpinCount 17689->17692 17693 7ffa53297a19 GetFileType 17689->17693 17695 7ffa53297ab9 17689->17695 17690 7ffa53297ce0 SetHandleCount 17691 7ffa53297aaf 17690->17691 17692->17691 17692->17695 17693->17692 17693->17695 17694 7ffa53297b95 GetStdHandle 17696 7ffa53297c7b 17694->17696 17697 7ffa53297bb9 17694->17697 17695->17690 17695->17694 17695->17696 17696->17690 17697->17696 17698 7ffa53297bc8 GetFileType 17697->17698 17698->17696 17699 7ffa53297beb InitializeCriticalSectionAndSpinCount 17698->17699 17699->17691 17699->17696 18456 7ffa532ac30d 18458 7ffa532ac31a get_int64_arg _get_printf_count_output 18456->18458 18457 7ffa532ac3f2 18465 7ffa532ab99c 18457->18465 18466 7ffa532ab530 wctomb_s 19 API calls 18457->18466 18458->18457 18459 7ffa532ac39d 18458->18459 18460 7ffa5329bd70 _invalid_parameter 17 API calls 18459->18460 18468 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 18460->18468 18461 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18463 7ffa532acd90 18461->18463 18462 7ffa532acc93 18464 7ffa5329bd70 _invalid_parameter 17 API calls 18462->18464 18462->18468 18464->18468 18465->18462 18467 7ffa532abada 18465->18467 18466->18457 18469 7ffa5329bd70 _invalid_parameter 17 API calls 18467->18469 18468->18461 18469->18468 17701 7ffa532ad410 17706 7ffa532ad3e0 17701->17706 17704 7ffa532ad43c 17713 7ffa532b0070 17706->17713 17709 7ffa532ad710 17710 7ffa532ad721 17709->17710 17711 7ffa532ad726 17709->17711 17710->17704 17718 7ffa53299360 LeaveCriticalSection 17711->17718 17716 7ffa532b0083 _free_nolock 17713->17716 17715 7ffa532ad402 17715->17704 17715->17709 17717 7ffa53299360 LeaveCriticalSection 17716->17717 17717->17715 17718->17710 16321 7ffa53293110 16324 7ffa532911e0 16321->16324 16325 7ffa532911f8 ExitProcess 16324->16325 17719 7ffa532a2c10 17720 7ffa532a2c53 17719->17720 17721 7ffa532a2c24 _updatetlocinfoEx_nolock 17719->17721 17723 7ffa53299360 LeaveCriticalSection 17721->17723 17723->17720 17724 7ffa532a6203 17726 7ffa532a616e _CrtMemDumpAllObjectsSince wcsxfrm 17724->17726 17725 7ffa532a6238 MultiByteToWideChar 17727 7ffa532a61c8 _LocaleUpdate::~_LocaleUpdate 17725->17727 17726->17725 17726->17727 17728 7ffa532b0204 17729 7ffa532b023d 17728->17729 17730 7ffa532aab10 17 API calls 17729->17730 17731 7ffa532b03d7 17729->17731 17732 7ffa532b0326 17729->17732 17730->17732 17732->17731 17733 7ffa532a9290 23 API calls 17732->17733 17733->17731 17734 7ffa53293409 17735 7ffa53293e00 3 API calls 17734->17735 17736 7ffa5329340e 17735->17736 17739 7ffa532988d0 HeapDestroy 17736->17739 17738 7ffa53293413 17739->17738 18478 7ffa53293909 18479 7ffa53293913 __SehTransFilter 18478->18479 18480 7ffa53293a71 RtlUnwindEx 18479->18480 18481 7ffa532939db __SehTransFilter 18479->18481 18480->18481 18482 7ffa532ae2fc 18483 7ffa532ae309 get_int64_arg _get_printf_count_output 18482->18483 18484 7ffa532ae38c 18483->18484 18485 7ffa532ae3e1 18483->18485 18489 7ffa5329bd70 _invalid_parameter 17 API calls 18484->18489 18486 7ffa532aeadf 18485->18486 18487 7ffa532aeec0 25 API calls 18485->18487 18498 7ffa532ada75 18485->18498 18488 7ffa532aef10 25 API calls 18486->18488 18487->18486 18490 7ffa532aeafd 18488->18490 18497 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 18489->18497 18491 7ffa532aeb33 18490->18491 18493 7ffa532aeec0 25 API calls 18490->18493 18492 7ffa532aec29 18491->18492 18506 7ffa532aeb49 _CrtMemDumpAllObjectsSince 18491->18506 18494 7ffa532aebda 18492->18494 18495 7ffa532aef10 25 API calls 18492->18495 18493->18491 18494->18498 18501 7ffa532aeec0 25 API calls 18494->18501 18495->18494 18496 7ffa532aeca1 18496->18497 18502 7ffa5329bd70 _invalid_parameter 17 API calls 18496->18502 18499 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18497->18499 18498->18496 18503 7ffa532adbb5 18498->18503 18500 7ffa532aed9e 18499->18500 18501->18498 18502->18497 18505 7ffa5329bd70 _invalid_parameter 17 API calls 18503->18505 18504 7ffa532af000 wcsxfrm 2 API calls 18504->18506 18505->18497 18506->18494 18506->18504 18507 7ffa532aee40 25 API calls 18506->18507 18507->18506 17740 7ffa532953fb 17741 7ffa5329541d _realloc_dbg 17740->17741 17742 7ffa53296380 _CrtIsValidHeapPointer HeapValidate 17741->17742 17743 7ffa53295421 17741->17743 17744 7ffa532954de _calloc_dbg_impl _realloc_dbg 17742->17744 17745 7ffa5329c020 _free_base 2 API calls 17744->17745 17745->17743 16523 18000c85c 16524 18000c8c2 16523->16524 16525 1800178a8 CreateProcessW 16524->16525 16526 18000ca47 16525->16526 17746 7ffa532b1200 17749 7ffa5329ed30 17746->17749 17748 7ffa532b1212 _IsExceptionObjectToBeDestroyed __SehTransFilter 17750 7ffa5329ed3e 17749->17750 17751 7ffa5329cf80 _inconsistency 36 API calls 17750->17751 17752 7ffa5329ed4c 17750->17752 17751->17752 17753 7ffa5329ed88 17752->17753 17754 7ffa5329cf80 _inconsistency 36 API calls 17752->17754 17753->17748 17754->17753 18537 7ffa532b1370 18538 7ffa532aaf60 _unlock_file2 2 API calls 18537->18538 18539 7ffa532b1390 18538->18539 16326 7ffa53293471 16327 7ffa5329347a 16326->16327 16336 7ffa532934bc 16326->16336 16328 7ffa53293496 16327->16328 16339 7ffa532970b0 16327->16339 16330 7ffa53297d00 _ioterm DeleteCriticalSection 16328->16330 16331 7ffa5329349b 16330->16331 16332 7ffa53293e00 3 API calls 16331->16332 16333 7ffa532934a0 16332->16333 16338 7ffa532988d0 HeapDestroy 16333->16338 16335 7ffa532934a5 16335->16336 16337 7ffa53293e00 3 API calls 16335->16337 16337->16336 16338->16335 16342 7ffa53297280 16339->16342 16343 7ffa53297296 _exit 16342->16343 16344 7ffa5329744e 16343->16344 16345 7ffa532972c7 DecodePointer 16343->16345 16352 7ffa53297368 _initterm 16343->16352 16346 7ffa5329745e 16344->16346 16386 7ffa53297520 16344->16386 16347 7ffa532972e5 DecodePointer 16345->16347 16345->16352 16349 7ffa532970c3 16346->16349 16350 7ffa53297520 _exit LeaveCriticalSection 16346->16350 16360 7ffa53297314 16347->16360 16349->16328 16351 7ffa53297479 16350->16351 16389 7ffa532974e0 16351->16389 16352->16344 16366 7ffa53296210 16352->16366 16357 7ffa5329736d DecodePointer 16365 7ffa53293d00 RtlEncodePointer 16357->16365 16360->16352 16360->16357 16363 7ffa53297391 DecodePointer DecodePointer 16360->16363 16364 7ffa53293d00 RtlEncodePointer 16360->16364 16361 7ffa53297449 16379 7ffa53296f10 16361->16379 16363->16360 16364->16360 16365->16360 16367 7ffa53296229 16366->16367 16368 7ffa5329628f 16367->16368 16370 7ffa532962cb 16367->16370 16392 7ffa5329bd70 DecodePointer 16368->16392 16396 7ffa53299360 LeaveCriticalSection 16370->16396 16371 7ffa532962c3 16371->16344 16373 7ffa53297100 16371->16373 16374 7ffa53297112 16373->16374 16375 7ffa532971e4 DecodePointer 16374->16375 16376 7ffa532971fe 16375->16376 16421 7ffa53293d00 RtlEncodePointer 16376->16421 16378 7ffa53297219 16378->16361 16422 7ffa532963e0 16379->16422 16381 7ffa53296f8e 16383 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16381->16383 16382 7ffa53296f33 16382->16381 16430 7ffa53296660 16382->16430 16385 7ffa53296fa7 16383->16385 16385->16344 16498 7ffa53299360 LeaveCriticalSection 16386->16498 16388 7ffa5329752e 16388->16346 16499 7ffa53297490 GetModuleHandleW 16389->16499 16393 7ffa5329bdac 16392->16393 16394 7ffa5329bdd0 16392->16394 16393->16371 16397 7ffa5329be00 16394->16397 16396->16371 16400 7ffa5329be50 16397->16400 16401 7ffa5329be8d RtlCaptureContext RtlLookupFunctionEntry 16400->16401 16402 7ffa5329be81 _invalid_parameter 16400->16402 16403 7ffa5329bf64 16401->16403 16404 7ffa5329bf1c RtlVirtualUnwind 16401->16404 16402->16401 16405 7ffa5329bf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16403->16405 16404->16405 16408 7ffa5329bfde _invalid_parameter 16405->16408 16407 7ffa5329be2d GetCurrentProcess TerminateProcess 16407->16393 16409 7ffa53293280 16408->16409 16410 7ffa53293289 16409->16410 16411 7ffa53293294 16410->16411 16412 7ffa53293720 RtlCaptureContext RtlLookupFunctionEntry 16410->16412 16411->16407 16413 7ffa53293764 RtlVirtualUnwind 16412->16413 16414 7ffa532937a5 16412->16414 16415 7ffa532937c7 IsDebuggerPresent 16413->16415 16414->16415 16420 7ffa53298d90 16415->16420 16417 7ffa53293826 SetUnhandledExceptionFilter UnhandledExceptionFilter 16418 7ffa53293844 _invalid_parameter 16417->16418 16419 7ffa5329384e GetCurrentProcess TerminateProcess 16417->16419 16418->16419 16419->16407 16420->16417 16421->16378 16423 7ffa532963f1 16422->16423 16424 7ffa53296447 16423->16424 16428 7ffa53296480 16423->16428 16425 7ffa5329bd70 _invalid_parameter 17 API calls 16424->16425 16426 7ffa5329647b 16425->16426 16426->16382 16427 7ffa53296504 16427->16382 16428->16427 16434 7ffa53299360 LeaveCriticalSection 16428->16434 16431 7ffa53296681 _CrtMemDumpAllObjectsSince 16430->16431 16435 7ffa53296850 16431->16435 16433 7ffa53296698 _LocaleUpdate::~_LocaleUpdate 16433->16381 16434->16426 16436 7ffa53296871 16435->16436 16437 7ffa53296ba6 16436->16437 16440 7ffa532968ed _CrtIsValidPointer 16436->16440 16465 7ffa53299360 LeaveCriticalSection 16437->16465 16439 7ffa53296bb0 16439->16433 16441 7ffa53296976 16440->16441 16442 7ffa5329695e IsBadReadPtr 16440->16442 16451 7ffa5329692f 16440->16451 16443 7ffa53296ad2 16441->16443 16444 7ffa53296a29 16441->16444 16442->16441 16445 7ffa53296b2d 16443->16445 16446 7ffa53296add 16443->16446 16447 7ffa53296a86 IsBadReadPtr 16444->16447 16448 7ffa53296abe 16444->16448 16445->16451 16452 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16445->16452 16450 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16446->16450 16447->16448 16447->16451 16453 7ffa53296bf0 16448->16453 16450->16451 16451->16433 16452->16451 16454 7ffa53296c28 16453->16454 16455 7ffa53296e25 _LocaleUpdate::~_LocaleUpdate 16454->16455 16456 7ffa53296c7a _CrtMemDumpAllObjectsSince 16454->16456 16457 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16455->16457 16460 7ffa53296ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 16456->16460 16466 7ffa5329c260 16456->16466 16458 7ffa53296e89 16457->16458 16458->16451 16470 7ffa5329c0c0 16460->16470 16462 7ffa53296e12 16462->16451 16463 7ffa53296dc7 16463->16462 16473 7ffa53296ea0 16463->16473 16465->16439 16467 7ffa5329c286 _CrtMemDumpAllObjectsSince wcsxfrm 16466->16467 16469 7ffa5329c29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16467->16469 16477 7ffa5329f4d0 16467->16477 16469->16460 16488 7ffa532a2260 16470->16488 16472 7ffa5329c103 16472->16463 16474 7ffa53296ebd 16473->16474 16476 7ffa53296ed1 16473->16476 16475 7ffa5329be00 _invalid_parameter 16 API calls 16474->16475 16474->16476 16475->16476 16476->16462 16478 7ffa5329f4f9 _CrtMemDumpAllObjectsSince 16477->16478 16481 7ffa5329f570 16478->16481 16480 7ffa5329f550 _LocaleUpdate::~_LocaleUpdate 16480->16469 16482 7ffa5329f599 MultiByteToWideChar 16481->16482 16484 7ffa5329f604 _CrtMemDumpAllObjectsSince_stat 16482->16484 16485 7ffa5329f60b malloc _calloc_dbg_impl _MarkAllocaS 16482->16485 16484->16480 16485->16484 16486 7ffa5329f68b MultiByteToWideChar 16485->16486 16486->16484 16487 7ffa5329f6ca GetStringTypeW 16486->16487 16487->16484 16489 7ffa532a228b 16488->16489 16490 7ffa532a22e1 16489->16490 16492 7ffa532a231f 16489->16492 16491 7ffa5329bd70 _invalid_parameter 17 API calls 16490->16491 16496 7ffa532a2315 _calloc_dbg_impl 16491->16496 16493 7ffa532a23c3 _calloc_dbg_impl 16492->16493 16494 7ffa532a2385 16492->16494 16493->16496 16497 7ffa5329bd70 _invalid_parameter 17 API calls 16493->16497 16495 7ffa5329bd70 _invalid_parameter 17 API calls 16494->16495 16495->16496 16496->16472 16497->16496 16498->16388 16500 7ffa532974b2 GetProcAddress 16499->16500 16501 7ffa532974d1 ExitProcess 16499->16501 16500->16501 17789 7ffa53298670 GetEnvironmentStringsW 17790 7ffa53298690 17789->17790 17792 7ffa53298697 WideCharToMultiByte 17789->17792 17793 7ffa53298733 17792->17793 17794 7ffa5329875f FreeEnvironmentStringsW 17792->17794 17793->17794 17795 7ffa5329876e WideCharToMultiByte 17793->17795 17794->17790 17796 7ffa532987c2 FreeEnvironmentStringsW 17795->17796 17797 7ffa532987aa 17795->17797 17796->17790 17797->17796 18567 7ffa532a1b64 18568 7ffa532a1b9d 18567->18568 18569 7ffa532aab10 17 API calls 18568->18569 18570 7ffa532a1bed 18568->18570 18571 7ffa532a1c86 18568->18571 18569->18571 18571->18570 18572 7ffa532a9290 23 API calls 18571->18572 18572->18570 18577 7ffa532abb66 18579 7ffa532abb78 _CrtMemDumpAllObjectsSince wcsxfrm 18577->18579 18578 7ffa532ab99c 18582 7ffa532acc93 18578->18582 18584 7ffa532abada 18578->18584 18579->18578 18580 7ffa532abc46 18579->18580 18581 7ffa5329bd70 _invalid_parameter 17 API calls 18580->18581 18585 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 18581->18585 18583 7ffa5329bd70 _invalid_parameter 17 API calls 18582->18583 18582->18585 18583->18585 18588 7ffa5329bd70 _invalid_parameter 17 API calls 18584->18588 18586 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18585->18586 18587 7ffa532acd90 18586->18587 18588->18585 17798 7ffa5329425a FlsGetValue FlsSetValue 17799 7ffa53294283 17798->17799 17812 7ffa5329405b 17814 7ffa5329406e 17812->17814 17818 7ffa53299360 LeaveCriticalSection 17814->17818 17815 7ffa532941bb _updatetlocinfoEx_nolock 17819 7ffa53299360 LeaveCriticalSection 17815->17819 17817 7ffa53294224 17818->17815 17819->17817 18592 7ffa5329e55a 18593 7ffa5329e564 18592->18593 18594 7ffa5329e5c2 RtlLookupFunctionEntry 18593->18594 18595 7ffa5329e601 18593->18595 18594->18595 18596 7ffa532a595c 18597 7ffa5329cf50 terminate 35 API calls 18596->18597 18598 7ffa532a5961 18597->18598 18599 7ffa532b1160 18602 7ffa532a4e90 18599->18602 18601 7ffa532b1179 18603 7ffa532a4ecf 18602->18603 18604 7ffa532a4ebb 18602->18604 18603->18601 18604->18603 18605 7ffa5329cf50 terminate 35 API calls 18604->18605 18605->18603 16638 7ffa53298860 HeapCreate 16639 7ffa5329888d 16638->16639 16640 7ffa53298891 GetVersion 16638->16640 16641 7ffa532988a7 HeapSetInformation 16640->16641 16642 7ffa532988c1 16640->16642 16641->16642 16642->16639 17820 7ffa532a5260 17821 7ffa532a5296 __SehTransFilter _CreateFrameInfo 17820->17821 17822 7ffa5329ed30 _FindAndUnlinkFrame 36 API calls 17821->17822 17823 7ffa532a53e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 17822->17823 17824 7ffa53295854 17825 7ffa5329585b _calloc_dbg_impl 17824->17825 17826 7ffa5329c020 _free_base 2 API calls 17825->17826 17827 7ffa532959d5 17826->17827 17828 7ffa5329a057 17829 7ffa5329a061 17828->17829 17830 7ffa5329a234 17829->17830 17836 7ffa5329a08e __initmbctable 17829->17836 17831 7ffa5329a25d IsValidCodePage 17830->17831 17835 7ffa5329a22d __initmbctable 17830->17835 17833 7ffa5329a27b GetCPInfo 17831->17833 17831->17835 17832 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17834 7ffa5329a470 17832->17834 17833->17835 17838 7ffa5329a295 __initmbctable 17833->17838 17835->17832 17837 7ffa5329a5e0 __initmbctable 19 API calls 17836->17837 17837->17835 17839 7ffa5329a5e0 __initmbctable 19 API calls 17838->17839 17839->17835 18606 7ffa53295357 18609 7ffa53299360 LeaveCriticalSection 18606->18609 18608 7ffa53295361 18609->18608 17845 7ffa5329d04a 17846 7ffa5329d1d8 DecodePointer 17845->17846 17847 7ffa5329d1e8 17846->17847 17848 7ffa5329d1f0 17847->17848 17849 7ffa53297090 _exit 33 API calls 17847->17849 17850 7ffa5329d209 17847->17850 17849->17850 17852 7ffa5329d289 17850->17852 17854 7ffa53293d00 RtlEncodePointer 17850->17854 17852->17848 17855 7ffa53299360 LeaveCriticalSection 17852->17855 17854->17852 17855->17848 18621 7ffa5329cb4f 18627 7ffa5329cb5c 18621->18627 18622 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18623 7ffa5329cf0f 18622->18623 18624 7ffa5329cbeb GetStdHandle 18625 7ffa5329cc94 18624->18625 18628 7ffa5329cc07 std::exception::_Copy_str 18624->18628 18625->18622 18626 7ffa5329cc99 18626->18625 18629 7ffa532a1640 17 API calls 18626->18629 18627->18624 18627->18625 18627->18626 18628->18625 18630 7ffa5329cc73 WriteFile 18628->18630 18631 7ffa5329cd10 18629->18631 18630->18625 18632 7ffa53297ff0 _invoke_watson_if_error 16 API calls 18631->18632 18633 7ffa5329cd3d GetModuleFileNameW 18632->18633 18634 7ffa5329cd68 18633->18634 18638 7ffa5329cdb1 18633->18638 18635 7ffa532a1640 17 API calls 18634->18635 18636 7ffa5329cd84 18635->18636 18637 7ffa53297ff0 _invoke_watson_if_error 16 API calls 18636->18637 18637->18638 18639 7ffa5329ce5e 18638->18639 18650 7ffa532a3380 18638->18650 18640 7ffa532a2d80 17 API calls 18639->18640 18641 7ffa5329ce76 18640->18641 18643 7ffa53297ff0 _invoke_watson_if_error 16 API calls 18641->18643 18644 7ffa5329cea3 18643->18644 18646 7ffa532a2d80 17 API calls 18644->18646 18645 7ffa5329ce31 18647 7ffa53297ff0 _invoke_watson_if_error 16 API calls 18645->18647 18648 7ffa5329ceb9 18646->18648 18647->18639 18649 7ffa53297ff0 _invoke_watson_if_error 16 API calls 18648->18649 18649->18625 18651 7ffa532a33a6 18650->18651 18652 7ffa532a346d _calloc_dbg_impl 18651->18652 18653 7ffa532a342f 18651->18653 18656 7ffa532a33bc _calloc_dbg_impl 18651->18656 18655 7ffa532a35fb 18652->18655 18652->18656 18658 7ffa532a3639 _calloc_dbg_impl 18652->18658 18654 7ffa5329bd70 _invalid_parameter 17 API calls 18653->18654 18654->18656 18657 7ffa5329bd70 _invalid_parameter 17 API calls 18655->18657 18656->18645 18657->18656 18658->18656 18659 7ffa5329bd70 _invalid_parameter 17 API calls 18658->18659 18659->18656 18664 7ffa532b0550 18665 7ffa532b0575 18664->18665 18666 7ffa532b055e 18664->18666 18666->18665 18667 7ffa532b0568 CloseHandle 18666->18667 18667->18665 16502 b60000 16503 b60183 16502->16503 16504 b6043e VirtualAlloc 16503->16504 16508 b60462 16504->16508 16505 b60a7b 16506 b60531 GetNativeSystemInfo 16506->16505 16507 b6056d VirtualAlloc 16506->16507 16512 b6058b 16507->16512 16508->16505 16508->16506 16509 b60a00 16509->16505 16510 b60a56 RtlAddFunctionTable 16509->16510 16510->16505 16511 b609d9 VirtualProtect 16511->16512 16512->16509 16512->16511 17860 7ffa532a3e3b 17861 7ffa532a3ec7 17860->17861 17862 7ffa5329e790 __SehTransFilter 37 API calls 17861->17862 17863 7ffa532a3ee4 17862->17863 17864 7ffa5329443c 17865 7ffa5329444c 17864->17865 17868 7ffa53299360 LeaveCriticalSection 17865->17868 17867 7ffa532948be 17868->17867 17869 7ffa532b1040 17872 7ffa5329e8f0 17869->17872 17871 7ffa532b108f 17873 7ffa5329e90d 17872->17873 17874 7ffa532a3cc0 __SehTransFilter 39 API calls 17873->17874 17875 7ffa5329e980 17874->17875 17875->17871 17876 7ffa532b0e40 17877 7ffa532b0e50 17876->17877 17878 7ffa532b0e5e 17876->17878 17877->17878 17879 7ffa53293e00 3 API calls 17877->17879 17879->17878 17880 7ffa532adc41 17881 7ffa532aee40 25 API calls 17880->17881 17883 7ffa532ada75 17881->17883 17882 7ffa532aeca1 17884 7ffa5329bd70 _invalid_parameter 17 API calls 17882->17884 17887 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 17882->17887 17883->17882 17886 7ffa532adbb5 17883->17886 17884->17887 17885 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17888 7ffa532aed9e 17885->17888 17889 7ffa5329bd70 _invalid_parameter 17 API calls 17886->17889 17887->17885 17889->17887 16618 7ffa53298040 16619 7ffa53298056 16618->16619 16620 7ffa5329805b GetModuleFileNameA 16618->16620 16621 7ffa5329aa40 __initmbctable 24 API calls 16619->16621 16622 7ffa53298083 16620->16622 16621->16620 17890 7ffa53297640 GetStartupInfoW 17898 7ffa53297676 _calloc_dbg 17890->17898 17891 7ffa53297689 17892 7ffa53297ce0 SetHandleCount 17892->17891 17893 7ffa53297b95 GetStdHandle 17895 7ffa53297c7b 17893->17895 17896 7ffa53297bb9 17893->17896 17894 7ffa53297ab9 17894->17892 17894->17893 17894->17895 17895->17892 17896->17895 17897 7ffa53297bc8 GetFileType 17896->17897 17897->17895 17899 7ffa53297beb InitializeCriticalSectionAndSpinCount 17897->17899 17898->17891 17898->17894 17901 7ffa53297a32 InitializeCriticalSectionAndSpinCount 17898->17901 17902 7ffa53297a19 GetFileType 17898->17902 17899->17891 17899->17895 17901->17891 17901->17894 17902->17894 17902->17901 18699 7ffa53291140 18700 7ffa5329116a 18699->18700 18701 7ffa5329118c 18700->18701 18702 7ffa5329119a FileTimeToSystemTime 18700->18702 18704 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18701->18704 18702->18701 18703 7ffa532911ae 18702->18703 18705 7ffa53291000 4 API calls 18703->18705 18706 7ffa532911d0 18704->18706 18705->18701 18707 7ffa532af53e 18708 7ffa532af55c 18707->18708 18709 7ffa532af74d 18708->18709 18710 7ffa532b0170 23 API calls 18708->18710 18711 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18709->18711 18710->18709 18712 7ffa532af7c5 18711->18712 17903 7ffa53299240 17904 7ffa5329925f 17903->17904 17905 7ffa5329924d 17903->17905 17906 7ffa53299281 InitializeCriticalSectionAndSpinCount 17904->17906 17907 7ffa53299295 17904->17907 17906->17907 17909 7ffa53299360 LeaveCriticalSection 17907->17909 17909->17905 17910 7ffa5329ae40 17911 7ffa5329d490 std::exception::_Copy_str 17 API calls 17910->17911 17912 7ffa5329ae59 17911->17912 17913 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17912->17913 17914 7ffa5329ae86 std::exception::_Copy_str 17913->17914 17915 7ffa532a0fd0 17 API calls 17914->17915 17917 7ffa5329af3a std::exception::_Copy_str 17914->17917 17916 7ffa5329af0d 17915->17916 17918 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17916->17918 17919 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 17917->17919 17920 7ffa5329b2e0 17917->17920 17918->17917 17919->17920 17921 7ffa5329b33e 17920->17921 17922 7ffa5329d490 std::exception::_Copy_str 17 API calls 17920->17922 17933 7ffa532a0cc0 17921->17933 17925 7ffa5329b311 17922->17925 17927 7ffa53297ff0 _invoke_watson_if_error 16 API calls 17925->17927 17926 7ffa5329b37d 17931 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17926->17931 17927->17921 17928 7ffa5329cff0 terminate 34 API calls 17929 7ffa5329b373 17928->17929 17930 7ffa53297090 _exit 33 API calls 17929->17930 17930->17926 17932 7ffa5329b3a0 17931->17932 17951 7ffa53293d00 RtlEncodePointer 17933->17951 17935 7ffa532a0cf6 17936 7ffa532a0d23 LoadLibraryW 17935->17936 17937 7ffa532a0e15 17935->17937 17938 7ffa532a0d44 GetProcAddress 17936->17938 17949 7ffa532a0d3d 17936->17949 17941 7ffa532a0e68 17937->17941 17942 7ffa532a0e39 DecodePointer DecodePointer 17937->17942 17939 7ffa532a0d6a 7 API calls 17938->17939 17938->17949 17939->17937 17944 7ffa532a0df3 GetProcAddress EncodePointer 17939->17944 17940 7ffa532a0ec8 17943 7ffa532a0f60 DecodePointer 17940->17943 17941->17940 17945 7ffa532a0eed DecodePointer 17941->17945 17950 7ffa532a0f0d 17941->17950 17942->17941 17943->17949 17944->17937 17945->17950 17946 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17947 7ffa5329b358 17946->17947 17947->17926 17947->17928 17948 7ffa532a0f2f DecodePointer 17948->17940 17948->17943 17949->17946 17950->17943 17950->17948 17951->17935 18717 7ffa53293faa 18718 7ffa53293e30 LeaveCriticalSection 18717->18718 18719 7ffa53293fb6 GetCurrentThreadId 18718->18719 18720 7ffa53293fea SetLastError 18719->18720 17961 7ffa532910b0 17962 7ffa532910da 17961->17962 17963 7ffa532910fc 17962->17963 17967 7ffa53291000 GetThreadLocale GetDateFormatA 17962->17967 17965 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17963->17965 17966 7ffa5329112c 17965->17966 17968 7ffa53291062 GetThreadLocale GetTimeFormatA 17967->17968 17969 7ffa5329105b 17967->17969 17968->17969 17969->17963 18721 7ffa532ac1a3 18724 7ffa532ac1b0 get_int64_arg 18721->18724 18722 7ffa532ab99c 18723 7ffa532acc93 18722->18723 18727 7ffa532abada 18722->18727 18725 7ffa5329bd70 _invalid_parameter 17 API calls 18723->18725 18728 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 18723->18728 18724->18722 18726 7ffa532ab530 wctomb_s 19 API calls 18724->18726 18725->18728 18726->18724 18731 7ffa5329bd70 _invalid_parameter 17 API calls 18727->18731 18729 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18728->18729 18730 7ffa532acd90 18729->18730 18731->18728 16513 7ffa5329aca8 16514 7ffa5329acb2 16513->16514 16515 7ffa532974e0 __crtExitProcess 3 API calls 16514->16515 16516 7ffa5329acbc RtlAllocateHeap 16515->16516 18000 7ffa532a2c9f 18001 7ffa532a2caf 18000->18001 18002 7ffa532a2ca6 18000->18002 18002->18001 18003 7ffa5329bd70 _invalid_parameter 17 API calls 18002->18003 18003->18001 18008 7ffa532a809f 18009 7ffa532a80b0 _calloc_dbg_impl 18008->18009 18010 7ffa532a8145 _calloc_dbg_impl 18008->18010 18010->18009 18011 7ffa5329bd70 _invalid_parameter 17 API calls 18010->18011 18011->18009 18744 7ffa532aa7a0 18751 7ffa532aa61f 18744->18751 18745 7ffa532aa726 WideCharToMultiByte 18746 7ffa532aa791 GetLastError 18745->18746 18745->18751 18747 7ffa532aa887 _dosmaperr __doserrno 18746->18747 18749 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18747->18749 18748 7ffa532aa7b0 WriteFile 18750 7ffa532aa857 GetLastError 18748->18750 18748->18751 18752 7ffa532aa9f5 18749->18752 18750->18751 18751->18745 18751->18747 18751->18748 18757 7ffa532a5393 18758 7ffa532a53a0 18757->18758 18759 7ffa532a53b4 __SehTransFilter 18758->18759 18760 7ffa532a53cc 18758->18760 18766 7ffa532a54a0 RaiseException 18759->18766 18767 7ffa532a54a0 RaiseException 18760->18767 18762 7ffa532a53ca 18764 7ffa5329ed30 _FindAndUnlinkFrame 36 API calls 18762->18764 18765 7ffa532a53e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 18764->18765 18766->18762 18767->18762 18020 7ffa532a4a95 18022 7ffa532a4aad __SehTransFilter 18020->18022 18021 7ffa532a4c2b 18022->18021 18023 7ffa532a5180 __SehTransFilter 38 API calls 18022->18023 18023->18021 18024 7ffa532a2695 18025 7ffa532a26a0 18024->18025 18026 7ffa5329bd70 _invalid_parameter 17 API calls 18025->18026 18027 7ffa532a26ab 18025->18027 18026->18027 16271 7ffa53293599 16274 7ffa53298900 16271->16274 16273 7ffa5329359e 16275 7ffa53298936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 16274->16275 16276 7ffa53298920 16274->16276 16277 7ffa532989de 16275->16277 16276->16273 16277->16276 16278 7ffa53294399 16279 7ffa532943a6 16278->16279 16281 7ffa53294377 16278->16281 16281->16278 16281->16279 16282 7ffa5329abb0 DecodePointer 16281->16282 16283 7ffa5329abd3 16282->16283 16283->16281 18777 7ffa532adf8d 18778 7ffa532adfbb 18777->18778 18779 7ffa532aeadf 18778->18779 18780 7ffa532aeec0 25 API calls 18778->18780 18789 7ffa532ada75 18778->18789 18781 7ffa532aef10 25 API calls 18779->18781 18780->18779 18782 7ffa532aeafd 18781->18782 18783 7ffa532aeb33 18782->18783 18785 7ffa532aeec0 25 API calls 18782->18785 18784 7ffa532aec29 18783->18784 18798 7ffa532aeb49 _CrtMemDumpAllObjectsSince 18783->18798 18786 7ffa532aebda 18784->18786 18787 7ffa532aef10 25 API calls 18784->18787 18785->18783 18786->18789 18790 7ffa532aeec0 25 API calls 18786->18790 18787->18786 18788 7ffa532aeca1 18791 7ffa5329bd70 _invalid_parameter 17 API calls 18788->18791 18794 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 18788->18794 18789->18788 18793 7ffa532adbb5 18789->18793 18790->18789 18791->18794 18792 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18795 7ffa532aed9e 18792->18795 18797 7ffa5329bd70 _invalid_parameter 17 API calls 18793->18797 18794->18792 18796 7ffa532af000 wcsxfrm 2 API calls 18796->18798 18797->18794 18798->18786 18798->18796 18799 7ffa532aee40 25 API calls 18798->18799 18799->18798 18804 7ffa5329c990 18808 7ffa53294980 18804->18808 18806 7ffa5329c9b8 EncodePointer 18807 7ffa5329c9e5 18806->18807 18809 7ffa532949cb _calloc_dbg_impl 18808->18809 18809->18806 18841 7ffa532ab580 18842 7ffa532ab5fa 18841->18842 18843 7ffa532ab676 18842->18843 18844 7ffa532ab6cb 18842->18844 18846 7ffa5329bd70 _invalid_parameter 17 API calls 18843->18846 18845 7ffa532aafb0 _fflush_nolock 17 API calls 18844->18845 18847 7ffa532ab6fe 18844->18847 18845->18847 18850 7ffa532ab6aa _LocaleUpdate::~_LocaleUpdate 18846->18850 18848 7ffa532ab84d 18847->18848 18854 7ffa532ab8a2 18847->18854 18849 7ffa5329bd70 _invalid_parameter 17 API calls 18848->18849 18849->18850 18852 7ffa53293280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18850->18852 18851 7ffa532ab915 18855 7ffa5329bd70 _invalid_parameter 17 API calls 18851->18855 18853 7ffa532acd90 18852->18853 18854->18851 18858 7ffa532ab96a 18854->18858 18855->18850 18856 7ffa532acc93 18856->18850 18857 7ffa5329bd70 _invalid_parameter 17 API calls 18856->18857 18857->18850 18858->18856 18859 7ffa532abada 18858->18859 18860 7ffa5329bd70 _invalid_parameter 17 API calls 18859->18860 18860->18850 18031 7ffa5329c080 HeapValidate 18032 7ffa5329c0a2 18031->18032

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AllocAllocateBoundaryDeleteDescriptorExitHeapLibraryLoadMessageProcessVirtual
                                                                    • String ID: :Pt$aZ.$!k}$"<t$"BQa$#sa{$$cb($$v"P$)*E$*p$+80Z$+sui$,'a$,kb($-~5$1+t$1>#J$1D4v$3/Q$4cg$9cnt$:-ZZ$?#$@kb($A+M$CwT>$GBQ+$N tW$N7#6$Pv5=$QS}5$Qp_*$Qv5$Qv}N$VqQS$[`$]=5[$^ir$_>zT$_>zT$a%"^$aQTH$b('x$b(/N$bkg2$c(kA$eMh$g(%"$gWQ>tTQv5MVM6qQS<jb(kAk%aQTGeMhH)59cj$hH)}$iAk%$kj$k%$b$k%a^$kW]>$o(fA$oRP$pNR`$pw ~$p0$q.$$t+)s$t/p$uTQ2$u'($werfault.exe$xT]v$}LhH$L`$@+*$L1&$S<j$aEy$w5M$|Oi$hH
                                                                    • API String ID: 3056597726-2091011546
                                                                    • Opcode ID: 1c06ffdaf7f78c717c8658d928c07ebd4f6ae3fbc6f84201f2b376329c5d69d0
                                                                    • Instruction ID: 5b0dc45c6808d91dbd24405605413834f028c471f083fe87a1e48ea1c157d2e4
                                                                    • Opcode Fuzzy Hash: 1c06ffdaf7f78c717c8658d928c07ebd4f6ae3fbc6f84201f2b376329c5d69d0
                                                                    • Instruction Fuzzy Hash: B2E2C8B251A7C18FE3708F22AA947DD3BA1F352708F509208C3992FA1DCB795255CF86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 15 b60000-b60460 call b60aa8 * 2 VirtualAlloc 37 b60462-b60466 15->37 38 b6048a-b60494 15->38 39 b60468-b60488 37->39 41 b60a91-b60aa6 38->41 42 b6049a-b6049e 38->42 39->38 39->39 42->41 43 b604a4-b604a8 42->43 43->41 44 b604ae-b604b2 43->44 44->41 45 b604b8-b604bf 44->45 45->41 46 b604c5-b604d2 45->46 46->41 47 b604d8-b604e1 46->47 47->41 48 b604e7-b604f4 47->48 48->41 49 b604fa-b60507 48->49 50 b60531-b60567 GetNativeSystemInfo 49->50 51 b60509-b60511 49->51 50->41 52 b6056d-b60589 VirtualAlloc 50->52 53 b60513-b60518 51->53 54 b605a0-b605ac 52->54 55 b6058b-b6059e 52->55 56 b60521 53->56 57 b6051a-b6051f 53->57 59 b605af-b605b2 54->59 55->54 58 b60523-b6052f 56->58 57->58 58->50 58->53 61 b605b4-b605bf 59->61 62 b605c1-b605db 59->62 61->59 63 b605dd-b605e2 62->63 64 b6061b-b60622 62->64 65 b605e4-b605ea 63->65 66 b606db-b606e2 64->66 67 b60628-b6062f 64->67 71 b605ec-b60609 65->71 72 b6060b-b60619 65->72 69 b60864-b6086b 66->69 70 b606e8-b606f9 66->70 67->66 68 b60635-b60642 67->68 68->66 73 b60648-b6064f 68->73 75 b60917-b60929 69->75 76 b60871-b6087f 69->76 74 b60702-b60705 70->74 71->71 71->72 72->64 72->65 78 b60654-b60658 73->78 79 b60707-b6070a 74->79 80 b606fb-b606ff 74->80 81 b60a07-b60a1a 75->81 82 b6092f-b60937 75->82 77 b6090e-b60911 76->77 77->75 87 b60884-b608a9 77->87 84 b606c0-b606ca 78->84 85 b6070c-b6071d 79->85 86 b60788-b6078e 79->86 80->74 102 b60a40-b60a4a 81->102 103 b60a1c-b60a27 81->103 83 b6093b-b6093f 82->83 88 b60945-b6095a 83->88 89 b609ec-b609fa 83->89 93 b606cc-b606d2 84->93 94 b6065a-b60669 84->94 90 b60794-b607a2 85->90 91 b6071f-b60720 85->91 86->90 109 b60907-b6090c 87->109 110 b608ab-b608b1 87->110 95 b6095c-b6095e 88->95 96 b6097b-b6097d 88->96 89->83 98 b60a00-b60a01 89->98 104 b6085d-b6085e 90->104 105 b607a8 90->105 101 b60722-b60784 91->101 93->78 106 b606d4-b606d5 93->106 99 b6067a-b6067e 94->99 100 b6066b-b60678 94->100 107 b60960-b6096c 95->107 108 b6096e-b60979 95->108 112 b609a2-b609a4 96->112 113 b6097f-b60981 96->113 98->81 114 b60680-b6068a 99->114 115 b6068c-b60690 99->115 111 b606bd-b606be 100->111 101->101 116 b60786 101->116 119 b60a4c-b60a54 102->119 120 b60a7b-b60a8e 102->120 117 b60a38-b60a3e 103->117 104->69 118 b607ae-b607d4 105->118 106->66 125 b609be-b609bf 107->125 108->125 109->77 121 b608b3-b608b9 110->121 122 b608bb-b608c8 110->122 111->84 131 b609a6-b609aa 112->131 132 b609ac-b609bb 112->132 126 b60983-b60987 113->126 127 b60989-b6098b 113->127 128 b606b6-b606ba 114->128 129 b606a5-b606a9 115->129 130 b60692-b606a3 115->130 116->90 117->102 123 b60a29-b60a35 117->123 144 b607d6-b607d9 118->144 145 b60835-b60839 118->145 119->120 124 b60a56-b60a79 RtlAddFunctionTable 119->124 120->41 134 b608ea-b608fe 121->134 135 b608d3-b608e5 122->135 136 b608ca-b608d1 122->136 123->117 124->120 133 b609c5-b609cb 125->133 126->125 127->112 139 b6098d-b6098f 127->139 128->111 129->111 140 b606ab-b606b3 129->140 130->128 131->125 132->125 141 b609cd-b609d3 133->141 142 b609d9-b609e9 VirtualProtect 133->142 134->109 153 b60900-b60905 134->153 135->134 136->135 136->136 146 b60991-b60997 139->146 147 b60999-b609a0 139->147 140->128 141->142 142->89 149 b607e3-b607f0 144->149 150 b607db-b607e1 144->150 151 b60844-b60850 145->151 152 b6083b 145->152 146->125 147->133 155 b607f2-b607f9 149->155 156 b607fb-b6080d 149->156 154 b60812-b6082c 150->154 151->118 157 b60856-b60857 151->157 152->151 153->110 154->145 159 b6082e-b60833 154->159 155->155 155->156 156->154 157->104 159->144
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.450517098.0000000000B60000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_b60000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 394283112-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: 2f85026ae1e1af2c18d9eef6fa339b8c881a8f4cf334491629bddf0d921b4fb5
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: 8972E730628B488FDB19EF19C8856BAB7E1FB94305F10466DE8CBC7251DB38D946CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 220 180011e5c-180011f0e call 1800153f4 223 180011f11-180011f17 220->223 224 18001228a-180012290 223->224 225 180011f1d 223->225 228 180012534-180012596 call 180025c30 224->228 229 180012296-18001229c 224->229 226 180011f23-180011f29 225->226 227 1800121da-180012280 call 180011ccc 225->227 230 1800121d0-1800121d5 226->230 231 180011f2f-180011f35 226->231 227->224 248 1800125a2 228->248 249 180012598-18001259d 228->249 234 1800122a2-1800122a8 229->234 235 180012449-180012525 call 180015ae0 229->235 230->223 236 1800125c4-180012680 call 180011ccc 231->236 237 180011f3b-180011f41 231->237 241 1800123f7-180012439 call 180025c30 234->241 242 1800122ae-1800122b4 234->242 247 18001252a-18001252f 235->247 254 180012685-1800126a5 236->254 245 1800121b6-1800121cb 237->245 246 180011f47-180011f4d 237->246 241->254 262 18001243f-180012444 241->262 250 1800125b3-1800125b9 242->250 251 1800122ba-1800123f2 call 18000a02c call 180011624 242->251 245->223 257 180011f53-180011f59 246->257 258 180012126-180012198 call 18001917c 246->258 259 180012115-180012121 247->259 252 1800125a7-1800125b0 248->252 249->259 250->254 255 1800125bf 250->255 251->252 252->250 255->223 257->250 263 180011f5f-1800120af call 18000bab8 257->263 265 18001219d-1800121b1 258->265 259->223 262->259 263->247 269 1800120b5-180012112 call 1800216e4 263->269 265->259 269->259
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :j$UI$UI$/$5$@u
                                                                    • API String ID: 0-1744832406
                                                                    • Opcode ID: d5fbd5fb42e64105118402a22ae1fd0938665267daf4f484be707b3cdea1b60d
                                                                    • Instruction ID: 62cabd7460019d857fad8ef6802a9940dae2da1dd4c69d60ad9891f806a9e916
                                                                    • Opcode Fuzzy Hash: d5fbd5fb42e64105118402a22ae1fd0938665267daf4f484be707b3cdea1b60d
                                                                    • Instruction Fuzzy Hash: 35421971A1470EDFCB58DFA8C49A6EEBBF2FB44348F008159E806A7250DB719619CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 322 180026f14-180026f3c 323 180026f41-180026f46 322->323 324 18002766b-180027670 323->324 325 180026f4c 323->325 326 180027966-1800279f8 call 180008534 call 18000efa8 324->326 327 180027676-18002767b 324->327 328 180026f52-180026f57 325->328 329 18002756c-180027666 call 18001cabc call 18000efa8 call 1800207c4 325->329 360 1800279fd-180027a68 call 1800207c4 326->360 330 180027681-180027686 327->330 331 180027817-1800278bc call 18000bc70 call 18000efa8 327->331 332 180027438-1800274dd call 180026c80 call 18000efa8 328->332 333 180026f5d-180026f62 328->333 329->323 336 18002768c-180027691 330->336 337 1800277bf-180027812 call 180025c30 330->337 366 1800278c1-180027961 call 1800207c4 331->366 368 1800274e2-180027567 call 1800207c4 332->368 339 180026f68-180026f6d 333->339 340 180027320-1800273b3 call 1800257c0 call 18000efa8 333->340 345 180027697-180027740 call 180021754 call 18000efa8 336->345 346 180027a6d-180027a72 336->346 337->323 348 180026f73-180026f78 339->348 349 180027204-18002731b call 18000b948 call 18000efa8 call 1800207c4 339->349 382 1800273b8-180027433 call 1800207c4 340->382 387 180027745-1800277ba call 1800207c4 345->387 361 1800270c4-1800270ce 346->361 362 180027a78 346->362 357 1800270cf-18002718a call 18002b1d4 call 18000efa8 348->357 358 180026f7e-180026f83 348->358 349->323 391 18002718f-1800271ff call 1800207c4 357->391 358->346 369 180026f89-180027052 call 180015df4 call 18000efa8 358->369 360->346 362->323 366->323 368->323 398 180027057-1800270bf call 1800207c4 369->398 382->323 387->323 391->323 398->361
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: F:^-$[9S$zUP$?'3$yc
                                                                    • API String ID: 0-3875576172
                                                                    • Opcode ID: 149e3d3d365d4ff99a41c49fe7a0ea6fd866fcc9ad2b25dafda07a3e1acf3aff
                                                                    • Instruction ID: acf5a29543b44a4ac2cab22a28fc6f208f1c2d96f0abb29e90a070f971d4b191
                                                                    • Opcode Fuzzy Hash: 149e3d3d365d4ff99a41c49fe7a0ea6fd866fcc9ad2b25dafda07a3e1acf3aff
                                                                    • Instruction Fuzzy Hash: 13720C7050038E8FDF49DF24C88A6DE3BA1FB68388F114619FC56962A1C7B4DA65CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 402 180016320-180016344 403 18001634b-180016350 402->403 404 180016546-18001657e call 180011624 403->404 405 180016356-18001635b 403->405 413 180016583-180016588 404->413 407 180016361-180016366 405->407 408 18001658f-1800165d0 call 180011624 405->408 411 18001636c-180016371 407->411 412 1800164ae-180016541 call 18001917c 407->412 414 1800165d5-1800165e1 408->414 415 180016411-180016493 call 18000cec4 411->415 416 180016377-18001637c 411->416 412->403 413->414 421 18001658a 413->421 426 180016498-18001649e 415->426 418 1800163e9-1800163f7 416->418 419 18001637e-180016383 416->419 425 1800163fd-180016401 418->425 423 180016385-18001638a 419->423 424 180016397-1800163e4 call 180008350 419->424 421->403 423->413 427 180016390-180016395 423->427 424->403 429 180016403-18001640c 425->429 430 1800163f9-1800163fa 425->430 426->414 431 1800164a4-1800164a9 426->431 427->403 429->403 430->425 431->403
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !$>]$>]$vM/${Wo
                                                                    • API String ID: 0-1672528178
                                                                    • Opcode ID: 3476f63b1fd483a3e4edb66e4c1250727eb216b571a6250b7c7aa87006e10f17
                                                                    • Instruction ID: 47ac1da3a1e26fe678bf2a9ce2069fe56df1d0f6d245f307fc2b30da9b08538d
                                                                    • Opcode Fuzzy Hash: 3476f63b1fd483a3e4edb66e4c1250727eb216b571a6250b7c7aa87006e10f17
                                                                    • Instruction Fuzzy Hash: 5C81197051464CABDBE9DF28C8C9BDD3BA0FB58394F906119FD02862A0DB74D9C5CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 524 180001378-18000139d 525 1800013a2 524->525 526 1800013a7-1800013ad 525->526 527 1800013b3-1800013b9 526->527 528 1800017a5-1800018d3 call 180011ccc * 2 526->528 530 1800016a8-1800017a0 call 180025c30 * 2 527->530 531 1800013bf-1800013c5 527->531 548 1800018d8 528->548 530->525 534 1800013cb-1800013d1 531->534 535 1800018ee-1800019a7 call 1800113e0 531->535 539 180001504-1800015f6 call 180003840 call 1800140d8 534->539 540 1800013d7-1800013d9 534->540 543 1800019ac-1800019b6 535->543 556 1800015fb-1800016a3 call 1800207c4 539->556 545 1800018dd-1800018e3 540->545 546 1800013df-1800014e9 call 180017620 540->546 545->543 550 1800018e9 545->550 554 1800014fa-1800014ff 546->554 555 1800014eb-1800014f5 546->555 548->545 550->526 554->525 555->525 556->548
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %DcZ$L\`$u%$vr
                                                                    • API String ID: 0-873403245
                                                                    • Opcode ID: 2030f1da5196c9f476bb93962b4ebdec29646a183379a03d07fdefea4280d3e9
                                                                    • Instruction ID: 7a4330a3d3912fed14e69a2d18b4041e28774fe6b527757d4cbe653c4a95fa98
                                                                    • Opcode Fuzzy Hash: 2030f1da5196c9f476bb93962b4ebdec29646a183379a03d07fdefea4280d3e9
                                                                    • Instruction Fuzzy Hash: 0912F47152068CDFCB8CDF28C88AADD7BA1FB48398F956219FD0A97250D774D984CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 559 180001d58-180001d95 560 180001d9a 559->560 561 180001d9c-180001da2 560->561 562 180001da8-180001dae 561->562 563 18000248e 561->563 565 180001db4-180001dba 562->565 566 180002197-1800021a4 562->566 564 180002493-180002499 563->564 564->561 569 18000249f-1800024ac 564->569 570 180001e9b-18000201d call 18000eef4 call 1800196ec 565->570 571 180001dc0-180001dc6 565->571 567 1800021a6-1800021ac 566->567 568 1800021ae-1800021ca 566->568 572 1800021d0-180002470 call 18001d014 call 1800196ec call 180008db0 567->572 568->572 585 180002024-18000218c call 1800196ec call 180008db0 570->585 586 18000201f 570->586 571->564 574 180001dcc-180001e8b call 18001c158 571->574 589 180002475-18000247d 572->589 574->569 581 180001e91-180001e96 574->581 581->561 585->569 594 180002192 585->594 586->585 589->569 591 18000247f-180002489 589->591 591->561 594->560
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .mZ$\$~V6k$%T
                                                                    • API String ID: 0-3287852823
                                                                    • Opcode ID: ccbc70a1b43ffc6d5414b274ff0ecbed60153be03e3051f192a6aa15e06d1cac
                                                                    • Instruction ID: 166b9a2b8c7d7ea13ff64321e1c32e26f96a2e299ccb60065a18498a6503f561
                                                                    • Opcode Fuzzy Hash: ccbc70a1b43ffc6d5414b274ff0ecbed60153be03e3051f192a6aa15e06d1cac
                                                                    • Instruction Fuzzy Hash: 0402E8711013C8CBEBBECFA4D885BD97BA9FB44B44F10661AE84AAE250CBB45745CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • HeapCreate.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00007FFA532933C2), ref: 00007FFA53298876
                                                                    • GetVersion.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFA532933C2), ref: 00007FFA53298891
                                                                    • HeapSetInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFA532933C2), ref: 00007FFA532988BB
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$CreateInformationVersion
                                                                    • String ID:
                                                                    • API String ID: 3563531100-0
                                                                    • Opcode ID: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                    • Instruction ID: 45f1d2dd950cacff2adb205ead97b0daab7702845521ef45215abe5e8507f763
                                                                    • Opcode Fuzzy Hash: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                    • Instruction Fuzzy Hash: 63F0BEB5A38F5282F3109710E81933D2392BFEA710F88C430C64EA26A1CE3DD589C610
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 601 18001d510-18001d54b 602 18001d550-18001d556 601->602 603 18001d94c-18001d9d1 call 180011ccc 602->603 604 18001d55c-18001d562 602->604 615 18001d9d6-18001d9dc 603->615 605 18001d568-18001d56e 604->605 606 18001d7aa-18001d7c7 604->606 608 18001d574-18001d57a 605->608 609 18001d745-18001d78f call 18001ca18 605->609 606->602 611 18001d7cd-18001d7e5 606->611 613 18001d67a-18001d740 call 1800035cc 608->613 614 18001d580-18001d586 608->614 619 18001d794-18001d79a 609->619 616 18001d87b-18001d8a1 611->616 617 18001d7eb-18001d878 call 180020f44 611->617 613->602 620 18001d649-18001d675 call 18001094c 614->620 621 18001d58c-18001d592 614->621 622 18001d9de 615->622 623 18001da50-18001da5c 615->623 625 18001d935-18001d936 616->625 626 18001d8a7-18001d933 call 180020f44 616->626 617->616 619->623 629 18001d7a0-18001d7a5 619->629 620->602 630 18001d598-18001d59e 621->630 631 18001d63f-18001d644 621->631 622->602 627 18001d939-18001d93c 625->627 626->627 627->602 635 18001d942-18001d947 627->635 629->602 636 18001d5a4-18001d5aa 630->636 637 18001d9e3-18001da4b call 18000a3f4 630->637 631->602 635->602 636->615 640 18001d5b0-18001d63a call 1800141c8 636->640 637->623 640->602
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: D"C!$r>$7
                                                                    • API String ID: 0-4181936694
                                                                    • Opcode ID: 541cc3c13b8465e2a0518f703328e58551f25428cc9c4eed4f201bddabca6e18
                                                                    • Instruction ID: 0283378d108cf163dc6514248e6e0b5631fea62f1129ef615c9b8fd25e2e86b8
                                                                    • Opcode Fuzzy Hash: 541cc3c13b8465e2a0518f703328e58551f25428cc9c4eed4f201bddabca6e18
                                                                    • Instruction Fuzzy Hash: 1BE1EF70510B4CEBDBD9DF28D8CAADD3BA0FB48394FA06219FD0686250D775D989CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 078$GDo$}
                                                                    • API String ID: 0-303245572
                                                                    • Opcode ID: 8956c442c33fd1cde17bd2344d54593dce01cac8c777ad426ea07fe8eec3f5fb
                                                                    • Instruction ID: 0c94e6823936b68487d3afc04f5daf4118d9ac6b30c0afcc694cd4a40111a1d0
                                                                    • Opcode Fuzzy Hash: 8956c442c33fd1cde17bd2344d54593dce01cac8c777ad426ea07fe8eec3f5fb
                                                                    • Instruction Fuzzy Hash: 32D1CAB051A784AFC398DF28C1CA94BBBE0FB84754F906A1DF88686260D7B0D945CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: e@-0$f $wC
                                                                    • API String ID: 0-2741453468
                                                                    • Opcode ID: 6e670c046987691f0a1e9af823784eece018238e228c51a72b7d39087d84c909
                                                                    • Instruction ID: f8f9b13c1cb793f3116966172e7ed192e0f5529545d7cab8ca7c6d0d9d04acad
                                                                    • Opcode Fuzzy Hash: 6e670c046987691f0a1e9af823784eece018238e228c51a72b7d39087d84c909
                                                                    • Instruction Fuzzy Hash: E2319571518B848FD3A8DF28C48975ABBE1FB84344F608A1DE6DACB260DB709549CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: L=`$rKS(
                                                                    • API String ID: 0-4157335196
                                                                    • Opcode ID: 0ffd1ea2413f9b71380f5aeaf5e19bad7dcec336af59defbaf39c2d3ae1cfae5
                                                                    • Instruction ID: c6b4aee86e77721e5ec6a37c1ce5251b52915c7d30808e23b45806a77bf6ffc0
                                                                    • Opcode Fuzzy Hash: 0ffd1ea2413f9b71380f5aeaf5e19bad7dcec336af59defbaf39c2d3ae1cfae5
                                                                    • Instruction Fuzzy Hash: FD51BC705183848FC769DF29C18A64BBBF1FBC6784F108A1DE69A86261D772D909CF43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Wm$`W
                                                                    • API String ID: 0-829970788
                                                                    • Opcode ID: 1814abb82c64624d0c82e6b0c2fd8fef1d44b2e07111184ee76eb17802e65ade
                                                                    • Instruction ID: 3e5335a01fca1db20c73b4a4a46b2fe43dbf21032e81bd0b2231691c24575172
                                                                    • Opcode Fuzzy Hash: 1814abb82c64624d0c82e6b0c2fd8fef1d44b2e07111184ee76eb17802e65ade
                                                                    • Instruction Fuzzy Hash: F041C070D1461C8FCF48DFA9D886ADDBBB0FB48304F20821DE456B6260C7789948CF69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8h
                                                                    • API String ID: 0-2787117397
                                                                    • Opcode ID: d20b5c2dabe29708a31ba0e8275e2e5ac6bcf12f9e6970397621dbc27d768f27
                                                                    • Instruction ID: eb392778bd881193a348804f8d52045fa41d3382a0d9eae0dd8f361f159f4541
                                                                    • Opcode Fuzzy Hash: d20b5c2dabe29708a31ba0e8275e2e5ac6bcf12f9e6970397621dbc27d768f27
                                                                    • Instruction Fuzzy Hash: 28D12E7060578C8FEBBADF24CC997DE3BA0FB49744F504219D88A8E260CB745B49CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _calloc_dbg$__initmbctable_invalid_parameter_invoke_watson_if_error
                                                                    • String ID: _setenvp$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$strcpy_s(*env, cchars, p)$~
                                                                    • API String ID: 1648969265-681193798
                                                                    • Opcode ID: a47b768e670489db5f0b83db0fb44db2e3349a8c3dd14e64627a86d88978e30f
                                                                    • Instruction ID: 248cc0e0a590806e166da0be288b66fc63392b4289a221819006463d4e10b365
                                                                    • Opcode Fuzzy Hash: a47b768e670489db5f0b83db0fb44db2e3349a8c3dd14e64627a86d88978e30f
                                                                    • Instruction Fuzzy Hash: 5E514C72A2CF4586E7508B18E49032E73A2FBD6744F548135EA8E977A4CF3DE4808B50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00007FFA53297540: _initp_misc_winsig.LIBCMTD ref: 00007FFA5329757B
                                                                      • Part of subcall function 00007FFA53297540: _initp_eh_hooks.LIBCMTD ref: 00007FFA53297585
                                                                      • Part of subcall function 00007FFA53298FE0: InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 00007FFA5329906F
                                                                    • FlsAlloc.KERNEL32 ref: 00007FFA53293D55
                                                                      • Part of subcall function 00007FFA53293E00: FlsFree.KERNEL32 ref: 00007FFA53293E13
                                                                      • Part of subcall function 00007FFA53293E00: _mtdeletelocks.LIBCMTD ref: 00007FFA53293E23
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AllocCountCriticalFreeInitializeSectionSpin_initp_eh_hooks_initp_misc_winsig_mtdeletelocks
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tidtable.c
                                                                    • API String ID: 3828364660-3898981997
                                                                    • Opcode ID: 0098fd6dd93212f57ede22d553d92d2d2d412d97cdbf7886a9325f838c4c5659
                                                                    • Instruction ID: f416cfaedd3adb75c183c9bb53daa5bee0aa7caef9d4158dac1404c362a1f253
                                                                    • Opcode Fuzzy Hash: 0098fd6dd93212f57ede22d553d92d2d2d412d97cdbf7886a9325f838c4c5659
                                                                    • Instruction Fuzzy Hash: D51130A293CF0289F350AB64A85537D2763AFE6B50F08C631E65FA22D5DF3CE4808650
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    C-Code - Quality: 16%
                                                                    			E00007FFA7FFA5329F570(intOrPtr __edx, long long __rcx, void* __rdx, long long __r8, void* _a8, intOrPtr _a16, long long _a24, intOrPtr _a32, void* _a40, intOrPtr _a48, intOrPtr _a64) {
                                                                    				long long _v24;
                                                                    				intOrPtr _v32;
                                                                    				long long _v40;
                                                                    				signed int _v48;
                                                                    				int _v52;
                                                                    				int _v56;
                                                                    				signed int _v64;
                                                                    				long long _v72;
                                                                    				void* _t53;
                                                                    				long long _t82;
                                                                    
                                                                    				_a32 = r9d;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __edx;
                                                                    				_a8 = __rcx;
                                                                    				_v56 = 0;
                                                                    				if (_a48 != 0) goto 0x5329f5ab;
                                                                    				_a48 =  *((intOrPtr*)( *_a8 + 4));
                                                                    				if (_a64 == 0) goto 0x5329f5bf;
                                                                    				_v32 = 9;
                                                                    				goto 0x5329f5c7;
                                                                    				_v32 = 1;
                                                                    				_v64 = 0;
                                                                    				_v72 = 0;
                                                                    				r9d = _a32;
                                                                    				_v48 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                                    				if (_v48 != 0) goto 0x5329f60b;
                                                                    				goto 0x5329f6f8;
                                                                    				if (0 != 0) goto 0x5329f652;
                                                                    				if (_v48 <= 0) goto 0x5329f652;
                                                                    				if (_v48 - 0xfffffff0 > 0) goto 0x5329f652;
                                                                    				_t82 = _v48 + _v48 + 0x10;
                                                                    				_t53 = malloc(??); // executed
                                                                    				E00007FFA7FFA5329F3B0(_t53, 0xdddd, _t82);
                                                                    				_v24 = _t82;
                                                                    				goto 0x5329f65b;
                                                                    				_v24 = 0;
                                                                    				_v40 = _v24;
                                                                    				if (_v40 != 0) goto 0x5329f674;
                                                                    				goto 0x5329f6f8;
                                                                    				E00007FFA7FFA532932B0(0, _a48, 0, _v40, __rdx, _v48 << 1);
                                                                    				_v64 = _v48;
                                                                    				_v72 = _v40;
                                                                    				r9d = _a32;
                                                                    				_v52 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                                    				if (_v52 == 0) goto 0x5329f6ea;
                                                                    				r8d = _v52;
                                                                    				_v56 = GetStringTypeW(??, ??, ??, ??);
                                                                    				E00007FFA7FFA5329F3E0(_v40);
                                                                    				return _v56;
                                                                    			}













                                                                    0x7ffa5329f570
                                                                    0x7ffa5329f575
                                                                    0x7ffa5329f57a
                                                                    0x7ffa5329f57e
                                                                    0x7ffa5329f587
                                                                    0x7ffa5329f597
                                                                    0x7ffa5329f5a4
                                                                    0x7ffa5329f5b3
                                                                    0x7ffa5329f5b5
                                                                    0x7ffa5329f5bd
                                                                    0x7ffa5329f5bf
                                                                    0x7ffa5329f5c7
                                                                    0x7ffa5329f5cf
                                                                    0x7ffa5329f5d8
                                                                    0x7ffa5329f5f9
                                                                    0x7ffa5329f602
                                                                    0x7ffa5329f606
                                                                    0x7ffa5329f60f
                                                                    0x7ffa5329f616
                                                                    0x7ffa5329f62a
                                                                    0x7ffa5329f631
                                                                    0x7ffa5329f639
                                                                    0x7ffa5329f646
                                                                    0x7ffa5329f64b
                                                                    0x7ffa5329f650
                                                                    0x7ffa5329f652
                                                                    0x7ffa5329f660
                                                                    0x7ffa5329f66b
                                                                    0x7ffa5329f66f
                                                                    0x7ffa5329f686
                                                                    0x7ffa5329f68f
                                                                    0x7ffa5329f698
                                                                    0x7ffa5329f69d
                                                                    0x7ffa5329f6bf
                                                                    0x7ffa5329f6c8
                                                                    0x7ffa5329f6d2
                                                                    0x7ffa5329f6e6
                                                                    0x7ffa5329f6ef
                                                                    0x7ffa5329f6fc

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocaMarkStringTypemalloc
                                                                    • String ID:
                                                                    • API String ID: 2618398691-0
                                                                    • Opcode ID: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                                    • Instruction ID: e285745e34537fe845310175c137e51ba9c1e25ec8b6ac048a6c76cc2aec6951
                                                                    • Opcode Fuzzy Hash: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                                    • Instruction Fuzzy Hash: C841057252CF818AD7A08B15E08436EB7A1F7D6795F148139EA9E53BA8DF7CD4848F00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FileModuleName__initmbctable
                                                                    • String ID: C:\Windows\SYSTEM32\regsvr32.exe$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdargv.c
                                                                    • API String ID: 3548084100-2649671803
                                                                    • Opcode ID: b22e410beffd46978b7d2afc3cd069083579849eea9e12d44582c014dad21e95
                                                                    • Instruction ID: 2722c2dacdc27057b328abde6db9feb3ae582441f42093af5f85bb9747099681
                                                                    • Opcode Fuzzy Hash: b22e410beffd46978b7d2afc3cd069083579849eea9e12d44582c014dad21e95
                                                                    • Instruction Fuzzy Hash: CC412D62638F4181EA50CB14E89037E6761FBE6764F584636E6AF53BE4DF3DD0848700
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    C-Code - Quality: 23%
                                                                    			E00007FFA7FFA5329A5E0(long long __rcx, void* _a8) {
                                                                    				signed int _v24;
                                                                    				char _v42;
                                                                    				void* _v48;
                                                                    				signed int _v56;
                                                                    				char _v312;
                                                                    				signed char* _v328;
                                                                    				char _v584;
                                                                    				char _v840;
                                                                    				char _v1352;
                                                                    				char _v1384;
                                                                    				char _v1392;
                                                                    				intOrPtr _v1400;
                                                                    				long long _v1408;
                                                                    				long long _v1416;
                                                                    				signed long long _t206;
                                                                    				signed char* _t214;
                                                                    				signed long long _t223;
                                                                    				intOrPtr _t225;
                                                                    				intOrPtr _t226;
                                                                    				signed long long _t233;
                                                                    
                                                                    				_t224 = __rcx;
                                                                    				_a8 = __rcx;
                                                                    				_t206 =  *0x532bb018; // 0x6e65c693e512
                                                                    				_v24 = _t206 ^ _t233;
                                                                    				if (GetCPInfo(??, ??) == 0) goto 0x5329a906;
                                                                    				_v56 = 0;
                                                                    				goto 0x5329a63c;
                                                                    				_v56 = _v56 + 1;
                                                                    				if (_v56 - 0x100 >= 0) goto 0x5329a661;
                                                                    				 *((char*)(_t233 + _a8 + 0x470)) = _v56 & 0x000000ff;
                                                                    				goto 0x5329a62c;
                                                                    				_v312 = 0x20;
                                                                    				_v328 =  &_v42;
                                                                    				goto 0x5329a68f;
                                                                    				_v328 =  &(_v328[2]);
                                                                    				if (( *_v328 & 0x000000ff) == 0) goto 0x5329a6ea;
                                                                    				_v56 =  *_v328 & 0x000000ff;
                                                                    				goto 0x5329a6c2;
                                                                    				_v56 = _v56 + 1;
                                                                    				_t214 = _v328;
                                                                    				if (_v56 - ( *(_t214 + 1) & 0x000000ff) > 0) goto 0x5329a6e8;
                                                                    				 *((char*)(_t233 + _t214 + 0x470)) = 0x20;
                                                                    				goto 0x5329a6b2;
                                                                    				goto 0x5329a67b;
                                                                    				_v1392 = 0;
                                                                    				_v1400 =  *((intOrPtr*)(_a8 + 0xc));
                                                                    				_v1408 =  *((intOrPtr*)(_a8 + 4));
                                                                    				_v1416 =  &_v1352;
                                                                    				r9d = 0x100;
                                                                    				E00007FFA7FFA5329F4D0(1,  &_v1352, __rcx,  &_v312); // executed
                                                                    				_v1384 = 0;
                                                                    				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                                    				_v1400 = 0x100;
                                                                    				_v1408 =  &_v840;
                                                                    				_v1416 = 0x100;
                                                                    				r8d = 0x100;
                                                                    				E00007FFA7FFA5329EF00( *((intOrPtr*)(_a8 + 0xc)), _a8, _t224,  &_v312);
                                                                    				_v1384 = 0;
                                                                    				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                                    				_v1400 = 0x100;
                                                                    				_v1408 =  &_v584;
                                                                    				_v1416 = 0x100;
                                                                    				r8d = 0x200;
                                                                    				_t223 = _a8;
                                                                    				E00007FFA7FFA5329EF00( *((intOrPtr*)(_t223 + 0xc)), _t223, _t224,  &_v312);
                                                                    				_v56 = 0;
                                                                    				_v56 = _v56 + 1;
                                                                    				if (_v56 - 0x100 >= 0) goto 0x5329a901;
                                                                    				if (( *(_t233 + 0x60 + _t223 * 2) & 1) == 0) goto 0x5329a879;
                                                                    				_t225 = _a8;
                                                                    				 *((char*)(_a8 + _t225 + 0x1c)) =  *(_t225 + _t223 + 0x1c) & 0x000000ff | 0x00000010;
                                                                    				 *((char*)(_a8 + _t225 + 0x11d)) =  *(_t233 + _t223 + 0x260) & 0x000000ff;
                                                                    				goto 0x5329a8fc;
                                                                    				if (( *(_t233 + 0x60 + _t223 * 2) & 2) == 0) goto 0x5329a8e5;
                                                                    				_t226 = _a8;
                                                                    				 *((char*)(_a8 + _t226 + 0x1c)) =  *(_t226 + _t223 + 0x1c) & 0x000000ff | 0x00000020;
                                                                    				 *((char*)(_a8 + _t226 + 0x11d)) =  *(_t233 + _t223 + 0x360) & 0x000000ff;
                                                                    				goto 0x5329a8fc;
                                                                    				 *((char*)(_a8 + _t223 + 0x11d)) = 0;
                                                                    				goto L1;
                                                                    				goto 0x5329aa20;
                                                                    				_v56 = 0;
                                                                    				_v56 = _v56 + 1;
                                                                    				_v56 = _v56 + 1;
                                                                    				if (_v56 - 0x100 >= 0) goto 0x5329aa20;
                                                                    				if (_v56 - 0x41 < 0) goto 0x5329a99c;
                                                                    				if (_v56 - 0x5a > 0) goto 0x5329a99c;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rcx = _a8;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000010;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                                    				_v56 = _v56 + 0x20;
                                                                    				__ecx = _v56;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(_a8 + __rcx + 0x11d)) = __al;
                                                                    				goto 0x5329aa1b;
                                                                    				if (_v56 - 0x61 < 0) goto 0x5329aa04;
                                                                    				if (_v56 - 0x7a > 0) goto 0x5329aa04;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rcx = _a8;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000020;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                                    				_v56 = _v56 - 0x20;
                                                                    				__ecx = _v56;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(__rdx + __rcx + 0x11d)) = __al;
                                                                    				goto 0x5329aa1b;
                                                                    				__eax = _v56;
                                                                    				__rcx = _a8;
                                                                    				 *((char*)(_a8 + __rax + 0x11d)) = 0;
                                                                    				goto L2;
                                                                    				__rcx = _v24;
                                                                    				__rcx = _v24 ^ __rsp;
                                                                    				return E00007FFA7FFA53293280(_v56, _v56, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                                    			}























                                                                    0x7ffa5329a5e0
                                                                    0x7ffa5329a5e0
                                                                    0x7ffa5329a5ec
                                                                    0x7ffa5329a5f6
                                                                    0x7ffa5329a619
                                                                    0x7ffa5329a61f
                                                                    0x7ffa5329a62a
                                                                    0x7ffa5329a635
                                                                    0x7ffa5329a647
                                                                    0x7ffa5329a658
                                                                    0x7ffa5329a65f
                                                                    0x7ffa5329a661
                                                                    0x7ffa5329a671
                                                                    0x7ffa5329a679
                                                                    0x7ffa5329a687
                                                                    0x7ffa5329a69c
                                                                    0x7ffa5329a6a9
                                                                    0x7ffa5329a6b0
                                                                    0x7ffa5329a6bb
                                                                    0x7ffa5329a6c2
                                                                    0x7ffa5329a6d5
                                                                    0x7ffa5329a6de
                                                                    0x7ffa5329a6e6
                                                                    0x7ffa5329a6e8
                                                                    0x7ffa5329a6ea
                                                                    0x7ffa5329a6fd
                                                                    0x7ffa5329a70c
                                                                    0x7ffa5329a715
                                                                    0x7ffa5329a71a
                                                                    0x7ffa5329a72f
                                                                    0x7ffa5329a734
                                                                    0x7ffa5329a747
                                                                    0x7ffa5329a74b
                                                                    0x7ffa5329a75b
                                                                    0x7ffa5329a760
                                                                    0x7ffa5329a770
                                                                    0x7ffa5329a783
                                                                    0x7ffa5329a788
                                                                    0x7ffa5329a79b
                                                                    0x7ffa5329a79f
                                                                    0x7ffa5329a7af
                                                                    0x7ffa5329a7b4
                                                                    0x7ffa5329a7c4
                                                                    0x7ffa5329a7ca
                                                                    0x7ffa5329a7d7
                                                                    0x7ffa5329a7dc
                                                                    0x7ffa5329a7f2
                                                                    0x7ffa5329a804
                                                                    0x7ffa5329a81b
                                                                    0x7ffa5329a828
                                                                    0x7ffa5329a84b
                                                                    0x7ffa5329a86d
                                                                    0x7ffa5329a874
                                                                    0x7ffa5329a88a
                                                                    0x7ffa5329a897
                                                                    0x7ffa5329a8ba
                                                                    0x7ffa5329a8dc
                                                                    0x7ffa5329a8e3
                                                                    0x7ffa5329a8f4
                                                                    0x7ffa5329a8fc
                                                                    0x7ffa5329a901
                                                                    0x7ffa5329a906
                                                                    0x7ffa5329a91a
                                                                    0x7ffa5329a91c
                                                                    0x7ffa5329a92e
                                                                    0x7ffa5329a93c
                                                                    0x7ffa5329a946
                                                                    0x7ffa5329a94f
                                                                    0x7ffa5329a953
                                                                    0x7ffa5329a960
                                                                    0x7ffa5329a96a
                                                                    0x7ffa5329a96e
                                                                    0x7ffa5329a976
                                                                    0x7ffa5329a981
                                                                    0x7ffa5329a984
                                                                    0x7ffa5329a98b
                                                                    0x7ffa5329a993
                                                                    0x7ffa5329a99a
                                                                    0x7ffa5329a9a4
                                                                    0x7ffa5329a9ae
                                                                    0x7ffa5329a9b7
                                                                    0x7ffa5329a9bb
                                                                    0x7ffa5329a9c8
                                                                    0x7ffa5329a9d2
                                                                    0x7ffa5329a9d6
                                                                    0x7ffa5329a9de
                                                                    0x7ffa5329a9e9
                                                                    0x7ffa5329a9ec
                                                                    0x7ffa5329a9f3
                                                                    0x7ffa5329a9fb
                                                                    0x7ffa5329aa02
                                                                    0x7ffa5329aa04
                                                                    0x7ffa5329aa0b
                                                                    0x7ffa5329aa13
                                                                    0x7ffa5329aa1b
                                                                    0x7ffa5329aa20
                                                                    0x7ffa5329aa28
                                                                    0x7ffa5329aa37

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Info
                                                                    • String ID: $z
                                                                    • API String ID: 1807457897-2251613814
                                                                    • Opcode ID: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                                    • Instruction ID: 3a4ba114a1806c11104c736aba673ef19ecda6ed05cecef63ebd27cacf95d2b9
                                                                    • Opcode Fuzzy Hash: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                                    • Instruction Fuzzy Hash: FFB1B67261CFC0CAD7758B29E4803AFB7A1F799785F149125DA8E83B99DB2CD4429F00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale_unlock$UpdateUpdate::~___updatetmbcinfo
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbctype.c
                                                                    • API String ID: 4112623284-4095683531
                                                                    • Opcode ID: 587d7c63c2f280d76f00a5a6279b212f57539b6122539f303ec6642172553049
                                                                    • Instruction ID: 98b90b625304be56ece4621d7c0dad3735fdd41e97a57a70dd7c3a538a2825db
                                                                    • Opcode Fuzzy Hash: 587d7c63c2f280d76f00a5a6279b212f57539b6122539f303ec6642172553049
                                                                    • Instruction Fuzzy Hash: AD91547662CF458AD7608B15E49036E77A2F7D97A4F488136EA8E537A8CF3CD581CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 50%
                                                                    			E00007FFA7FFA5329461B(void* __rdx, void* __r8, long long _a32, long long _a40, intOrPtr _a64, long long _a72, void* _a80, intOrPtr _a88, long long _a96, long long _a128, signed int _a136, long long _a144, intOrPtr _a152, void* _a160) {
                                                                    				signed int _t64;
                                                                    				intOrPtr _t66;
                                                                    				void* _t73;
                                                                    				void* _t92;
                                                                    				long long _t98;
                                                                    				long long _t113;
                                                                    				long long _t114;
                                                                    				long long _t115;
                                                                    				long long _t130;
                                                                    				intOrPtr _t132;
                                                                    				long long _t135;
                                                                    
                                                                    				if (_a136 == 1) goto 0x53294672;
                                                                    				_t64 = _a136 & 0x0000ffff;
                                                                    				if (_t64 == 2) goto 0x53294672;
                                                                    				if (_a136 == 3) goto 0x53294672;
                                                                    				_a40 = "Error: memory allocation: bad memory block type.\n";
                                                                    				_a32 = "%s";
                                                                    				r9d = 0;
                                                                    				r8d = 0;
                                                                    				0x5329ad00();
                                                                    				if (_t64 != 1) goto 0x53294672;
                                                                    				asm("int3");
                                                                    				_t98 = _a128 + 0x34;
                                                                    				_a96 = _t98;
                                                                    				0x5329ac90(); // executed
                                                                    				_a80 = _t98;
                                                                    				if (_a80 != 0) goto 0x532946b8;
                                                                    				if (_a160 == 0) goto 0x532946b3;
                                                                    				 *_a160 = 0xc;
                                                                    				goto 0x532948b4;
                                                                    				_t66 =  *0x532bb03c; // 0x37
                                                                    				 *0x532bb03c = _t66 + 1;
                                                                    				if (_a64 == 0) goto 0x5329472d;
                                                                    				 *_a80 = 0;
                                                                    				 *((long long*)(_a80 + 8)) = 0;
                                                                    				 *((long long*)(_a80 + 0x10)) = 0;
                                                                    				 *((intOrPtr*)(_a80 + 0x18)) = 0xfedcbabc;
                                                                    				 *((long long*)(_a80 + 0x20)) = _a128;
                                                                    				 *(_a80 + 0x1c) = 3;
                                                                    				 *((intOrPtr*)(_a80 + 0x28)) = 0;
                                                                    				goto 0x53294844;
                                                                    				if (0xffffffff -  *0x532bc960 - _a128 <= 0) goto 0x53294763;
                                                                    				_t130 =  *0x532bc960; // 0x43e6
                                                                    				 *0x532bc960 = _t130 + _a128;
                                                                    				goto 0x5329476e;
                                                                    				 *0x532bc960 = 0xffffffff;
                                                                    				_t132 =  *0x532bc990; // 0xaa6
                                                                    				 *0x532bc990 = _t132 + _a128;
                                                                    				_t113 =  *0x532bc978; // 0x338e
                                                                    				_t92 =  *0x532bc990 - _t113; // 0xaa6
                                                                    				if (_t92 <= 0) goto 0x532947a8;
                                                                    				_t114 =  *0x532bc990; // 0xaa6
                                                                    				 *0x532bc978 = _t114;
                                                                    				if ( *0x532bc980 == 0) goto 0x532947c4;
                                                                    				_t115 =  *0x532bc980; // 0xb40b50
                                                                    				 *((long long*)(_t115 + 8)) = _a80;
                                                                    				goto 0x532947d0;
                                                                    				 *0x532bc968 = _a80;
                                                                    				_t135 =  *0x532bc980; // 0xb40b50
                                                                    				 *_a80 = _t135;
                                                                    				 *((long long*)(_a80 + 8)) = 0;
                                                                    				 *((long long*)(_a80 + 0x10)) = _a144;
                                                                    				 *((intOrPtr*)(_a80 + 0x18)) = _a152;
                                                                    				 *((long long*)(_a80 + 0x20)) = _a128;
                                                                    				 *(_a80 + 0x1c) = _a136;
                                                                    				_t78 = _a88;
                                                                    				 *((intOrPtr*)(_a80 + 0x28)) = _a88;
                                                                    				 *0x532bc980 = _a80;
                                                                    				r8d = 4;
                                                                    				E00007FFA7FFA532932B0( *0x532bb04c & 0x000000ff, _a88,  *0x532bb04c & 0x000000ff, _a80 + 0x2c, __rdx, __r8);
                                                                    				_t145 = _a128;
                                                                    				r8d = 4;
                                                                    				E00007FFA7FFA532932B0( *0x532bb04c & 0x000000ff, _a88,  *0x532bb04c & 0x000000ff, _a80 + _a128 + 0x30, _a128, __r8);
                                                                    				_t73 = E00007FFA7FFA532932B0( *0x532bb04f & 0x000000ff, _t78,  *0x532bb04f & 0x000000ff, _a80 + 0x30, _t145, _a128);
                                                                    				_a72 = _a80 + 0x30;
                                                                    				return E00007FFA7FFA53299360(_t73, 4);
                                                                    			}














                                                                    0x7ffa53294623
                                                                    0x7ffa5329462c
                                                                    0x7ffa53294634
                                                                    0x7ffa5329463e
                                                                    0x7ffa53294647
                                                                    0x7ffa53294653
                                                                    0x7ffa53294658
                                                                    0x7ffa5329465b
                                                                    0x7ffa53294665
                                                                    0x7ffa5329466d
                                                                    0x7ffa5329466f
                                                                    0x7ffa5329467a
                                                                    0x7ffa5329467e
                                                                    0x7ffa53294688
                                                                    0x7ffa5329468d
                                                                    0x7ffa53294698
                                                                    0x7ffa532946a3
                                                                    0x7ffa532946ad
                                                                    0x7ffa532946b3
                                                                    0x7ffa532946b8
                                                                    0x7ffa532946c0
                                                                    0x7ffa532946cb
                                                                    0x7ffa532946d2
                                                                    0x7ffa532946de
                                                                    0x7ffa532946eb
                                                                    0x7ffa532946f8
                                                                    0x7ffa5329470c
                                                                    0x7ffa53294715
                                                                    0x7ffa53294721
                                                                    0x7ffa53294728
                                                                    0x7ffa53294743
                                                                    0x7ffa5329474d
                                                                    0x7ffa5329475a
                                                                    0x7ffa53294761
                                                                    0x7ffa53294763
                                                                    0x7ffa53294776
                                                                    0x7ffa53294783
                                                                    0x7ffa5329478a
                                                                    0x7ffa53294791
                                                                    0x7ffa53294798
                                                                    0x7ffa5329479a
                                                                    0x7ffa532947a1
                                                                    0x7ffa532947b0
                                                                    0x7ffa532947b2
                                                                    0x7ffa532947be
                                                                    0x7ffa532947c2
                                                                    0x7ffa532947c9
                                                                    0x7ffa532947d5
                                                                    0x7ffa532947dc
                                                                    0x7ffa532947e4
                                                                    0x7ffa532947f9
                                                                    0x7ffa53294809
                                                                    0x7ffa53294819
                                                                    0x7ffa53294829
                                                                    0x7ffa53294831
                                                                    0x7ffa53294835
                                                                    0x7ffa5329483d
                                                                    0x7ffa53294854
                                                                    0x7ffa5329485c
                                                                    0x7ffa5329486d
                                                                    0x7ffa5329487a
                                                                    0x7ffa53294882
                                                                    0x7ffa532948a1
                                                                    0x7ffa532948af
                                                                    0x7ffa532948c7

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock
                                                                    • String ID: Error: memory allocation: bad memory block type.
                                                                    • API String ID: 2480363372-1537269110
                                                                    • Opcode ID: 070c00f70d4df6f813f84e43e5590717d4ebcb6a3ae1d4e5f47ac26a0ae5b61c
                                                                    • Instruction ID: c8e7898da90f4bfc0b0fb71abe237203f879aab7a32c8bb1b683d90d247153e1
                                                                    • Opcode Fuzzy Hash: 070c00f70d4df6f813f84e43e5590717d4ebcb6a3ae1d4e5f47ac26a0ae5b61c
                                                                    • Instruction Fuzzy Hash: C371F476A19F8582EB20CB55E49036EB3A1FBDAB50F048536DA9D937A4CFBCD054CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer_initterm_e
                                                                    • String ID: Y
                                                                    • API String ID: 1618838664-1754117475
                                                                    • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction ID: 8ee0f65e0a668ede1cd29fbc551b43e1ef1d2bf359e146ffc26a29a31834eb21
                                                                    • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction Fuzzy Hash: D7E0AC6292CF4697E7209B14E8501BD2362BFE6344F888531D14EA24A5DF2CE984CA00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 46%
                                                                    			E00007FFA7FFA53293110() {
                                                                    				void* _t2;
                                                                    				intOrPtr _t3;
                                                                    				void* _t5;
                                                                    
                                                                    				_t3 =  *0x532bc3c8; // 0x180000000
                                                                    				E00007FFA7FFA532911E0(_t2, _t3, "H82WX82viYR", _t5); // executed
                                                                    				ExitProcess(??);
                                                                    			}






                                                                    0x7ffa53293114
                                                                    0x7ffa53293122
                                                                    0x7ffa53293127

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExitProcess
                                                                    • String ID: H82WX82viYR
                                                                    • API String ID: 621844428-3887106525
                                                                    • Opcode ID: 9520d05ee5257cfcb6870757d168f5deeb70c535bf89830e30f839e103e3a1eb
                                                                    • Instruction ID: abb4eb57941cdfcaa1089d9b338e9a18153f21aedfa20fa5df303cb040ce5709
                                                                    • Opcode Fuzzy Hash: 9520d05ee5257cfcb6870757d168f5deeb70c535bf89830e30f839e103e3a1eb
                                                                    • Instruction Fuzzy Hash: 3CC04C51F35F0391DA0467E3EC9106D12536BE6780FC89431D50D66221DD5CA2D64721
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 47%
                                                                    			E00007FFA7FFA5329A000(signed short __ecx, void* __rcx, long long __rdx, signed int _a8, void* _a16) {
                                                                    				signed int _v24;
                                                                    				signed char* _v32;
                                                                    				char _v50;
                                                                    				char _v56;
                                                                    				signed int _v72;
                                                                    				signed char* _v80;
                                                                    				signed int _v84;
                                                                    				signed int _v88;
                                                                    				signed long long _t204;
                                                                    				signed long long _t205;
                                                                    				signed long long _t206;
                                                                    				signed char* _t215;
                                                                    				signed long long _t218;
                                                                    				signed long long _t233;
                                                                    				signed long long _t234;
                                                                    
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __ecx;
                                                                    				_t204 =  *0x532bb018; // 0x6e65c693e512
                                                                    				_t205 = _t204 ^ _t234;
                                                                    				_v24 = _t205;
                                                                    				_a8 = E00007FFA7FFA53299F20(_a8, _t205);
                                                                    				if (_a8 != 0) goto 0x5329a04d;
                                                                    				E00007FFA7FFA5329A4E0(_a16);
                                                                    				goto 0x5329a463;
                                                                    				_v84 = 0;
                                                                    				_v84 = _v84 + 1;
                                                                    				if (_t205 - 5 >= 0) goto 0x5329a239;
                                                                    				_t206 = _t205 * 0x30;
                                                                    				if ( *((intOrPtr*)(0x532bbb70 + _t206)) != _a8) goto 0x5329a234;
                                                                    				_v72 = 0;
                                                                    				goto 0x5329a0a2;
                                                                    				_v72 = _v72 + 1;
                                                                    				if (_v72 - 0x101 >= 0) goto 0x5329a0bf;
                                                                    				 *((char*)(_a16 + _t206 + 0x1c)) = 0;
                                                                    				goto 0x5329a098;
                                                                    				_v88 = 0;
                                                                    				goto 0x5329a0d3;
                                                                    				_v88 = _v88 + 1;
                                                                    				if (_v88 - 4 >= 0) goto 0x5329a197;
                                                                    				_v80 = 0x47fccec899700;
                                                                    				goto 0x5329a111;
                                                                    				_v80 =  &(_v80[2]);
                                                                    				if (( *_v80 & 0x000000ff) == 0) goto 0x5329a192;
                                                                    				if ((_v80[1] & 0x000000ff) == 0) goto 0x5329a192;
                                                                    				_v72 =  *_v80 & 0x000000ff;
                                                                    				goto 0x5329a142;
                                                                    				_v72 = _v72 + 1;
                                                                    				_t215 = _v80;
                                                                    				if (_v72 - ( *(_t215 + 1) & 0x000000ff) > 0) goto 0x5329a18d;
                                                                    				_t233 = _a16;
                                                                    				 *((char*)(_t233 + 0x532bbb70 + _t206 * 0x30 + 0x1c)) =  *(_a16 + _t215 + 0x1c) & 0x000000ff |  *0xFFF4A65776D8;
                                                                    				goto 0x5329a138;
                                                                    				goto 0x5329a103;
                                                                    				goto 0x5329a0c9;
                                                                    				 *(_a16 + 4) = _a8;
                                                                    				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                    				_t218 = _a16;
                                                                    				 *(_a16 + 0xc) = E00007FFA7FFA5329A480( *((intOrPtr*)(_t218 + 4)));
                                                                    				_v88 = 0;
                                                                    				goto 0x5329a1e7;
                                                                    				_v88 = _v88 + 1;
                                                                    				if (_v88 - 6 >= 0) goto 0x5329a220;
                                                                    				_t205 = 0x532bbb70;
                                                                    				 *((short*)(_a16 + 0x10 + _t233 * 2)) =  *(0x532bbb70 + 4 + (0x532bbb70 + _t218 * 0x30) * 2) & 0x0000ffff;
                                                                    				goto 0x5329a1dd;
                                                                    				E00007FFA7FFA5329A5E0(_a16);
                                                                    				goto 0x5329a463;
                                                                    				goto L1;
                                                                    				if (_a8 == 0) goto 0x5329a271;
                                                                    				if (_a8 == 0xfde8) goto 0x5329a271;
                                                                    				if (_a8 == 0xfde9) goto 0x5329a271;
                                                                    				__eax = _a8 & 0x0000ffff;
                                                                    				__ecx = _a8 & 0x0000ffff;
                                                                    				if (IsValidCodePage(??) != 0) goto 0x5329a27b;
                                                                    				__eax = 0xffffffff;
                                                                    				goto 0x5329a463;
                                                                    				__rdx =  &_v56;
                                                                    				__ecx = _a8;
                                                                    				if (GetCPInfo(??, ??) == 0) goto 0x5329a444;
                                                                    				_v72 = 0;
                                                                    				goto 0x5329a2a9;
                                                                    				_v72 = _v72 + 1;
                                                                    				_v72 = _v72 + 1;
                                                                    				if (_v72 - 0x101 >= 0) goto 0x5329a2c6;
                                                                    				__eax = _v72;
                                                                    				__rcx = _a16;
                                                                    				 *((char*)(_a16 + __rax + 0x1c)) = 0;
                                                                    				goto 0x5329a29f;
                                                                    				__rax = _a16;
                                                                    				__ecx = _a8;
                                                                    				 *(_a16 + 4) = _a8;
                                                                    				__rax = _a16;
                                                                    				 *(_a16 + 0xc) = 0;
                                                                    				if (_v56 - 1 <= 0) goto 0x5329a3f4;
                                                                    				__rax =  &_v50;
                                                                    				_v32 =  &_v50;
                                                                    				goto 0x5329a30c;
                                                                    				_v32 =  &(_v32[2]);
                                                                    				_v32 =  &(_v32[2]);
                                                                    				__rax = _v32;
                                                                    				__eax =  *_v32 & 0x000000ff;
                                                                    				if (( *_v32 & 0x000000ff) == 0) goto 0x5329a37c;
                                                                    				__rax = _v32;
                                                                    				__eax =  *(__rax + 1) & 0x000000ff;
                                                                    				if (( *(__rax + 1) & 0x000000ff) == 0) goto 0x5329a37c;
                                                                    				__rax = _v32;
                                                                    				__eax =  *_v32 & 0x000000ff;
                                                                    				_v72 =  *_v32 & 0x000000ff;
                                                                    				goto 0x5329a33d;
                                                                    				_v72 = _v72 + 1;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rax = _v32;
                                                                    				__eax =  *(__rax + 1) & 0x000000ff;
                                                                    				if (_v72 - ( *(__rax + 1) & 0x000000ff) > 0) goto 0x5329a37a;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rcx = _a16;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000004;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rdx = _a16;
                                                                    				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                    				goto 0x5329a333;
                                                                    				goto 0x5329a2fe;
                                                                    				_v72 = 1;
                                                                    				goto 0x5329a390;
                                                                    				_v72 = _v72 + 1;
                                                                    				_v72 = _v72 + 1;
                                                                    				if (_v72 - 0xff >= 0) goto 0x5329a3c8;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rcx = _a16;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000008;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rdx = _a16;
                                                                    				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                    				goto 0x5329a386;
                                                                    				__rax = _a16;
                                                                    				__ecx =  *(_a16 + 4);
                                                                    				__eax = E00007FFA7FFA5329A480( *(_a16 + 4));
                                                                    				__rcx = _a16;
                                                                    				 *(_a16 + 0xc) = __eax;
                                                                    				__rax = _a16;
                                                                    				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                    				goto 0x5329a403;
                                                                    				__rax = _a16;
                                                                    				 *(__rax + 8) = 0;
                                                                    				_v88 = 0;
                                                                    				goto 0x5329a417;
                                                                    				_v88 = _v88 + 1;
                                                                    				_v88 = _v88 + 1;
                                                                    				if (_v88 - 6 >= 0) goto 0x5329a433;
                                                                    				__eax = _v88;
                                                                    				__ecx = 0;
                                                                    				__rdx = _a16;
                                                                    				 *((short*)(_a16 + 0x10 + __rax * 2)) = __cx;
                                                                    				goto 0x5329a40d;
                                                                    				__rcx = _a16;
                                                                    				__eax = E00007FFA7FFA5329A5E0(_a16); // executed
                                                                    				__eax = 0;
                                                                    				goto 0x5329a463;
                                                                    				if ( *0x532bcd68 == 0) goto 0x5329a45e;
                                                                    				__rcx = _a16;
                                                                    				E00007FFA7FFA5329A4E0(_a16) = 0;
                                                                    				goto 0x5329a463;
                                                                    				__eax = 0xffffffff;
                                                                    				__rcx = _v24;
                                                                    				__rcx = _v24 ^ __rsp;
                                                                    				return E00007FFA7FFA53293280(0xffffffff, __ecx, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                                    			}


















                                                                    0x7ffa5329a000
                                                                    0x7ffa5329a005
                                                                    0x7ffa5329a00d
                                                                    0x7ffa5329a014
                                                                    0x7ffa5329a017
                                                                    0x7ffa5329a028
                                                                    0x7ffa5329a037
                                                                    0x7ffa5329a041
                                                                    0x7ffa5329a048
                                                                    0x7ffa5329a04d
                                                                    0x7ffa5329a05d
                                                                    0x7ffa5329a069
                                                                    0x7ffa5329a073
                                                                    0x7ffa5329a088
                                                                    0x7ffa5329a08e
                                                                    0x7ffa5329a096
                                                                    0x7ffa5329a09e
                                                                    0x7ffa5329a0aa
                                                                    0x7ffa5329a0b8
                                                                    0x7ffa5329a0bd
                                                                    0x7ffa5329a0bf
                                                                    0x7ffa5329a0c7
                                                                    0x7ffa5329a0cf
                                                                    0x7ffa5329a0d8
                                                                    0x7ffa5329a0fc
                                                                    0x7ffa5329a101
                                                                    0x7ffa5329a10c
                                                                    0x7ffa5329a11b
                                                                    0x7ffa5329a128
                                                                    0x7ffa5329a132
                                                                    0x7ffa5329a136
                                                                    0x7ffa5329a13e
                                                                    0x7ffa5329a142
                                                                    0x7ffa5329a14f
                                                                    0x7ffa5329a17f
                                                                    0x7ffa5329a187
                                                                    0x7ffa5329a18b
                                                                    0x7ffa5329a18d
                                                                    0x7ffa5329a192
                                                                    0x7ffa5329a1a6
                                                                    0x7ffa5329a1b1
                                                                    0x7ffa5329a1b8
                                                                    0x7ffa5329a1d0
                                                                    0x7ffa5329a1d3
                                                                    0x7ffa5329a1db
                                                                    0x7ffa5329a1e3
                                                                    0x7ffa5329a1ec
                                                                    0x7ffa5329a200
                                                                    0x7ffa5329a218
                                                                    0x7ffa5329a21e
                                                                    0x7ffa5329a228
                                                                    0x7ffa5329a22f
                                                                    0x7ffa5329a234
                                                                    0x7ffa5329a241
                                                                    0x7ffa5329a24e
                                                                    0x7ffa5329a25b
                                                                    0x7ffa5329a25d
                                                                    0x7ffa5329a265
                                                                    0x7ffa5329a26f
                                                                    0x7ffa5329a271
                                                                    0x7ffa5329a276
                                                                    0x7ffa5329a27b
                                                                    0x7ffa5329a280
                                                                    0x7ffa5329a28f
                                                                    0x7ffa5329a295
                                                                    0x7ffa5329a29d
                                                                    0x7ffa5329a2a3
                                                                    0x7ffa5329a2a5
                                                                    0x7ffa5329a2b1
                                                                    0x7ffa5329a2b3
                                                                    0x7ffa5329a2b7
                                                                    0x7ffa5329a2bf
                                                                    0x7ffa5329a2c4
                                                                    0x7ffa5329a2c6
                                                                    0x7ffa5329a2ce
                                                                    0x7ffa5329a2d5
                                                                    0x7ffa5329a2d8
                                                                    0x7ffa5329a2e0
                                                                    0x7ffa5329a2ec
                                                                    0x7ffa5329a2f2
                                                                    0x7ffa5329a2f7
                                                                    0x7ffa5329a2fc
                                                                    0x7ffa5329a303
                                                                    0x7ffa5329a307
                                                                    0x7ffa5329a30c
                                                                    0x7ffa5329a311
                                                                    0x7ffa5329a316
                                                                    0x7ffa5329a318
                                                                    0x7ffa5329a31d
                                                                    0x7ffa5329a323
                                                                    0x7ffa5329a325
                                                                    0x7ffa5329a32a
                                                                    0x7ffa5329a32d
                                                                    0x7ffa5329a331
                                                                    0x7ffa5329a337
                                                                    0x7ffa5329a339
                                                                    0x7ffa5329a33d
                                                                    0x7ffa5329a342
                                                                    0x7ffa5329a34a
                                                                    0x7ffa5329a350
                                                                    0x7ffa5329a354
                                                                    0x7ffa5329a361
                                                                    0x7ffa5329a368
                                                                    0x7ffa5329a36c
                                                                    0x7ffa5329a374
                                                                    0x7ffa5329a378
                                                                    0x7ffa5329a37a
                                                                    0x7ffa5329a37c
                                                                    0x7ffa5329a384
                                                                    0x7ffa5329a38a
                                                                    0x7ffa5329a38c
                                                                    0x7ffa5329a398
                                                                    0x7ffa5329a39e
                                                                    0x7ffa5329a3a2
                                                                    0x7ffa5329a3af
                                                                    0x7ffa5329a3b6
                                                                    0x7ffa5329a3ba
                                                                    0x7ffa5329a3c2
                                                                    0x7ffa5329a3c6
                                                                    0x7ffa5329a3c8
                                                                    0x7ffa5329a3d0
                                                                    0x7ffa5329a3d3
                                                                    0x7ffa5329a3d8
                                                                    0x7ffa5329a3e0
                                                                    0x7ffa5329a3e3
                                                                    0x7ffa5329a3eb
                                                                    0x7ffa5329a3f2
                                                                    0x7ffa5329a3f4
                                                                    0x7ffa5329a3fc
                                                                    0x7ffa5329a403
                                                                    0x7ffa5329a40b
                                                                    0x7ffa5329a411
                                                                    0x7ffa5329a413
                                                                    0x7ffa5329a41c
                                                                    0x7ffa5329a41e
                                                                    0x7ffa5329a422
                                                                    0x7ffa5329a424
                                                                    0x7ffa5329a42c
                                                                    0x7ffa5329a431
                                                                    0x7ffa5329a433
                                                                    0x7ffa5329a43b
                                                                    0x7ffa5329a440
                                                                    0x7ffa5329a442
                                                                    0x7ffa5329a44b
                                                                    0x7ffa5329a44d
                                                                    0x7ffa5329a45a
                                                                    0x7ffa5329a45c
                                                                    0x7ffa5329a45e
                                                                    0x7ffa5329a463
                                                                    0x7ffa5329a468
                                                                    0x7ffa5329a474

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_
                                                                    • String ID:
                                                                    • API String ID: 1901436342-0
                                                                    • Opcode ID: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                    • Instruction ID: 926cd54e30537231577772bb304792f597df8e03fb72e21f106762ff709accab
                                                                    • Opcode Fuzzy Hash: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                    • Instruction Fuzzy Hash: DBD1097262CB818AD7A48B15E48432EB7A1F7D9754F088136EACF97798DF2CD5858F00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 62%
                                                                    			E00007FFA7FFA53297540(long long __rax) {
                                                                    				long long _v24;
                                                                    				void* _t8;
                                                                    				void* _t9;
                                                                    
                                                                    				_t16 = __rax;
                                                                    				_t9 = E00007FFA7FFA53293D00(_t8); // executed
                                                                    				_v24 = __rax;
                                                                    				return E00007FFA7FFA5329CF20(E00007FFA7FFA5329CFB0(E00007FFA7FFA5329D450(E00007FFA7FFA5329D470(E00007FFA7FFA5329BD50(E00007FFA7FFA5329AB90(_t9, _v24), _v24), _v24), _v24), _v24), _t16, _v24);
                                                                    			}






                                                                    0x7ffa53297540
                                                                    0x7ffa53297544
                                                                    0x7ffa53297549
                                                                    0x7ffa5329758e

                                                                    APIs
                                                                      • Part of subcall function 00007FFA53293D00: RtlEncodePointer.NTDLL ref: 00007FFA53293D06
                                                                    • _initp_misc_winsig.LIBCMTD ref: 00007FFA5329757B
                                                                    • _initp_eh_hooks.LIBCMTD ref: 00007FFA53297585
                                                                      • Part of subcall function 00007FFA5329CF20: EncodePointer.KERNEL32(?,?,?,?,00007FFA5329758A,?,?,?,?,?,?,00007FFA53293D39), ref: 00007FFA5329CF30
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer$_initp_eh_hooks_initp_misc_winsig
                                                                    • String ID:
                                                                    • API String ID: 2678799220-0
                                                                    • Opcode ID: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                                    • Instruction ID: 4d2ab31eb25aefbb071f65adeb34ea86cf25d3b663994fa47a307e0874add9ba
                                                                    • Opcode Fuzzy Hash: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                                    • Instruction Fuzzy Hash: 4FE0E9A7938E8181D520BB11E86207E9372BBE6B48F444132F6CE5667FCE2CE5508A90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExitProcess$AllocateHeap__crt
                                                                    • String ID:
                                                                    • API String ID: 4215626177-0
                                                                    • Opcode ID: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                                    • Instruction ID: e57850aad4d463de6988f1cb5159ac847235e9461f8bd07a44ca03cac7bf08d9
                                                                    • Opcode Fuzzy Hash: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                                    • Instruction Fuzzy Hash: EAE0866291CF8683E7209719E41037E6262FFD6748F488035D78F166A6CF3DD480D610
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID:
                                                                    • API String ID: 963392458-0
                                                                    • Opcode ID: 04cf030d77e645320339c33741cb4d53f5c8d6a2e25ff01d0d4939bc2732d238
                                                                    • Instruction ID: 2da17281d2a08d1ac9b8a996dbaf27e8716b5e9a88d25284efbd0f172fd1731a
                                                                    • Opcode Fuzzy Hash: 04cf030d77e645320339c33741cb4d53f5c8d6a2e25ff01d0d4939bc2732d238
                                                                    • Instruction Fuzzy Hash: 7041417051CB848FDBB8DF18E48979AB7E0FB88314F104A5DE48EC7245DB749885CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 58%
                                                                    			E00007FFA7FFA53294399(long long __rax, long long _a48, intOrPtr _a80, intOrPtr _a88, void* _a120) {
                                                                    
                                                                    				_a48 = __rax;
                                                                    				if (_a48 == 0) goto 0x532943ad;
                                                                    				goto 0x532943f5;
                                                                    				if (_a88 != 0) goto 0x532943ce;
                                                                    				if (_a120 == 0) goto 0x532943c7;
                                                                    				 *_a120 = 0xc;
                                                                    				goto 0x532943f5;
                                                                    				if (E00007FFA7FFA5329ABB0(_a48, _a80) != 0) goto 0x532943f3;
                                                                    				if (_a120 == 0) goto 0x532943ef;
                                                                    				 *_a120 = 0xc;
                                                                    				goto 0x532943f5;
                                                                    				goto 0x53294377;
                                                                    				return 0;
                                                                    			}



                                                                    0x7ffa53294399
                                                                    0x7ffa532943a4
                                                                    0x7ffa532943ab
                                                                    0x7ffa532943b2
                                                                    0x7ffa532943ba
                                                                    0x7ffa532943c1
                                                                    0x7ffa532943cc
                                                                    0x7ffa532943da
                                                                    0x7ffa532943e2
                                                                    0x7ffa532943e9
                                                                    0x7ffa532943f1
                                                                    0x7ffa532943f3
                                                                    0x7ffa532943f9

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                    • Instruction ID: 1f15c83b15a0da47fb1a0e3f8e62830da17d4ae89ff858cd9c82def1707f4cfb
                                                                    • Opcode Fuzzy Hash: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                    • Instruction Fuzzy Hash: A701E56252CF41C2F6508B25E04072EB7A1F7D9794F644231EA8E52AA8CF7CE4908A04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$ByteCharMultiUpdateUpdate::~_Wide
                                                                    • String ID:
                                                                    • API String ID: 2569699860-0
                                                                    • Opcode ID: 0c57b3b436687e78039d68963cfd06a068c3edb785e51800680b91c9a9ce0a07
                                                                    • Instruction ID: 1fefe8d46dbe3296f3c58481d284ed8c48dd562c4d7a0b422ebe41d18e120d4a
                                                                    • Opcode Fuzzy Hash: 0c57b3b436687e78039d68963cfd06a068c3edb785e51800680b91c9a9ce0a07
                                                                    • Instruction Fuzzy Hash: 9601AEB2A2CBC18AC760DF11F08069AB7A1F7D9394F508129EA8E43B59CB38D5448F40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _ioterm
                                                                    • String ID:
                                                                    • API String ID: 4163092671-0
                                                                    • Opcode ID: c4661e6c861f00f368b387c53bfc5a2878f93a0c021545087ea26df979c33d88
                                                                    • Instruction ID: 689e2a51b216bf108a2a7c5b514c5724c94e72932ebf1419cba51495f21c273e
                                                                    • Opcode Fuzzy Hash: c4661e6c861f00f368b387c53bfc5a2878f93a0c021545087ea26df979c33d88
                                                                    • Instruction Fuzzy Hash: 9FF044A6C3CF0B89F2616794944537C2297AFF6B50F0CD138E20EA00D2DF6CA8C48621
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _ioterm.LIBCMTD ref: 00007FFA53293437
                                                                      • Part of subcall function 00007FFA53297D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFA5329343C), ref: 00007FFA53297D93
                                                                      • Part of subcall function 00007FFA53293E00: FlsFree.KERNEL32 ref: 00007FFA53293E13
                                                                      • Part of subcall function 00007FFA53293E00: _mtdeletelocks.LIBCMTD ref: 00007FFA53293E23
                                                                      • Part of subcall function 00007FFA532988D0: HeapDestroy.KERNELBASE ref: 00007FFA532988DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                                    • String ID:
                                                                    • API String ID: 1508997487-0
                                                                    • Opcode ID: 8c7cd16c52d3f74447f8a2e4d1e0973512220e22c4a7d0e47614c04d6d0045ae
                                                                    • Instruction ID: b31a79f7078da69a5adddc2600e1b165537f87191178162b9cf17786f0377e2b
                                                                    • Opcode Fuzzy Hash: 8c7cd16c52d3f74447f8a2e4d1e0973512220e22c4a7d0e47614c04d6d0045ae
                                                                    • Instruction Fuzzy Hash: 42E0B692D2CE078AF21263A4585227D12825FEAB81F4CC030E20FE1292EE5CA8804271
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyHeap
                                                                    • String ID:
                                                                    • API String ID: 2435110975-0
                                                                    • Opcode ID: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                                    • Instruction ID: 2be218fc90042bf7ade04ed4de4771e7d20ed139e8c3d104971797b366c5c69a
                                                                    • Opcode Fuzzy Hash: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                                    • Instruction Fuzzy Hash: 27C04C64D75F11C1E6045711FCA532C22257BE6715F948030C50D212218E2D55968710
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer
                                                                    • String ID:
                                                                    • API String ID: 2118026453-0
                                                                    • Opcode ID: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                                    • Instruction ID: 3375de4173d110b556f23a22eaa3f9269c71b5ccdb00f7af144dbce5fe62da4a
                                                                    • Opcode Fuzzy Hash: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                                    • Instruction Fuzzy Hash: 84A00124E2AB9196DA5C372658A602911216BAA609EE45C69C61F502518D2D92AA8B04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_snwprintf_s_unlock_wcsftime_l
                                                                    • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $P$Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportW$_itow_s(nLine, szLineMessage, 4096, 10)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcpy_s(szOutMessage2, 4096, "_CrtDbgReport: String too long or Invalid characters in String")$wcscat_s(szLineMessage, 4096, L"\n")$wcscat_s(szLineMessage, 4096, L"\r")$wcscat_s(szLineMessage, 4096, szUserMessage)$wcscpy_s(szLineMessage, 4096, szFormat ? L"Assertion failed: " : L"Assertion failed!")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcscpy_s(szUserMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcstombs_s(&ret, szaOutMessage, 4096, szOutMessage, ((size_t)-1))$wcstombs_s(((void *)0), szOutMessage2, 4096, szOutMessage, ((size_t)-1))
                                                                    • API String ID: 4197005980-4190456261
                                                                    • Opcode ID: 91caf2df9a40c10ca931429e5e540051a4e8143577a7dc19426bf0d901356392
                                                                    • Instruction ID: 435544a0b275cd7c306d568dffa61e2f119845e72f7b0425a3497d7d80b19906
                                                                    • Opcode Fuzzy Hash: 91caf2df9a40c10ca931429e5e540051a4e8143577a7dc19426bf0d901356392
                                                                    • Instruction Fuzzy Hash: 8142F47292CF8686E7208B10E4643EE63A6FBE5344F44C236D6CD52A99DF7CE149CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                    • API String ID: 2574300362-564504941
                                                                    • Opcode ID: 6419c91a8387a46f3245e2fe33ee525fa99a19ae0c1292820c60068700cd62ec
                                                                    • Instruction ID: ff6489fe61c785d4378f875da91432752b18f3cde5d9605c09e5187ef19c7cc4
                                                                    • Opcode Fuzzy Hash: 6419c91a8387a46f3245e2fe33ee525fa99a19ae0c1292820c60068700cd62ec
                                                                    • Instruction Fuzzy Hash: 9F51E73592CF8286E650DB15F8543ADB3A2FBE6754F488435DA8E62664DF7CF484CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Client hook re-allocation failure at file %hs line %d.$Client hook re-allocation failure.$Error: memory allocation: bad memory block type.$Error: memory allocation: bad memory block type.Memory allocated at %hs(%d).$Error: possible heap corruption at or near 0x%p$Invalid allocation size: %Iu bytes.$Invalid allocation size: %Iu bytes.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_realloc()$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$_pFirstBlock == pOldBlock$_pLastBlock == pOldBlock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$fRealloc || (!fRealloc && pNewBlock == pOldBlock)$pOldBlock->nLine == IGNORE_LINE && pOldBlock->lRequest == IGNORE_REQ
                                                                    • API String ID: 0-1181733849
                                                                    • Opcode ID: caf568ba67e02e981cee0a62def33bb5426de77b0166e0249518d1aed8fc28ed
                                                                    • Instruction ID: 8127d8070f188838c8a8948d33525dc7d2a5c542f0afdd47bac3251ee20a2b05
                                                                    • Opcode Fuzzy Hash: caf568ba67e02e981cee0a62def33bb5426de77b0166e0249518d1aed8fc28ed
                                                                    • Instruction Fuzzy Hash: 66423C72A2CF8585E720CB15E45036E73A6FBDA790F188535DA9E93BA4DF7CD4908B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ, xrefs: 00007FFA532957E9
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 00007FFA53295683
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 00007FFA5329579F
                                                                    • Client hook free failure., xrefs: 00007FFA532954A0
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FFA53295620
                                                                    • _BLOCK_TYPE_IS_VALID(pHead->nBlockUse), xrefs: 00007FFA53295558
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c, xrefs: 00007FFA532954F7, 00007FFA5329556D, 00007FFA532957FE
                                                                    • _CrtIsValidHeapPointer(pUserData), xrefs: 00007FFA532954E2
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FFA5329573C
                                                                    • The Block at 0x%p was allocated by aligned routines, use _aligned_free(), xrefs: 00007FFA5329542B
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: HeapPointerValid_free_base
                                                                    • String ID: Client hook free failure.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_free()$_BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ
                                                                    • API String ID: 1656799702-182684663
                                                                    • Opcode ID: 5020832333ec35d85279f4adfeb03ce22c38d55cbbbf155ecd90f9052befc044
                                                                    • Instruction ID: c658abaafd79a5d488dbbc9907fcb425d15faec8fa4f17bbd708b095d0d2b1b2
                                                                    • Opcode Fuzzy Hash: 5020832333ec35d85279f4adfeb03ce22c38d55cbbbf155ecd90f9052befc044
                                                                    • Instruction Fuzzy Hash: A3C19376A28F4182EB60CB55E45036EB7A2FBD6790F24853AEA4E53B94DF7CD444CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • _1, xrefs: 00007FFA532961FC
                                                                    • DAMAGED, xrefs: 00007FFA53295E7D
                                                                    • _heapchk fails with _HEAPBADPTR., xrefs: 00007FFA53295D7E
                                                                    • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 00007FFA5329617C
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FFA53295EF9
                                                                    • _heapchk fails with _HEAPBADBEGIN., xrefs: 00007FFA53295CE5
                                                                    • _heapchk fails with _HEAPBADNODE., xrefs: 00007FFA53295D19
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FFA53295FE7
                                                                    • _heapchk fails with unknown return value!, xrefs: 00007FFA53295DAF
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 00007FFA53295F42
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 00007FFA53296030
                                                                    • _heapchk fails with _HEAPBADEND., xrefs: 00007FFA53295D4D
                                                                    • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 00007FFA532960C7
                                                                    • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed., xrefs: 00007FFA532960FA
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$DAMAGED$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).$_heapchk fails with _HEAPBADBEGIN.$_heapchk fails with _HEAPBADEND.$_heapchk fails with _HEAPBADNODE.$_heapchk fails with _HEAPBADPTR.$_heapchk fails with unknown return value!$_1
                                                                    • API String ID: 0-510578482
                                                                    • Opcode ID: ecaeb8f0e9f50f2af9e26624824c00194ce636c943c5c9e443a2ba6a1604b1b7
                                                                    • Instruction ID: e38ded5a421d43fc501f73921b121090da778cb19a6d88498afa2256cdac718f
                                                                    • Opcode Fuzzy Hash: ecaeb8f0e9f50f2af9e26624824c00194ce636c943c5c9e443a2ba6a1604b1b7
                                                                    • Instruction Fuzzy Hash: 26E15076A28F4186EB24CB65E49022EB3A2FBD6754F148535EA8E53B54DF7CD041CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 57%
                                                                    			E00007FFA7FFA53293280(void* __eax, signed int __ecx, signed int __edx, signed int __rcx, signed int __rdx, void* __r8) {
                                                                    				void* _t7;
                                                                    				void* _t10;
                                                                    				signed long long _t15;
                                                                    				signed long long* _t16;
                                                                    				signed long long _t20;
                                                                    				signed long long _t24;
                                                                    
                                                                    				_t7 = __rcx -  *0x532bb018; // 0x6e65c693e512
                                                                    				if (_t7 != 0) goto 0x5329329a;
                                                                    				asm("dec eax");
                                                                    				if ((__ecx & 0x0000ffff) != 0) goto 0x53293296;
                                                                    				asm("repe ret");
                                                                    				asm("dec eax");
                                                                    				goto 0x53293720;
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("o16 nop [eax+eax]");
                                                                    				if (__r8 - 8 < 0) goto 0x5329330c;
                                                                    				_t20 = __rdx * 0x1010101;
                                                                    				_t10 = __r8 - 0x40;
                                                                    				if (_t10 < 0) goto 0x532932ee;
                                                                    				_t15 =  ~__rcx;
                                                                    				if (_t10 == 0) goto 0x532932de;
                                                                    				 *__rcx = _t20;
                                                                    				_t16 = _t15 + __rcx;
                                                                    				if (_t10 != 0) goto 0x53293327;
                                                                    				_t24 = __r8 - _t15 & 7;
                                                                    				if (_t10 == 0) goto 0x5329330c;
                                                                    				 *_t16 = _t20;
                                                                    				if (_t10 != 0) goto 0x53293300;
                                                                    				if (_t24 == 0) goto 0x5329331b;
                                                                    				_t16[1] = __edx & 0x000000ff;
                                                                    				if (_t24 - 1 != 0) goto 0x53293311;
                                                                    				return __eax;
                                                                    			}









                                                                    0x7ffa53293280
                                                                    0x7ffa53293287
                                                                    0x7ffa53293289
                                                                    0x7ffa53293292
                                                                    0x7ffa53293294
                                                                    0x7ffa53293296
                                                                    0x7ffa5329329a
                                                                    0x7ffa5329329f
                                                                    0x7ffa532932a0
                                                                    0x7ffa532932a1
                                                                    0x7ffa532932a2
                                                                    0x7ffa532932a3
                                                                    0x7ffa532932a4
                                                                    0x7ffa532932a5
                                                                    0x7ffa532932a6
                                                                    0x7ffa532932b7
                                                                    0x7ffa532932c6
                                                                    0x7ffa532932ca
                                                                    0x7ffa532932ce
                                                                    0x7ffa532932d0
                                                                    0x7ffa532932d6
                                                                    0x7ffa532932db
                                                                    0x7ffa532932de
                                                                    0x7ffa532932ec
                                                                    0x7ffa532932f1
                                                                    0x7ffa532932f9
                                                                    0x7ffa53293300
                                                                    0x7ffa5329330a
                                                                    0x7ffa5329330f
                                                                    0x7ffa53293311
                                                                    0x7ffa53293319
                                                                    0x7ffa5329331b

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3778485334-0
                                                                    • Opcode ID: b9a945e82b5db3173e30537439e0c8a0a2586c91a17b1594fbe54d080f64dea2
                                                                    • Instruction ID: 578e7dd0a1fcea7151413575f79a96a153a82d5ce96c86224202148860fc3cc7
                                                                    • Opcode Fuzzy Hash: b9a945e82b5db3173e30537439e0c8a0a2586c91a17b1594fbe54d080f64dea2
                                                                    • Instruction Fuzzy Hash: 6B31177692CF4285E6109B50F8643BD73A6FBEA754F488435DA8E62764DF7CE088CB10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !f3$/w 8$CZ&B$KE$XW]${H$~V$ehl
                                                                    • API String ID: 0-603092622
                                                                    • Opcode ID: 1ed8f1f3fe5d83a620da9bed02dcbbab86e8a919e24c18f8a00020719e4cb4ac
                                                                    • Instruction ID: cfa183faa2580dac9c87674e45a13d453ed6874265d0529349a04ca9f57a85af
                                                                    • Opcode Fuzzy Hash: 1ed8f1f3fe5d83a620da9bed02dcbbab86e8a919e24c18f8a00020719e4cb4ac
                                                                    • Instruction Fuzzy Hash: 079206752047888BDBB8CF24D8897CE7BE1FB86354F10451DE94E8AA60DBB89744CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock
                                                                    • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Invalid allocation size: %Iu bytes.$_CrtCheckMemory()$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 2480363372-3680694803
                                                                    • Opcode ID: 20c9d93c7bd8e5bb28edf4ede7e61cb74df2466a6d8b2339d4d317b1b63016a2
                                                                    • Instruction ID: 8393c5a1f0e7d7dbaf709ec100603b6474bc75389aac8d0a448b3645500b1f55
                                                                    • Opcode Fuzzy Hash: 20c9d93c7bd8e5bb28edf4ede7e61cb74df2466a6d8b2339d4d317b1b63016a2
                                                                    • Instruction Fuzzy Hash: 65516E7292CF828AE730CB64E45077E72A6FBE6344F188535D65E92B94DF3CE4908B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -~$!X$"98$5%dv$RXrB$}k=$t$t
                                                                    • API String ID: 0-2601355769
                                                                    • Opcode ID: 1ffe31184e489043dfc0ad9b25877cc2ca41a6506ccf0b542c306d1cb23fc7eb
                                                                    • Instruction ID: 40fa059977533c12daa4c197ac7ec32be5dd4a9ad21ad0dd792eee812670dda9
                                                                    • Opcode Fuzzy Hash: 1ffe31184e489043dfc0ad9b25877cc2ca41a6506ccf0b542c306d1cb23fc7eb
                                                                    • Instruction Fuzzy Hash: 4E32F4B1A0578C8BCBB9CF68C8997DD7BF0FB48318F90521DEA099B251CB745A45CB18
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$$3$1P$H<,D$I$e$e
                                                                    • API String ID: 0-63615268
                                                                    • Opcode ID: f878a82ca4faae8fe20105a06ae6298662dc00276aeafef1a86afe3292831526
                                                                    • Instruction ID: 84603d17c853973844c2c43058df0d3f37fc759f8199a5ada31f3ca4409f6e56
                                                                    • Opcode Fuzzy Hash: f878a82ca4faae8fe20105a06ae6298662dc00276aeafef1a86afe3292831526
                                                                    • Instruction Fuzzy Hash: 64E2CF715046898BDBF9DF24C88A7DD3BA1BB44344FA0C119E88ECE291DF745A8DEB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $*TG$Ag9$N?$`S$jk7$yHb
                                                                    • API String ID: 0-938425255
                                                                    • Opcode ID: a8480cca88ee067c9f89c24fcf558755f915344c34e6418cf6ef844eb024a60c
                                                                    • Instruction ID: 9f34faa7130dc1dd87f506cddbfe67dee9fd1f9295814769d0e47bce79b2000f
                                                                    • Opcode Fuzzy Hash: a8480cca88ee067c9f89c24fcf558755f915344c34e6418cf6ef844eb024a60c
                                                                    • Instruction Fuzzy Hash: 6D62E371A0530CDFCB59DFA8D18A6DDBBF1FF48344F004119E84AA72A0D7B4991ACB89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$3A<7$B.$Jq^$eIas$p<c$~;-
                                                                    • API String ID: 0-2724674699
                                                                    • Opcode ID: c830ff2e536ec82d4aacd995a299ed7dc96ce275305048a2346641cb28e12bef
                                                                    • Instruction ID: 11eaaa9cd8c54950f626fcd1c6608fbf38bfda5f45ba0fc90d4db62925cbbc4d
                                                                    • Opcode Fuzzy Hash: c830ff2e536ec82d4aacd995a299ed7dc96ce275305048a2346641cb28e12bef
                                                                    • Instruction Fuzzy Hash: 4142EAB090438C8BCBB8DF64C8857DD7BF0FB48308F50852DEA1A9B251DBB05685CB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 33%
                                                                    			E00007FFA7FFA5329BE50(intOrPtr __ecx, intOrPtr __edx, void* __edi, void* __esp, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a24) {
                                                                    				intOrPtr _v4;
                                                                    				void* _v12;
                                                                    				signed long long _v24;
                                                                    				signed int _v36;
                                                                    				long long _v180;
                                                                    				long long _v184;
                                                                    				intOrPtr _v192;
                                                                    				char _v196;
                                                                    				intOrPtr _v204;
                                                                    				long _v212;
                                                                    				long long _v220;
                                                                    				long long _v228;
                                                                    				long long _v1212;
                                                                    				long long _v1308;
                                                                    				char _v1460;
                                                                    				char _v1476;
                                                                    				char _v1484;
                                                                    				int _v1492;
                                                                    				long long _v1500;
                                                                    				long long _v1508;
                                                                    				long long _v1516;
                                                                    				long long _v1524;
                                                                    				long long _v1532;
                                                                    				long long _v1540;
                                                                    				void* _t51;
                                                                    				signed long long _t80;
                                                                    				long long _t85;
                                                                    				void* _t100;
                                                                    
                                                                    				_a24 = r8d;
                                                                    				_a16 = __edx;
                                                                    				_a8 = __ecx;
                                                                    				_t80 =  *0x532bb018; // 0x6e65c693e512
                                                                    				_v24 = _t80 ^ _t100 - 0x00000610;
                                                                    				if (_a8 == 0xffffffff) goto 0x5329be8d;
                                                                    				E00007FFA7FFA53298D90(_t51, _a8);
                                                                    				_v184 = 0;
                                                                    				memset(__edi, 0, 0x94 << 0);
                                                                    				_v1508 =  &_v196;
                                                                    				_v1500 =  &_v1460;
                                                                    				_v1492 = 0;
                                                                    				_v212 = 0;
                                                                    				__imp__RtlCaptureContext();
                                                                    				_t85 = _v1212;
                                                                    				_v220 = _t85;
                                                                    				r8d = 0;
                                                                    				0x532b0e28();
                                                                    				_v228 = _t85;
                                                                    				if (_v228 == 0) goto 0x5329bf64;
                                                                    				_v1516 = 0;
                                                                    				_v1524 =  &_v1476;
                                                                    				_v1532 =  &_v1484;
                                                                    				_v1540 =  &_v1460;
                                                                    				0x532b0e22();
                                                                    				goto 0x5329bf84;
                                                                    				_v1212 = _v12;
                                                                    				_v1308 =  &_v12;
                                                                    				_v196 = _a4;
                                                                    				_v192 = _a12;
                                                                    				_v180 = _v12;
                                                                    				_v1492 = IsDebuggerPresent();
                                                                    				SetUnhandledExceptionFilter(??);
                                                                    				_v212 = UnhandledExceptionFilter(??);
                                                                    				if (_v212 != 0) goto 0x5329bffb;
                                                                    				if (_v1492 != 0) goto 0x5329bffb;
                                                                    				if (_v4 == 0xffffffff) goto 0x5329bffb;
                                                                    				return E00007FFA7FFA53293280(E00007FFA7FFA53298D90(_t59, _v4), _v4, __edx, _v36 ^ _t100 - 0x00000610, _v204, _v220);
                                                                    			}































                                                                    0x7ffa5329be50
                                                                    0x7ffa5329be55
                                                                    0x7ffa5329be59
                                                                    0x7ffa5329be65
                                                                    0x7ffa5329be6f
                                                                    0x7ffa5329be7f
                                                                    0x7ffa5329be88
                                                                    0x7ffa5329be8d
                                                                    0x7ffa5329beaa
                                                                    0x7ffa5329beb4
                                                                    0x7ffa5329bebe
                                                                    0x7ffa5329bec3
                                                                    0x7ffa5329becb
                                                                    0x7ffa5329bedb
                                                                    0x7ffa5329bee1
                                                                    0x7ffa5329bee9
                                                                    0x7ffa5329bef1
                                                                    0x7ffa5329bf04
                                                                    0x7ffa5329bf09
                                                                    0x7ffa5329bf1a
                                                                    0x7ffa5329bf1c
                                                                    0x7ffa5329bf2a
                                                                    0x7ffa5329bf34
                                                                    0x7ffa5329bf3e
                                                                    0x7ffa5329bf5d
                                                                    0x7ffa5329bf62
                                                                    0x7ffa5329bf6c
                                                                    0x7ffa5329bf7c
                                                                    0x7ffa5329bf8b
                                                                    0x7ffa5329bf99
                                                                    0x7ffa5329bfa8
                                                                    0x7ffa5329bfb6
                                                                    0x7ffa5329bfbc
                                                                    0x7ffa5329bfcd
                                                                    0x7ffa5329bfdc
                                                                    0x7ffa5329bfe3
                                                                    0x7ffa5329bfed
                                                                    0x7ffa5329c013

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 1239891234-0
                                                                    • Opcode ID: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                                    • Instruction ID: 1149dbd036aa7762e7db378b1376fcbf9b651eda5594eef752f458ecb3c89c6f
                                                                    • Opcode Fuzzy Hash: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                                    • Instruction Fuzzy Hash: 9241CE72518FC48AE6708B14E8543AFB3A2F7D9355F444629E68D82BA8EF3DD095CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                    • String ID:
                                                                    • API String ID: 1445889803-0
                                                                    • Opcode ID: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                                    • Instruction ID: 2070d1464793df69be39c9e6dfa21bce5ce9e24df880ab827bf4a05560ee968f
                                                                    • Opcode Fuzzy Hash: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                                    • Instruction Fuzzy Hash: AD21FB3161DF0585EA70CB05F86022977E4EBDEBA4F085635EADD97B64EE3CD2948B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Fg$UE;~$ibq$X$o
                                                                    • API String ID: 0-4038568857
                                                                    • Opcode ID: 478ae4c756925d4c0df58bf132ef81c61d708642842f5bb4a6db73d18922ca94
                                                                    • Instruction ID: c65d31d342ee38981127283826f07a965cef744f0e08d64225b30ad95669dc15
                                                                    • Opcode Fuzzy Hash: 478ae4c756925d4c0df58bf132ef81c61d708642842f5bb4a6db73d18922ca94
                                                                    • Instruction Fuzzy Hash: B0A2E9B1E0470C9FCB59CFA8E48A6DEBBF2FB48344F004119E906B7251D7B49919CB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !g$!g$-{e$.9Y$7cm
                                                                    • API String ID: 0-3613756181
                                                                    • Opcode ID: 8466a7fe0396b74cedb6887ba44c1057051f2a552123ac4d034c792a786adc4e
                                                                    • Instruction ID: bf5508b14f48093895fd1996fdb0e85e6185e8dd26636c64e6a2ba956b5e503a
                                                                    • Opcode Fuzzy Hash: 8466a7fe0396b74cedb6887ba44c1057051f2a552123ac4d034c792a786adc4e
                                                                    • Instruction Fuzzy Hash: 409231711483CB8BCB78CF54C845BEEBBE1FB84704F10852CE86A8BA51E7B49649DB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Ol$`P$i($km}&$ttR
                                                                    • API String ID: 0-1254889785
                                                                    • Opcode ID: 9493bf0160dfff7cf218a8f761ba212010c51dc1cc37675f8f08f25cb4825c85
                                                                    • Instruction ID: 987162bd0b035dc474e6baf50d73a519649db35efcc54d1c771acda0ad58d409
                                                                    • Opcode Fuzzy Hash: 9493bf0160dfff7cf218a8f761ba212010c51dc1cc37675f8f08f25cb4825c85
                                                                    • Instruction Fuzzy Hash: 57422870908B488FD769CF79C48965EBBF1FB88748F204A1DE6A297271DB709845CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: &JS$T'$T'$t7"$wHM
                                                                    • API String ID: 0-3882947952
                                                                    • Opcode ID: e1efb4f73683d5eb84ec2e51f9646df27f06f31a7415d6bac1a400d419ecf411
                                                                    • Instruction ID: 5dfe4264b2e9e46270ab4916ee937e41ce96fb3ef9e59635e1bc08d1b7ce1cf5
                                                                    • Opcode Fuzzy Hash: e1efb4f73683d5eb84ec2e51f9646df27f06f31a7415d6bac1a400d419ecf411
                                                                    • Instruction Fuzzy Hash: C6C1E3B150464DDFCB98CF28D1856DA7BE0FF48318F41822AFC0A9B264D774DA68DB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 2T$=+%2$]|m$.s$9=
                                                                    • API String ID: 0-2491194820
                                                                    • Opcode ID: cf9153d85b611db8c4e34f9d3970acb18e39f17aceac1e5b04446b1241c988c8
                                                                    • Instruction ID: b22ad84dfc9a36729601f04a7d34ea20b01e779292d252d1f9b28ced5abbce67
                                                                    • Opcode Fuzzy Hash: cf9153d85b611db8c4e34f9d3970acb18e39f17aceac1e5b04446b1241c988c8
                                                                    • Instruction Fuzzy Hash: AE911570D0978C8FDB99DFE8D046BDEBBB2EB15348F40412DE44AAB298D774550ACB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <jG$PXf$]V.$fE$2>
                                                                    • API String ID: 0-2974598014
                                                                    • Opcode ID: bad49f1636925e4aa97c527113884a17b5682b6c71c0135986e4f76ada5c5575
                                                                    • Instruction ID: 93145a700ffc0e4eb939e50d890ad0ed9c26548b847d798d32bc26a6146f6c62
                                                                    • Opcode Fuzzy Hash: bad49f1636925e4aa97c527113884a17b5682b6c71c0135986e4f76ada5c5575
                                                                    • Instruction Fuzzy Hash: 3FA1E9716097C88FDBBADF68C84A7CB7BE4FB49704F50461DD88A8A250CBB45649CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -$<yH$`Zx$i,$i,
                                                                    • API String ID: 0-409805761
                                                                    • Opcode ID: f6182156d312c6874ac13020d1629895101c3b27d9b9d95c05b51086f9e303f4
                                                                    • Instruction ID: e265554e7eca7cf7370185f19b3f513919126148552d798dab9d7d185450bf95
                                                                    • Opcode Fuzzy Hash: f6182156d312c6874ac13020d1629895101c3b27d9b9d95c05b51086f9e303f4
                                                                    • Instruction Fuzzy Hash: 1F511D70E0470ECFCB59CFA8D4956EFBBB6EB44384F00816DD406A6290DB749B59CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: G$B$f F$p1
                                                                    • API String ID: 0-995880848
                                                                    • Opcode ID: f106650fdab1d10f8436c7cd336edd67fd48273b3da7da9a68bf46945136c829
                                                                    • Instruction ID: e5e766d75efbf2695ddd79b534cb997516972fc828d7cc42ecf8557e6a546d15
                                                                    • Opcode Fuzzy Hash: f106650fdab1d10f8436c7cd336edd67fd48273b3da7da9a68bf46945136c829
                                                                    • Instruction Fuzzy Hash: F972F87058478A8FDBB8DF24C8857EF7BA2FB84304F11852DE89A8B250DBB59655CF01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <!b$[2\$q+|k$qz;
                                                                    • API String ID: 0-4125875841
                                                                    • Opcode ID: 4b7cb7bbd3893869e40255ef41bc2512a7308139999d5a55f5be408d5e599cf0
                                                                    • Instruction ID: a542c4577bd7c2caf4f59e22e2006f44d15bdd166a7528eec1f5ff4567d3e676
                                                                    • Opcode Fuzzy Hash: 4b7cb7bbd3893869e40255ef41bc2512a7308139999d5a55f5be408d5e599cf0
                                                                    • Instruction Fuzzy Hash: 883234716187448FC769DF68C58A65EBBF0FB86744F10891DF6868B2A0C7B2D809CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: &$5RX$WE0$\h]
                                                                    • API String ID: 0-3485045178
                                                                    • Opcode ID: 03a43095a46f3f61d774493bb922c9041777d8e7f6728b8083ed9e1489c990f2
                                                                    • Instruction ID: bcdd786ba30a02497e69aa8425991a4f00e6ab9cdb2a577162cf86c9936701da
                                                                    • Opcode Fuzzy Hash: 03a43095a46f3f61d774493bb922c9041777d8e7f6728b8083ed9e1489c990f2
                                                                    • Instruction Fuzzy Hash: 4502E4705187C88BD794DFA8C48A69FFBE1FB94744F104A1DF486862A0DBF4D949CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: A1$A1$\)$v8
                                                                    • API String ID: 0-2822171287
                                                                    • Opcode ID: 392d2325a62e3d43b495978243ee00a583b670d5214b1fd2fb6c21b80fcb7928
                                                                    • Instruction ID: 6e847e787c057b57acc1c354f394c9b4082fee365cea8ba22b71c11ea9ebc013
                                                                    • Opcode Fuzzy Hash: 392d2325a62e3d43b495978243ee00a583b670d5214b1fd2fb6c21b80fcb7928
                                                                    • Instruction Fuzzy Hash: 40F1EF71904348DBCF9CDF68C88A6DE7FA1FF48394FA05129FA4697250C7759989CB80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *ECV$;.$;.$pv>&
                                                                    • API String ID: 0-2557916696
                                                                    • Opcode ID: 4cb81f83a04ef04c4b0be031f68b033a83f7e38034b852111fd97ec7dec363fa
                                                                    • Instruction ID: 7999f9c4935295cc2aa309186ca72e602cbe03928e3ff34651e0e21172d74868
                                                                    • Opcode Fuzzy Hash: 4cb81f83a04ef04c4b0be031f68b033a83f7e38034b852111fd97ec7dec363fa
                                                                    • Instruction Fuzzy Hash: 52F1C0B0505609DFCB98CF28C599ADA7BE0FF48348F41812EFC4A9B260D774DA68DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Hwn$NR'$$fkD$}gK
                                                                    • API String ID: 0-1908897248
                                                                    • Opcode ID: a42200c2a405048015f864ccfe9f3e227c0945315cfa0ff0bef3f4c816ba0cee
                                                                    • Instruction ID: b3495f7b3258c7cfbbaf34d24a151d9f74cd673a76d708f913f7006ffd896b9d
                                                                    • Opcode Fuzzy Hash: a42200c2a405048015f864ccfe9f3e227c0945315cfa0ff0bef3f4c816ba0cee
                                                                    • Instruction Fuzzy Hash: 4AE1E6701083C8CBDBFADF64C889BDA7BACFB44708F105519EA0A9E258DB745789CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !vT$3P$?gs $Y^u
                                                                    • API String ID: 0-3532888945
                                                                    • Opcode ID: b61af7194893f8c82987b2510d64685971d92872f6245166d2af23a9bb7efed9
                                                                    • Instruction ID: a130400614884e80b8bc041bf9d1a61bd98fb93a976fe1395b57ea9810b4de45
                                                                    • Opcode Fuzzy Hash: b61af7194893f8c82987b2510d64685971d92872f6245166d2af23a9bb7efed9
                                                                    • Instruction Fuzzy Hash: 72C1207160170DCBDBA8CF28C18A6CE3BE5FF48354F104129FC1A9A261D7B4EA59DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -,$7k A$k$2s
                                                                    • API String ID: 0-3102563331
                                                                    • Opcode ID: 21b97ee769df899699db8ec55527806a56553d5edd7851697391367575400d1c
                                                                    • Instruction ID: bac349e1162b647475c44c7bb34b04b6f4b8289c4e67fa9b2355cb93066e8c6e
                                                                    • Opcode Fuzzy Hash: 21b97ee769df899699db8ec55527806a56553d5edd7851697391367575400d1c
                                                                    • Instruction Fuzzy Hash: 36C1387151074D9BCF89DF28C88A5DD3BB1FB48398F566219FC4AA6260C7B4D584CF84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 76N$Ho<$]}$s5xe
                                                                    • API String ID: 0-3382501871
                                                                    • Opcode ID: 48f959005062580ac36a5c68606ec558c6a5f2e613880a1e5b76a83967194bde
                                                                    • Instruction ID: 0065c1d241d3448e2397ca8c0fa5a5365e82301828f7e764778ef267285b4530
                                                                    • Opcode Fuzzy Hash: 48f959005062580ac36a5c68606ec558c6a5f2e613880a1e5b76a83967194bde
                                                                    • Instruction Fuzzy Hash: 47A1E171504349CFCB95DF28C089ACA7BE0FF58308F42562AFC49A7255D774DAA8CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <~]$@:$]U$]U
                                                                    • API String ID: 0-740249671
                                                                    • Opcode ID: f6acb40b154dde8fa3df42201c69f340e4f140856c7e7667b8c968f76e5b3c44
                                                                    • Instruction ID: 93bbccedb30105693727df547a8ee70240eea560fa1b67170d45bbd81435be64
                                                                    • Opcode Fuzzy Hash: f6acb40b154dde8fa3df42201c69f340e4f140856c7e7667b8c968f76e5b3c44
                                                                    • Instruction Fuzzy Hash: BC81387450660DCFDB69DF68D0867EE77F2FB24344F204029E815DA2A2D774CA19CB8A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 00007FFA5329617C
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FFA53295EF9
                                                                    • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 00007FFA532960C7
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FFA53295FE7
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).
                                                                    • API String ID: 0-1867057952
                                                                    • Opcode ID: ea889a4d0a0d63da2a4932dba4f80fda51d0f679e8992708aed7b5cf259d3687
                                                                    • Instruction ID: bae7cf7de889865a1edcb3df45d861f7c19a357b02d28be00bdfb77eeec4b5e7
                                                                    • Opcode Fuzzy Hash: ea889a4d0a0d63da2a4932dba4f80fda51d0f679e8992708aed7b5cf259d3687
                                                                    • Instruction Fuzzy Hash: C6812A77628F4586DB24CB55E09022EB7A1FBD9BA4F148436EA8E83B54CFBDD441CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: U!t$)$o}$q
                                                                    • API String ID: 0-3686089749
                                                                    • Opcode ID: bf0474be6c6ce2e48f6d2d7926dbfb2caa288b201239c410f95da0c70b98d83b
                                                                    • Instruction ID: 504cee08a43b26f7e4edd141fcc1dad3608ee18550f5ec8ccdea89eebec808be
                                                                    • Opcode Fuzzy Hash: bf0474be6c6ce2e48f6d2d7926dbfb2caa288b201239c410f95da0c70b98d83b
                                                                    • Instruction Fuzzy Hash: 74918CB190030E8FCB48CF68D58A5DE7FB1FB68398F204219F85696254D77496A5CFC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4<$4<$Hhr$J;}
                                                                    • API String ID: 0-2050331814
                                                                    • Opcode ID: c5a04ea52945682b476d42612895679d50d29c6124b176cb0c2b711214be2d9b
                                                                    • Instruction ID: 3d3ba58424421bda00612f90d71964148b60402fac749f980543760ede98840e
                                                                    • Opcode Fuzzy Hash: c5a04ea52945682b476d42612895679d50d29c6124b176cb0c2b711214be2d9b
                                                                    • Instruction Fuzzy Hash: 7461F4B0615648DFDF58DF68C08A69A7BA1FB48354F00C12EFC1ADB294DB70DA58CB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ;$;$eQ%$_
                                                                    • API String ID: 0-1753937898
                                                                    • Opcode ID: afea0fbc1d0f044595d14710a3cdc41d7bc72a212051bdcef0ffdf3ac8c4ab3c
                                                                    • Instruction ID: 3574068fecf093fcbc9a635d24f3027655c33c427b378eb3a0ef079df85d540d
                                                                    • Opcode Fuzzy Hash: afea0fbc1d0f044595d14710a3cdc41d7bc72a212051bdcef0ffdf3ac8c4ab3c
                                                                    • Instruction Fuzzy Hash: 868137705003CCABDBFACF28CC997D93BA0FB49354F50822AE94A8E250DF745B499B40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :U$<;?:${(${(
                                                                    • API String ID: 0-1086306767
                                                                    • Opcode ID: adfd1542a6b862dcbbf80cb55e1091ef2c2665d1724c34312d1a81eba162a757
                                                                    • Instruction ID: ff3a3435717f4ead1b58fb824901535bd9cf299cdf9a7bd1c813f3606ded2d6e
                                                                    • Opcode Fuzzy Hash: adfd1542a6b862dcbbf80cb55e1091ef2c2665d1724c34312d1a81eba162a757
                                                                    • Instruction Fuzzy Hash: 0861E0705187848BD768CF28C18965FBBF0FB8A748F10891EF68686260D7B6D948CB03
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Oh$h<$t010$|N.
                                                                    • API String ID: 0-2324740333
                                                                    • Opcode ID: 35c0cfe6136cac06300efd424f395a2521218bc7fc47dd603edd05c4400a0958
                                                                    • Instruction ID: 16379aaf1bb4413e0c13418f9d8c18c2bc98b7e827952bd0a9b5f9990c6c03cf
                                                                    • Opcode Fuzzy Hash: 35c0cfe6136cac06300efd424f395a2521218bc7fc47dd603edd05c4400a0958
                                                                    • Instruction Fuzzy Hash: E051B1B090034A8BCF48DF68D48A4DE7FB1FB58398F60461DE85AAA250D37496A4CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: GW$V{mu$dF
                                                                    • API String ID: 0-3399639152
                                                                    • Opcode ID: 13f3ce258387fdab81722341723304c211862b24c4b90673b1ab6d5c48b56b4d
                                                                    • Instruction ID: 5d4924119bb90987b6c65e27c55bf51887eeb75551c0c0a5c8140b5b1edb0396
                                                                    • Opcode Fuzzy Hash: 13f3ce258387fdab81722341723304c211862b24c4b90673b1ab6d5c48b56b4d
                                                                    • Instruction Fuzzy Hash: B8F13F71508B888FD7B9CF28D48969EBBF0FB84744F20461EE5A59B270DBB49645CF02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: K:$]w($n S$
                                                                    • API String ID: 0-3322466707
                                                                    • Opcode ID: c1684008171d4e306236772ac743a7b0f928483c20fc59153bd471c66e400ccf
                                                                    • Instruction ID: e698a885d6bb162bf0ff3cac371d937558b4210aa05752a6266eb715b4493fc4
                                                                    • Opcode Fuzzy Hash: c1684008171d4e306236772ac743a7b0f928483c20fc59153bd471c66e400ccf
                                                                    • Instruction Fuzzy Hash: 94F11570D047588BDBA8DFA8C88A6DDBBF0FB48304F60821DD85AAB251DB749949DF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $L+$S'$$o%
                                                                    • API String ID: 0-4100028055
                                                                    • Opcode ID: 9fd258a3895b4d268f32f05a4a2d93e51bad250bed430a342084c072b36ef08c
                                                                    • Instruction ID: 179b9f87c3a4f9e214743648708db8209e3d71a45a824f016a1577c5ed2144a1
                                                                    • Opcode Fuzzy Hash: 9fd258a3895b4d268f32f05a4a2d93e51bad250bed430a342084c072b36ef08c
                                                                    • Instruction Fuzzy Hash: 34F1DFB1504609DFCB98DF28C0896DE7BE0FB58358F41812AFC4A9B264D770DA68DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 47T]$K_j$is[
                                                                    • API String ID: 0-2699472077
                                                                    • Opcode ID: f40290fddc4da9899e50fb62f60591b1b1e6ff44cb1495cdff8c692982a81ea2
                                                                    • Instruction ID: 6016c1221021197edd7f817fb9cbd09fcb5ac8bbf6c5f54f5697c1ffe249b4d0
                                                                    • Opcode Fuzzy Hash: f40290fddc4da9899e50fb62f60591b1b1e6ff44cb1495cdff8c692982a81ea2
                                                                    • Instruction Fuzzy Hash: 2CD127719047CD8FCF99CFA8C88A6EE7BB1FB48344F50821DE80697651C7B4990ACB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: B+=$Mt$[4
                                                                    • API String ID: 0-935141491
                                                                    • Opcode ID: a60433d87628b4dd05d8c24f82dcc33c98af1bb7bb81019966b8dd8b9453b802
                                                                    • Instruction ID: bf1f234f614a92c8f0daef92778263c373ce788cc2d228a45e1a9745d38385ec
                                                                    • Opcode Fuzzy Hash: a60433d87628b4dd05d8c24f82dcc33c98af1bb7bb81019966b8dd8b9453b802
                                                                    • Instruction Fuzzy Hash: 36F1D470505B888FDBB9DF24CC897EB7BA0FB94316F10551EE84A9A290DFB49648CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $c7$@%?5$b3
                                                                    • API String ID: 0-1970763919
                                                                    • Opcode ID: 9dd9411ae2ae8fe50429bce004b52f82e822d73dcaf286881c61fffa8cd320f1
                                                                    • Instruction ID: 7544b270a4a1d87a4c453583f66bfc56a0d33d7204b7a287ddb0882fb61d0d22
                                                                    • Opcode Fuzzy Hash: 9dd9411ae2ae8fe50429bce004b52f82e822d73dcaf286881c61fffa8cd320f1
                                                                    • Instruction Fuzzy Hash: 48E158B5902748CFCB88DF68C69A59D7BF1FF59308F404029FC1A9A264D7B4D928CB49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #^$`]$%
                                                                    • API String ID: 0-102912427
                                                                    • Opcode ID: ca2120b3b73aeab9747ebd3a80ee073ee8f7bbd66699a0431753568d5f85675a
                                                                    • Instruction ID: 878e7741f870b7fe1bc6c0f4a33361fdae8fd10665ac772b8c524eb0937c225a
                                                                    • Opcode Fuzzy Hash: ca2120b3b73aeab9747ebd3a80ee073ee8f7bbd66699a0431753568d5f85675a
                                                                    • Instruction Fuzzy Hash: FDB1277090474D8FCF48CF68C88A6DE7BF0FB48398F165219E85AA6250D778D549CF89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: EQp$JK8[$kU
                                                                    • API String ID: 0-1401246002
                                                                    • Opcode ID: f6e783ca98e508b57d8889390bb84d83c8a7c59b34dd19a79ab41ed993f4136f
                                                                    • Instruction ID: 75ff6837d11cf9dd0609e11c9b8f3cf17f900585419d92be27056132c399e7dd
                                                                    • Opcode Fuzzy Hash: f6e783ca98e508b57d8889390bb84d83c8a7c59b34dd19a79ab41ed993f4136f
                                                                    • Instruction Fuzzy Hash: 2EB1587190474DCBCF88CF68C48A6DE7BF0FB58358F165219E94AA6260C778D584CF89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: /@=`$h$zJ
                                                                    • API String ID: 0-1145068787
                                                                    • Opcode ID: 058fb21ebd37bd9eb3c247c823e69362e4f90846d4c9b1e02e85b924af49b442
                                                                    • Instruction ID: efaff62c6dea5b666cd0ec5e1287633bd35f75f1b854ced8b25ae11fb6165d3c
                                                                    • Opcode Fuzzy Hash: 058fb21ebd37bd9eb3c247c823e69362e4f90846d4c9b1e02e85b924af49b442
                                                                    • Instruction Fuzzy Hash: 74A12F70608B4C8BEB9ADF18C4857DD7BF1FB49384F508559F84A86292CB34DA49CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $g$>6$nB
                                                                    • API String ID: 0-1868063892
                                                                    • Opcode ID: ff2a3d7c641745ffb25121b662fa46cfa0900d035ad6a59b85364cfb369e7909
                                                                    • Instruction ID: 5ef365e91c1d80a07604eb41db5a1b86f6ebf61e3d7968a3749ade557fb4125b
                                                                    • Opcode Fuzzy Hash: ff2a3d7c641745ffb25121b662fa46cfa0900d035ad6a59b85364cfb369e7909
                                                                    • Instruction Fuzzy Hash: 7CB121705193849FC7A9CF68C58569EBBF0FB88744F906A1DF8868B260D7B4DA44CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #\9$Vj+&$M
                                                                    • API String ID: 0-3658199817
                                                                    • Opcode ID: b54fe4db0c482ebc48653361818c1ec5b550a7c5ec628dbf807c67c5d3739686
                                                                    • Instruction ID: 26c1b974044aa0bae0d49f3ac843ec2fe1acc35572613d15cd803358aab69238
                                                                    • Opcode Fuzzy Hash: b54fe4db0c482ebc48653361818c1ec5b550a7c5ec628dbf807c67c5d3739686
                                                                    • Instruction Fuzzy Hash: FEA144709147098FCB48CFA8D88A5DEBBF0FB48318F11421DE89AB7250D778A945CF99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$d,U$d3
                                                                    • API String ID: 0-3246363944
                                                                    • Opcode ID: b19347f6a86a0bef7f71d8365dac67f13c927bf2e0e4be2ddf998f75a428a595
                                                                    • Instruction ID: e67d37b33042bdc2b75ebe9cceb0670a2214c716ea8b8408a91d9fe0cb16ea97
                                                                    • Opcode Fuzzy Hash: b19347f6a86a0bef7f71d8365dac67f13c927bf2e0e4be2ddf998f75a428a595
                                                                    • Instruction Fuzzy Hash: 84C1F9715093C8CBDBBEDF64C885BDA3BA9FB44708F10521DEA0A9E258CB745749CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: X9T[$Y)~$Zo
                                                                    • API String ID: 0-3816472334
                                                                    • Opcode ID: 4d45b44019f37ffc6e1bc3352b37dca48114cbe71f71f11aaeec7abd6044a81e
                                                                    • Instruction ID: 74daf22561f986eaee31dd2e877d7e0390ad28e8a973cc345c4d359d4462c4de
                                                                    • Opcode Fuzzy Hash: 4d45b44019f37ffc6e1bc3352b37dca48114cbe71f71f11aaeec7abd6044a81e
                                                                    • Instruction Fuzzy Hash: A8A17CB5A02749CBCF48DF68C29A59D7BF1BF49304F408129FC1A9A360E3B5E525CB49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: HR$HR$K)
                                                                    • API String ID: 0-1226256413
                                                                    • Opcode ID: fe1a1f4cc53af174484b1611b8e08b9bf30ae67f3885f7bd771c709debbd063f
                                                                    • Instruction ID: e79f82d9c1651787cdde5b7f69db4956d02e0856481d2681396fdc662c453c95
                                                                    • Opcode Fuzzy Hash: fe1a1f4cc53af174484b1611b8e08b9bf30ae67f3885f7bd771c709debbd063f
                                                                    • Instruction Fuzzy Hash: 7B511971A08B0D8FDB58DFE8C4856EEBBF1FB48354F004119E81AB72A4C7749A09CB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ]u$"$:;
                                                                    • API String ID: 0-2021956800
                                                                    • Opcode ID: e5b729e8d3ca91e6ffaa64c5216b9ad0038ed08cda9d2019842c7aa3bd36f9ee
                                                                    • Instruction ID: 26b28f3a503e825e1842dbf9688ebde44fe9506c1339f803b7779101942ae612
                                                                    • Opcode Fuzzy Hash: e5b729e8d3ca91e6ffaa64c5216b9ad0038ed08cda9d2019842c7aa3bd36f9ee
                                                                    • Instruction Fuzzy Hash: A4619CB490438E8FCB48DF68C88A5CE7BB0FB48758F104A19EC26A7250D3B49664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :/$MX-$p/{
                                                                    • API String ID: 0-4131788469
                                                                    • Opcode ID: dafbc4e7fc6d693899884ed9ed99f384ad96a46aea59d1081574b489c0c87a57
                                                                    • Instruction ID: 300bb33d5e72857c277ccbf4b656446e283825a036a8781aa3fd7c6b43312ff2
                                                                    • Opcode Fuzzy Hash: dafbc4e7fc6d693899884ed9ed99f384ad96a46aea59d1081574b489c0c87a57
                                                                    • Instruction Fuzzy Hash: A451CFB181034E8FCB48CF68C49A9DEBFB0FB58358F104619E816A6260D3B496A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$^'$r]I
                                                                    • API String ID: 0-2222137400
                                                                    • Opcode ID: 6c7560d6808315bae7f49c2fb11faa3634dddad0bf829aa3411576f4b5dc867d
                                                                    • Instruction ID: 3b6e37f17289f863f41b4cc43218ba669218828eb13bdfb79aac3f5d198efd30
                                                                    • Opcode Fuzzy Hash: 6c7560d6808315bae7f49c2fb11faa3634dddad0bf829aa3411576f4b5dc867d
                                                                    • Instruction Fuzzy Hash: 363117B15087C48BD75DDFA8C49A21EFBE1BB84344F508A1DF5828A760D7F4D548CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @$T3$$w4
                                                                    • API String ID: 0-2021144935
                                                                    • Opcode ID: bc7dc22fb94c9f236bd87286f30cded165edce72f2f8fa2203197d10143a9bcc
                                                                    • Instruction ID: b7ecb3d52509d16e0b7106ebb5b87557e4c245f613a26780fe6ea3dbe1bda8ab
                                                                    • Opcode Fuzzy Hash: bc7dc22fb94c9f236bd87286f30cded165edce72f2f8fa2203197d10143a9bcc
                                                                    • Instruction Fuzzy Hash: 2C31B1B452C781AFC788DF28C49981EBBE1FB88314F806A1CF8C68B354D7799815CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: fuQ$z2[
                                                                    • API String ID: 0-2289383304
                                                                    • Opcode ID: 441494ec0c86c783de8318a42c6139c52bb1bde3da6283a2c639beb8e2f65b2f
                                                                    • Instruction ID: 6dbb2b06e415c8f3afbcfc152abca8622b4e8fcbe683a1ba83f0e2cb341d8d2f
                                                                    • Opcode Fuzzy Hash: 441494ec0c86c783de8318a42c6139c52bb1bde3da6283a2c639beb8e2f65b2f
                                                                    • Instruction Fuzzy Hash: 3EE11E7150670CCBDB68CF38C58A69D7BE1FF54348F205129EC1A9B262D770E929CB49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :C$kR[
                                                                    • API String ID: 0-2209222604
                                                                    • Opcode ID: 11a29c0ca78bb61b91ac56aed3bc2f39647a1b65c88feb917197daf0b3f95e80
                                                                    • Instruction ID: 7c9a6a6b3faeb9776e3b10aef600c10835f2b607fd00d40f7bdfdfd53dfcb9a1
                                                                    • Opcode Fuzzy Hash: 11a29c0ca78bb61b91ac56aed3bc2f39647a1b65c88feb917197daf0b3f95e80
                                                                    • Instruction Fuzzy Hash: 90D13870A4470C8FDB99DFA8D04A7DDBBF2FB48344F108119E80AAF295C7B49949CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: U/a$b*I
                                                                    • API String ID: 0-148379327
                                                                    • Opcode ID: 5fd17e9242f9f83aee3c84d8a49cb22fc0f07f7b85d6bf0c23bfb3783ccf2aec
                                                                    • Instruction ID: 7d254379c67d49f8dc4f025a9255c0c47b4989c88be3dfa38f92a25c6632ea03
                                                                    • Opcode Fuzzy Hash: 5fd17e9242f9f83aee3c84d8a49cb22fc0f07f7b85d6bf0c23bfb3783ccf2aec
                                                                    • Instruction Fuzzy Hash: 28D10B7150024E8BCB59CF68C88A6DE3FB0FB18398F155219FC5AA7250D7B8D698CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Jl$aijA
                                                                    • API String ID: 0-1592139677
                                                                    • Opcode ID: 63e2519535c0a0a06864801ebef0b78a9df6d39fc0654acb9b8633e279544aec
                                                                    • Instruction ID: 7b4029e1b0f4c6d16455640de175402024ed69906be1bf35ac226dba8d49acae
                                                                    • Opcode Fuzzy Hash: 63e2519535c0a0a06864801ebef0b78a9df6d39fc0654acb9b8633e279544aec
                                                                    • Instruction Fuzzy Hash: 4AC1217111474CCFDBA9CF28C59A6DA3BE8FF48344F10412AFC5A86261C774EA58CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: E!X$aT
                                                                    • API String ID: 0-1608121357
                                                                    • Opcode ID: 6891fb2d6db3071f9b84c44756173137ff7b28830fe573994ee80e512644894e
                                                                    • Instruction ID: 4d019785a6b4256ed0cfe79ca05195ecf0bf4926bcad1b682180c0cba5e5cf4f
                                                                    • Opcode Fuzzy Hash: 6891fb2d6db3071f9b84c44756173137ff7b28830fe573994ee80e512644894e
                                                                    • Instruction Fuzzy Hash: 16B12770E0470ECFCB99DFE8C4556EFB7B6FB58388F0081599806A6290DB748719CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: i6$5t
                                                                    • API String ID: 0-3127670231
                                                                    • Opcode ID: a253027af394429a069129eb83cd81c4fb0c40bb542b60a20d2aa22b5b78e39c
                                                                    • Instruction ID: 343c37a285082c0d22a0c6c838fe19bbba7b54ff6f1f952ba2714c32cb406723
                                                                    • Opcode Fuzzy Hash: a253027af394429a069129eb83cd81c4fb0c40bb542b60a20d2aa22b5b78e39c
                                                                    • Instruction Fuzzy Hash: B6A1E270D087188FDB69DFB9C88A69DBBF0FB48708F20821DD856A7252DB749949CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: t3Z$r'
                                                                    • API String ID: 0-3247238830
                                                                    • Opcode ID: 45187aede304d4735527529db4b0bfe1669f1d2749ba8206633b0fe433a295e4
                                                                    • Instruction ID: 1d29c97d450220819c0ed5b60dd6ff5608267f61915941bb22285759947d3464
                                                                    • Opcode Fuzzy Hash: 45187aede304d4735527529db4b0bfe1669f1d2749ba8206633b0fe433a295e4
                                                                    • Instruction Fuzzy Hash: 74A1EC706057CC9FEBB9DF24C8897DE7BA0FB4A344F50461DE88A8E260DB745649CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: N}V$jt
                                                                    • API String ID: 0-2926509837
                                                                    • Opcode ID: b049d5321a5d0b8b2c35b06077383899f8fb99c1ca51b799598ed477ff688beb
                                                                    • Instruction ID: 5d852b2b0b88ea82dc6b1cd0fb1e099f39aebf29041bab94b5a0a50aabd496dc
                                                                    • Opcode Fuzzy Hash: b049d5321a5d0b8b2c35b06077383899f8fb99c1ca51b799598ed477ff688beb
                                                                    • Instruction Fuzzy Hash: 64A148B990628CDFCB98DFA8C5CA58D7BB1FF44308F00411AFC169A256D7B4D629CB49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: |I$}r/
                                                                    • API String ID: 0-4123960085
                                                                    • Opcode ID: a5b20f145e2128ebb590cd3c49dff006a35873bd4209483889af058205fdcd1a
                                                                    • Instruction ID: 800e601dd46cbb9d9738628f52141beaff35432bc8d4d1bcfb76f59376750d80
                                                                    • Opcode Fuzzy Hash: a5b20f145e2128ebb590cd3c49dff006a35873bd4209483889af058205fdcd1a
                                                                    • Instruction Fuzzy Hash: 2981F2711047888BDBB9CF28C88A7DA7BA1FB95348F50C219D88ECE261DF75564DDB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Fd7$T;
                                                                    • API String ID: 0-1040651304
                                                                    • Opcode ID: 7f0199fa78f26e8ae3d4cfff6d4ba3547f4bc3c86668e4528162529d3c3e3bb8
                                                                    • Instruction ID: 7ffd56a0096037782dccd6a22a1dfddd73a4019a8d8d07411bfc7024195b5d88
                                                                    • Opcode Fuzzy Hash: 7f0199fa78f26e8ae3d4cfff6d4ba3547f4bc3c86668e4528162529d3c3e3bb8
                                                                    • Instruction Fuzzy Hash: 8071E47051074D9FCB89CF24C8C9ADA7FB1FB483A8FA56218FC0696255C774D989CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: bep$o1S[
                                                                    • API String ID: 0-985821681
                                                                    • Opcode ID: c77bf9ac064369e7680d63b20ce0fc89bb0b2606aa702be6d1acaa4fa6638a8c
                                                                    • Instruction ID: 91a209abfe7e4aeb1d81c4716095da0dca5975d88cd9946800e077bcf0a455c5
                                                                    • Opcode Fuzzy Hash: c77bf9ac064369e7680d63b20ce0fc89bb0b2606aa702be6d1acaa4fa6638a8c
                                                                    • Instruction Fuzzy Hash: C2513A70A0830D8FDB68DFA8C4456EEB7F2FB58358F004519E44AEB290DB349A19CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: _6#$u<
                                                                    • API String ID: 0-4076860791
                                                                    • Opcode ID: 98c419b77e8ba2554e3faf170cbc78b74b026a1788d9e59b3cc1785a688e6d9f
                                                                    • Instruction ID: 493e3a016aefd0e8f5cec56f814c132ed6dac505d4b0458c18be2d4878a88dba
                                                                    • Opcode Fuzzy Hash: 98c419b77e8ba2554e3faf170cbc78b74b026a1788d9e59b3cc1785a688e6d9f
                                                                    • Instruction Fuzzy Hash: D451C0B190070A8BCB48CF68C4965DE7FB1FB68394F24422DE856A6350D3749AA5CFD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Nz$Nz
                                                                    • API String ID: 0-3618188535
                                                                    • Opcode ID: f1f9fac336b8da8ff6122659e216f65e6467f6a7eb6b837c99e1b7255e82ae59
                                                                    • Instruction ID: b98bb35d41bec71e3509b0825005519e10211f24d4dcfaaa5e415a9a600f37b2
                                                                    • Opcode Fuzzy Hash: f1f9fac336b8da8ff6122659e216f65e6467f6a7eb6b837c99e1b7255e82ae59
                                                                    • Instruction Fuzzy Hash: 7761D97060478C9FDBB9CF54D8857DE3AA1FB46344F60851AA88E8A250CFB45788CB43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 10W$ra"
                                                                    • API String ID: 0-3432184507
                                                                    • Opcode ID: fd02e9085198f1ee23cd325c43483fe701dbbe4b729f3c21db55c4e968cbf284
                                                                    • Instruction ID: 1603a0fb70214c4199dc1879cc592ce20ce94242888b692f3a5634201c3c6fcf
                                                                    • Opcode Fuzzy Hash: fd02e9085198f1ee23cd325c43483fe701dbbe4b729f3c21db55c4e968cbf284
                                                                    • Instruction Fuzzy Hash: 215106B1D0070E8BCF48DFA5C48A5EEBFB1FB58358F218109E815A6260D7B49695CFC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Dm"i$e
                                                                    • API String ID: 0-579088429
                                                                    • Opcode ID: 1da592fe1c5b87024080557b40311a255aea64fd983cac56dc8e0bfd413ff1a3
                                                                    • Instruction ID: ff289f4c4decf21b808411560f97a6ae0bbfde48fa9fd21a36285b9362365cbb
                                                                    • Opcode Fuzzy Hash: 1da592fe1c5b87024080557b40311a255aea64fd983cac56dc8e0bfd413ff1a3
                                                                    • Instruction Fuzzy Hash: 1251A1B180038ECFCF88CF68D8865CE7BB0FF58358F105A19E865A6260D3B49664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: . 9$j~F
                                                                    • API String ID: 0-3982525500
                                                                    • Opcode ID: 8e27ed3e49b3a332b1e9bdfaf9f41fe9f17daf01a485ce033b7626c7aaf20959
                                                                    • Instruction ID: 73f587e096f547b5323f36eeea6c902c11c99e62676f2e49b342c8d806439c0b
                                                                    • Opcode Fuzzy Hash: 8e27ed3e49b3a332b1e9bdfaf9f41fe9f17daf01a485ce033b7626c7aaf20959
                                                                    • Instruction Fuzzy Hash: C951E3B190034A8FCF48CF68C5864EE7FB1FB58398F50461DE85AAA250D37896A4CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <>$u_"
                                                                    • API String ID: 0-3712044913
                                                                    • Opcode ID: 54a7279f070d6e0e1cb936a4c41fbfa7e6deebc7b08f576cf545ddb7c45c5dbd
                                                                    • Instruction ID: 00705162336351badf1f89c020232bf89398a1e9550ad3a4c6adce9a79b90856
                                                                    • Opcode Fuzzy Hash: 54a7279f070d6e0e1cb936a4c41fbfa7e6deebc7b08f576cf545ddb7c45c5dbd
                                                                    • Instruction Fuzzy Hash: FC51BFB090034E8FCB48CF69D48A5DE7FB1FB58398F104619E856AA250D37496A8CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 7M$kJz
                                                                    • API String ID: 0-1286445197
                                                                    • Opcode ID: 98bdb79501751698457a0c63b58abd008b0bb4ffe469ed6aba7912a1c6e09250
                                                                    • Instruction ID: 73e64fa095a73a4e7c26ce88557ae34d60ddb43780546a58e46c5e1049f230da
                                                                    • Opcode Fuzzy Hash: 98bdb79501751698457a0c63b58abd008b0bb4ffe469ed6aba7912a1c6e09250
                                                                    • Instruction Fuzzy Hash: E441D5B180034E9FCB48CF68D48A5DEBFB0FB58398F118619F815AA260D7B49694CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: NKi$gJk
                                                                    • API String ID: 0-746334108
                                                                    • Opcode ID: 58a5bce911c0f09ef1344d541f8e13db5683852ad3f58203c0096be295061b76
                                                                    • Instruction ID: 370847f9a3576a2127be3913012de96f7d2fcf003f6ba5f8aec55f91b5c1372d
                                                                    • Opcode Fuzzy Hash: 58a5bce911c0f09ef1344d541f8e13db5683852ad3f58203c0096be295061b76
                                                                    • Instruction Fuzzy Hash: AD41C3B091034A8FCB48CF68C48A5DE7FF0FB28398F104619E815A6250D37496A8CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 97"$lND
                                                                    • API String ID: 0-255837067
                                                                    • Opcode ID: 9f2144797edb960c4800540d43b86211ccc900e5f41a7482899803b998be048c
                                                                    • Instruction ID: fdd228a39bc21f447827aa5875072745b1c1c90cd936de3499e4094daaa9051d
                                                                    • Opcode Fuzzy Hash: 9f2144797edb960c4800540d43b86211ccc900e5f41a7482899803b998be048c
                                                                    • Instruction Fuzzy Hash: 2F41D4B080038E8FCB48CFA8D8865DE7BF0FB48358F504609E86AA6250D7B49665CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <\$P
                                                                    • API String ID: 0-3329260309
                                                                    • Opcode ID: 58da91c3c3294d218300734e2334eac2d42de78c76df722d29d8bba67d1a0edb
                                                                    • Instruction ID: 7a6472800a972813acd2230f771f615073e8df7510407cf225569f4894f6b0d7
                                                                    • Opcode Fuzzy Hash: 58da91c3c3294d218300734e2334eac2d42de78c76df722d29d8bba67d1a0edb
                                                                    • Instruction Fuzzy Hash: AC41A2B181034DCFDB44CF68C88A5DE7FF0FB58358F104619E869A6250D7B89698CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: &Z];$j,
                                                                    • API String ID: 0-1323350831
                                                                    • Opcode ID: 0816880f4d87a32c826b6eaf935fab6bcbeafe9302e1cf1b19fce18330a9178f
                                                                    • Instruction ID: 4d52acf51d445db6beda3a26974f1176594abf5478927dcbf805cd9d8e8fa18c
                                                                    • Opcode Fuzzy Hash: 0816880f4d87a32c826b6eaf935fab6bcbeafe9302e1cf1b19fce18330a9178f
                                                                    • Instruction Fuzzy Hash: 9F31DEB190074E8BCF48DF24C88A1DE3BA1FB28798F50461DFC5696250D7B4D6A4CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 'd=$Y6C
                                                                    • API String ID: 0-2002142494
                                                                    • Opcode ID: fd35d43619dc3a263a01b5f940063c5335a5c98091513a5ed1770b6a4388dd96
                                                                    • Instruction ID: ccf6aaa63b1aa8c6b30d000549e8006a3e599278b8e3fc9790a4e3cb01e02506
                                                                    • Opcode Fuzzy Hash: fd35d43619dc3a263a01b5f940063c5335a5c98091513a5ed1770b6a4388dd96
                                                                    • Instruction Fuzzy Hash: 744191B190034E9FCB44CFA8D48A5DEBFF0FB58398F205619E81AA6250D3B49694CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 27A$Cm)X
                                                                    • API String ID: 0-3608389941
                                                                    • Opcode ID: e0490a94f28e6ce23732593848f5f9e9112bddaf8c3b402d699b48d1b456956c
                                                                    • Instruction ID: 684b918ddde8746cffb287e87a4350d0062747792986074a3c358ea6f2ed809a
                                                                    • Opcode Fuzzy Hash: e0490a94f28e6ce23732593848f5f9e9112bddaf8c3b402d699b48d1b456956c
                                                                    • Instruction Fuzzy Hash: 15316FB46187848B8348DF28D59551ABBE5FBCC308F404B2DF4CAAB360D778D644CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ?oCf$Wu
                                                                    • API String ID: 0-2445847193
                                                                    • Opcode ID: b07007c7df8fdcff1a3a12132ff18166943f80f753e521aa0974c7cb649c130d
                                                                    • Instruction ID: 6e752a1dbd70b7d88cda0fb1d20915d08c65693f2945daa64a17bfbf07288bfe
                                                                    • Opcode Fuzzy Hash: b07007c7df8fdcff1a3a12132ff18166943f80f753e521aa0974c7cb649c130d
                                                                    • Instruction Fuzzy Hash: 5E21AEB55187848B83489F28C44A41ABBE0FB8C70DF504B2DF8DAA6260D778D646CB4B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0F6 $KO
                                                                    • API String ID: 0-276686719
                                                                    • Opcode ID: 6205ceb11bb6b662748add8c297f1b443fa17d6724776aa75fc58f5dae511f0b
                                                                    • Instruction ID: 15a0bfab9284e0424f8d805b4637dfad6d31782236c6d70db9798c35a47a8228
                                                                    • Opcode Fuzzy Hash: 6205ceb11bb6b662748add8c297f1b443fa17d6724776aa75fc58f5dae511f0b
                                                                    • Instruction Fuzzy Hash: AB21AD755283808FC368DF68C58614BBBF0FB86748F504A1DFAC686261D7B6D805CB47
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: p$tSA
                                                                    • API String ID: 0-3551818358
                                                                    • Opcode ID: 99011765d78b2b4d15352d42fcf875ddc55d3d35c100f7abdde6317782da955f
                                                                    • Instruction ID: dafa682f426fd7c4027cc0dc28289443c8a7082daafb3c1476061bf3b97c4e55
                                                                    • Opcode Fuzzy Hash: 99011765d78b2b4d15352d42fcf875ddc55d3d35c100f7abdde6317782da955f
                                                                    • Instruction Fuzzy Hash: 4A2169B45183858BD788DF28C54A50BBBE0BBCD74CF400B2DF4CAA6260D378D644CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8r.F$P?
                                                                    • API String ID: 0-1060054278
                                                                    • Opcode ID: 69901aac6ce1aef3d4959f7919bc5ecc16501e8ce7d01dbb2ce958a2c67dc727
                                                                    • Instruction ID: b2da1e8a0f89ffdbcd525e428a91df6a678b185604bab408c7dee67f2374b2b0
                                                                    • Opcode Fuzzy Hash: 69901aac6ce1aef3d4959f7919bc5ecc16501e8ce7d01dbb2ce958a2c67dc727
                                                                    • Instruction Fuzzy Hash: DC2179B45187849BC749DF68D44A41ABBE0BB9C71CF800B5DF4CAAA310D3B8D645CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <>
                                                                    • API String ID: 0-1927776135
                                                                    • Opcode ID: 37c3f39876e999beb0937df684067ca5812f0cda9578e561258942df6de8421c
                                                                    • Instruction ID: 9b9c084f2c1b1f08cb5858c99f1f27cbdd47ca95557f3058ff07422eb4e47033
                                                                    • Opcode Fuzzy Hash: 37c3f39876e999beb0937df684067ca5812f0cda9578e561258942df6de8421c
                                                                    • Instruction Fuzzy Hash: F742047190438C9BDBB9CFA8D8CA6DD7BB0FB58314F20421DD80A9B261DB745A85CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: j=
                                                                    • API String ID: 0-592141216
                                                                    • Opcode ID: 1169f1869d3fb428bfdad968f94ee3f32c89471e58a558a0d80dd63f76afa428
                                                                    • Instruction ID: 9003355423bafd58b5275d98cfc2247977288ca0e37ad1cbcdd73f3390e5cf1b
                                                                    • Opcode Fuzzy Hash: 1169f1869d3fb428bfdad968f94ee3f32c89471e58a558a0d80dd63f76afa428
                                                                    • Instruction Fuzzy Hash: 6BD1397150074D8BDF89DF28C89A6DE3BA0FB58398F55522CFC4AA6250C778D998CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !O
                                                                    • API String ID: 0-2378650393
                                                                    • Opcode ID: 302dfdcfbb7bb296299c3bc274bc73d8feb87790668f515a7c841834ed93dc2b
                                                                    • Instruction ID: 4170ec84c9d3f49002394f5178db7bb3edfe66952fd3c2890134f0e6da5031b0
                                                                    • Opcode Fuzzy Hash: 302dfdcfbb7bb296299c3bc274bc73d8feb87790668f515a7c841834ed93dc2b
                                                                    • Instruction Fuzzy Hash: F2E10A711087C88BDBFADF64C88ABDE3BACFB44748F105519EA0A9E258CB745748CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ^Lu
                                                                    • API String ID: 0-3854589714
                                                                    • Opcode ID: fb3768cccb7a26f6a89fbcd18e8308750f02c0f1f73e9d8b382492f454794486
                                                                    • Instruction ID: 7c859a126a25bd0c02bef77f14247f717a5a9adcaacfb9e6f8c6730b8303fd88
                                                                    • Opcode Fuzzy Hash: fb3768cccb7a26f6a89fbcd18e8308750f02c0f1f73e9d8b382492f454794486
                                                                    • Instruction Fuzzy Hash: E4A128709047498FCB9DCF68C88A6EEBBF1FF48384F204119EA46A7250D7759A85CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Z"
                                                                    • API String ID: 0-1896177830
                                                                    • Opcode ID: 85f6676341921d6f483625aa17b45c04f6466e2be55beb334fa49e51010a1540
                                                                    • Instruction ID: 91163448777d7afc4cc80e296cb9cfbd8772b1902329242c75d45222aab24025
                                                                    • Opcode Fuzzy Hash: 85f6676341921d6f483625aa17b45c04f6466e2be55beb334fa49e51010a1540
                                                                    • Instruction Fuzzy Hash: C0A165B590060DCFCBA8CF78D15A68E7BF1BB04308F606129EC269A262E774D619CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: e8f2
                                                                    • API String ID: 0-4239716772
                                                                    • Opcode ID: 3907476c53bac25a555e3ffc467f8b6ad850bf32927a98fe31c8bf9de770097f
                                                                    • Instruction ID: aaec5001b0b3f576b33a9a86a913a78c3f9fdfa8ed470970e8cb6047951b043a
                                                                    • Opcode Fuzzy Hash: 3907476c53bac25a555e3ffc467f8b6ad850bf32927a98fe31c8bf9de770097f
                                                                    • Instruction Fuzzy Hash: C491C37010078E8BDF49DF24D89A5DA3BA1FB58348F114618FC5A97294C7B8EA65CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Qhm
                                                                    • API String ID: 0-202924511
                                                                    • Opcode ID: a2bb8b1411107b7575902c6661116fd2ce5bfac275bcbff6451e16fcd58631a3
                                                                    • Instruction ID: dff427aa29f5729145b0ab8b996757c093157db28b416262619acb8c77b37c14
                                                                    • Opcode Fuzzy Hash: a2bb8b1411107b7575902c6661116fd2ce5bfac275bcbff6451e16fcd58631a3
                                                                    • Instruction Fuzzy Hash: 1D511479517209CBCB69CF38D4D56E93BE0EF68344F20012DFC668B2A2DB70D5268B48
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: WZ'
                                                                    • API String ID: 0-1944904082
                                                                    • Opcode ID: 8b55f411d49b287bdfafef9dc47725f2bb274e5ab4be629ead2bc2b735d307b3
                                                                    • Instruction ID: 5b5aaaf1f09ca5557c90149fa64bb16396cbc43774f49a57b3b09e68a9cf408c
                                                                    • Opcode Fuzzy Hash: 8b55f411d49b287bdfafef9dc47725f2bb274e5ab4be629ead2bc2b735d307b3
                                                                    • Instruction Fuzzy Hash: F171087155878CDBDBBADF28C8897D937B1FB98304F908219D80E8E254DB785B4ACB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -]
                                                                    • API String ID: 0-3195032325
                                                                    • Opcode ID: 2f387ab0a9f756c6099ceefcc45306d74e879ef7c324eb87884d154b92a960fc
                                                                    • Instruction ID: 01c3c27378e714c100c9a801295078fc99e5b088b1ed4129002e73aaaa485763
                                                                    • Opcode Fuzzy Hash: 2f387ab0a9f756c6099ceefcc45306d74e879ef7c324eb87884d154b92a960fc
                                                                    • Instruction Fuzzy Hash: 0151297010064D8BCB49DF28D4855D93FE1FB0C3ACF1A6318FD4AAA251D774D989CB88
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: }4}
                                                                    • API String ID: 0-922147943
                                                                    • Opcode ID: 13f685bfa53c13813d4a1c5d0eb0e1f62a0b1129b8c138172dc2148ffb4c9b25
                                                                    • Instruction ID: d7790a4c64fa8f9a696ea70ce14f4ff71b76161c227bc6b72ade158e86aff98b
                                                                    • Opcode Fuzzy Hash: 13f685bfa53c13813d4a1c5d0eb0e1f62a0b1129b8c138172dc2148ffb4c9b25
                                                                    • Instruction Fuzzy Hash: 3461F2B090075D8FCF48DFA4C88A5EEBBB0FB18348F114219E849B6250D7789A09CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: J_H
                                                                    • API String ID: 0-3345504573
                                                                    • Opcode ID: 917d428dc0055415592351f28073fdc95282f2729562562c1ca0dc8b4505919e
                                                                    • Instruction ID: 228b1474463df3943694e07488ce24e2c321c70e95dbe7fca5aca48057557888
                                                                    • Opcode Fuzzy Hash: 917d428dc0055415592351f28073fdc95282f2729562562c1ca0dc8b4505919e
                                                                    • Instruction Fuzzy Hash: EE71E3B1904789CBDBB9DFA4C8896DDBBB0FB48344F20421EDC5AAB251DBB45685CF01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 6p
                                                                    • API String ID: 0-4149211260
                                                                    • Opcode ID: 2ce6c019f8e175d8f04f96ba0abbac2df009c59e7d0a66d8d52c33c4e2d2dbc2
                                                                    • Instruction ID: 4bbd446beaef8e149afb4be24994101fb76057089ac3c5e28d57a25dd33f9813
                                                                    • Opcode Fuzzy Hash: 2ce6c019f8e175d8f04f96ba0abbac2df009c59e7d0a66d8d52c33c4e2d2dbc2
                                                                    • Instruction Fuzzy Hash: 5D512670D0470E8FDBA5CFA4C4863EEBBF0FB58344F208519E155B6251C7789A498BD6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: o-b
                                                                    • API String ID: 0-1062997908
                                                                    • Opcode ID: 576a5f5008345344db0b8e3d8b9e4c65842e933aac756182c5b50859cc037c1c
                                                                    • Instruction ID: 42124e7df8dcd8895505725edc86312d8ed31e4959f5f45477de907a66349d68
                                                                    • Opcode Fuzzy Hash: 576a5f5008345344db0b8e3d8b9e4c65842e933aac756182c5b50859cc037c1c
                                                                    • Instruction Fuzzy Hash: 5951177050064D8BDB94DF58C48A6DE3BE0FB28398F254219FC4AA6250D7789699CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: >(O
                                                                    • API String ID: 0-1787487011
                                                                    • Opcode ID: b44782859c9866ecf0a367f2980fc160796e99ead2e04d39a5c7d0e6a088d4a1
                                                                    • Instruction ID: 047403745ffdf525a43130cb5f0cbada7355141308e198c8a6f422d75d1d2ed5
                                                                    • Opcode Fuzzy Hash: b44782859c9866ecf0a367f2980fc160796e99ead2e04d39a5c7d0e6a088d4a1
                                                                    • Instruction Fuzzy Hash: FB51D0B090078A8BCF4CDF64C8964EE7BB1FB48344F418A1DE966A6350D3B49665CFD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8:*
                                                                    • API String ID: 0-724269717
                                                                    • Opcode ID: e3fa9c188720ae3383b8778e69c2785bb5a3de525a41bd4bbc95f284b45543ac
                                                                    • Instruction ID: 711009871b2250b35f00fe0553413368f045348530dbac453829dc2cbdd56c12
                                                                    • Opcode Fuzzy Hash: e3fa9c188720ae3383b8778e69c2785bb5a3de525a41bd4bbc95f284b45543ac
                                                                    • Instruction Fuzzy Hash: DE519FB491074A8FCF48CF68D48A4DEBFB0FB68398F604519EC56AA250D37496A4CFD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: rX
                                                                    • API String ID: 0-981687150
                                                                    • Opcode ID: 72326b85271c7a937057e165988be4f12753e05fcac8eb4b8ea4e21389b64c69
                                                                    • Instruction ID: b6d69565f821f61997a80366e3bba675c41573294b632c1fc230c031640afc4a
                                                                    • Opcode Fuzzy Hash: 72326b85271c7a937057e165988be4f12753e05fcac8eb4b8ea4e21389b64c69
                                                                    • Instruction Fuzzy Hash: 4151AFB090034E9FCB88CF64D48A5DE7FF0FB68398F204619E856A6250D7B496A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Mf_
                                                                    • API String ID: 0-1332758469
                                                                    • Opcode ID: fb88f28924fad9aaa6151cff677ca0e0efdf4f904b7a048c95071875f4937966
                                                                    • Instruction ID: 588ebf95624ee4adfb38f08f1f8e1a2e631849e2b9196c961bccb52f3d8eb30d
                                                                    • Opcode Fuzzy Hash: fb88f28924fad9aaa6151cff677ca0e0efdf4f904b7a048c95071875f4937966
                                                                    • Instruction Fuzzy Hash: 72413A7051034E8BDB49DF24C88A6DE3FA0FB28388F254619FC4AA6250D774DA99CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X
                                                                    • API String ID: 0-1684620495
                                                                    • Opcode ID: 95d6dfd1a906a0706b046fd694ee3460552bea9bfe9cb5e2a40ac0cd4b690da8
                                                                    • Instruction ID: f9643209bdbdb1888c2e59a9774da8228396ec72f530c9748c2220c9be6d5877
                                                                    • Opcode Fuzzy Hash: 95d6dfd1a906a0706b046fd694ee3460552bea9bfe9cb5e2a40ac0cd4b690da8
                                                                    • Instruction Fuzzy Hash: BC41B2B050C3858BC368DF69D49A51BFFF0FB8A344F104A1DF68686660D7B6D985CB06
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *ZP
                                                                    • API String ID: 0-3785686542
                                                                    • Opcode ID: 124ec41d44a3523d05a66609c609173a78c4b3624f4a4e6496b4e9e6556fc9cc
                                                                    • Instruction ID: cd700ac0e72fdea100a6c678007ea8a5747de393b09cc95ae15ed8a735d2c9a6
                                                                    • Opcode Fuzzy Hash: 124ec41d44a3523d05a66609c609173a78c4b3624f4a4e6496b4e9e6556fc9cc
                                                                    • Instruction Fuzzy Hash: C351A3B490038EDFCB89CF64D88A5CE7BB0FB14358F104A19F826A6260D7B49665CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: m9
                                                                    • API String ID: 0-3356931199
                                                                    • Opcode ID: 59db1ee33f63e0a2717973542dec2f5b5e1c1c898ff6bc1b3de0a09d2022d082
                                                                    • Instruction ID: d52339509a2a8a66acc38e501e73e88f1da459d23edb33c529fdb618239225c9
                                                                    • Opcode Fuzzy Hash: 59db1ee33f63e0a2717973542dec2f5b5e1c1c898ff6bc1b3de0a09d2022d082
                                                                    • Instruction Fuzzy Hash: AC41DFB091074E8BDB48CF68C48A5DE7FF0FB58388F24821DE816A6250D3B496A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4pI
                                                                    • API String ID: 0-4229698716
                                                                    • Opcode ID: 2de104f479e2b2f02d24493f8855e4bc5dcdc9c63e6a51756a92895ab6f7f3eb
                                                                    • Instruction ID: 0770ca01e568b3f0bfe5184ab77212d0ab800e579d58ef6f76929ab8cb5ebb0d
                                                                    • Opcode Fuzzy Hash: 2de104f479e2b2f02d24493f8855e4bc5dcdc9c63e6a51756a92895ab6f7f3eb
                                                                    • Instruction Fuzzy Hash: 2741F4B190074E8BCF48CFA8C89A5DE7FB0FB58358F10561DE826A6250D3B49658CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: T7
                                                                    • API String ID: 0-2187045315
                                                                    • Opcode ID: 5b373cdcbe2aa1956c24a8ef4c3b2010382917b3ef4417ae897a4905ea2e7e5d
                                                                    • Instruction ID: e445a35d468e15d444dcf9e81ad6d1cbfbebd9662ebae466ae50992912f39bd9
                                                                    • Opcode Fuzzy Hash: 5b373cdcbe2aa1956c24a8ef4c3b2010382917b3ef4417ae897a4905ea2e7e5d
                                                                    • Instruction Fuzzy Hash: 6B41E3B191074A8BCF48CF68C48A4DE7FB0FF68398F214609E856A6250D3B496A5CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Y[
                                                                    • API String ID: 0-1945238269
                                                                    • Opcode ID: 31c1f4254bc290cabebbeaadf273c7758becd057e90036f86d7834daa6438d30
                                                                    • Instruction ID: 277041adf1a083522e20f1ff56a0db14356653c4c70dd43ccf4c86f47916e8c3
                                                                    • Opcode Fuzzy Hash: 31c1f4254bc290cabebbeaadf273c7758becd057e90036f86d7834daa6438d30
                                                                    • Instruction Fuzzy Hash: C941E67091038E8FCB48DF68C88A5DE7BB1FB58358F10461DEC6AAB250D3B49664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: [
                                                                    • API String ID: 0-784033777
                                                                    • Opcode ID: 593e2affadbd7d43363044155888d79a97a338ed63d972069ddab33477027861
                                                                    • Instruction ID: 430e1a122fe0b20a7e1e6f195b5c5d6ab4e3c741a825a8fe397d5d7cdac5a180
                                                                    • Opcode Fuzzy Hash: 593e2affadbd7d43363044155888d79a97a338ed63d972069ddab33477027861
                                                                    • Instruction Fuzzy Hash: 2841E4B090074E8BCB48CF64C89A4EE7FF1FB68358F11461DE856A6250D3B496A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 9 m
                                                                    • API String ID: 0-1920745034
                                                                    • Opcode ID: 403251bbe0303adcdb9fc718cab8a153fac6736b8b0f21ecfcc0465734d374f6
                                                                    • Instruction ID: 3be0e43e89224af25a3a96d245761afcbfad2e5132df1735d4859c98edb6e384
                                                                    • Opcode Fuzzy Hash: 403251bbe0303adcdb9fc718cab8a153fac6736b8b0f21ecfcc0465734d374f6
                                                                    • Instruction Fuzzy Hash: 5D41A6B180038ECFCB48CF68C88A5DE7FB1FB58358F114A19F869A6210D7B49665CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: wo0
                                                                    • API String ID: 0-1782833155
                                                                    • Opcode ID: 915272897a82389ccaff6fb74a1b6d3f763f551119c92165f64424d72f92453c
                                                                    • Instruction ID: 9062cfcdbd96f40b118b25d613ee2554a2eb62b456f013d12e1abcba11dd4c76
                                                                    • Opcode Fuzzy Hash: 915272897a82389ccaff6fb74a1b6d3f763f551119c92165f64424d72f92453c
                                                                    • Instruction Fuzzy Hash: AD4104B090034E8BCB48CF68C4865DE7FB0FB48358F11861DE85AAA250D7749664CFC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0FT
                                                                    • API String ID: 0-3306264968
                                                                    • Opcode ID: 221a7c3e7820f489f33ab0bfd813c90db956588b7e3f278aa32cbc5897504973
                                                                    • Instruction ID: 6bc0069c9e8fc616ccef226ca938112ebcbb35ca2f33a2ab28ad344b092e513b
                                                                    • Opcode Fuzzy Hash: 221a7c3e7820f489f33ab0bfd813c90db956588b7e3f278aa32cbc5897504973
                                                                    • Instruction Fuzzy Hash: 30419FB090078E8FCB49CF64C88A5DE7BB0FB18358F104A19E866A7250D7B8D665CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: [Mh<
                                                                    • API String ID: 0-3342980100
                                                                    • Opcode ID: 8db4eb38f9ab2c3bc7d36487ff8b598b8cd98b11ddd9dbc7aed51384deea61bf
                                                                    • Instruction ID: 3dfa530075d16dbdc0ab74c4fd592fdc9016efe2b3d8749faa49a3b984689735
                                                                    • Opcode Fuzzy Hash: 8db4eb38f9ab2c3bc7d36487ff8b598b8cd98b11ddd9dbc7aed51384deea61bf
                                                                    • Instruction Fuzzy Hash: 3D41B4B090034E8BDB88DF68C88A4DE7FF0FB58398F104619E855A6250D37496A4CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: [*y
                                                                    • API String ID: 0-3642367475
                                                                    • Opcode ID: f920a7f17afa669f85dd4fa2bbc3f052cb99f05070bc78a3fd5f717c453881c3
                                                                    • Instruction ID: f49b88a051f724710f0cfdc48a2fab0be3c7391659c99e254e23c0044fb95fb4
                                                                    • Opcode Fuzzy Hash: f920a7f17afa669f85dd4fa2bbc3f052cb99f05070bc78a3fd5f717c453881c3
                                                                    • Instruction Fuzzy Hash: 9F318C746183858B8748DF28D45641ABBE1FBCC308F405B2DF8CAAB291D7789641CB8B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: dk
                                                                    • API String ID: 0-2586313868
                                                                    • Opcode ID: 8a4805f75226fc2840e2c7b063b7b1e39b1ba6f4f5ce1306a123ad924c24cf9d
                                                                    • Instruction ID: bd21a50a93d9ce141822b95cdb4ee263f008649e2ad7f0911c2a62c734e6813a
                                                                    • Opcode Fuzzy Hash: 8a4805f75226fc2840e2c7b063b7b1e39b1ba6f4f5ce1306a123ad924c24cf9d
                                                                    • Instruction Fuzzy Hash: 8631E4B0508B808BC75CDF28C49A51BBBF1FBC6354F504A1CF686863A0DBB6D849CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: m?@
                                                                    • API String ID: 0-4017832957
                                                                    • Opcode ID: 92bb4875fae3dfbb536cc4a594f9b8f02b4b9fef725d60d218a6fcb850c1db5e
                                                                    • Instruction ID: 763f89865c62d32814b91696e152b9bff8d9fc03c4acc356d14baff2dc9750fc
                                                                    • Opcode Fuzzy Hash: 92bb4875fae3dfbb536cc4a594f9b8f02b4b9fef725d60d218a6fcb850c1db5e
                                                                    • Instruction Fuzzy Hash: B231BF752187858BC749DF28C04A41ABBE1FB8D30CF504B2DF4CAA6350D778D616CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: MR
                                                                    • API String ID: 0-1985102067
                                                                    • Opcode ID: c3045b5f67f41fb122cd1cd8de18bcca47d48181f2768d112050a64545bdb3cc
                                                                    • Instruction ID: 3dc758c2b0da019c4ef40f7354f1f5afd613488c2e2992af3e697213e5bda16f
                                                                    • Opcode Fuzzy Hash: c3045b5f67f41fb122cd1cd8de18bcca47d48181f2768d112050a64545bdb3cc
                                                                    • Instruction Fuzzy Hash: 9F215CB05187808BD749DF28C55941EBBE1BB9D30CF804B2DF4CAAA251D778DA05CF4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: h{9
                                                                    • API String ID: 0-709585855
                                                                    • Opcode ID: 158519ec253ad62ee934b2a1f06c22473a728e5d40c1cbc8d8e2591bd6c1f9a1
                                                                    • Instruction ID: 28d7748f9e23597285172eede27c795ca80d4d45ffdf147c2eecc812d7a7424c
                                                                    • Opcode Fuzzy Hash: 158519ec253ad62ee934b2a1f06c22473a728e5d40c1cbc8d8e2591bd6c1f9a1
                                                                    • Instruction Fuzzy Hash: A22180B152D785AFC788DF28C59991ABBE0FB98308F806E1DF9868A250D374D545CB43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: =WQ
                                                                    • API String ID: 0-979633440
                                                                    • Opcode ID: beecb343f63eb420ad30c3b234d671f41fcffe89ae230601040905a52fbe6922
                                                                    • Instruction ID: f1c989dca105177ef840caf4573424004201902730bc760d24db79eb0592445f
                                                                    • Opcode Fuzzy Hash: beecb343f63eb420ad30c3b234d671f41fcffe89ae230601040905a52fbe6922
                                                                    • Instruction Fuzzy Hash: 2C2146746187848B8749DF28C44A51ABBE1BB8D30CF804B1DF8CAAB250D7789A05CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0d58b218a6fad6bc529337baac5d9ed9f8b1cbf9dbb0a3b92ec118c03c99fb86
                                                                    • Instruction ID: c77f93fcecba916d7a728a8c6eb3e78c0c4fd01b54dcd62d4346d4040ea08623
                                                                    • Opcode Fuzzy Hash: 0d58b218a6fad6bc529337baac5d9ed9f8b1cbf9dbb0a3b92ec118c03c99fb86
                                                                    • Instruction Fuzzy Hash: 28E11E7090470D8FCF59DF68D446AEE7BB6FB48344F504129EC4EAB251DB74AA08CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1c8b8be56366865ecfdde9c8b2ec8895e219799960cb59c8d6409a7e773344f9
                                                                    • Instruction ID: 37013b96f87cdafdf9e9430ef7fa874701b46d6ad591addafa58d16b7588ecf0
                                                                    • Opcode Fuzzy Hash: 1c8b8be56366865ecfdde9c8b2ec8895e219799960cb59c8d6409a7e773344f9
                                                                    • Instruction Fuzzy Hash: 7E811370D047098FDB89CFA8D4856EEBBF1FB48314F14812EE846B6250CB788A49CF59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 636ed3c89b38e63114f2d2672b542ea9429d7597145989221425ac881483aa9e
                                                                    • Instruction ID: 9c3afdfbfdf497047419e96e23ac648a32a0c35cf7c10b77ff2162508d5b9c58
                                                                    • Opcode Fuzzy Hash: 636ed3c89b38e63114f2d2672b542ea9429d7597145989221425ac881483aa9e
                                                                    • Instruction Fuzzy Hash: 68715B70A0460D8FCFA9DF64D0857EE77F2FB48348F109169E856972A2DB74DA18CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 62b2812e5277d79cf71890da185327c00cb0182960b11156e794a9778dcccdd1
                                                                    • Instruction ID: 96a2ca05932f578597b6f31f20a9b51789f655d9034ffcd243468df0dde1503e
                                                                    • Opcode Fuzzy Hash: 62b2812e5277d79cf71890da185327c00cb0182960b11156e794a9778dcccdd1
                                                                    • Instruction Fuzzy Hash: 8B6108B050424D8FCB99CF28C48A6DA7FE0FB58348F61422DF84AA6250D778D694CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0a7e039c7e162bbace75073517b23d1c0edb14752be4eceffb74d3575dc747b7
                                                                    • Instruction ID: e11998f87687b7015f7b025411e2dba788bee123d684f62271b2fcc2a6602c8d
                                                                    • Opcode Fuzzy Hash: 0a7e039c7e162bbace75073517b23d1c0edb14752be4eceffb74d3575dc747b7
                                                                    • Instruction Fuzzy Hash: 74516C3011C7889FD7A9DF28C48A7ABBBF2FB88354F405A1DE4CA83251D775A5468B43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 37b3c9751f9c0622dad5cee6893bdb18b89ef97b8e375e51f8b49718ad0ca1ed
                                                                    • Instruction ID: 3c9e139cfc3177b9e6430d12f2245ff46c98974f9447e7844960b67abc7cc201
                                                                    • Opcode Fuzzy Hash: 37b3c9751f9c0622dad5cee6893bdb18b89ef97b8e375e51f8b49718ad0ca1ed
                                                                    • Instruction Fuzzy Hash: 2C416E705197449FD7D5CF28C489B5EBBE0FB88744F80A92DF485C2291CB74C9498B03
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d93e85a75c27503c9e550547e6f4dbe74bfd5b550d549da600d4a1fb4778da09
                                                                    • Instruction ID: 8d3aa2995036c6943faeb837d6d259061f9fd1ebb01e44e177952bfba46c1523
                                                                    • Opcode Fuzzy Hash: d93e85a75c27503c9e550547e6f4dbe74bfd5b550d549da600d4a1fb4778da09
                                                                    • Instruction Fuzzy Hash: BC51B5B190038E9FCB48CF68D8865DE7BF0FB48358F508A19F826A7250D3B49664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c2a73fccebe1b17c37a08eaad88bc03e676d8e4e44166d1bd6bc2a62feffe697
                                                                    • Instruction ID: 3bfbec68728c413781f4eceae801228648357d86044db0a2bb780f5116396d21
                                                                    • Opcode Fuzzy Hash: c2a73fccebe1b17c37a08eaad88bc03e676d8e4e44166d1bd6bc2a62feffe697
                                                                    • Instruction Fuzzy Hash: 4951B5B190074E8FCB48DFA8D88A5DE7BB1FB48348F04861DE826A7350D3B49564CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4330d8994c454f3a4ce2cb979804135e217ee49caa662d464dea2a0ef5ce2a30
                                                                    • Instruction ID: 53b90e1c5486c9cc5d3a4e2843fa79abd377b3644fddba8a35b35de5b3b72a9d
                                                                    • Opcode Fuzzy Hash: 4330d8994c454f3a4ce2cb979804135e217ee49caa662d464dea2a0ef5ce2a30
                                                                    • Instruction Fuzzy Hash: AA51A4B590038E8FCF48DF64C88A5DE7BB1FB48348F014A19E86AA6350D7B4D665CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f6e19dd2ecc4b4f98e7bd80107de5ee987440c0ef4aaf5382ea96953c73351d3
                                                                    • Instruction ID: e1ff16132d2196f3f75472eef2dbafaed56c0de40c9f91af0ed0f4743424dce2
                                                                    • Opcode Fuzzy Hash: f6e19dd2ecc4b4f98e7bd80107de5ee987440c0ef4aaf5382ea96953c73351d3
                                                                    • Instruction Fuzzy Hash: 7241E3B190034A8FCB48CF68C8865DE7FB1FB58358F10861DE85AAA360D77496A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 00ebc5b3581f268e1dca31b076cde8af601d69c20f797ec800b8524e8aca152a
                                                                    • Instruction ID: 71fd5f9204d30feec7a15df1bf9f79d56724cbe4fb23e8fa5a2523106a8ad13f
                                                                    • Opcode Fuzzy Hash: 00ebc5b3581f268e1dca31b076cde8af601d69c20f797ec800b8524e8aca152a
                                                                    • Instruction Fuzzy Hash: 2C51B2B080034E9FCB48CFA8D48A4DEBFF0FB58398F245619E859A6250D3749695CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1f4f6e8d1d7fb1cefad6bab8572f86962bf991beacb3f1c3af335354cec980e2
                                                                    • Instruction ID: 13dd754d1e7aaa458ccf3f25f1a53950ed55eb7a2af7c94b5f3f3eca6f4c7b71
                                                                    • Opcode Fuzzy Hash: 1f4f6e8d1d7fb1cefad6bab8572f86962bf991beacb3f1c3af335354cec980e2
                                                                    • Instruction Fuzzy Hash: 4141B3B090434E8FCB48DF68C48A4CE7FB0FB58398F204619E856A6250D3B496A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b99b47e9b962ad4e889b98a468eb4c97838fe937d78fd3ed328a07435872d91a
                                                                    • Instruction ID: 25ea7a1fae7cee08e525b2e53d13b9e761fafe3c3046f9c16da3d4363f6b727f
                                                                    • Opcode Fuzzy Hash: b99b47e9b962ad4e889b98a468eb4c97838fe937d78fd3ed328a07435872d91a
                                                                    • Instruction Fuzzy Hash: 7641F0B090078E8BCF48CF68C88A4DE7FB0FB48358F54461DE86AA6350D3B49664CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 83981cbbf60b78e7deea3e04e91402b42a32efa8c5dfd88cb8f56556e6fb0c3c
                                                                    • Instruction ID: 2f3c92175ef08bfcd336efc03048a581a759bd19a61f5d08681f8b59d2b4a65d
                                                                    • Opcode Fuzzy Hash: 83981cbbf60b78e7deea3e04e91402b42a32efa8c5dfd88cb8f56556e6fb0c3c
                                                                    • Instruction Fuzzy Hash: CA41EF70508B898FE3A8DF29C48950BBBF2FBC5354F104A1DF69686360D7B5D845CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 94030778b375274538e88af110c4c71a5f626c7493089532c44927a023a09910
                                                                    • Instruction ID: 881360cf52284626b478287e7223753f8540b5b8a242225130398fb52c45b4e6
                                                                    • Opcode Fuzzy Hash: 94030778b375274538e88af110c4c71a5f626c7493089532c44927a023a09910
                                                                    • Instruction Fuzzy Hash: 9141B1B090034E8FCF48CF68C48A5DEBFB0FB68398F214619E855A6250D3B496A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 93974b6d4f6273d20610df347467165d2a5c3046e1daec97411395bd01693f1f
                                                                    • Instruction ID: 9c4ff176952ec0d3a7c23327861baecbe751e07bc56d6e6d0065064954d6898b
                                                                    • Opcode Fuzzy Hash: 93974b6d4f6273d20610df347467165d2a5c3046e1daec97411395bd01693f1f
                                                                    • Instruction Fuzzy Hash: D93113B0508B84CBD7B4DF24C08979ABBE0FBC4758F608A1CE5D9C6261DBB4984DDB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 613fb402d6b778ceaf7e513f493c666c428009a0501ff02ca6debf04feb91865
                                                                    • Instruction ID: 2086fc6cf530452ca317dde1c3f5989bf97dc2ab51b7d711b1b7619edf53518f
                                                                    • Opcode Fuzzy Hash: 613fb402d6b778ceaf7e513f493c666c428009a0501ff02ca6debf04feb91865
                                                                    • Instruction Fuzzy Hash: 9A4107B090034D9FCF48DF68C89A5DEBFB1FB48358F10865DE96AA6250D3B49664CF84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a391d5f1ee034caf47bfedc7cfbee3ee0130da0d99d6425c5f03999ced993457
                                                                    • Instruction ID: 1338ccaed59e81eda3dfb0132a5285c9e75a0d4e8ad1c64b0ac71650cc1258ea
                                                                    • Opcode Fuzzy Hash: a391d5f1ee034caf47bfedc7cfbee3ee0130da0d99d6425c5f03999ced993457
                                                                    • Instruction Fuzzy Hash: 5541E4B190075ECFCF44CFA8D88A4CE7BF0FB08358F144619E869A6210D3B49658CF99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fd33be4bf54c8c25dddb299aef1f30db163f836ea6c92e4bd2e4a70074cec26c
                                                                    • Instruction ID: 90c54515c462ca516bd1a7834683e0366852147f904ce70d700c1fd94530822e
                                                                    • Opcode Fuzzy Hash: fd33be4bf54c8c25dddb299aef1f30db163f836ea6c92e4bd2e4a70074cec26c
                                                                    • Instruction Fuzzy Hash: D33198B16187848BD788DF28D44941ABBE1FBDC30CF405B1DF4CAAA360D7789644CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4dc2512c0ff6dc22a4fb7ff1d0ea1563faee4dc38c2ddbd287c0bb24e1b40528
                                                                    • Instruction ID: 9655ad274102c7f9d75b202b541ab5cd2305fe15ce58f1dcda736dbe1a9cecaf
                                                                    • Opcode Fuzzy Hash: 4dc2512c0ff6dc22a4fb7ff1d0ea1563faee4dc38c2ddbd287c0bb24e1b40528
                                                                    • Instruction Fuzzy Hash: 3B2146B46183858B8389DF28D04A41ABBE1FBCC308F905B1DF4CAAB254D77896558B4B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 443cbba6f5f89cfce6496fb7e303af42859a42b87001d497a7063cf79c72ec44
                                                                    • Instruction ID: 28a8b9ee08791f4b35668e747dad36529c2fac2b53c208ad34d18e94405bcf7a
                                                                    • Opcode Fuzzy Hash: 443cbba6f5f89cfce6496fb7e303af42859a42b87001d497a7063cf79c72ec44
                                                                    • Instruction Fuzzy Hash: 8E21D870529784ABC788DF18C58A55ABBF0FBC5758F80691DF8C686251C7B4D906CB43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451105173.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b24567682a71932b9bd3cac4b142caf72f763870487d30b345218c61caa1d775
                                                                    • Instruction ID: 3473a0eaf58d43c1d16632198f29a9e85fcf3b0d6ee31105f780c840bc6bd29d
                                                                    • Opcode Fuzzy Hash: b24567682a71932b9bd3cac4b142caf72f763870487d30b345218c61caa1d775
                                                                    • Instruction Fuzzy Hash: 0E2148741087848FC398EF28C08A41BBBE0BB9C35CF400B1DF4CAA7265D7B8D6558B0A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_unlock_wcsftime_l
                                                                    • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportA$_itoa_s(nLine, szLineMessage, 4096, 10)$e = mbstowcs_s(&ret, szOutMessage2, 4096, szOutMessage, ((size_t)-1))$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcat_s(szLineMessage, 4096, "\n")$strcat_s(szLineMessage, 4096, "\r")$strcat_s(szLineMessage, 4096, szUserMessage)$strcpy_s(szLineMessage, 4096, szFormat ? "Assertion failed: " : "Assertion failed!")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$strcpy_s(szUserMessage, 4096, "_CrtDbgReport: String too long or IO Error")$wcscpy_s(szOutMessage2, 4096, L"_CrtDbgReport: String too long or Invalid characters in String")$6o$Pl
                                                                    • API String ID: 242677333-579931786
                                                                    • Opcode ID: a63f40807382e4d475d486b4876b23bc4dd58b7e370bc0180856c528c8acbbda
                                                                    • Instruction ID: 500c90198dd69b26a6791dc7b5522bcaf271bed7467fbe3d1ea1c171595a9529
                                                                    • Opcode Fuzzy Hash: a63f40807382e4d475d486b4876b23bc4dd58b7e370bc0180856c528c8acbbda
                                                                    • Instruction Fuzzy Hash: 4132297292CF8695E7308B10E8643EE7362FBE5345F848135D68D52A99DF7CE588CB80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$FileModuleName
                                                                    • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowW$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$wcscpy_s(szExeName, 260, L"<program name unknown>")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")
                                                                    • API String ID: 1949418964-1840610800
                                                                    • Opcode ID: b12b1314681225994c561f9efc1de4d9c7126b4e593a535ef46bdf2ab838bdf2
                                                                    • Instruction ID: 4e93de82bbb94113a9e058bd58ee91b2b9f1d2cbe071b1b6575fc473cb6a5d01
                                                                    • Opcode Fuzzy Hash: b12b1314681225994c561f9efc1de4d9c7126b4e593a535ef46bdf2ab838bdf2
                                                                    • Instruction Fuzzy Hash: 4AF11A72528FC690EA34CB50E4943AEB3A6FBE5780F588136D68D52769DF3CE195CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$_invalid_parameter
                                                                    • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$strcpy_s(szExeName, 260, "<program name unknown>")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$m*
                                                                    • API String ID: 2356156361-2279852085
                                                                    • Opcode ID: 6f4650fd4357eea9b956771a13d9b8a3362ab7c768ecc2367610c4505c6cb5c5
                                                                    • Instruction ID: 9157e97490257892a9bbfce29864b4440ef4cc87333f931409a8c76fd342521d
                                                                    • Opcode Fuzzy Hash: 6f4650fd4357eea9b956771a13d9b8a3362ab7c768ecc2367610c4505c6cb5c5
                                                                    • Instruction Fuzzy Hash: 2BC1D97252CF8691E7308B51E4903EE63A6FBDA784F448135D68E92BA9DF3CD194CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FileHandleWrite
                                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $_NMSG_WRITE$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\crt0msg.c$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"\n\n")$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), error_text)$wcscpy_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)$_$0I$2H
                                                                    • API String ID: 3320372497-2837547082
                                                                    • Opcode ID: bb867b9cd4420929bdb9afde1297a67263cb8f1db9c8fa78cbb90456e5291ccd
                                                                    • Instruction ID: 9a2558e9f94f14de15c1c69e26a14c237cc32f826549d761111b25c818c6f3d5
                                                                    • Opcode Fuzzy Hash: bb867b9cd4420929bdb9afde1297a67263cb8f1db9c8fa78cbb90456e5291ccd
                                                                    • Instruction Fuzzy Hash: 3591717252CF8685EB20CB15E4643BE6362FBE6744F988136D68E57695CF3CD144CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$Decode$AddressEncodeLibraryLoadProc
                                                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                    • API String ID: 2256938910-232180764
                                                                    • Opcode ID: 4136024d25ab454011a9418e3e33b4ea31b56a31dc25d7fc48a91c666a4aba5f
                                                                    • Instruction ID: fd75de418f99f924fdcbf078334e4131ddb46619a7815c5c444d0b7b7746868a
                                                                    • Opcode Fuzzy Hash: 4136024d25ab454011a9418e3e33b4ea31b56a31dc25d7fc48a91c666a4aba5f
                                                                    • Instruction Fuzzy Hash: 9781D93192CF8286E650DB15F85436EB3A2FBE6744F58C435D68DA2668DF7CE488CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWidewcsncnt
                                                                    • String ID:
                                                                    • API String ID: 641786319-0
                                                                    • Opcode ID: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                                    • Instruction ID: ef3aa2130f75d1079b3fe6ccd6bd835ffa641a0afcdfedd5bb0652d48f900da7
                                                                    • Opcode Fuzzy Hash: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                                    • Instruction Fuzzy Hash: A5022A3251CF85C2D6608B54E4503AEB7A2FBD67A0F148631E69E97BA9DF7CD484CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 20%
                                                                    			E00007FFA7FFA532A40B0(void* __ecx, void* __edi, void* __esi, void* __esp, void* __eflags, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, void* _a16, long long _a24, void* _a32, signed int* _a40, signed int _a48, signed int _a56, long long _a64) {
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				char _v56;
                                                                    				long long _v64;
                                                                    				long long _v72;
                                                                    				char _v80;
                                                                    				void* _v88;
                                                                    				void* _v96;
                                                                    				intOrPtr _v104;
                                                                    				void* _v112;
                                                                    				intOrPtr _v120;
                                                                    				void* _v128;
                                                                    				char _v132;
                                                                    				char _v136;
                                                                    				long long _v144;
                                                                    				signed int _v152;
                                                                    				char _v160;
                                                                    				signed char _v164;
                                                                    				signed int _v168;
                                                                    				char _v176;
                                                                    				char _v184;
                                                                    				long long _v192;
                                                                    				signed char _v200;
                                                                    				long long _v208;
                                                                    				signed int _v216;
                                                                    				signed int _v224;
                                                                    				long long _v232;
                                                                    				void* _t222;
                                                                    				void* _t244;
                                                                    				void* _t295;
                                                                    				long long _t302;
                                                                    				long long _t303;
                                                                    				intOrPtr _t311;
                                                                    				long long _t312;
                                                                    				long long _t321;
                                                                    				intOrPtr _t325;
                                                                    				long long _t329;
                                                                    				long long _t330;
                                                                    				long long _t332;
                                                                    
                                                                    				_t295 = __rax;
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_v164 = 0;
                                                                    				_v152 = 0;
                                                                    				_v168 = E00007FFA7FFA532A3B40(_a40, _a32);
                                                                    				E00007FFA7FFA5329E500(_a16, _a32, _a40,  &_v160);
                                                                    				if (_v168 - E00007FFA7FFA532A3C70(_t295, _a16, _a32, _a40) <= 0) goto 0x532a4176;
                                                                    				r9d = _v168;
                                                                    				E00007FFA7FFA532A3BD0(_t217,  &_v160, _a32, _a40);
                                                                    				r9d = _v168;
                                                                    				E00007FFA7FFA532A3C00(_v168 - E00007FFA7FFA532A3C70(_t295, _a16, _a32, _a40), _t295, _a16, _a32, _a40);
                                                                    				goto 0x532a4197;
                                                                    				_v168 = E00007FFA7FFA532A3C70(_t295, _a16, _a32, _a40);
                                                                    				if (_v168 - 0xffffffff < 0) goto 0x532a41b1;
                                                                    				if (_v168 - _a40[1] >= 0) goto 0x532a41b1;
                                                                    				goto 0x532a41b6;
                                                                    				_t222 = E00007FFA7FFA5329CF80(_a40);
                                                                    				if ( *_a8 != 0xe06d7363) goto 0x532a4398;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0x532a4398;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0x532a4213;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0x532a4213;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0x532a4398;
                                                                    				_t302 = _a8;
                                                                    				if ( *((long long*)(_t302 + 0x30)) != 0) goto 0x532a4398;
                                                                    				0x53294000();
                                                                    				if ( *((long long*)(_t302 + 0xf0)) != 0) goto 0x532a423a;
                                                                    				goto 0x532a4862;
                                                                    				0x53294000();
                                                                    				_t303 =  *((intOrPtr*)(_t302 + 0xf0));
                                                                    				_a8 = _t303;
                                                                    				0x53294000();
                                                                    				_a24 =  *((intOrPtr*)(_t303 + 0xf8));
                                                                    				_v164 = 1;
                                                                    				E00007FFA7FFA5329E6E0(_t222, _a8,  *((intOrPtr*)(_a8 + 0x38)));
                                                                    				if (E00007FFA7FFA532AD2C0(1, _a8) == 0) goto 0x532a4290;
                                                                    				goto 0x532a4295;
                                                                    				E00007FFA7FFA5329CF80(_a8);
                                                                    				if ( *_a8 != 0xe06d7363) goto 0x532a42fa;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0x532a42fa;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0x532a42e6;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0x532a42e6;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0x532a42fa;
                                                                    				_t311 = _a8;
                                                                    				if ( *((long long*)(_t311 + 0x30)) != 0) goto 0x532a42fa;
                                                                    				E00007FFA7FFA5329CF80(_t311);
                                                                    				0x53294000();
                                                                    				if ( *((long long*)(_t311 + 0x108)) == 0) goto 0x532a4398;
                                                                    				0x53294000();
                                                                    				_t312 =  *((intOrPtr*)(_t311 + 0x108));
                                                                    				_v144 = _t312;
                                                                    				0x53294000();
                                                                    				 *((long long*)(_t312 + 0x108)) = 0;
                                                                    				if ((E00007FFA7FFA532A5BB0(_t312, _a8, _v144) & 0x000000ff) == 0) goto 0x532a4349;
                                                                    				goto 0x532a4398;
                                                                    				if ((E00007FFA7FFA532A5CC0(_v144) & 0x000000ff) == 0) goto 0x532a4393;
                                                                    				E00007FFA7FFA532A5AB0(1, _a8);
                                                                    				E00007FFA7FFA532A4870( &_v56, "bad exception");
                                                                    				E00007FFA7FFA532AD320(__edi, __esi, __esp,  &_v56, 0x532ba160);
                                                                    				goto 0x532a4398;
                                                                    				E00007FFA7FFA5329CF50(_t312);
                                                                    				if ( *_a8 != 0xe06d7363) goto 0x532a47d9;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0x532a47d9;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0x532a43f5;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0x532a43f5;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0x532a47d9;
                                                                    				if (_a40[3] <= 0) goto 0x532a466c;
                                                                    				_v216 = _a32;
                                                                    				_v224 =  &_v132;
                                                                    				_t321 =  &_v136;
                                                                    				_v232 = _t321;
                                                                    				r9d = _v168;
                                                                    				r8d = _a56;
                                                                    				E00007FFA7FFA5329EA30(_a16, _a40);
                                                                    				_v128 = _t321;
                                                                    				goto 0x532a447e;
                                                                    				_v136 = _v136 + 1;
                                                                    				_v128 = _v128 + 0x14;
                                                                    				if (_v136 - _v132 >= 0) goto 0x532a466c;
                                                                    				if ( *_v128 - _v168 > 0) goto 0x532a44b3;
                                                                    				_t325 = _v128;
                                                                    				if (_v168 -  *((intOrPtr*)(_t325 + 4)) <= 0) goto 0x532a44b5;
                                                                    				goto 0x532a445a;
                                                                    				E00007FFA7FFA5329E680( *((intOrPtr*)(_t325 + 4)), _t325);
                                                                    				_v112 = _t325 +  *((intOrPtr*)(_v128 + 0x10));
                                                                    				_v120 =  *((intOrPtr*)(_v128 + 0xc));
                                                                    				_v120 = _v120 - 1;
                                                                    				_t329 = _v112 + 0x14;
                                                                    				_v112 = _t329;
                                                                    				if (_v120 <= 0) goto 0x532a4667;
                                                                    				_t244 = E00007FFA7FFA5329E6A0(_v120 - 1, _t329);
                                                                    				_t330 = _t329 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc)) + 4;
                                                                    				_v96 = _t330;
                                                                    				E00007FFA7FFA5329E6A0(_t244, _t330);
                                                                    				_v104 =  *((intOrPtr*)(_t330 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc))));
                                                                    				goto 0x532a457e;
                                                                    				_v104 = _v104 - 1;
                                                                    				_t332 = _v96 + 4;
                                                                    				_v96 = _t332;
                                                                    				if (_v104 <= 0) goto 0x532a4662;
                                                                    				E00007FFA7FFA5329E6A0(_v104 - 1, _t332);
                                                                    				_v88 = _t332 +  *_v96;
                                                                    				if (E00007FFA7FFA532A4CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))) != 0) goto 0x532a45ce;
                                                                    				goto 0x532a455a;
                                                                    				_v152 = 1;
                                                                    				_v176 = _a48 & 0x000000ff;
                                                                    				_v184 = _v164 & 0x000000ff;
                                                                    				_v192 = _a64;
                                                                    				_v200 = _a56;
                                                                    				_v208 = _v128;
                                                                    				_v216 = _v88;
                                                                    				_v224 = _v112;
                                                                    				_v232 = _a40;
                                                                    				E00007FFA7FFA532A5180(__edi, __esi, __esp, E00007FFA7FFA532A4CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))), _a8, _a16, _a24, _a32);
                                                                    				goto 0x532a4667;
                                                                    				goto 0x532a455a;
                                                                    				goto L1;
                                                                    				goto 0x532a445a;
                                                                    				__eax = _v152 & 0x000000ff;
                                                                    				__eflags = _v152 & 0x000000ff;
                                                                    				if ((_v152 & 0x000000ff) != 0) goto 0x532a47d7;
                                                                    				__rax = _a40;
                                                                    				__eax =  *_a40;
                                                                    				__eax =  *_a40 & 0x1fffffff;
                                                                    				__eflags = __eax - 0x19930521;
                                                                    				if (__eax - 0x19930521 < 0) goto 0x532a47d7;
                                                                    				__rax = _a40;
                                                                    				__eflags =  *(__rax + 0x20);
                                                                    				if ( *(__rax + 0x20) == 0) goto 0x532a46bf;
                                                                    				__eax = E00007FFA7FFA5329E680(__eax, __rax);
                                                                    				_a40 = _a40[8];
                                                                    				_v32 = __rax;
                                                                    				goto 0x532a46cb;
                                                                    				_v32 = 0;
                                                                    				__eflags = _v32;
                                                                    				if (_v32 == 0) goto 0x532a47d7;
                                                                    				__rax = _a40;
                                                                    				__eflags =  *(__rax + 0x20);
                                                                    				if ( *(__rax + 0x20) == 0) goto 0x532a4706;
                                                                    				__eax = E00007FFA7FFA5329E680(__eax, __rax);
                                                                    				_a40 = _a40[8];
                                                                    				__rax = __rax + _a40[8];
                                                                    				_v24 = __rax;
                                                                    				goto 0x532a4712;
                                                                    				_v24 = 0;
                                                                    				__rdx = _v24;
                                                                    				__rcx = _a8;
                                                                    				E00007FFA7FFA532A5BB0(__rax, _a8, _v24) = __al & 0x000000ff;
                                                                    				__eflags = __al & 0x000000ff;
                                                                    				if ((__al & 0x000000ff) != 0) goto 0x532a47d7;
                                                                    				__rax = _a16;
                                                                    				_v64 = _a16;
                                                                    				__r9 =  &_v80;
                                                                    				__r8 = _a40;
                                                                    				__rdx = _a32;
                                                                    				__rcx = _a16;
                                                                    				__eax = E00007FFA7FFA5329E500(_a16, _a32, _a40,  &_v80);
                                                                    				_v64 = __rax;
                                                                    				_v72 = 0;
                                                                    				__eax = _a48 & 0x000000ff;
                                                                    				_v200 = __al;
                                                                    				__rax = _a32;
                                                                    				_v208 = _a32;
                                                                    				__rax = _a40;
                                                                    				_v216 = _a40;
                                                                    				_v224 = 0xffffffff;
                                                                    				_v232 = 0;
                                                                    				__r9 = _v64;
                                                                    				__r8 = _a24;
                                                                    				__rdx = _a8;
                                                                    				__rcx = _a16;
                                                                    				__eax = E00007FFA7FFA5329EDC0(__edi, __esi, __esp, _a16, _a8, _a24, _v64);
                                                                    				goto 0x532a484c;
                                                                    				__rax = _a40;
                                                                    				__eflags =  *(__rax + 0xc);
                                                                    				if ( *(__rax + 0xc) <= 0) goto 0x532a484c;
                                                                    				__eax = _a48 & 0x000000ff;
                                                                    				__eflags = _a48 & 0x000000ff;
                                                                    				if ((_a48 & 0x000000ff) != 0) goto 0x532a4847;
                                                                    				__rax = _a64;
                                                                    				_v208 = _a64;
                                                                    				__eax = _a56;
                                                                    				_v216 = _a56;
                                                                    				__eax = _v168;
                                                                    				_v224 = _v168;
                                                                    				__rax = _a40;
                                                                    				_v232 = _a40;
                                                                    				__r9 = _a32;
                                                                    				__r8 = _a24;
                                                                    				__rdx = _a16;
                                                                    				__rcx = _a8;
                                                                    				__eax = E00007FFA7FFA532A4960(__ecx, _a8, _a16, _a24, _a32);
                                                                    				goto 0x532a484c;
                                                                    				__eax = E00007FFA7FFA5329CF50(__rax);
                                                                    				0x53294000();
                                                                    				__eflags =  *((long long*)(__rax + 0x108));
                                                                    				if ( *((long long*)(__rax + 0x108)) != 0) goto 0x532a485d;
                                                                    				goto 0x532a4862;
                                                                    				return E00007FFA7FFA5329CF80(__rax);
                                                                    			}










































                                                                    0x7ffa532a40b0
                                                                    0x7ffa532a40b0
                                                                    0x7ffa532a40b5
                                                                    0x7ffa532a40ba
                                                                    0x7ffa532a40bf
                                                                    0x7ffa532a40cb
                                                                    0x7ffa532a40d0
                                                                    0x7ffa532a40ea
                                                                    0x7ffa532a410b
                                                                    0x7ffa532a4131
                                                                    0x7ffa532a4133
                                                                    0x7ffa532a414d
                                                                    0x7ffa532a4152
                                                                    0x7ffa532a416f
                                                                    0x7ffa532a4174
                                                                    0x7ffa532a4193
                                                                    0x7ffa532a419c
                                                                    0x7ffa532a41ad
                                                                    0x7ffa532a41af
                                                                    0x7ffa532a41b1
                                                                    0x7ffa532a41c4
                                                                    0x7ffa532a41d6
                                                                    0x7ffa532a41eb
                                                                    0x7ffa532a41fc
                                                                    0x7ffa532a420d
                                                                    0x7ffa532a4213
                                                                    0x7ffa532a4220
                                                                    0x7ffa532a4226
                                                                    0x7ffa532a4233
                                                                    0x7ffa532a4235
                                                                    0x7ffa532a423a
                                                                    0x7ffa532a423f
                                                                    0x7ffa532a4246
                                                                    0x7ffa532a424e
                                                                    0x7ffa532a425a
                                                                    0x7ffa532a4262
                                                                    0x7ffa532a4273
                                                                    0x7ffa532a428c
                                                                    0x7ffa532a428e
                                                                    0x7ffa532a4290
                                                                    0x7ffa532a42a3
                                                                    0x7ffa532a42b1
                                                                    0x7ffa532a42c2
                                                                    0x7ffa532a42d3
                                                                    0x7ffa532a42e4
                                                                    0x7ffa532a42e6
                                                                    0x7ffa532a42f3
                                                                    0x7ffa532a42f5
                                                                    0x7ffa532a42fa
                                                                    0x7ffa532a4307
                                                                    0x7ffa532a430d
                                                                    0x7ffa532a4312
                                                                    0x7ffa532a4319
                                                                    0x7ffa532a431e
                                                                    0x7ffa532a4323
                                                                    0x7ffa532a4345
                                                                    0x7ffa532a4347
                                                                    0x7ffa532a4358
                                                                    0x7ffa532a4364
                                                                    0x7ffa532a4378
                                                                    0x7ffa532a438c
                                                                    0x7ffa532a4391
                                                                    0x7ffa532a4393
                                                                    0x7ffa532a43a6
                                                                    0x7ffa532a43b8
                                                                    0x7ffa532a43cd
                                                                    0x7ffa532a43de
                                                                    0x7ffa532a43ef
                                                                    0x7ffa532a4401
                                                                    0x7ffa532a440f
                                                                    0x7ffa532a441c
                                                                    0x7ffa532a4421
                                                                    0x7ffa532a4429
                                                                    0x7ffa532a442e
                                                                    0x7ffa532a4433
                                                                    0x7ffa532a444b
                                                                    0x7ffa532a4450
                                                                    0x7ffa532a4458
                                                                    0x7ffa532a4463
                                                                    0x7ffa532a4476
                                                                    0x7ffa532a448c
                                                                    0x7ffa532a44a0
                                                                    0x7ffa532a44a2
                                                                    0x7ffa532a44b1
                                                                    0x7ffa532a44b3
                                                                    0x7ffa532a44b5
                                                                    0x7ffa532a44c9
                                                                    0x7ffa532a44dc
                                                                    0x7ffa532a44ee
                                                                    0x7ffa532a44fd
                                                                    0x7ffa532a4501
                                                                    0x7ffa532a4511
                                                                    0x7ffa532a4517
                                                                    0x7ffa532a452c
                                                                    0x7ffa532a4531
                                                                    0x7ffa532a4539
                                                                    0x7ffa532a4551
                                                                    0x7ffa532a4558
                                                                    0x7ffa532a4563
                                                                    0x7ffa532a4572
                                                                    0x7ffa532a4576
                                                                    0x7ffa532a4586
                                                                    0x7ffa532a458c
                                                                    0x7ffa532a459f
                                                                    0x7ffa532a45ca
                                                                    0x7ffa532a45cc
                                                                    0x7ffa532a45ce
                                                                    0x7ffa532a45db
                                                                    0x7ffa532a45e4
                                                                    0x7ffa532a45f0
                                                                    0x7ffa532a45fc
                                                                    0x7ffa532a4608
                                                                    0x7ffa532a4615
                                                                    0x7ffa532a4622
                                                                    0x7ffa532a462f
                                                                    0x7ffa532a4654
                                                                    0x7ffa532a465b
                                                                    0x7ffa532a465d
                                                                    0x7ffa532a4662
                                                                    0x7ffa532a4667
                                                                    0x7ffa532a466c
                                                                    0x7ffa532a4671
                                                                    0x7ffa532a4673
                                                                    0x7ffa532a4679
                                                                    0x7ffa532a4681
                                                                    0x7ffa532a4683
                                                                    0x7ffa532a4688
                                                                    0x7ffa532a468d
                                                                    0x7ffa532a4693
                                                                    0x7ffa532a469b
                                                                    0x7ffa532a469f
                                                                    0x7ffa532a46a1
                                                                    0x7ffa532a46ae
                                                                    0x7ffa532a46b5
                                                                    0x7ffa532a46bd
                                                                    0x7ffa532a46bf
                                                                    0x7ffa532a46cb
                                                                    0x7ffa532a46d4
                                                                    0x7ffa532a46da
                                                                    0x7ffa532a46e2
                                                                    0x7ffa532a46e6
                                                                    0x7ffa532a46e8
                                                                    0x7ffa532a46f5
                                                                    0x7ffa532a46f9
                                                                    0x7ffa532a46fc
                                                                    0x7ffa532a4704
                                                                    0x7ffa532a4706
                                                                    0x7ffa532a4712
                                                                    0x7ffa532a471a
                                                                    0x7ffa532a4727
                                                                    0x7ffa532a472a
                                                                    0x7ffa532a472c
                                                                    0x7ffa532a4732
                                                                    0x7ffa532a473a
                                                                    0x7ffa532a4742
                                                                    0x7ffa532a474a
                                                                    0x7ffa532a4752
                                                                    0x7ffa532a475a
                                                                    0x7ffa532a4762
                                                                    0x7ffa532a4767
                                                                    0x7ffa532a476f
                                                                    0x7ffa532a477b
                                                                    0x7ffa532a4783
                                                                    0x7ffa532a4787
                                                                    0x7ffa532a478f
                                                                    0x7ffa532a4794
                                                                    0x7ffa532a479c
                                                                    0x7ffa532a47a1
                                                                    0x7ffa532a47a9
                                                                    0x7ffa532a47b2
                                                                    0x7ffa532a47ba
                                                                    0x7ffa532a47c2
                                                                    0x7ffa532a47ca
                                                                    0x7ffa532a47d2
                                                                    0x7ffa532a47d7
                                                                    0x7ffa532a47d9
                                                                    0x7ffa532a47e1
                                                                    0x7ffa532a47e5
                                                                    0x7ffa532a47e7
                                                                    0x7ffa532a47ef
                                                                    0x7ffa532a47f1
                                                                    0x7ffa532a47f3
                                                                    0x7ffa532a47fb
                                                                    0x7ffa532a4800
                                                                    0x7ffa532a4807
                                                                    0x7ffa532a480b
                                                                    0x7ffa532a480f
                                                                    0x7ffa532a4813
                                                                    0x7ffa532a481b
                                                                    0x7ffa532a4820
                                                                    0x7ffa532a4828
                                                                    0x7ffa532a4830
                                                                    0x7ffa532a4838
                                                                    0x7ffa532a4840
                                                                    0x7ffa532a4845
                                                                    0x7ffa532a4847
                                                                    0x7ffa532a484c
                                                                    0x7ffa532a4851
                                                                    0x7ffa532a4859
                                                                    0x7ffa532a485b
                                                                    0x7ffa532a4869

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: BlockStateUnwind_inconsistency$ControlFromterminate$BaseDecodeEntryExceptionFunctionImageLookupPointerRaiseReadThrowValidatestd::bad_exception::bad_exceptionstd::exception::exceptiontype_info::operator==
                                                                    • String ID: bad exception$csm$csm$csm
                                                                    • API String ID: 3498492519-820278400
                                                                    • Opcode ID: 8c50efc0869d6d00d6f15bc2f3e4a8aa3cd75fee2d20c8f1ee388d100984527e
                                                                    • Instruction ID: 13a9fb26287c40ee401780afcd11334400ed213941935b7bc656475f773a743d
                                                                    • Opcode Fuzzy Hash: 8c50efc0869d6d00d6f15bc2f3e4a8aa3cd75fee2d20c8f1ee388d100984527e
                                                                    • Instruction Fuzzy Hash: 9E12D376928FC586D6709B15E0403EEB7A2FBEAB44F448136DA8D57B99CF78D490CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$_invalid_parameter$UpdateUpdate::~_
                                                                    • String ID: ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream), ( (_textmode_safe(fn) == __IOINFO_TM_ANSI) && !_tm_unicode_safe(fn))))$("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 4023976971-2293733425
                                                                    • Opcode ID: 2e8f2817575abf17236a5f031f9d249ff9066c6c73ed3770e2a1ff63e1bea630
                                                                    • Instruction ID: aa2ca69852d5acd76fc9ddaf5afd8dd12c173d39beda68da5e0ec6921526c746
                                                                    • Opcode Fuzzy Hash: 2e8f2817575abf17236a5f031f9d249ff9066c6c73ed3770e2a1ff63e1bea630
                                                                    • Instruction Fuzzy Hash: E102687292CFC28AE7308B14E4543AEB7A6FBE2344F048135D28D96A99DF7CE545CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: _mbstowcs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$s != NULL
                                                                    • API String ID: 530996419-3695252689
                                                                    • Opcode ID: fa484580cb52892c02ff67f95a17d1b2129cff6d1ab00e5c74c45926566419d1
                                                                    • Instruction ID: 2335305f2ff90879e6094677937efd2bc417d7f8b4c4becb84024bb6968e2c97
                                                                    • Opcode Fuzzy Hash: fa484580cb52892c02ff67f95a17d1b2129cff6d1ab00e5c74c45926566419d1
                                                                    • Instruction Fuzzy Hash: 15D1183252CF8582D6609B15E4503AEB7A2FBE1790F048635E69E93BE9DF7CD4848B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: "$"$("Buffer too small", 0)$_wctomb_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wctomb.c$sizeInBytes <= INT_MAX$sizeInBytes > 0
                                                                    • API String ID: 2192614184-1854130327
                                                                    • Opcode ID: 0349e1f67bcf58a9467b2163a48374e143b216b4fcd3e10d2347f4427f3577c7
                                                                    • Instruction ID: 42edf70f02b003a0ecfd8615dc32dd378fe6b9ef47760a869f73db35ca0a379a
                                                                    • Opcode Fuzzy Hash: 0349e1f67bcf58a9467b2163a48374e143b216b4fcd3e10d2347f4427f3577c7
                                                                    • Instruction Fuzzy Hash: 02C12D7292CF8286E7609B10E4543BE73A2FBE2744F448136D68D93A99CF7CE844CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-1870338870
                                                                    • Opcode ID: 677b85930a9a5e10114940793937fb41496cbdaf58dc4485b8ee00e4ca785de0
                                                                    • Instruction ID: 3cc25cc7939f3155919148b72f44e2985547fa4c3558b86de31fa54a6f94bb38
                                                                    • Opcode Fuzzy Hash: 677b85930a9a5e10114940793937fb41496cbdaf58dc4485b8ee00e4ca785de0
                                                                    • Instruction Fuzzy Hash: F1D13AB292CF828AE7708B14E4543AE76A2FBE1348F448135D68D97A99DF7CD485CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 19%
                                                                    			E00007FFA7FFA532AC6D6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                    				signed int _t223;
                                                                    				signed char _t228;
                                                                    				intOrPtr _t263;
                                                                    				signed int _t338;
                                                                    				signed int _t339;
                                                                    				signed long long _t342;
                                                                    				intOrPtr* _t365;
                                                                    				signed long long _t390;
                                                                    
                                                                    				_t338 = __rax;
                                                                    				_a80 = _a80 | 0x00000040;
                                                                    				_a72 = 0xa;
                                                                    				_a72 = 0xa;
                                                                    				_a116 = 0x10;
                                                                    				asm("bts eax, 0xf");
                                                                    				_a708 = 7;
                                                                    				_a708 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ac754;
                                                                    				_a84 = 0x30;
                                                                    				_a85 = _a708 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ac777;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0x532ac79e;
                                                                    				E00007FFA7FFA532A1EA0( &_a1112);
                                                                    				_a824 = _t338;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0x532ac7c5;
                                                                    				E00007FFA7FFA532A1EA0( &_a1112);
                                                                    				_a824 = _t338;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0x532ac810;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac7f6;
                                                                    				_t339 = E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				goto 0x532ac80e;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac834;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				goto 0x532ac84b;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac882;
                                                                    				if (_a824 >= 0) goto 0x532ac882;
                                                                    				_a832 =  ~_a824;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0x532ac892;
                                                                    				_t342 = _a824;
                                                                    				_a832 = _t342;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0x532ac8c7;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0x532ac8c7;
                                                                    				_a832 = _a832 & _t342;
                                                                    				if (_a116 >= 0) goto 0x532ac8d8;
                                                                    				_a116 = 1;
                                                                    				goto 0x532ac8f5;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0x532ac8f5;
                                                                    				_a116 = 0x200;
                                                                    				if (_a832 != 0) goto 0x532ac908;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t223 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t223 > 0) goto 0x532ac936;
                                                                    				if (_a832 == 0) goto 0x532ac9d3;
                                                                    				_a1040 = _a72;
                                                                    				_a816 = _t223 / _a1040 + 0x30;
                                                                    				_a1048 = _a72;
                                                                    				if (_a816 - 0x39 <= 0) goto 0x532ac9b2;
                                                                    				_t228 = _a816 + _a708;
                                                                    				_a816 = _t228;
                                                                    				 *_a64 = _a816 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0x532ac915;
                                                                    				_a104 = _t228;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0x532aca31;
                                                                    				if (_a104 == 0) goto 0x532aca12;
                                                                    				if ( *_a64 == 0x30) goto 0x532aca31;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0x532acc6e;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0x532aca63;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0x532aca7d;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0x532aca95;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a840 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0x532acad5;
                                                                    				E00007FFA7FFA532ACF10(0x20, _a840, _a1088,  &_a688);
                                                                    				E00007FFA7FFA532ACF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0x532acb27;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0x532acb27;
                                                                    				E00007FFA7FFA532ACF10(0x30, _a840, _a1088,  &_a688);
                                                                    				if (_a76 == 0) goto 0x532acc1d;
                                                                    				if (_a104 <= 0) goto 0x532acc1d;
                                                                    				_a872 = 0;
                                                                    				_a848 = _a64;
                                                                    				_a856 = _a104;
                                                                    				_a856 = _a856 - 1;
                                                                    				if (_a856 == 0) goto 0x532acc1b;
                                                                    				_a1056 =  *_a848 & 0x0000ffff;
                                                                    				r9d = _a1056 & 0x0000ffff;
                                                                    				r8d = 6;
                                                                    				_a872 = E00007FFA7FFA532AB530( &_a860,  &_a864, _a1088);
                                                                    				_a848 =  &(_a848[1]);
                                                                    				if (_a872 != 0) goto 0x532acbe5;
                                                                    				if (_a860 != 0) goto 0x532acbf2;
                                                                    				_a688 = 0xffffffff;
                                                                    				goto 0x532acc1b;
                                                                    				E00007FFA7FFA532ACF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                    				goto 0x532acb60;
                                                                    				goto 0x532acc3b;
                                                                    				E00007FFA7FFA532ACF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                    				if (_a688 < 0) goto 0x532acc6e;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0x532acc6e;
                                                                    				E00007FFA7FFA532ACF10(0x20, _a840, _a1088,  &_a688);
                                                                    				if (_a96 == 0) goto 0x532acc8e;
                                                                    				0x53295330();
                                                                    				_a96 = 0;
                                                                    				goto 0x532ab99c;
                                                                    				if (_a704 == 0) goto 0x532accb4;
                                                                    				if (_a704 == 7) goto 0x532accb4;
                                                                    				_a1060 = 0;
                                                                    				goto 0x532accbf;
                                                                    				_a1060 = 1;
                                                                    				_t263 = _a1060;
                                                                    				_a876 = _t263;
                                                                    				if (_a876 != 0) goto 0x532acd05;
                                                                    				_t365 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t365;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0x5329b3b0();
                                                                    				if (_t263 != 1) goto 0x532acd05;
                                                                    				asm("int3");
                                                                    				if (_a876 != 0) goto 0x532acd61;
                                                                    				0x5329ab30();
                                                                    				 *_t365 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E00007FFA7FFA5329BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a912 = 0xffffffff;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				goto 0x532acd80;
                                                                    				_a916 = _a688;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				return E00007FFA7FFA53293280(_a916, 2, 2, _a1064 ^ _t390, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}











                                                                    0x7ffa532ac6d6
                                                                    0x7ffa532ac6dd
                                                                    0x7ffa532ac6e1
                                                                    0x7ffa532ac6ee
                                                                    0x7ffa532ac6f8
                                                                    0x7ffa532ac704
                                                                    0x7ffa532ac70c
                                                                    0x7ffa532ac719
                                                                    0x7ffa532ac724
                                                                    0x7ffa532ac737
                                                                    0x7ffa532ac739
                                                                    0x7ffa532ac748
                                                                    0x7ffa532ac74c
                                                                    0x7ffa532ac756
                                                                    0x7ffa532ac769
                                                                    0x7ffa532ac76f
                                                                    0x7ffa532ac782
                                                                    0x7ffa532ac78c
                                                                    0x7ffa532ac791
                                                                    0x7ffa532ac799
                                                                    0x7ffa532ac7a9
                                                                    0x7ffa532ac7b3
                                                                    0x7ffa532ac7b8
                                                                    0x7ffa532ac7c0
                                                                    0x7ffa532ac7ce
                                                                    0x7ffa532ac7d9
                                                                    0x7ffa532ac7e8
                                                                    0x7ffa532ac7ec
                                                                    0x7ffa532ac7f4
                                                                    0x7ffa532ac7fe
                                                                    0x7ffa532ac806
                                                                    0x7ffa532ac80e
                                                                    0x7ffa532ac819
                                                                    0x7ffa532ac823
                                                                    0x7ffa532ac82a
                                                                    0x7ffa532ac832
                                                                    0x7ffa532ac83c
                                                                    0x7ffa532ac843
                                                                    0x7ffa532ac854
                                                                    0x7ffa532ac85f
                                                                    0x7ffa532ac86c
                                                                    0x7ffa532ac878
                                                                    0x7ffa532ac880
                                                                    0x7ffa532ac882
                                                                    0x7ffa532ac88a
                                                                    0x7ffa532ac89d
                                                                    0x7ffa532ac8aa
                                                                    0x7ffa532ac8bf
                                                                    0x7ffa532ac8cc
                                                                    0x7ffa532ac8ce
                                                                    0x7ffa532ac8d6
                                                                    0x7ffa532ac8df
                                                                    0x7ffa532ac8eb
                                                                    0x7ffa532ac8ed
                                                                    0x7ffa532ac8fe
                                                                    0x7ffa532ac900
                                                                    0x7ffa532ac910
                                                                    0x7ffa532ac915
                                                                    0x7ffa532ac91f
                                                                    0x7ffa532ac925
                                                                    0x7ffa532ac930
                                                                    0x7ffa532ac93b
                                                                    0x7ffa532ac95e
                                                                    0x7ffa532ac96a
                                                                    0x7ffa532ac997
                                                                    0x7ffa532ac9a9
                                                                    0x7ffa532ac9ab
                                                                    0x7ffa532ac9bf
                                                                    0x7ffa532ac9c9
                                                                    0x7ffa532ac9ce
                                                                    0x7ffa532ac9e0
                                                                    0x7ffa532ac9ec
                                                                    0x7ffa532ac9fc
                                                                    0x7ffa532aca03
                                                                    0x7ffa532aca10
                                                                    0x7ffa532aca1a
                                                                    0x7ffa532aca24
                                                                    0x7ffa532aca2d
                                                                    0x7ffa532aca36
                                                                    0x7ffa532aca45
                                                                    0x7ffa532aca52
                                                                    0x7ffa532aca54
                                                                    0x7ffa532aca59
                                                                    0x7ffa532aca61
                                                                    0x7ffa532aca6c
                                                                    0x7ffa532aca6e
                                                                    0x7ffa532aca73
                                                                    0x7ffa532aca7b
                                                                    0x7ffa532aca86
                                                                    0x7ffa532aca88
                                                                    0x7ffa532aca8d
                                                                    0x7ffa532acaa5
                                                                    0x7ffa532acab5
                                                                    0x7ffa532acad0
                                                                    0x7ffa532acaee
                                                                    0x7ffa532acafc
                                                                    0x7ffa532acb07
                                                                    0x7ffa532acb22
                                                                    0x7ffa532acb2c
                                                                    0x7ffa532acb37
                                                                    0x7ffa532acb3d
                                                                    0x7ffa532acb4d
                                                                    0x7ffa532acb59
                                                                    0x7ffa532acb70
                                                                    0x7ffa532acb79
                                                                    0x7ffa532acb8a
                                                                    0x7ffa532acb92
                                                                    0x7ffa532acb9b
                                                                    0x7ffa532acbb6
                                                                    0x7ffa532acbc9
                                                                    0x7ffa532acbd9
                                                                    0x7ffa532acbe3
                                                                    0x7ffa532acbe5
                                                                    0x7ffa532acbf0
                                                                    0x7ffa532acc11
                                                                    0x7ffa532acc16
                                                                    0x7ffa532acc1b
                                                                    0x7ffa532acc36
                                                                    0x7ffa532acc43
                                                                    0x7ffa532acc4e
                                                                    0x7ffa532acc69
                                                                    0x7ffa532acc74
                                                                    0x7ffa532acc80
                                                                    0x7ffa532acc85
                                                                    0x7ffa532acc8e
                                                                    0x7ffa532acc9b
                                                                    0x7ffa532acca5
                                                                    0x7ffa532acca7
                                                                    0x7ffa532accb2
                                                                    0x7ffa532accb4
                                                                    0x7ffa532accbf
                                                                    0x7ffa532accc6
                                                                    0x7ffa532accd5
                                                                    0x7ffa532accd7
                                                                    0x7ffa532accde
                                                                    0x7ffa532acce3
                                                                    0x7ffa532acce6
                                                                    0x7ffa532accf8
                                                                    0x7ffa532acd00
                                                                    0x7ffa532acd02
                                                                    0x7ffa532acd0d
                                                                    0x7ffa532acd0f
                                                                    0x7ffa532acd14
                                                                    0x7ffa532acd1a
                                                                    0x7ffa532acd23
                                                                    0x7ffa532acd3e
                                                                    0x7ffa532acd43
                                                                    0x7ffa532acd53
                                                                    0x7ffa532acd5f
                                                                    0x7ffa532acd68
                                                                    0x7ffa532acd74
                                                                    0x7ffa532acd97

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg$wctomb_s
                                                                    • String ID: ("Incorrect format specifier", 0)$-$9$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2984758162-268265396
                                                                    • Opcode ID: 61945b808d8ddeeab049de188114ad7d55d89a3558f0f9168201042d10a77149
                                                                    • Instruction ID: 1f335551d73d6999376a7ab50caefee19de9397a5c40bce4fe917898cf485e15
                                                                    • Opcode Fuzzy Hash: 61945b808d8ddeeab049de188114ad7d55d89a3558f0f9168201042d10a77149
                                                                    • Instruction Fuzzy Hash: FF02E27261CFC28BE7718B14E4813AEB7A5F7D6750F084125E68DD6A99DBBCE540CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: "$(pwcs == NULL && sizeInWords == 0) || (pwcs != NULL && sizeInWords > 0)$P$_mbstowcs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$retsize <= sizeInWords
                                                                    • API String ID: 2192614184-660564692
                                                                    • Opcode ID: 51ea2d8a29ec6a42f4206cddb2a15a761283d0351a467ffd0ee92275139e1829
                                                                    • Instruction ID: 6301d891751a4623c49a8f8e9caa78d0c3dcf1fa971ccd4253cc2c1475a23c40
                                                                    • Opcode Fuzzy Hash: 51ea2d8a29ec6a42f4206cddb2a15a761283d0351a467ffd0ee92275139e1829
                                                                    • Instruction Fuzzy Hash: FFE11B3292CFC686E6709B14E4443AEA3A1FBE6754F44C635D69DA2AD8DF7CD484CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 57%
                                                                    			E00007FFA7FFA532A55F0(void* __ecx, long long __rcx, long long __rdx, signed int* __r8, signed int* __r9, long long _a8, void* _a16, signed int* _a24, signed int* _a32) {
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				long long _v56;
                                                                    				void* _v64;
                                                                    				long long _v72;
                                                                    				void* _t88;
                                                                    				void* _t89;
                                                                    				void* _t107;
                                                                    				void* _t109;
                                                                    				signed int* _t158;
                                                                    				signed int* _t160;
                                                                    				long long _t175;
                                                                    				long long _t186;
                                                                    				signed int* _t187;
                                                                    				signed int* _t193;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_v72 = 0;
                                                                    				_t158 = _a24;
                                                                    				if ( *((intOrPtr*)(_t158 + 4)) == 0) goto 0x532a5639;
                                                                    				_t89 = E00007FFA7FFA5329E680(_t88, _t158);
                                                                    				_v56 = _t158 + _a24[1];
                                                                    				goto 0x532a5642;
                                                                    				_v56 = 0;
                                                                    				if (_v56 == 0) goto 0x532a56aa;
                                                                    				_t160 = _a24;
                                                                    				if ( *((intOrPtr*)(_t160 + 4)) == 0) goto 0x532a5673;
                                                                    				E00007FFA7FFA5329E680(_t89, _t160);
                                                                    				_v48 = _t160 + _a24[1];
                                                                    				goto 0x532a567c;
                                                                    				_v48 = 0;
                                                                    				if ( *((char*)(_v48 + 0x10)) == 0) goto 0x532a56aa;
                                                                    				if (_a24[2] != 0) goto 0x532a56b1;
                                                                    				if (( *_a24 & 0x80000000) != 0) goto 0x532a56b1;
                                                                    				goto 0x532a5966;
                                                                    				if (( *_a24 & 0x80000000) == 0) goto 0x532a56d0;
                                                                    				_v64 = _a16;
                                                                    				goto 0x532a56e9;
                                                                    				_v64 = _a24[2] +  *_a16;
                                                                    				if (( *_a24 & 0x00000008) == 0) goto 0x532a5765;
                                                                    				if (E00007FFA7FFA532AD2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0x532a575b;
                                                                    				if (E00007FFA7FFA532AD2C0(1, _v64) == 0) goto 0x532a575b;
                                                                    				 *_v64 =  *((intOrPtr*)(_a8 + 0x28));
                                                                    				_t175 = _v64;
                                                                    				E00007FFA7FFA532A5B30(_t100,  *_t175,  &(_a32[2]));
                                                                    				 *_v64 = _t175;
                                                                    				goto 0x532a5760;
                                                                    				E00007FFA7FFA5329CF80(_t175);
                                                                    				goto 0x532a595a;
                                                                    				if (( *_a32 & 0x00000001) == 0) goto 0x532a5813;
                                                                    				if (E00007FFA7FFA532AD2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0x532a5809;
                                                                    				if (E00007FFA7FFA532AD2C0(1, _v64) == 0) goto 0x532a5809;
                                                                    				_t107 = E00007FFA7FFA5329C410(__ecx, E00007FFA7FFA532AD2C0(1, _v64), _v64,  *((intOrPtr*)(_a8 + 0x28)), _a32[5]);
                                                                    				if (_a32[5] != 8) goto 0x532a5807;
                                                                    				if ( *_v64 == 0) goto 0x532a5807;
                                                                    				_t186 = _v64;
                                                                    				E00007FFA7FFA532A5B30(_t107,  *_t186,  &(_a32[2]));
                                                                    				 *_v64 = _t186;
                                                                    				goto 0x532a580e;
                                                                    				_t109 = E00007FFA7FFA5329CF80(_t186);
                                                                    				goto 0x532a595a;
                                                                    				_t187 = _a32;
                                                                    				if ( *((intOrPtr*)(_t187 + 0x18)) == 0) goto 0x532a583c;
                                                                    				E00007FFA7FFA5329E6A0(_t109, _t187);
                                                                    				_v40 = _t187 + _a32[6];
                                                                    				goto 0x532a5845;
                                                                    				_v40 = 0;
                                                                    				if (_v40 != 0) goto 0x532a58c6;
                                                                    				if (E00007FFA7FFA532AD2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0x532a58bc;
                                                                    				if (E00007FFA7FFA532AD2C0(1, _v64) == 0) goto 0x532a58bc;
                                                                    				_t191 = _a32[5];
                                                                    				_v32 = _a32[5];
                                                                    				E00007FFA7FFA532A5B30(_t112,  *((intOrPtr*)(_a8 + 0x28)),  &(_a32[2]));
                                                                    				E00007FFA7FFA5329C410(__ecx, E00007FFA7FFA532AD2C0(1, _v64), _v64, _a32[5], _v32);
                                                                    				goto 0x532a58c1;
                                                                    				E00007FFA7FFA5329CF80(_t191);
                                                                    				goto 0x532a595a;
                                                                    				if (E00007FFA7FFA532AD2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0x532a5955;
                                                                    				if (E00007FFA7FFA532AD2C0(1, _v64) == 0) goto 0x532a5955;
                                                                    				_t193 = _a32;
                                                                    				if ( *((intOrPtr*)(_t193 + 0x18)) == 0) goto 0x532a5919;
                                                                    				E00007FFA7FFA5329E6A0(_t117, _t193);
                                                                    				_v24 = _t193 + _a32[6];
                                                                    				goto 0x532a5922;
                                                                    				_v24 = 0;
                                                                    				if (E00007FFA7FFA532AD2F0(_v24) == 0) goto 0x532a5955;
                                                                    				_t195 = _a32;
                                                                    				if (( *_a32 & 0x00000004) == 0) goto 0x532a594b;
                                                                    				_v72 = 2;
                                                                    				goto 0x532a5953;
                                                                    				_v72 = 1;
                                                                    				goto 0x532a595a;
                                                                    				E00007FFA7FFA5329CF80(_a32);
                                                                    				E00007FFA7FFA5329CF50(_t195);
                                                                    				return _v72;
                                                                    			}




















                                                                    0x7ffa532a55f0
                                                                    0x7ffa532a55f5
                                                                    0x7ffa532a55fa
                                                                    0x7ffa532a55ff
                                                                    0x7ffa532a5608
                                                                    0x7ffa532a5610
                                                                    0x7ffa532a561c
                                                                    0x7ffa532a561e
                                                                    0x7ffa532a5632
                                                                    0x7ffa532a5637
                                                                    0x7ffa532a5639
                                                                    0x7ffa532a5648
                                                                    0x7ffa532a564a
                                                                    0x7ffa532a5656
                                                                    0x7ffa532a5658
                                                                    0x7ffa532a566c
                                                                    0x7ffa532a5671
                                                                    0x7ffa532a5673
                                                                    0x7ffa532a5687
                                                                    0x7ffa532a5695
                                                                    0x7ffa532a56a8
                                                                    0x7ffa532a56ac
                                                                    0x7ffa532a56c2
                                                                    0x7ffa532a56c9
                                                                    0x7ffa532a56ce
                                                                    0x7ffa532a56e4
                                                                    0x7ffa532a56f8
                                                                    0x7ffa532a570f
                                                                    0x7ffa532a5722
                                                                    0x7ffa532a5732
                                                                    0x7ffa532a5744
                                                                    0x7ffa532a574c
                                                                    0x7ffa532a5756
                                                                    0x7ffa532a5759
                                                                    0x7ffa532a575b
                                                                    0x7ffa532a5760
                                                                    0x7ffa532a5774
                                                                    0x7ffa532a578f
                                                                    0x7ffa532a57a2
                                                                    0x7ffa532a57c1
                                                                    0x7ffa532a57d6
                                                                    0x7ffa532a57e1
                                                                    0x7ffa532a57f2
                                                                    0x7ffa532a57fa
                                                                    0x7ffa532a5804
                                                                    0x7ffa532a5807
                                                                    0x7ffa532a5809
                                                                    0x7ffa532a580e
                                                                    0x7ffa532a5813
                                                                    0x7ffa532a581f
                                                                    0x7ffa532a5821
                                                                    0x7ffa532a5835
                                                                    0x7ffa532a583a
                                                                    0x7ffa532a583c
                                                                    0x7ffa532a584b
                                                                    0x7ffa532a5862
                                                                    0x7ffa532a5875
                                                                    0x7ffa532a587f
                                                                    0x7ffa532a5883
                                                                    0x7ffa532a58a0
                                                                    0x7ffa532a58b5
                                                                    0x7ffa532a58ba
                                                                    0x7ffa532a58bc
                                                                    0x7ffa532a58c1
                                                                    0x7ffa532a58db
                                                                    0x7ffa532a58ee
                                                                    0x7ffa532a58f0
                                                                    0x7ffa532a58fc
                                                                    0x7ffa532a58fe
                                                                    0x7ffa532a5912
                                                                    0x7ffa532a5917
                                                                    0x7ffa532a5919
                                                                    0x7ffa532a592e
                                                                    0x7ffa532a5930
                                                                    0x7ffa532a593f
                                                                    0x7ffa532a5941
                                                                    0x7ffa532a5949
                                                                    0x7ffa532a594b
                                                                    0x7ffa532a5953
                                                                    0x7ffa532a5955
                                                                    0x7ffa532a595c
                                                                    0x7ffa532a596a

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Validate$Read$Pointer_inconsistency$Adjust$DecodeExecuteterminate
                                                                    • String ID:
                                                                    • API String ID: 801082872-0
                                                                    • Opcode ID: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                                    • Instruction ID: 1a87532cbf6d9e2c33a82d352428f669cf6451ea3fb69c151b177f74e8ce8d9c
                                                                    • Opcode Fuzzy Hash: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                                    • Instruction Fuzzy Hash: BAA1303262CF4682EA608B15E45036F67A1FBD5B94F688035DACD977A9DF7CD481CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtow_s
                                                                    • API String ID: 2123368286-1993839260
                                                                    • Opcode ID: 758167781a4fb66a58f740ebc537b1c9f8383254a932b9fe6e590f504f1f2882
                                                                    • Instruction ID: f81b329de60273217ab08b93b6f8e63b69afcc077a36aaec50dd2689a23413bc
                                                                    • Opcode Fuzzy Hash: 758167781a4fb66a58f740ebc537b1c9f8383254a932b9fe6e590f504f1f2882
                                                                    • Instruction Fuzzy Hash: F6E13972A2CF858AE7608B14E45436EB7A2FBE6744F048135E68D93B98DFBDD444CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtoa_s
                                                                    • API String ID: 2123368286-1853640030
                                                                    • Opcode ID: 820d6638ce8c2bc49aeb15d9bb45941f698caf6262644320b28b67af79be84a6
                                                                    • Instruction ID: 7693b3f3375b44fb9df60f31252dce96c3b109e283c067579a8aa659d3e17aea
                                                                    • Opcode Fuzzy Hash: 820d6638ce8c2bc49aeb15d9bb45941f698caf6262644320b28b67af79be84a6
                                                                    • Instruction Fuzzy Hash: DBE1377292CF858AE7608B58E45036EB7A2FBE6744F048035E68D93B98DFBDD444CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 22%
                                                                    			E00007FFA7FFA532AE6C6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                                    				signed int _t224;
                                                                    				signed char _t229;
                                                                    				void* _t260;
                                                                    				intOrPtr _t268;
                                                                    				signed int _t342;
                                                                    				signed int _t343;
                                                                    				signed long long _t346;
                                                                    				intOrPtr* _t365;
                                                                    				intOrPtr* _t370;
                                                                    				signed long long _t400;
                                                                    
                                                                    				_t342 = __rax;
                                                                    				_a80 = _a80 | 0x00000040;
                                                                    				_a72 = 0xa;
                                                                    				_a72 = 0xa;
                                                                    				_a116 = 0x10;
                                                                    				asm("bts eax, 0xf");
                                                                    				_a1220 = 7;
                                                                    				_a1220 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ae74d;
                                                                    				_a84 = 0x30;
                                                                    				_a86 = _a1220 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ae770;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0x532ae797;
                                                                    				E00007FFA7FFA532A1EA0( &_a1560);
                                                                    				_a1304 = _t342;
                                                                    				goto 0x532ae844;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0x532ae7be;
                                                                    				E00007FFA7FFA532A1EA0( &_a1560);
                                                                    				_a1304 = _t342;
                                                                    				goto 0x532ae844;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0x532ae809;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ae7ef;
                                                                    				_t343 = E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				goto 0x532ae807;
                                                                    				E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				goto 0x532ae844;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ae82d;
                                                                    				E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				goto 0x532ae844;
                                                                    				E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ae87b;
                                                                    				if (_a1304 >= 0) goto 0x532ae87b;
                                                                    				_a1312 =  ~_a1304;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0x532ae88b;
                                                                    				_t346 = _a1304;
                                                                    				_a1312 = _t346;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0x532ae8c0;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0x532ae8c0;
                                                                    				_a1312 = _a1312 & _t346;
                                                                    				if (_a116 >= 0) goto 0x532ae8d1;
                                                                    				_a116 = 1;
                                                                    				goto 0x532ae8ee;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0x532ae8ee;
                                                                    				_a116 = 0x200;
                                                                    				if (_a1312 != 0) goto 0x532ae901;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t224 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t224 > 0) goto 0x532ae92f;
                                                                    				if (_a1312 == 0) goto 0x532ae9cc;
                                                                    				_a1480 = _a72;
                                                                    				_a1296 = _t224 / _a1480 + 0x30;
                                                                    				_a1488 = _a72;
                                                                    				if (_a1296 - 0x39 <= 0) goto 0x532ae9ab;
                                                                    				_t229 = _a1296 + _a1220;
                                                                    				_a1296 = _t229;
                                                                    				 *_a64 = _a1296 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0x532ae90e;
                                                                    				_a104 = _t229;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0x532aea2a;
                                                                    				if (_a104 == 0) goto 0x532aea0b;
                                                                    				if ( *_a64 == 0x30) goto 0x532aea2a;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0x532aec7c;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532aea9d;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0x532aea61;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aea9d;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0x532aea80;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aea9d;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0x532aea9d;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a1320 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0x532aeadf;
                                                                    				E00007FFA7FFA532AEEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				E00007FFA7FFA532AEF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0x532aeb33;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0x532aeb33;
                                                                    				E00007FFA7FFA532AEEC0(0x30, _a1320, _a1536,  &_a1200);
                                                                    				if (_a76 != 0) goto 0x532aec29;
                                                                    				if (_a104 <= 0) goto 0x532aec29;
                                                                    				_t365 = _a64;
                                                                    				_a1328 = _t365;
                                                                    				_a1336 = _a104;
                                                                    				_a1336 = _a1336 - 1;
                                                                    				if (_a1336 <= 0) goto 0x532aec27;
                                                                    				_t260 = E00007FFA7FFA53296840(_a1336,  &_a120);
                                                                    				_a1496 = _t365;
                                                                    				E00007FFA7FFA53296840(_t260,  &_a120);
                                                                    				_a1340 = E00007FFA7FFA532AF000( &_a1212, _a1328,  *((intOrPtr*)( *_t365 + 0x10c)), _a1496);
                                                                    				if (_a1340 > 0) goto 0x532aebe7;
                                                                    				_a1200 = 0xffffffff;
                                                                    				goto 0x532aec27;
                                                                    				E00007FFA7FFA532AEE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                                    				_a1328 = _a1328 + _a1340;
                                                                    				goto 0x532aeb61;
                                                                    				goto 0x532aec47;
                                                                    				E00007FFA7FFA532AEF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                                    				if (_a1200 < 0) goto 0x532aec7c;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0x532aec7c;
                                                                    				E00007FFA7FFA532AEEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				if (_a96 == 0) goto 0x532aec9c;
                                                                    				0x53295330();
                                                                    				_a96 = 0;
                                                                    				goto 0x532ada75;
                                                                    				if (_a1216 == 0) goto 0x532aecc2;
                                                                    				if (_a1216 == 7) goto 0x532aecc2;
                                                                    				_a1504 = 0;
                                                                    				goto 0x532aeccd;
                                                                    				_a1504 = 1;
                                                                    				_t268 = _a1504;
                                                                    				_a1344 = _t268;
                                                                    				if (_a1344 != 0) goto 0x532aed13;
                                                                    				_t370 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t370;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0x5329b3b0();
                                                                    				if (_t268 != 1) goto 0x532aed13;
                                                                    				asm("int3");
                                                                    				if (_a1344 != 0) goto 0x532aed6f;
                                                                    				0x5329ab30();
                                                                    				 *_t370 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E00007FFA7FFA5329BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a1376 = 0xffffffff;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				goto 0x532aed8e;
                                                                    				_a1380 = _a1200;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				return E00007FFA7FFA53293280(_a1380, 2, 2, _a1512 ^ _t400, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}













                                                                    0x7ffa532ae6c6
                                                                    0x7ffa532ae6cd
                                                                    0x7ffa532ae6d1
                                                                    0x7ffa532ae6de
                                                                    0x7ffa532ae6eb
                                                                    0x7ffa532ae6f7
                                                                    0x7ffa532ae6ff
                                                                    0x7ffa532ae70c
                                                                    0x7ffa532ae717
                                                                    0x7ffa532ae72a
                                                                    0x7ffa532ae731
                                                                    0x7ffa532ae740
                                                                    0x7ffa532ae745
                                                                    0x7ffa532ae74f
                                                                    0x7ffa532ae762
                                                                    0x7ffa532ae768
                                                                    0x7ffa532ae77b
                                                                    0x7ffa532ae785
                                                                    0x7ffa532ae78a
                                                                    0x7ffa532ae792
                                                                    0x7ffa532ae7a2
                                                                    0x7ffa532ae7ac
                                                                    0x7ffa532ae7b1
                                                                    0x7ffa532ae7b9
                                                                    0x7ffa532ae7c7
                                                                    0x7ffa532ae7d2
                                                                    0x7ffa532ae7e1
                                                                    0x7ffa532ae7e5
                                                                    0x7ffa532ae7ed
                                                                    0x7ffa532ae7f7
                                                                    0x7ffa532ae7ff
                                                                    0x7ffa532ae807
                                                                    0x7ffa532ae812
                                                                    0x7ffa532ae81c
                                                                    0x7ffa532ae823
                                                                    0x7ffa532ae82b
                                                                    0x7ffa532ae835
                                                                    0x7ffa532ae83c
                                                                    0x7ffa532ae84d
                                                                    0x7ffa532ae858
                                                                    0x7ffa532ae865
                                                                    0x7ffa532ae871
                                                                    0x7ffa532ae879
                                                                    0x7ffa532ae87b
                                                                    0x7ffa532ae883
                                                                    0x7ffa532ae896
                                                                    0x7ffa532ae8a3
                                                                    0x7ffa532ae8b8
                                                                    0x7ffa532ae8c5
                                                                    0x7ffa532ae8c7
                                                                    0x7ffa532ae8cf
                                                                    0x7ffa532ae8d8
                                                                    0x7ffa532ae8e4
                                                                    0x7ffa532ae8e6
                                                                    0x7ffa532ae8f7
                                                                    0x7ffa532ae8f9
                                                                    0x7ffa532ae909
                                                                    0x7ffa532ae90e
                                                                    0x7ffa532ae918
                                                                    0x7ffa532ae91e
                                                                    0x7ffa532ae929
                                                                    0x7ffa532ae934
                                                                    0x7ffa532ae957
                                                                    0x7ffa532ae963
                                                                    0x7ffa532ae990
                                                                    0x7ffa532ae9a2
                                                                    0x7ffa532ae9a4
                                                                    0x7ffa532ae9b8
                                                                    0x7ffa532ae9c2
                                                                    0x7ffa532ae9c7
                                                                    0x7ffa532ae9d9
                                                                    0x7ffa532ae9e5
                                                                    0x7ffa532ae9f5
                                                                    0x7ffa532ae9fc
                                                                    0x7ffa532aea09
                                                                    0x7ffa532aea13
                                                                    0x7ffa532aea1d
                                                                    0x7ffa532aea26
                                                                    0x7ffa532aea2f
                                                                    0x7ffa532aea3e
                                                                    0x7ffa532aea4b
                                                                    0x7ffa532aea52
                                                                    0x7ffa532aea57
                                                                    0x7ffa532aea5f
                                                                    0x7ffa532aea6a
                                                                    0x7ffa532aea71
                                                                    0x7ffa532aea76
                                                                    0x7ffa532aea7e
                                                                    0x7ffa532aea89
                                                                    0x7ffa532aea90
                                                                    0x7ffa532aea95
                                                                    0x7ffa532aeaad
                                                                    0x7ffa532aeabd
                                                                    0x7ffa532aeada
                                                                    0x7ffa532aeaf8
                                                                    0x7ffa532aeb06
                                                                    0x7ffa532aeb11
                                                                    0x7ffa532aeb2e
                                                                    0x7ffa532aeb38
                                                                    0x7ffa532aeb43
                                                                    0x7ffa532aeb49
                                                                    0x7ffa532aeb4e
                                                                    0x7ffa532aeb5a
                                                                    0x7ffa532aeb71
                                                                    0x7ffa532aeb7a
                                                                    0x7ffa532aeb85
                                                                    0x7ffa532aeb8a
                                                                    0x7ffa532aeb97
                                                                    0x7ffa532aebc9
                                                                    0x7ffa532aebd8
                                                                    0x7ffa532aebda
                                                                    0x7ffa532aebe5
                                                                    0x7ffa532aebff
                                                                    0x7ffa532aec1a
                                                                    0x7ffa532aec22
                                                                    0x7ffa532aec27
                                                                    0x7ffa532aec42
                                                                    0x7ffa532aec4f
                                                                    0x7ffa532aec5a
                                                                    0x7ffa532aec77
                                                                    0x7ffa532aec82
                                                                    0x7ffa532aec8e
                                                                    0x7ffa532aec93
                                                                    0x7ffa532aec9c
                                                                    0x7ffa532aeca9
                                                                    0x7ffa532aecb3
                                                                    0x7ffa532aecb5
                                                                    0x7ffa532aecc0
                                                                    0x7ffa532aecc2
                                                                    0x7ffa532aeccd
                                                                    0x7ffa532aecd4
                                                                    0x7ffa532aece3
                                                                    0x7ffa532aece5
                                                                    0x7ffa532aecec
                                                                    0x7ffa532aecf1
                                                                    0x7ffa532aecf4
                                                                    0x7ffa532aed06
                                                                    0x7ffa532aed0e
                                                                    0x7ffa532aed10
                                                                    0x7ffa532aed1b
                                                                    0x7ffa532aed1d
                                                                    0x7ffa532aed22
                                                                    0x7ffa532aed28
                                                                    0x7ffa532aed31
                                                                    0x7ffa532aed4c
                                                                    0x7ffa532aed51
                                                                    0x7ffa532aed61
                                                                    0x7ffa532aed6d
                                                                    0x7ffa532aed76
                                                                    0x7ffa532aed82
                                                                    0x7ffa532aeda5

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$9$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1967237116-1983305044
                                                                    • Opcode ID: 39c1530eb87c93b5c15807e3225054cbc2f74160d6d1f03a50421518d7a029c2
                                                                    • Instruction ID: 290614f778c8a40090d46ad761343c1917d45e335120283626e743f86683105b
                                                                    • Opcode Fuzzy Hash: 39c1530eb87c93b5c15807e3225054cbc2f74160d6d1f03a50421518d7a029c2
                                                                    • Instruction Fuzzy Hash: BAF1F57251CFC28AE7608B15E8413AFB3A2EBD6351F444135E68D97A99EBBCE441CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$wcscat_s
                                                                    • API String ID: 2123368286-3477667311
                                                                    • Opcode ID: 5284e54803fa5a35f276e18858076b29593f150ab8ed8022a36a7ce25e0bf2f4
                                                                    • Instruction ID: 73fbb4253b1618d9097e4dd80e32eb01318a08dacbf492ad816937e044226546
                                                                    • Opcode Fuzzy Hash: 5284e54803fa5a35f276e18858076b29593f150ab8ed8022a36a7ce25e0bf2f4
                                                                    • Instruction Fuzzy Hash: 59F16D32A2CF8686EB608B55E45036E63A2FBE6790F148135D69E93BD4DF7CD484CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$strcat_s
                                                                    • API String ID: 2123368286-1420200500
                                                                    • Opcode ID: cc07cef64c5b8afb013f442fd59d1430f3c77c8b5aa073aebe04f881c7874d42
                                                                    • Instruction ID: 36adbd7ebd8f0ec1e1e4d7a4276f0f8528d3fd74305a0238e2aa937084ae0d61
                                                                    • Opcode Fuzzy Hash: cc07cef64c5b8afb013f442fd59d1430f3c77c8b5aa073aebe04f881c7874d42
                                                                    • Instruction Fuzzy Hash: 86F15E32A2CF8686EB608B14E45436EA3A2EBE6750F14C535D69EA3BD4DF7CD0448B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_argwctomb_s
                                                                    • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2560055391-3497434347
                                                                    • Opcode ID: 667eef7f1f49c1d82be4abe5f7b2b6c0360aabec3e49fa9d9e3a648fddbc0f41
                                                                    • Instruction ID: e2ce33472f296f5f5ae306c85de983cf7090e584ccb6161c1992fb9d05db1e8a
                                                                    • Opcode Fuzzy Hash: 667eef7f1f49c1d82be4abe5f7b2b6c0360aabec3e49fa9d9e3a648fddbc0f41
                                                                    • Instruction Fuzzy Hash: 22C1277292CFC287E7718B14E4543AEB7A6EBE5744F488035D68C96A99DFBCE540CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno$_invalid_parameter
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_lseeki64$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                                    • API String ID: 747159061-1442092225
                                                                    • Opcode ID: 14faf06f4b776b3818928093306a4898f737286e5044e20a730c767404cf7ae4
                                                                    • Instruction ID: 3fef536d41c2f7decfd3ace4033238abc71f45b2f074b238ab21ba11e2b80e03
                                                                    • Opcode Fuzzy Hash: 14faf06f4b776b3818928093306a4898f737286e5044e20a730c767404cf7ae4
                                                                    • Instruction Fuzzy Hash: 3B617C72928F4A8AE7109B15E45136E72A2FBE2760F548335E26D576D9DF7CE440CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _exit_invoke_watson_if_error_invoke_watson_if_oneof
                                                                    • String ID: Module: $(*_errno())$...$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")
                                                                    • API String ID: 1778837556-2487400587
                                                                    • Opcode ID: 1725f90675b356b8c96096f206fe05692ea700145f07fa5ff60a00d667238266
                                                                    • Instruction ID: 008a3347206c5964f32b849c6e8cd9629542582fdf65e9b91e6cb5a845bfd3b9
                                                                    • Opcode Fuzzy Hash: 1725f90675b356b8c96096f206fe05692ea700145f07fa5ff60a00d667238266
                                                                    • Instruction Fuzzy Hash: 1B51E6B6518F8191E734CB44E4903EEB3A2FBE9784F448135EA8E52A69DF3CD194CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameterwctomb_s
                                                                    • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 83251219-3442986447
                                                                    • Opcode ID: a7736ae2d77719cf8dd033ea8b01e94f48993e2d03ef0b45187a851eb092d1a4
                                                                    • Instruction ID: 2fe4d1b17aa4030875434f3b745144113669a6d2af9ce516c6410713924c0953
                                                                    • Opcode Fuzzy Hash: a7736ae2d77719cf8dd033ea8b01e94f48993e2d03ef0b45187a851eb092d1a4
                                                                    • Instruction Fuzzy Hash: 7EF1137291CFC28BE7708B15E4903AEB7A6E7D6740F088126E68D96A99DF7CD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(filedes) & FOPEN)$(filedes >= 0 && (unsigned)filedes < (unsigned)_nhandle)$_commit$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\commit.c
                                                                    • API String ID: 2123368286-2816485415
                                                                    • Opcode ID: a09a08489fcfa17bf46b80f7bccdd7250e5da7b82fa925d7c8e71ba256914943
                                                                    • Instruction ID: 454ee828459542dd269f6b6fc8b50a207df010ea180da1f92dde93d747953960
                                                                    • Opcode Fuzzy Hash: a09a08489fcfa17bf46b80f7bccdd7250e5da7b82fa925d7c8e71ba256914943
                                                                    • Instruction Fuzzy Hash: BB618B72A38F86C6E7519B20E46072E7263FBE2754F08C235E65E66AD5DF7CE4408B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno$_invalid_parameter
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\close.c
                                                                    • API String ID: 747159061-2992490823
                                                                    • Opcode ID: 31e6f22f94a5a332f8c1da309800fd96aa675ce4ff76475566f44e9374f3c210
                                                                    • Instruction ID: 5f0bc3131f145161337cea103fb87e3a0b8cc93766595d8d97cc65b62264ffcc
                                                                    • Opcode Fuzzy Hash: 31e6f22f94a5a332f8c1da309800fd96aa675ce4ff76475566f44e9374f3c210
                                                                    • Instruction Fuzzy Hash: 20517C72A38F468AE7119B24E4A036E7263FBE2354F48C235E25E676D5DF3CE4408B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _calloc_dbg$InfoStartup_calloc_dbg_impl
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                                    • API String ID: 1930727954-3864165772
                                                                    • Opcode ID: 617d55474ac06f65b7cd4356313d68e2bb61afc46366722552cd75840edfa0c5
                                                                    • Instruction ID: aa817c06590d43a1a7f29849ed6ba404748111d2fa4c027a615feed3b5c42142
                                                                    • Opcode Fuzzy Hash: 617d55474ac06f65b7cd4356313d68e2bb61afc46366722552cd75840edfa0c5
                                                                    • Instruction Fuzzy Hash: C0F12662619FC5C9E7708B19E44076EB7A1FBD6B60F188225CAAE977E4CE3CD441CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_arg
                                                                    • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1328470723-1899493600
                                                                    • Opcode ID: 66637f3263954389c4faca3e64166f48d89120a2e65f09c6e12548c2e7ae54a3
                                                                    • Instruction ID: 44d187a0907e8daf363e8895c150e17e82ee95873fffdb41d39085141ae52c7b
                                                                    • Opcode Fuzzy Hash: 66637f3263954389c4faca3e64166f48d89120a2e65f09c6e12548c2e7ae54a3
                                                                    • Instruction Fuzzy Hash: C3C1067292CF8286E7609B14E4503AEB3A2FBE5355F448135D68D97A99DFBCE441CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocaMarkStringmalloc
                                                                    • String ID:
                                                                    • API String ID: 2352934578-0
                                                                    • Opcode ID: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                                    • Instruction ID: e8120a71f30c738aa507f91be2bcdf0569ad373b1f4933f097269818d4b3039c
                                                                    • Opcode Fuzzy Hash: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                                    • Instruction Fuzzy Hash: D6B1367291CF818AE7A08B14E04436EB7A2F7DA755F148235E68E63B98DB7CD4848F50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcsncpy_s.inl$wcsncpy_s
                                                                    • API String ID: 2123368286-322314505
                                                                    • Opcode ID: 399a9458fa01abea37a4ed0ff3a6319967a0ea4a6e471ce5995f41885ca75c61
                                                                    • Instruction ID: 4ed53580304d3783048557a414e5ef754956fe4a9cf5a22ed892de77491413c3
                                                                    • Opcode Fuzzy Hash: 399a9458fa01abea37a4ed0ff3a6319967a0ea4a6e471ce5995f41885ca75c61
                                                                    • Instruction Fuzzy Hash: C9025E32A2CF8686EBB09B54E45036E63A1FBE6794F148535D79E92BD4DF7CD0848B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1139040907-3988320827
                                                                    • Opcode ID: 2dc7b4f9e3ef16c46f4c156222616883407f9e483511c99d0d30e534b880734d
                                                                    • Instruction ID: 4adeddb93bebed439fade82e8433f5a8ee5a5fa1a68e7ab2fd17da1d0d3f6d8e
                                                                    • Opcode Fuzzy Hash: 2dc7b4f9e3ef16c46f4c156222616883407f9e483511c99d0d30e534b880734d
                                                                    • Instruction Fuzzy Hash: E8F1F47291CF818AE7608B15E8503AEB7A2FBD6745F144036E68D97A99DF7CD441CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$wcscpy_s
                                                                    • API String ID: 2123368286-3300880850
                                                                    • Opcode ID: 5aefbc8f1d73eb7cfc6612018eacf67af3b13798598c0c57764cabda027a92b3
                                                                    • Instruction ID: 8707562d37b7269f616100a795a76c62c34231f564a0c142992f0398e6afc850
                                                                    • Opcode Fuzzy Hash: 5aefbc8f1d73eb7cfc6612018eacf67af3b13798598c0c57764cabda027a92b3
                                                                    • Instruction Fuzzy Hash: 63C17031A2CF8686EB608B15E45037E63A1FBD67A4F588135D69E93B95DF7CE084CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$strcpy_s
                                                                    • API String ID: 2123368286-3045918802
                                                                    • Opcode ID: 3a73121abd8cd92c4d24009a6c05b63160c008938b58f8c852a28b4bc1f5a78a
                                                                    • Instruction ID: 6eea8ecbf1a7527c0e1023cc6678aba59d261bae3c457f71e1112db6a474ba63
                                                                    • Opcode Fuzzy Hash: 3a73121abd8cd92c4d24009a6c05b63160c008938b58f8c852a28b4bc1f5a78a
                                                                    • Instruction Fuzzy Hash: 09C19F72A2CF8685EB608B24E4543BE63A1FBE6394F548135D69E53BA5DF3CD084DB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 15%
                                                                    			E00007FFA7FFA532AF000(long long __rcx, signed char* __rdx, long long __r8, long long __r9, long long _a8, signed char* _a16, long long _a24, long long _a32) {
                                                                    				intOrPtr _v24;
                                                                    				long long _v32;
                                                                    				intOrPtr _v36;
                                                                    				intOrPtr _v40;
                                                                    				intOrPtr _v44;
                                                                    				intOrPtr _v48;
                                                                    				intOrPtr _v52;
                                                                    				intOrPtr _v56;
                                                                    				char _v88;
                                                                    				intOrPtr _v96;
                                                                    				long long _v104;
                                                                    				void* _t80;
                                                                    				void* _t81;
                                                                    				void* _t89;
                                                                    				void* _t92;
                                                                    				intOrPtr _t102;
                                                                    				intOrPtr* _t136;
                                                                    				intOrPtr* _t137;
                                                                    				intOrPtr* _t139;
                                                                    				signed char* _t141;
                                                                    				intOrPtr* _t142;
                                                                    				intOrPtr* _t143;
                                                                    				intOrPtr* _t144;
                                                                    				intOrPtr* _t148;
                                                                    				intOrPtr* _t149;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				if (_a16 == 0) goto 0x532af031;
                                                                    				if (_a24 != 0) goto 0x532af038;
                                                                    				goto 0x532af31a;
                                                                    				_t136 = _a16;
                                                                    				if ( *_t136 != 0) goto 0x532af066;
                                                                    				if (_a8 == 0) goto 0x532af05f;
                                                                    				 *_a8 = 0;
                                                                    				goto 0x532af31a;
                                                                    				0x532966b0();
                                                                    				_t80 = E00007FFA7FFA53296840(0,  &_v88);
                                                                    				_t137 =  *_t136;
                                                                    				if ( *((intOrPtr*)(_t137 + 0x10c)) == 1) goto 0x532af0d2;
                                                                    				_t81 = E00007FFA7FFA53296840(_t80,  &_v88);
                                                                    				if ( *((intOrPtr*)( *_t137 + 0x10c)) == 2) goto 0x532af0d2;
                                                                    				_t139 = L"_loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2";
                                                                    				_v104 = _t139;
                                                                    				r9d = 0;
                                                                    				r8d = 0x47;
                                                                    				0x5329b3b0();
                                                                    				if (_t81 != 1) goto 0x532af0d2;
                                                                    				asm("int3");
                                                                    				E00007FFA7FFA53296840(0,  &_v88);
                                                                    				if ( *((intOrPtr*)( *_t139 + 0x14)) != 0) goto 0x532af121;
                                                                    				if (_a8 == 0) goto 0x532af106;
                                                                    				_t141 = _a16;
                                                                    				 *_a8 =  *_t141 & 0x000000ff;
                                                                    				_v56 = 1;
                                                                    				E00007FFA7FFA53296800( &_v88);
                                                                    				goto 0x532af31a;
                                                                    				E00007FFA7FFA53296840(_v56,  &_v88);
                                                                    				if (E00007FFA7FFA532A2B90( *_a16 & 0x000000ff, _t141, _t141) == 0) goto 0x532af276;
                                                                    				_t89 = E00007FFA7FFA53296840(_t88,  &_v88);
                                                                    				_t142 =  *_t141;
                                                                    				if ( *((intOrPtr*)(_t142 + 0x10c)) - 1 <= 0) goto 0x532af1f3;
                                                                    				E00007FFA7FFA53296840(_t89,  &_v88);
                                                                    				_t143 =  *_t142;
                                                                    				if (_a24 -  *((intOrPtr*)(_t143 + 0x10c)) < 0) goto 0x532af1f3;
                                                                    				if (_a8 == 0) goto 0x532af191;
                                                                    				_v36 = 1;
                                                                    				goto 0x532af199;
                                                                    				_v36 = 0;
                                                                    				_t92 = E00007FFA7FFA53296840( *((intOrPtr*)(_t143 + 0x10c)),  &_v88);
                                                                    				_t144 =  *_t143;
                                                                    				_v32 = _t144;
                                                                    				E00007FFA7FFA53296840(_t92,  &_v88);
                                                                    				_v96 = _v36;
                                                                    				_v104 = _a8;
                                                                    				r9d =  *((intOrPtr*)(_v32 + 0x10c));
                                                                    				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0x532af247;
                                                                    				E00007FFA7FFA53296840(_t94,  &_v88);
                                                                    				if (_a24 -  *((intOrPtr*)( *((intOrPtr*)( *_t144)) + 0x10c)) < 0) goto 0x532af221;
                                                                    				_t148 = _a16;
                                                                    				if ( *((char*)(_t148 + 1)) != 0) goto 0x532af247;
                                                                    				0x5329ab30();
                                                                    				 *_t148 = 0x2a;
                                                                    				_v52 = 0xffffffff;
                                                                    				E00007FFA7FFA53296800( &_v88);
                                                                    				goto 0x532af31a;
                                                                    				E00007FFA7FFA53296840(_v52,  &_v88);
                                                                    				_t149 =  *_t148;
                                                                    				_v48 =  *((intOrPtr*)(_t149 + 0x10c));
                                                                    				E00007FFA7FFA53296800( &_v88);
                                                                    				_t102 = _v48;
                                                                    				goto 0x532af310;
                                                                    				if (_a8 == 0) goto 0x532af28b;
                                                                    				_v24 = 1;
                                                                    				goto 0x532af293;
                                                                    				_v24 = 0;
                                                                    				E00007FFA7FFA53296840(_t102,  &_v88);
                                                                    				_v96 = _v24;
                                                                    				_v104 = _a8;
                                                                    				r9d = 1;
                                                                    				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0x532af2f8;
                                                                    				0x5329ab30();
                                                                    				 *((intOrPtr*)( *_t149)) = 0x2a;
                                                                    				_v44 = 0xffffffff;
                                                                    				E00007FFA7FFA53296800( &_v88);
                                                                    				goto 0x532af31a;
                                                                    				_v40 = 1;
                                                                    				E00007FFA7FFA53296800( &_v88);
                                                                    				goto 0x532af31a;
                                                                    				return E00007FFA7FFA53296800( &_v88);
                                                                    			}




























                                                                    0x7ffa532af000
                                                                    0x7ffa532af005
                                                                    0x7ffa532af00a
                                                                    0x7ffa532af00f
                                                                    0x7ffa532af024
                                                                    0x7ffa532af02f
                                                                    0x7ffa532af033
                                                                    0x7ffa532af038
                                                                    0x7ffa532af045
                                                                    0x7ffa532af050
                                                                    0x7ffa532af05c
                                                                    0x7ffa532af061
                                                                    0x7ffa532af073
                                                                    0x7ffa532af07d
                                                                    0x7ffa532af082
                                                                    0x7ffa532af08c
                                                                    0x7ffa532af093
                                                                    0x7ffa532af0a2
                                                                    0x7ffa532af0a4
                                                                    0x7ffa532af0ab
                                                                    0x7ffa532af0b0
                                                                    0x7ffa532af0b3
                                                                    0x7ffa532af0c5
                                                                    0x7ffa532af0cd
                                                                    0x7ffa532af0cf
                                                                    0x7ffa532af0d7
                                                                    0x7ffa532af0e3
                                                                    0x7ffa532af0ee
                                                                    0x7ffa532af0f0
                                                                    0x7ffa532af103
                                                                    0x7ffa532af106
                                                                    0x7ffa532af113
                                                                    0x7ffa532af11c
                                                                    0x7ffa532af126
                                                                    0x7ffa532af140
                                                                    0x7ffa532af14b
                                                                    0x7ffa532af150
                                                                    0x7ffa532af15a
                                                                    0x7ffa532af165
                                                                    0x7ffa532af16a
                                                                    0x7ffa532af17a
                                                                    0x7ffa532af185
                                                                    0x7ffa532af187
                                                                    0x7ffa532af18f
                                                                    0x7ffa532af191
                                                                    0x7ffa532af19e
                                                                    0x7ffa532af1a3
                                                                    0x7ffa532af1a6
                                                                    0x7ffa532af1b0
                                                                    0x7ffa532af1bc
                                                                    0x7ffa532af1c8
                                                                    0x7ffa532af1d2
                                                                    0x7ffa532af1f1
                                                                    0x7ffa532af1f8
                                                                    0x7ffa532af20f
                                                                    0x7ffa532af211
                                                                    0x7ffa532af21f
                                                                    0x7ffa532af221
                                                                    0x7ffa532af226
                                                                    0x7ffa532af22c
                                                                    0x7ffa532af239
                                                                    0x7ffa532af242
                                                                    0x7ffa532af24c
                                                                    0x7ffa532af251
                                                                    0x7ffa532af25a
                                                                    0x7ffa532af263
                                                                    0x7ffa532af268
                                                                    0x7ffa532af271
                                                                    0x7ffa532af27f
                                                                    0x7ffa532af281
                                                                    0x7ffa532af289
                                                                    0x7ffa532af28b
                                                                    0x7ffa532af298
                                                                    0x7ffa532af2a4
                                                                    0x7ffa532af2b0
                                                                    0x7ffa532af2b5
                                                                    0x7ffa532af2d3
                                                                    0x7ffa532af2d5
                                                                    0x7ffa532af2da
                                                                    0x7ffa532af2e0
                                                                    0x7ffa532af2ed
                                                                    0x7ffa532af2f6
                                                                    0x7ffa532af2f8
                                                                    0x7ffa532af305
                                                                    0x7ffa532af30e
                                                                    0x7ffa532af321

                                                                    APIs
                                                                    Strings
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c, xrefs: 00007FFA532AF0B9
                                                                    • _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2, xrefs: 00007FFA532AF0A4
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWide
                                                                    • String ID: _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c
                                                                    • API String ID: 3162172745-1617866167
                                                                    • Opcode ID: c1274c363911339d648a95bedd1909bdcc319eff7e23c8a9712c300a8ba53b59
                                                                    • Instruction ID: e9e928cebeeecadb5c1bcd0d6668ef76b70dac1a47fda9128166dda8387fc90f
                                                                    • Opcode Fuzzy Hash: c1274c363911339d648a95bedd1909bdcc319eff7e23c8a9712c300a8ba53b59
                                                                    • Instruction Fuzzy Hash: FD91F732A2CF8196E7609B10E4503AEB7A2FBE2B54F44C135E68E93A95DF7CD444CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invoke_watson_if_oneof_swprintf_p
                                                                    • String ID: $ Data: <%s> %s$%.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 792801276-1329727594
                                                                    • Opcode ID: 607a4edc1d8635394f44f6361f5afd02e99ede9dffc913f916da5ff8546dd257
                                                                    • Instruction ID: 826b51ab1b28e5f796809903418523d2323021b3bde92bb9f2e87644f6488b47
                                                                    • Opcode Fuzzy Hash: 607a4edc1d8635394f44f6361f5afd02e99ede9dffc913f916da5ff8546dd257
                                                                    • Instruction Fuzzy Hash: C0614A7262DFC186E7349B10E4507AE77A2FBE6740F488136D68E57B89DE3CD4448B50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno$_invalid_parameter
                                                                    • String ID: (_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_get_osfhandle$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\osfinfo.c
                                                                    • API String ID: 747159061-3177431134
                                                                    • Opcode ID: 733470a45f5ff35a9cc2dbc2e65958217baa720b2ccc02f46ae502d5c05be40f
                                                                    • Instruction ID: 63efdde11f6c1b93415b9367a7cc485af6b0b62cb3b04c105a118932c5083467
                                                                    • Opcode Fuzzy Hash: 733470a45f5ff35a9cc2dbc2e65958217baa720b2ccc02f46ae502d5c05be40f
                                                                    • Instruction Fuzzy Hash: D651AE72A2CF4696E7109B14E89036DB3A2FBE2760F44D231E16E676D5CFBCD4408B10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocH_enabledSize_invalid_parameter_is_
                                                                    • String ID: _expand_base$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\expand.c$pBlock != NULL
                                                                    • API String ID: 1608253119-1427866139
                                                                    • Opcode ID: 6d96cea77955d8bb906b6453695997b0a193914bba0a0a822ab5dc7dadfec49f
                                                                    • Instruction ID: d02a8e3bf941ad9db2b2c07cb0c933dd43452e7c9eda73d9265e113dfaebd6bc
                                                                    • Opcode Fuzzy Hash: 6d96cea77955d8bb906b6453695997b0a193914bba0a0a822ab5dc7dadfec49f
                                                                    • Instruction Fuzzy Hash: BA41647292CF4682E7109B10E46436E77A2FBE6790F548535EA4E936D8DF3DE484CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsnwprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c$format != NULL$string != NULL && sizeInWords > 0
                                                                    • API String ID: 2123368286-2958264153
                                                                    • Opcode ID: 54e27a84bf50c775cab06d8b5edff0f5a952963ad436725320079f8e266d75c3
                                                                    • Instruction ID: 173ca0f3ab111a38ff953d577335d0c15a448a13f269f40b0e454ec546e466a8
                                                                    • Opcode Fuzzy Hash: 54e27a84bf50c775cab06d8b5edff0f5a952963ad436725320079f8e266d75c3
                                                                    • Instruction Fuzzy Hash: E9E16C7292CF868AE6708B24E44036EB6A2FBE6754F148235E69D93BD5DF7CD444CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1967237116-569934968
                                                                    • Opcode ID: cc230896d9a9b78453caf74913fa4f6c5025a346ba52c0faae240e43dd1109e8
                                                                    • Instruction ID: ae78879c4b5344387d23c5445dc243a4df7ae8c2b435490cddfcf10afbd0a64c
                                                                    • Opcode Fuzzy Hash: cc230896d9a9b78453caf74913fa4f6c5025a346ba52c0faae240e43dd1109e8
                                                                    • Instruction Fuzzy Hash: 24D1F47251CFC68BE6718B14E4903AEB7A5E7D6740F088136E68D96A99DFBCE540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 100%
                                                                    			E00007FFA7FFA532ABFDE(char _a696, char _a976) {
                                                                    
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0x532aca31;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7ffa532abfe6
                                                                    0x7ffa532abff7
                                                                    0x7ffa532ac006
                                                                    0x7ffa532ac02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: wctomb_s
                                                                    • String ID: $("Incorrect format specifier", 0)$7$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2215178078-1895985292
                                                                    • Opcode ID: 328cc2888182d49a31844c3056f2ccb27a85ea43ad5a4f85c1908e4795749c83
                                                                    • Instruction ID: 676f2300c7d1c0ac97a3766abc418e3d5fff4f0f685c648bddd15cf3f219159a
                                                                    • Opcode Fuzzy Hash: 328cc2888182d49a31844c3056f2ccb27a85ea43ad5a4f85c1908e4795749c83
                                                                    • Instruction Fuzzy Hash: 78B1257251CFC28BE771CB14E4943AEB7A6E7D5744F088026E68C96A99DBBCE540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL$string != NULL && sizeInBytes > 0
                                                                    • API String ID: 2123368286-348877268
                                                                    • Opcode ID: b6bbebb1f4d85d28a6809bfbee2de0be140824b02a8ca1d2541b9b7cfc6d5eb8
                                                                    • Instruction ID: a06e5fae781cc6ef2406f406751062a8ea58374ea7621974e64b53317aec6177
                                                                    • Opcode Fuzzy Hash: b6bbebb1f4d85d28a6809bfbee2de0be140824b02a8ca1d2541b9b7cfc6d5eb8
                                                                    • Instruction Fuzzy Hash: 8E914D7292CF4686E7608B14E45436E77A1FBE6354F148235E69DA3AE8DFBCD4848F00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$(ch != _T('\0'))$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-4087627024
                                                                    • Opcode ID: 957d201a7f975e21043e4e8cb8b7cb2b2c46c9e35bbf440868bf758d6fc38531
                                                                    • Instruction ID: 22f61b615dbb0a45ee1a32b9b1f905c942f95678d07c744da362cb03e72afd3e
                                                                    • Opcode Fuzzy Hash: 957d201a7f975e21043e4e8cb8b7cb2b2c46c9e35bbf440868bf758d6fc38531
                                                                    • Instruction Fuzzy Hash: 9671616292CFC286E7719B10E4543BE77A6EBE6344F488135D68D92A99DF7CD140CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: dst != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\memcpy_s.c$memcpy_s$sizeInBytes >= count$src != NULL
                                                                    • API String ID: 2123368286-3692278645
                                                                    • Opcode ID: 401d9823d412221fb6395ed79c47aff3affb5440d9467cb4f29d8a138cee4ba4
                                                                    • Instruction ID: df4e1e7fe642bbc787b0f14c4d6f78eaf36dad67d60c85b0545160d71a14d7c8
                                                                    • Opcode Fuzzy Hash: 401d9823d412221fb6395ed79c47aff3affb5440d9467cb4f29d8a138cee4ba4
                                                                    • Instruction Fuzzy Hash: 2B516F7292CF4286F7209B11E45476E77A2FBE2794F948035E68D53A98CFBDE484CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _free_base_malloc_base
                                                                    • String ID:
                                                                    • API String ID: 3824334587-0
                                                                    • Opcode ID: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                                    • Instruction ID: 0bfd06e1c8eded700899bbf0abf92f8c2d236232f87f869eebab1d23e7c08a63
                                                                    • Opcode Fuzzy Hash: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                                    • Instruction Fuzzy Hash: 3E313EA293CF4285E6249B60E45433EA3A3FBE6794F088535E58FA66D5CF7CD4C08B10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: Bad memory block found at 0x%p.$Bad memory block found at 0x%p.Memory allocated at %hs(%d).$_CrtMemCheckpoint$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$state != NULL
                                                                    • API String ID: 2123368286-817335350
                                                                    • Opcode ID: 79c801832210f02bb2549a70f13a14fc678dbb47873921c6f453ebac8324fa6a
                                                                    • Instruction ID: 11441ece00d6ad32d4d89025a4c422211ce71ff7015bcb63b9de37d9ed7edbc7
                                                                    • Opcode Fuzzy Hash: 79c801832210f02bb2549a70f13a14fc678dbb47873921c6f453ebac8324fa6a
                                                                    • Instruction Fuzzy Hash: 35611F76928F41C6EB248B59E49132D77A1F7D6794F248135EB8E93B64CF3DD4418B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 100%
                                                                    			E00007FFA7FFA5329CFF0(intOrPtr _a8) {
                                                                    				intOrPtr _v24;
                                                                    				long long _v48;
                                                                    				long long _v64;
                                                                    				intOrPtr _t21;
                                                                    
                                                                    				_a8 = _t21;
                                                                    				_v48 = 0;
                                                                    				_v64 = 0;
                                                                    				_v24 = _a8;
                                                                    				_v24 = _v24 - 2;
                                                                    				if (_v24 - 0x14 > 0) goto 0x5329d13e;
                                                                    				goto __rax;
                                                                    			}







                                                                    0x7ffa5329cff0
                                                                    0x7ffa5329cff8
                                                                    0x7ffa5329d000
                                                                    0x7ffa5329d010
                                                                    0x7ffa5329d01b
                                                                    0x7ffa5329d024
                                                                    0x7ffa5329d048

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Invalid signal or error", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\winsig.c$raise
                                                                    • API String ID: 2123368286-2245755083
                                                                    • Opcode ID: ea92073534654960e4773f731c7ed7de4444a26fa1832afe31598046f11c2526
                                                                    • Instruction ID: 1f1368e82cd7404f4fe4c7e93b07bae6114fb3e3455a39192bb73ed2114fffb8
                                                                    • Opcode Fuzzy Hash: ea92073534654960e4773f731c7ed7de4444a26fa1832afe31598046f11c2526
                                                                    • Instruction Fuzzy Hash: 0671FA72928F818AE7608B14E45437EB7A2FBE6755F548039E68E57A94CF3CE484DF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: HeapPointerValid
                                                                    • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$L7$LX
                                                                    • API String ID: 299318057-1988567080
                                                                    • Opcode ID: daa921bd4a8f87b13c34e3fb9a704e2154bbea7e848b38387929040681ee6967
                                                                    • Instruction ID: e8f03f1c64904f1a2e88e4d29d5fac52fee7b7cb6624301aa012522691599425
                                                                    • Opcode Fuzzy Hash: daa921bd4a8f87b13c34e3fb9a704e2154bbea7e848b38387929040681ee6967
                                                                    • Instruction Fuzzy Hash: 24317672738F4285E7649B15E45123D6792FBD6780F588039E64E937A8DF2CD484CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer$_realloc_dbg
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\onexit.c$}
                                                                    • API String ID: 429494535-1858280179
                                                                    • Opcode ID: c2a3dc5e3c5b3ef6ce05fce9891920db6be9e05d2791cfb21aba20a8a533fa4f
                                                                    • Instruction ID: 49c97d08dbcabbf97b25cf4f05756cc6e35b753bb99dff02c97df4a004f73643
                                                                    • Opcode Fuzzy Hash: c2a3dc5e3c5b3ef6ce05fce9891920db6be9e05d2791cfb21aba20a8a533fa4f
                                                                    • Instruction Fuzzy Hash: CF41F232A2DF8586DA40CB09F49032EB7A1FBDA794F105435EA8E43B28DF7DD0948B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$Decode$_initterm$EncodeExitProcess__crt
                                                                    • String ID:
                                                                    • API String ID: 3799933513-0
                                                                    • Opcode ID: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                    • Instruction ID: 6e951437117a499edd768ec1e325e6b6a15270a74068818ac28bde8277764c10
                                                                    • Opcode Fuzzy Hash: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                    • Instruction Fuzzy Hash: 88514F7292DF4682E7509B18F45032E77A6FBE6744F189535EA8E927A5DF3CD084CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1967237116-734865713
                                                                    • Opcode ID: 3c24d1ab21f2eaa164015dd35ad3ad4baa8f1e206880d9711f96d4d726ca0df5
                                                                    • Instruction ID: 89a60703db89b0ee8362a9712d36b3f97933333d27e5172663f0c55c7a3baaf0
                                                                    • Opcode Fuzzy Hash: 3c24d1ab21f2eaa164015dd35ad3ad4baa8f1e206880d9711f96d4d726ca0df5
                                                                    • Instruction Fuzzy Hash: E7D1E57291CF828AE7708B15E4503AEB7A2FBD5754F044136E68D93A99DBBCE441CF04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 100%
                                                                    			E00007FFA7FFA532ADF8D(signed short _a1208, signed int _a1412) {
                                                                    
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ("Incorrect format specifier", 0)$7$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 0-1585035072
                                                                    • Opcode ID: 3ac2e27d66d95a25dfb2edd2f0848946df9d4bfe2e481795af5e1dbd4b0ec7bb
                                                                    • Instruction ID: d3f4c9674ecaaf5d3cf79162423000298f47a6eb1917423db3baaff3d46cc18c
                                                                    • Opcode Fuzzy Hash: 3ac2e27d66d95a25dfb2edd2f0848946df9d4bfe2e481795af5e1dbd4b0ec7bb
                                                                    • Instruction Fuzzy Hash: 52B1E47251CFC28AE7608B54E4513AFB7A2FBD5355F048026EA8D97A99DBBCE441CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (count == 0) || (string != NULL)$(format != NULL)$_vswprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c
                                                                    • API String ID: 2123368286-1876092940
                                                                    • Opcode ID: 5533e41279f98ba4d4f5350db4eab6cd9eaa803fb231b9fee7a87e58e20f6e26
                                                                    • Instruction ID: 922af221e8254062c34b8374b83e00eb499364ddd4fc98a58771a373a247dfb9
                                                                    • Opcode Fuzzy Hash: 5533e41279f98ba4d4f5350db4eab6cd9eaa803fb231b9fee7a87e58e20f6e26
                                                                    • Instruction Fuzzy Hash: A1914B32528F85CAE7608B15E44036EBBA1F7D5794F148535EA9E93BA8DF7CD484CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 84%
                                                                    			E00007FFA7FFA532ADDE0(signed int _a80, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544) {
                                                                    
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0x532ade66;
                                                                    				if (_a1408 == 0x68) goto 0x532adf6f;
                                                                    				if (_a1408 == 0x6c) goto 0x532ade24;
                                                                    				if (_a1408 == 0x77) goto 0x532adf7c;
                                                                    				goto 0x532adf88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0x532ade56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532ade61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0x532adeb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0x532adeb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0x532adefb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0x532adefb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0x532adf5d;
                                                                    				goto 0x532adf6d;
                                                                    				_a1216 = 0;
                                                                    				goto E00007FFA7FFA532ADC41;
                                                                    				goto 0x532adf88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7ffa532adde8
                                                                    0x7ffa532addf7
                                                                    0x7ffa532ade01
                                                                    0x7ffa532ade0f
                                                                    0x7ffa532ade19
                                                                    0x7ffa532ade1f
                                                                    0x7ffa532ade32
                                                                    0x7ffa532ade40
                                                                    0x7ffa532ade4c
                                                                    0x7ffa532ade54
                                                                    0x7ffa532ade5d
                                                                    0x7ffa532ade61
                                                                    0x7ffa532ade6a
                                                                    0x7ffa532ade80
                                                                    0x7ffa532ade91
                                                                    0x7ffa532ade9f
                                                                    0x7ffa532adeab
                                                                    0x7ffa532adeb3
                                                                    0x7ffa532adec6
                                                                    0x7ffa532aded7
                                                                    0x7ffa532adee5
                                                                    0x7ffa532adef1
                                                                    0x7ffa532adef9
                                                                    0x7ffa532adf09
                                                                    0x7ffa532adf19
                                                                    0x7ffa532adf29
                                                                    0x7ffa532adf39
                                                                    0x7ffa532adf49
                                                                    0x7ffa532adf59
                                                                    0x7ffa532adf5b
                                                                    0x7ffa532adf5d
                                                                    0x7ffa532adf68
                                                                    0x7ffa532adf6d
                                                                    0x7ffa532adf76
                                                                    0x7ffa532adf7a
                                                                    0x7ffa532adf80
                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                                    • API String ID: 530996419-4206863317
                                                                    • Opcode ID: 7c5d23002966610aaf37fd2e87aab718b594dfcb558d5e32631a425086473698
                                                                    • Instruction ID: 68501aa1d46a09a8487a0a3f8df7df387faf1bad32df9c20fe05ef651eb5d158
                                                                    • Opcode Fuzzy Hash: 7c5d23002966610aaf37fd2e87aab718b594dfcb558d5e32631a425086473698
                                                                    • Instruction Fuzzy Hash: 62912B6291CFC18AE7B08B15E45037EB3A2F7E2751F448036E68DD7A94DBACD851DB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 84%
                                                                    			E00007FFA7FFA532ABE32(signed int _a80, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096) {
                                                                    
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0x532abeb7;
                                                                    				if (_a972 == 0x68) goto 0x532abfc0;
                                                                    				if (_a972 == 0x6c) goto 0x532abe76;
                                                                    				if (_a972 == 0x77) goto 0x532abfcd;
                                                                    				goto 0x532abfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0x532abea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532abeb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0x532abf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0x532abf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0x532abf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0x532abf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x69) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x75) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x78) goto 0x532abfac;
                                                                    				if ( *_a1096 != 0x58) goto 0x532abfae;
                                                                    				goto 0x532abfbe;
                                                                    				_a704 = 0;
                                                                    				goto E00007FFA7FFA532ABB66;
                                                                    				goto 0x532abfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0x532aca31;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7ffa532abe3a
                                                                    0x7ffa532abe49
                                                                    0x7ffa532abe53
                                                                    0x7ffa532abe61
                                                                    0x7ffa532abe6b
                                                                    0x7ffa532abe71
                                                                    0x7ffa532abe84
                                                                    0x7ffa532abe91
                                                                    0x7ffa532abe9d
                                                                    0x7ffa532abea5
                                                                    0x7ffa532abeae
                                                                    0x7ffa532abeb2
                                                                    0x7ffa532abebb
                                                                    0x7ffa532abed1
                                                                    0x7ffa532abee2
                                                                    0x7ffa532abef0
                                                                    0x7ffa532abefc
                                                                    0x7ffa532abf04
                                                                    0x7ffa532abf17
                                                                    0x7ffa532abf28
                                                                    0x7ffa532abf36
                                                                    0x7ffa532abf42
                                                                    0x7ffa532abf4a
                                                                    0x7ffa532abf5a
                                                                    0x7ffa532abf6a
                                                                    0x7ffa532abf7a
                                                                    0x7ffa532abf8a
                                                                    0x7ffa532abf9a
                                                                    0x7ffa532abfaa
                                                                    0x7ffa532abfac
                                                                    0x7ffa532abfae
                                                                    0x7ffa532abfb9
                                                                    0x7ffa532abfbe
                                                                    0x7ffa532abfc7
                                                                    0x7ffa532abfcb
                                                                    0x7ffa532abfd1
                                                                    0x7ffa532abfe6
                                                                    0x7ffa532abff7
                                                                    0x7ffa532ac006
                                                                    0x7ffa532ac02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                                    • API String ID: 530996419-3826063230
                                                                    • Opcode ID: ca0a1c3a4d76a0406b352d4f9ca239403a79a6076d76e868b137271f3bc4e837
                                                                    • Instruction ID: a7bab9af3c8633cc1e572b4b6b70f527b868cbd8216e1c487a218a53be1696c8
                                                                    • Opcode Fuzzy Hash: ca0a1c3a4d76a0406b352d4f9ca239403a79a6076d76e868b137271f3bc4e837
                                                                    • Instruction Fuzzy Hash: D3914C6291CFC28BE7718B54A09037EBBA6E7D2301F488036E68DD7A59CBACD540CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E00007FFA7FFA532ADCA8(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t171;
                                                                    				char* _t191;
                                                                    				char* _t192;
                                                                    
                                                                    				_a1404 = _a1208 & 0x0000ffff;
                                                                    				if (_a1404 == 0x20) goto 0x532add05;
                                                                    				if (_a1404 == 0x23) goto 0x532add12;
                                                                    				if (_a1404 == 0x2b) goto 0x532adcf8;
                                                                    				if (_a1404 == 0x2d) goto 0x532adceb;
                                                                    				if (_a1404 == 0x30) goto 0x532add20;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0x532add2b;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532add6c;
                                                                    				_t191 =  &_a1560;
                                                                    				_a88 = E00007FFA7FFA532A1E40(_t191);
                                                                    				if (_a88 >= 0) goto 0x532add6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0x532add83;
                                                                    				_a88 = _t171 + _t191 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532addc4;
                                                                    				_t192 =  &_a1560;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t192);
                                                                    				if (_a116 >= 0) goto 0x532addc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532adddb;
                                                                    				_a116 = _t171 + _t192 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0x532ade66;
                                                                    				if (_a1408 == 0x68) goto 0x532adf6f;
                                                                    				if (_a1408 == 0x6c) goto 0x532ade24;
                                                                    				if (_a1408 == 0x77) goto 0x532adf7c;
                                                                    				goto 0x532adf88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0x532ade56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532ade61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0x532adeb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0x532adeb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0x532adefb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0x532adefb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0x532adf5d;
                                                                    				goto 0x532adf6d;
                                                                    				_a1216 = 0;
                                                                    				goto E00007FFA7FFA532ADC41;
                                                                    				goto 0x532adf88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7ffa532adcb0
                                                                    0x7ffa532adcbf
                                                                    0x7ffa532adcc9
                                                                    0x7ffa532adcd3
                                                                    0x7ffa532adcdd
                                                                    0x7ffa532adce7
                                                                    0x7ffa532adce9
                                                                    0x7ffa532adcf2
                                                                    0x7ffa532adcf6
                                                                    0x7ffa532adcff
                                                                    0x7ffa532add03
                                                                    0x7ffa532add0c
                                                                    0x7ffa532add10
                                                                    0x7ffa532add16
                                                                    0x7ffa532add1e
                                                                    0x7ffa532add27
                                                                    0x7ffa532add3b
                                                                    0x7ffa532add3d
                                                                    0x7ffa532add4a
                                                                    0x7ffa532add53
                                                                    0x7ffa532add5c
                                                                    0x7ffa532add66
                                                                    0x7ffa532add6a
                                                                    0x7ffa532add7f
                                                                    0x7ffa532add88
                                                                    0x7ffa532adda0
                                                                    0x7ffa532adda2
                                                                    0x7ffa532addaf
                                                                    0x7ffa532addb8
                                                                    0x7ffa532addba
                                                                    0x7ffa532addc2
                                                                    0x7ffa532addd7
                                                                    0x7ffa532adde8
                                                                    0x7ffa532addf7
                                                                    0x7ffa532ade01
                                                                    0x7ffa532ade0f
                                                                    0x7ffa532ade19
                                                                    0x7ffa532ade1f
                                                                    0x7ffa532ade32
                                                                    0x7ffa532ade40
                                                                    0x7ffa532ade4c
                                                                    0x7ffa532ade54
                                                                    0x7ffa532ade5d
                                                                    0x7ffa532ade61
                                                                    0x7ffa532ade6a
                                                                    0x7ffa532ade80
                                                                    0x7ffa532ade91
                                                                    0x7ffa532ade9f
                                                                    0x7ffa532adeab
                                                                    0x7ffa532adeb3
                                                                    0x7ffa532adec6
                                                                    0x7ffa532aded7
                                                                    0x7ffa532adee5
                                                                    0x7ffa532adef1
                                                                    0x7ffa532adef9
                                                                    0x7ffa532adf09
                                                                    0x7ffa532adf19
                                                                    0x7ffa532adf29
                                                                    0x7ffa532adf39
                                                                    0x7ffa532adf49
                                                                    0x7ffa532adf59
                                                                    0x7ffa532adf5b
                                                                    0x7ffa532adf5d
                                                                    0x7ffa532adf68
                                                                    0x7ffa532adf6d
                                                                    0x7ffa532adf76
                                                                    0x7ffa532adf7a
                                                                    0x7ffa532adf80
                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$0$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 530996419-1247675978
                                                                    • Opcode ID: f21bac4cf66fd83060826b10cda673f64da0b58cdc9b26c9e440e84a16dbb144
                                                                    • Instruction ID: c7cecd862cce3f32600ff31a2da27961334580b16b3b2b7996fea58c5d5b5b8b
                                                                    • Opcode Fuzzy Hash: f21bac4cf66fd83060826b10cda673f64da0b58cdc9b26c9e440e84a16dbb144
                                                                    • Instruction Fuzzy Hash: B35109B292CEC28AE7708B14A4543BEB6A2FBD6345F448135D68E96998DBACD440DF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E00007FFA7FFA532ABCFA(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t171;
                                                                    				char* _t191;
                                                                    				char* _t192;
                                                                    
                                                                    				_a968 = _a696 & 0x000000ff;
                                                                    				if (_a968 == 0x20) goto 0x532abd57;
                                                                    				if (_a968 == 0x23) goto 0x532abd64;
                                                                    				if (_a968 == 0x2b) goto 0x532abd4a;
                                                                    				if (_a968 == 0x2d) goto 0x532abd3d;
                                                                    				if (_a968 == 0x30) goto 0x532abd72;
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0x532abd7d;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if (_a696 != 0x2a) goto 0x532abdbe;
                                                                    				_t191 =  &_a1112;
                                                                    				_a88 = E00007FFA7FFA532A1E40(_t191);
                                                                    				if (_a88 >= 0) goto 0x532abdbc;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0x532abdd5;
                                                                    				_a88 = _t171 + _t191 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0x532abe16;
                                                                    				_t192 =  &_a1112;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t192);
                                                                    				if (_a116 >= 0) goto 0x532abe14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532abe2d;
                                                                    				_a116 = _t171 + _t192 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0x532abeb7;
                                                                    				if (_a972 == 0x68) goto 0x532abfc0;
                                                                    				if (_a972 == 0x6c) goto 0x532abe76;
                                                                    				if (_a972 == 0x77) goto 0x532abfcd;
                                                                    				goto 0x532abfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0x532abea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532abeb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0x532abf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0x532abf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0x532abf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0x532abf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x69) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x75) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x78) goto 0x532abfac;
                                                                    				if ( *_a1096 != 0x58) goto 0x532abfae;
                                                                    				goto 0x532abfbe;
                                                                    				_a704 = 0;
                                                                    				goto E00007FFA7FFA532ABB66;
                                                                    				goto 0x532abfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0x532aca31;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7ffa532abd02
                                                                    0x7ffa532abd11
                                                                    0x7ffa532abd1b
                                                                    0x7ffa532abd25
                                                                    0x7ffa532abd2f
                                                                    0x7ffa532abd39
                                                                    0x7ffa532abd3b
                                                                    0x7ffa532abd44
                                                                    0x7ffa532abd48
                                                                    0x7ffa532abd51
                                                                    0x7ffa532abd55
                                                                    0x7ffa532abd5e
                                                                    0x7ffa532abd62
                                                                    0x7ffa532abd68
                                                                    0x7ffa532abd70
                                                                    0x7ffa532abd79
                                                                    0x7ffa532abd8d
                                                                    0x7ffa532abd8f
                                                                    0x7ffa532abd9c
                                                                    0x7ffa532abda5
                                                                    0x7ffa532abdae
                                                                    0x7ffa532abdb8
                                                                    0x7ffa532abdbc
                                                                    0x7ffa532abdd1
                                                                    0x7ffa532abdda
                                                                    0x7ffa532abdf2
                                                                    0x7ffa532abdf4
                                                                    0x7ffa532abe01
                                                                    0x7ffa532abe0a
                                                                    0x7ffa532abe0c
                                                                    0x7ffa532abe14
                                                                    0x7ffa532abe29
                                                                    0x7ffa532abe3a
                                                                    0x7ffa532abe49
                                                                    0x7ffa532abe53
                                                                    0x7ffa532abe61
                                                                    0x7ffa532abe6b
                                                                    0x7ffa532abe71
                                                                    0x7ffa532abe84
                                                                    0x7ffa532abe91
                                                                    0x7ffa532abe9d
                                                                    0x7ffa532abea5
                                                                    0x7ffa532abeae
                                                                    0x7ffa532abeb2
                                                                    0x7ffa532abebb
                                                                    0x7ffa532abed1
                                                                    0x7ffa532abee2
                                                                    0x7ffa532abef0
                                                                    0x7ffa532abefc
                                                                    0x7ffa532abf04
                                                                    0x7ffa532abf17
                                                                    0x7ffa532abf28
                                                                    0x7ffa532abf36
                                                                    0x7ffa532abf42
                                                                    0x7ffa532abf4a
                                                                    0x7ffa532abf5a
                                                                    0x7ffa532abf6a
                                                                    0x7ffa532abf7a
                                                                    0x7ffa532abf8a
                                                                    0x7ffa532abf9a
                                                                    0x7ffa532abfaa
                                                                    0x7ffa532abfac
                                                                    0x7ffa532abfae
                                                                    0x7ffa532abfb9
                                                                    0x7ffa532abfbe
                                                                    0x7ffa532abfc7
                                                                    0x7ffa532abfcb
                                                                    0x7ffa532abfd1
                                                                    0x7ffa532abfe6
                                                                    0x7ffa532abff7
                                                                    0x7ffa532ac006
                                                                    0x7ffa532ac02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$0$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 530996419-4087627031
                                                                    • Opcode ID: 1de43203eafd45e9ce0d0d64285ee361cc766a04d488c37d7d0694f7340f7322
                                                                    • Instruction ID: 522685bf00ba09299d7b7344cc33dcd80b0b7e4a490a88e88ce9ac7926b4dcf1
                                                                    • Opcode Fuzzy Hash: 1de43203eafd45e9ce0d0d64285ee361cc766a04d488c37d7d0694f7340f7322
                                                                    • Instruction Fuzzy Hash: 85512E6292CFC28BE7B18B54E0543BEBBA5EBE6344F084135D28DD6999DBACD540CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 26%
                                                                    			E00007FFA7FFA532ADD30(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t139;
                                                                    				char* _t159;
                                                                    				char* _t160;
                                                                    
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532add6c;
                                                                    				_t159 =  &_a1560;
                                                                    				_a88 = E00007FFA7FFA532A1E40(_t159);
                                                                    				if (_a88 >= 0) goto 0x532add6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0x532add83;
                                                                    				_a88 = _t139 + _t159 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532addc4;
                                                                    				_t160 =  &_a1560;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t160);
                                                                    				if (_a116 >= 0) goto 0x532addc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532adddb;
                                                                    				_a116 = _t139 + _t160 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0x532ade66;
                                                                    				if (_a1408 == 0x68) goto 0x532adf6f;
                                                                    				if (_a1408 == 0x6c) goto 0x532ade24;
                                                                    				if (_a1408 == 0x77) goto 0x532adf7c;
                                                                    				goto 0x532adf88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0x532ade56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532ade61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0x532adeb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0x532adeb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0x532adefb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0x532adefb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0x532adf5d;
                                                                    				goto 0x532adf6d;
                                                                    				_a1216 = 0;
                                                                    				goto E00007FFA7FFA532ADC41;
                                                                    				goto 0x532adf88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7ffa532add3b
                                                                    0x7ffa532add3d
                                                                    0x7ffa532add4a
                                                                    0x7ffa532add53
                                                                    0x7ffa532add5c
                                                                    0x7ffa532add66
                                                                    0x7ffa532add6a
                                                                    0x7ffa532add7f
                                                                    0x7ffa532add88
                                                                    0x7ffa532adda0
                                                                    0x7ffa532adda2
                                                                    0x7ffa532addaf
                                                                    0x7ffa532addb8
                                                                    0x7ffa532addba
                                                                    0x7ffa532addc2
                                                                    0x7ffa532addd7
                                                                    0x7ffa532adde8
                                                                    0x7ffa532addf7
                                                                    0x7ffa532ade01
                                                                    0x7ffa532ade0f
                                                                    0x7ffa532ade19
                                                                    0x7ffa532ade1f
                                                                    0x7ffa532ade32
                                                                    0x7ffa532ade40
                                                                    0x7ffa532ade4c
                                                                    0x7ffa532ade54
                                                                    0x7ffa532ade5d
                                                                    0x7ffa532ade61
                                                                    0x7ffa532ade6a
                                                                    0x7ffa532ade80
                                                                    0x7ffa532ade91
                                                                    0x7ffa532ade9f
                                                                    0x7ffa532adeab
                                                                    0x7ffa532adeb3
                                                                    0x7ffa532adec6
                                                                    0x7ffa532aded7
                                                                    0x7ffa532adee5
                                                                    0x7ffa532adef1
                                                                    0x7ffa532adef9
                                                                    0x7ffa532adf09
                                                                    0x7ffa532adf19
                                                                    0x7ffa532adf29
                                                                    0x7ffa532adf39
                                                                    0x7ffa532adf49
                                                                    0x7ffa532adf59
                                                                    0x7ffa532adf5b
                                                                    0x7ffa532adf5d
                                                                    0x7ffa532adf68
                                                                    0x7ffa532adf6d
                                                                    0x7ffa532adf76
                                                                    0x7ffa532adf7a
                                                                    0x7ffa532adf80
                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-734865713
                                                                    • Opcode ID: 84afe223306fb715127401468d722999f495e1b64e531eed53167a130bda57e2
                                                                    • Instruction ID: 47c830675004a30853970f16644094c6c74a69bb2379fe21766584c5ace4b782
                                                                    • Opcode Fuzzy Hash: 84afe223306fb715127401468d722999f495e1b64e531eed53167a130bda57e2
                                                                    • Instruction Fuzzy Hash: D3513AA291CEC28AE7708B14E4503BEB7A2EBE5344F444135D68D97995DBACD480CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 26%
                                                                    			E00007FFA7FFA532ABD82(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t139;
                                                                    				char* _t159;
                                                                    				char* _t160;
                                                                    
                                                                    				if (_a696 != 0x2a) goto 0x532abdbe;
                                                                    				_t159 =  &_a1112;
                                                                    				_a88 = E00007FFA7FFA532A1E40(_t159);
                                                                    				if (_a88 >= 0) goto 0x532abdbc;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0x532abdd5;
                                                                    				_a88 = _t139 + _t159 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0x532abe16;
                                                                    				_t160 =  &_a1112;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t160);
                                                                    				if (_a116 >= 0) goto 0x532abe14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532abe2d;
                                                                    				_a116 = _t139 + _t160 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0x532abeb7;
                                                                    				if (_a972 == 0x68) goto 0x532abfc0;
                                                                    				if (_a972 == 0x6c) goto 0x532abe76;
                                                                    				if (_a972 == 0x77) goto 0x532abfcd;
                                                                    				goto 0x532abfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0x532abea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532abeb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0x532abf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0x532abf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0x532abf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0x532abf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x69) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x75) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x78) goto 0x532abfac;
                                                                    				if ( *_a1096 != 0x58) goto 0x532abfae;
                                                                    				goto 0x532abfbe;
                                                                    				_a704 = 0;
                                                                    				goto E00007FFA7FFA532ABB66;
                                                                    				goto 0x532abfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0x532aca31;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7ffa532abd8d
                                                                    0x7ffa532abd8f
                                                                    0x7ffa532abd9c
                                                                    0x7ffa532abda5
                                                                    0x7ffa532abdae
                                                                    0x7ffa532abdb8
                                                                    0x7ffa532abdbc
                                                                    0x7ffa532abdd1
                                                                    0x7ffa532abdda
                                                                    0x7ffa532abdf2
                                                                    0x7ffa532abdf4
                                                                    0x7ffa532abe01
                                                                    0x7ffa532abe0a
                                                                    0x7ffa532abe0c
                                                                    0x7ffa532abe14
                                                                    0x7ffa532abe29
                                                                    0x7ffa532abe3a
                                                                    0x7ffa532abe49
                                                                    0x7ffa532abe53
                                                                    0x7ffa532abe61
                                                                    0x7ffa532abe6b
                                                                    0x7ffa532abe71
                                                                    0x7ffa532abe84
                                                                    0x7ffa532abe91
                                                                    0x7ffa532abe9d
                                                                    0x7ffa532abea5
                                                                    0x7ffa532abeae
                                                                    0x7ffa532abeb2
                                                                    0x7ffa532abebb
                                                                    0x7ffa532abed1
                                                                    0x7ffa532abee2
                                                                    0x7ffa532abef0
                                                                    0x7ffa532abefc
                                                                    0x7ffa532abf04
                                                                    0x7ffa532abf17
                                                                    0x7ffa532abf28
                                                                    0x7ffa532abf36
                                                                    0x7ffa532abf42
                                                                    0x7ffa532abf4a
                                                                    0x7ffa532abf5a
                                                                    0x7ffa532abf6a
                                                                    0x7ffa532abf7a
                                                                    0x7ffa532abf8a
                                                                    0x7ffa532abf9a
                                                                    0x7ffa532abfaa
                                                                    0x7ffa532abfac
                                                                    0x7ffa532abfae
                                                                    0x7ffa532abfb9
                                                                    0x7ffa532abfbe
                                                                    0x7ffa532abfc7
                                                                    0x7ffa532abfcb
                                                                    0x7ffa532abfd1
                                                                    0x7ffa532abfe6
                                                                    0x7ffa532abff7
                                                                    0x7ffa532ac006
                                                                    0x7ffa532ac02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-192189897
                                                                    • Opcode ID: 642eb86adef82c061240f963ecada7643a5a14508ef6930c6b5b5b901d4a1b0a
                                                                    • Instruction ID: 69fb03084ff00f8301ff1d3be9beb8b606d5c77f77e3f9815543078742d23e12
                                                                    • Opcode Fuzzy Hash: 642eb86adef82c061240f963ecada7643a5a14508ef6930c6b5b5b901d4a1b0a
                                                                    • Instruction Fuzzy Hash: 5451496292CFC28AE770CB24E4943BEBBA5E7E6344F484135D28DD6A99DB6CD140CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E00007FFA7FFA532ABDE7(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t113;
                                                                    				char* _t133;
                                                                    
                                                                    				if (_a696 != 0x2a) goto 0x532abe16;
                                                                    				_t133 =  &_a1112;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t133);
                                                                    				if (_a116 >= 0) goto 0x532abe14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532abe2d;
                                                                    				_a116 = _t113 + _t133 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0x532abeb7;
                                                                    				if (_a972 == 0x68) goto 0x532abfc0;
                                                                    				if (_a972 == 0x6c) goto 0x532abe76;
                                                                    				if (_a972 == 0x77) goto 0x532abfcd;
                                                                    				goto 0x532abfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0x532abea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532abeb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0x532abf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0x532abf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0x532abf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0x532abf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x69) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x75) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x78) goto 0x532abfac;
                                                                    				if ( *_a1096 != 0x58) goto 0x532abfae;
                                                                    				goto 0x532abfbe;
                                                                    				_a704 = 0;
                                                                    				goto E00007FFA7FFA532ABB66;
                                                                    				goto 0x532abfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0x532aca31;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7ffa532abdf2
                                                                    0x7ffa532abdf4
                                                                    0x7ffa532abe01
                                                                    0x7ffa532abe0a
                                                                    0x7ffa532abe0c
                                                                    0x7ffa532abe14
                                                                    0x7ffa532abe29
                                                                    0x7ffa532abe3a
                                                                    0x7ffa532abe49
                                                                    0x7ffa532abe53
                                                                    0x7ffa532abe61
                                                                    0x7ffa532abe6b
                                                                    0x7ffa532abe71
                                                                    0x7ffa532abe84
                                                                    0x7ffa532abe91
                                                                    0x7ffa532abe9d
                                                                    0x7ffa532abea5
                                                                    0x7ffa532abeae
                                                                    0x7ffa532abeb2
                                                                    0x7ffa532abebb
                                                                    0x7ffa532abed1
                                                                    0x7ffa532abee2
                                                                    0x7ffa532abef0
                                                                    0x7ffa532abefc
                                                                    0x7ffa532abf04
                                                                    0x7ffa532abf17
                                                                    0x7ffa532abf28
                                                                    0x7ffa532abf36
                                                                    0x7ffa532abf42
                                                                    0x7ffa532abf4a
                                                                    0x7ffa532abf5a
                                                                    0x7ffa532abf6a
                                                                    0x7ffa532abf7a
                                                                    0x7ffa532abf8a
                                                                    0x7ffa532abf9a
                                                                    0x7ffa532abfaa
                                                                    0x7ffa532abfac
                                                                    0x7ffa532abfae
                                                                    0x7ffa532abfb9
                                                                    0x7ffa532abfbe
                                                                    0x7ffa532abfc7
                                                                    0x7ffa532abfcb
                                                                    0x7ffa532abfd1
                                                                    0x7ffa532abfe6
                                                                    0x7ffa532abff7
                                                                    0x7ffa532ac006
                                                                    0x7ffa532ac02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-192189897
                                                                    • Opcode ID: 9b0d14d024408deea39e0a17da6f412b88ec8238870ee572ebff0cd3a83ccddf
                                                                    • Instruction ID: 63552ac586b91c294bb8191c54da34410738a774f9db11da0ba63aed0c044d06
                                                                    • Opcode Fuzzy Hash: 9b0d14d024408deea39e0a17da6f412b88ec8238870ee572ebff0cd3a83ccddf
                                                                    • Instruction Fuzzy Hash: BF417D6292CFC28AE7708B24E4943BEBBA6E7E6704F484135D28DD2995DF6CD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E00007FFA7FFA532ADD95(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t113;
                                                                    				char* _t133;
                                                                    
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532addc4;
                                                                    				_t133 =  &_a1560;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t133);
                                                                    				if (_a116 >= 0) goto 0x532addc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532adddb;
                                                                    				_a116 = _t113 + _t133 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0x532ade66;
                                                                    				if (_a1408 == 0x68) goto 0x532adf6f;
                                                                    				if (_a1408 == 0x6c) goto 0x532ade24;
                                                                    				if (_a1408 == 0x77) goto 0x532adf7c;
                                                                    				goto 0x532adf88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0x532ade56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532ade61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0x532adeb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0x532adeb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0x532adefb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0x532adefb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0x532adf5d;
                                                                    				goto 0x532adf6d;
                                                                    				_a1216 = 0;
                                                                    				goto E00007FFA7FFA532ADC41;
                                                                    				goto 0x532adf88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7ffa532adda0
                                                                    0x7ffa532adda2
                                                                    0x7ffa532addaf
                                                                    0x7ffa532addb8
                                                                    0x7ffa532addba
                                                                    0x7ffa532addc2
                                                                    0x7ffa532addd7
                                                                    0x7ffa532adde8
                                                                    0x7ffa532addf7
                                                                    0x7ffa532ade01
                                                                    0x7ffa532ade0f
                                                                    0x7ffa532ade19
                                                                    0x7ffa532ade1f
                                                                    0x7ffa532ade32
                                                                    0x7ffa532ade40
                                                                    0x7ffa532ade4c
                                                                    0x7ffa532ade54
                                                                    0x7ffa532ade5d
                                                                    0x7ffa532ade61
                                                                    0x7ffa532ade6a
                                                                    0x7ffa532ade80
                                                                    0x7ffa532ade91
                                                                    0x7ffa532ade9f
                                                                    0x7ffa532adeab
                                                                    0x7ffa532adeb3
                                                                    0x7ffa532adec6
                                                                    0x7ffa532aded7
                                                                    0x7ffa532adee5
                                                                    0x7ffa532adef1
                                                                    0x7ffa532adef9
                                                                    0x7ffa532adf09
                                                                    0x7ffa532adf19
                                                                    0x7ffa532adf29
                                                                    0x7ffa532adf39
                                                                    0x7ffa532adf49
                                                                    0x7ffa532adf59
                                                                    0x7ffa532adf5b
                                                                    0x7ffa532adf5d
                                                                    0x7ffa532adf68
                                                                    0x7ffa532adf6d
                                                                    0x7ffa532adf76
                                                                    0x7ffa532adf7a
                                                                    0x7ffa532adf80
                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-734865713
                                                                    • Opcode ID: e93e5a5da9d23810187a949f5699427fbde4a421f2c98764f5e18462d0498a04
                                                                    • Instruction ID: 8661d2fb892b5f920779e3979b359289618deebfe1fff8f649f060b1f0a6b7f3
                                                                    • Opcode Fuzzy Hash: e93e5a5da9d23810187a949f5699427fbde4a421f2c98764f5e18462d0498a04
                                                                    • Instruction Fuzzy Hash: 224148A291CF828AE7708B24E4603BE72A2FBE6744F444135D68E97995DB7CD441CF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_oneof_swprintf_p
                                                                    • String ID: %.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 2731067127-3604075083
                                                                    • Opcode ID: a5e89465a157929821ec7ea19f55365b45851ed2ed8ce63167a36004212f5177
                                                                    • Instruction ID: 830f73e1492f11a37f0f6ae9e2777bd4204ff5bd95c37ec588b7de77a3244a8a
                                                                    • Opcode Fuzzy Hash: a5e89465a157929821ec7ea19f55365b45851ed2ed8ce63167a36004212f5177
                                                                    • Instruction Fuzzy Hash: DC415EB261DF8186E7248B51E4507AE77A2FBE6740F488135E68E57B89CF3CD444CB10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\a_env.c
                                                                    • API String ID: 1823725401-2473407871
                                                                    • Opcode ID: 2fea13ac07d8f022f3d86b1cc1b99bf950f7c5081f441752a002fe175989ec87
                                                                    • Instruction ID: a5c7a74ba528ee93195b89a2ba7819901a81077d1a9df01e695dbb25062c7d3e
                                                                    • Opcode Fuzzy Hash: 2fea13ac07d8f022f3d86b1cc1b99bf950f7c5081f441752a002fe175989ec87
                                                                    • Instruction Fuzzy Hash: 12411976628F8586E7108B16F45432FB7A1FBD5B94F184025EB8E57B68DF7DD0848B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 41%
                                                                    			E00007FFA7FFA532A4F20(long long __rax, long long __rcx, long long __rdx, long long __r8, long long _a8, long long _a16, long long _a24, signed int _a32) {
                                                                    				void* _v16;
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				void* _v56;
                                                                    				signed int _v72;
                                                                    				long long _v80;
                                                                    				signed int _v88;
                                                                    				void* _t88;
                                                                    				void* _t89;
                                                                    				void* _t90;
                                                                    				void* _t92;
                                                                    				void* _t93;
                                                                    				void* _t101;
                                                                    				long long _t113;
                                                                    				intOrPtr _t116;
                                                                    				void* _t117;
                                                                    				long long _t118;
                                                                    				long long _t121;
                                                                    				long long _t122;
                                                                    				long long _t125;
                                                                    				void* _t164;
                                                                    
                                                                    				_t113 = __rax;
                                                                    				_a32 = r9d;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_v88 = E00007FFA7FFA532A3B70(_a8, _a16, _a24);
                                                                    				E00007FFA7FFA5329E680(_t79, _t113);
                                                                    				_v80 = _t113;
                                                                    				0x53294000();
                                                                    				_v56 = _t113 + 0x100;
                                                                    				 *_v56 =  *_v56 + 1;
                                                                    				if (_v88 == 0xffffffff) goto 0x532a5103;
                                                                    				if (_v88 - _a32 <= 0) goto 0x532a5103;
                                                                    				if (_v88 - 0xffffffff <= 0) goto 0x532a4fb9;
                                                                    				_t116 = _a24;
                                                                    				if (_v88 -  *((intOrPtr*)(_t116 + 4)) >= 0) goto 0x532a4fb9;
                                                                    				goto 0x532a4fbe;
                                                                    				E00007FFA7FFA5329E680(E00007FFA7FFA5329CF80(_t116), _t116);
                                                                    				_t117 = _t116 +  *((intOrPtr*)(_a24 + 8));
                                                                    				_v72 =  *((intOrPtr*)(_t117 + _v88 * 8));
                                                                    				_t88 = E00007FFA7FFA5329E680( *((intOrPtr*)(_t117 + _v88 * 8)), _t117);
                                                                    				_t118 = _t117 +  *((intOrPtr*)(_a24 + 8));
                                                                    				if ( *((intOrPtr*)(_t118 + 4 + _v88 * 8)) == 0) goto 0x532a5038;
                                                                    				_t89 = E00007FFA7FFA5329E680(_t88, _t118);
                                                                    				_v48 = _t118;
                                                                    				_t90 = E00007FFA7FFA5329E680(_t89, _t118);
                                                                    				_t121 = _v48 +  *((intOrPtr*)(_t118 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                                    				_v40 = _t121;
                                                                    				goto 0x532a5041;
                                                                    				_v40 = 0;
                                                                    				if (_v40 == 0) goto 0x532a50f4;
                                                                    				r9d = _v72;
                                                                    				_t92 = E00007FFA7FFA5329E680(E00007FFA7FFA532A3BD0(_t90, _a8, _a16, _a24), _t121);
                                                                    				_t122 = _t121 +  *((intOrPtr*)(_a24 + 8));
                                                                    				if ( *((intOrPtr*)(_t122 + 4 + _v88 * 8)) == 0) goto 0x532a50c9;
                                                                    				_t93 = E00007FFA7FFA5329E680(_t92, _t122);
                                                                    				_v32 = _t122;
                                                                    				E00007FFA7FFA5329E680(_t93, _t122);
                                                                    				_t125 = _v32 +  *((intOrPtr*)(_t122 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                                    				_v24 = _t125;
                                                                    				goto 0x532a50d2;
                                                                    				_v24 = 0;
                                                                    				r8d = 0x103;
                                                                    				E00007FFA7FFA5329E6C0(E00007FFA7FFA532AD7E0(_v24, _a8, _t164), _t125, _v80);
                                                                    				goto 0x532a50f6;
                                                                    				_v88 = _v72;
                                                                    				goto 0x532a4f83;
                                                                    				0x53294000();
                                                                    				if ( *((intOrPtr*)(_t125 + 0x100)) <= 0) goto 0x532a5131;
                                                                    				0x53294000();
                                                                    				_v16 = _t125 + 0x100;
                                                                    				 *_v16 =  *_v16 - 1;
                                                                    				if (_v88 == 0xffffffff) goto 0x532a514a;
                                                                    				if (_v88 - _a32 <= 0) goto 0x532a514a;
                                                                    				_t101 = E00007FFA7FFA5329CF80(_v16);
                                                                    				r9d = _v88;
                                                                    				return E00007FFA7FFA532A3BD0(_t101, _a8, _a16, _a24);
                                                                    			}


























                                                                    0x7ffa532a4f20
                                                                    0x7ffa532a4f20
                                                                    0x7ffa532a4f25
                                                                    0x7ffa532a4f2a
                                                                    0x7ffa532a4f2f
                                                                    0x7ffa532a4f55
                                                                    0x7ffa532a4f59
                                                                    0x7ffa532a4f5e
                                                                    0x7ffa532a4f63
                                                                    0x7ffa532a4f6e
                                                                    0x7ffa532a4f81
                                                                    0x7ffa532a4f88
                                                                    0x7ffa532a4f99
                                                                    0x7ffa532a4fa4
                                                                    0x7ffa532a4fa6
                                                                    0x7ffa532a4fb5
                                                                    0x7ffa532a4fb7
                                                                    0x7ffa532a4fbe
                                                                    0x7ffa532a4fcf
                                                                    0x7ffa532a4fda
                                                                    0x7ffa532a4fde
                                                                    0x7ffa532a4fef
                                                                    0x7ffa532a4ffc
                                                                    0x7ffa532a4ffe
                                                                    0x7ffa532a5003
                                                                    0x7ffa532a5008
                                                                    0x7ffa532a502e
                                                                    0x7ffa532a5031
                                                                    0x7ffa532a5036
                                                                    0x7ffa532a5038
                                                                    0x7ffa532a5047
                                                                    0x7ffa532a504d
                                                                    0x7ffa532a506f
                                                                    0x7ffa532a5080
                                                                    0x7ffa532a508d
                                                                    0x7ffa532a508f
                                                                    0x7ffa532a5094
                                                                    0x7ffa532a5099
                                                                    0x7ffa532a50bf
                                                                    0x7ffa532a50c2
                                                                    0x7ffa532a50c7
                                                                    0x7ffa532a50c9
                                                                    0x7ffa532a50d2
                                                                    0x7ffa532a50ef
                                                                    0x7ffa532a50f4
                                                                    0x7ffa532a50fa
                                                                    0x7ffa532a50fe
                                                                    0x7ffa532a5103
                                                                    0x7ffa532a510f
                                                                    0x7ffa532a5111
                                                                    0x7ffa532a511c
                                                                    0x7ffa532a512f
                                                                    0x7ffa532a5136
                                                                    0x7ffa532a5143
                                                                    0x7ffa532a5145
                                                                    0x7ffa532a514a
                                                                    0x7ffa532a5170

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: State$_inconsistency$BaseControlCurrentFromImage
                                                                    • String ID:
                                                                    • API String ID: 2452617236-0
                                                                    • Opcode ID: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                                    • Instruction ID: 3aa3b04a77a057e2dc4df28cc6b22f63a201722af93849fae2126bfb93bee159
                                                                    • Opcode Fuzzy Hash: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                                    • Instruction Fuzzy Hash: 6B610672A1DF8186DA60DB14E05036EB3A1FBD9789F148535EACE93B9ACF7CD4418B40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E00007FFA7FFA53299F20(intOrPtr __ecx, intOrPtr* __rax, intOrPtr _a8) {
                                                                    				long long _v16;
                                                                    				intOrPtr _v20;
                                                                    				intOrPtr _v24;
                                                                    				int _v28;
                                                                    				int _v32;
                                                                    				char _v64;
                                                                    				long long _v72;
                                                                    				intOrPtr _t29;
                                                                    				intOrPtr* _t41;
                                                                    
                                                                    				_t41 = __rax;
                                                                    				_a8 = __ecx;
                                                                    				_v16 = 0xfffffffe;
                                                                    				_v72 = 0;
                                                                    				0x532966b0();
                                                                    				 *0x532bcd68 = 0;
                                                                    				if (_a8 != 0xfffffffe) goto 0x53299f81;
                                                                    				 *0x532bcd68 = 1;
                                                                    				_v32 = GetOEMCP();
                                                                    				E00007FFA7FFA53296800( &_v64);
                                                                    				goto 0x53299fe3;
                                                                    				if (_a8 != 0xfffffffd) goto 0x53299fae;
                                                                    				 *0x532bcd68 = 1;
                                                                    				_v28 = GetACP();
                                                                    				E00007FFA7FFA53296800( &_v64);
                                                                    				_t29 = _v28;
                                                                    				goto 0x53299fe3;
                                                                    				if (_a8 != 0xfffffffc) goto 0x53299fe3;
                                                                    				 *0x532bcd68 = 1;
                                                                    				E00007FFA7FFA53296840(_t29,  &_v64);
                                                                    				_v24 =  *((intOrPtr*)( *_t41 + 4));
                                                                    				E00007FFA7FFA53296800( &_v64);
                                                                    				goto 0x53299ff9;
                                                                    				_v20 = _a8;
                                                                    				E00007FFA7FFA53296800( &_v64);
                                                                    				return _v20;
                                                                    			}












                                                                    0x7ffa53299f20
                                                                    0x7ffa53299f20
                                                                    0x7ffa53299f28
                                                                    0x7ffa53299f31
                                                                    0x7ffa53299f44
                                                                    0x7ffa53299f4a
                                                                    0x7ffa53299f59
                                                                    0x7ffa53299f5b
                                                                    0x7ffa53299f6b
                                                                    0x7ffa53299f74
                                                                    0x7ffa53299f7f
                                                                    0x7ffa53299f86
                                                                    0x7ffa53299f88
                                                                    0x7ffa53299f98
                                                                    0x7ffa53299fa1
                                                                    0x7ffa53299fa6
                                                                    0x7ffa53299fac
                                                                    0x7ffa53299fb3
                                                                    0x7ffa53299fb5
                                                                    0x7ffa53299fc4
                                                                    0x7ffa53299fcf
                                                                    0x7ffa53299fd8
                                                                    0x7ffa53299fe1
                                                                    0x7ffa53299fe7
                                                                    0x7ffa53299ff0
                                                                    0x7ffa53299ffd

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_
                                                                    • String ID:
                                                                    • API String ID: 1901436342-0
                                                                    • Opcode ID: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                                    • Instruction ID: ea6384a60e10f4f724dbab76f4ba3754b2b1eac5cdc5f8732d85795f2c5fb45a
                                                                    • Opcode Fuzzy Hash: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                                    • Instruction Fuzzy Hash: 4121F573928F4286E7209B14E45026EBBA1EBE2374F148335E29E526E9CB7CD585CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: P$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$sizeInBytes > retsize
                                                                    • API String ID: 2123368286-552404435
                                                                    • Opcode ID: 2c731414488d35c21f2780f328146d5dcf70469cadf2ee42e60feab36cc6bb66
                                                                    • Instruction ID: a26f04827db062c0f0660f2e58a5aecaa67124dd27a3e6a6e1d80d37d74a990a
                                                                    • Opcode Fuzzy Hash: 2c731414488d35c21f2780f328146d5dcf70469cadf2ee42e60feab36cc6bb66
                                                                    • Instruction Fuzzy Hash: 7351152291CFC586EA718B18E40436EB6A2FBE6760F148235D6AD53BE8DF7CD444CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 28%
                                                                    			E00007FFA7FFA532ADC6B(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t184;
                                                                    				char* _t204;
                                                                    				char* _t205;
                                                                    
                                                                    				_a112 = 0;
                                                                    				_a108 = _a112;
                                                                    				_a88 = _a108;
                                                                    				_a92 = _a88;
                                                                    				_a80 = 0;
                                                                    				_a116 = 0xffffffff;
                                                                    				_a76 = 0;
                                                                    				_a1404 = _a1208 & 0x0000ffff;
                                                                    				if (_a1404 == 0x20) goto 0x532add05;
                                                                    				if (_a1404 == 0x23) goto 0x532add12;
                                                                    				if (_a1404 == 0x2b) goto 0x532adcf8;
                                                                    				if (_a1404 == 0x2d) goto 0x532adceb;
                                                                    				if (_a1404 == 0x30) goto 0x532add20;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0x532add2b;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532add6c;
                                                                    				_t204 =  &_a1560;
                                                                    				_a88 = E00007FFA7FFA532A1E40(_t204);
                                                                    				if (_a88 >= 0) goto 0x532add6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0x532add83;
                                                                    				_a88 = _t184 + _t204 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532addc4;
                                                                    				_t205 =  &_a1560;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t205);
                                                                    				if (_a116 >= 0) goto 0x532addc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532adddb;
                                                                    				_a116 = _t184 + _t205 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0x532ade66;
                                                                    				if (_a1408 == 0x68) goto 0x532adf6f;
                                                                    				if (_a1408 == 0x6c) goto 0x532ade24;
                                                                    				if (_a1408 == 0x77) goto 0x532adf7c;
                                                                    				goto 0x532adf88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0x532ade56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532ade61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0x532adeb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0x532adeb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0x532adefb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0x532adefb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0x532adf5d;
                                                                    				goto 0x532adf6d;
                                                                    				_a1216 = 0;
                                                                    				goto E00007FFA7FFA532ADC41;
                                                                    				goto 0x532adf88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7ffa532adc6b
                                                                    0x7ffa532adc77
                                                                    0x7ffa532adc7f
                                                                    0x7ffa532adc87
                                                                    0x7ffa532adc8b
                                                                    0x7ffa532adc93
                                                                    0x7ffa532adc9b
                                                                    0x7ffa532adcb0
                                                                    0x7ffa532adcbf
                                                                    0x7ffa532adcc9
                                                                    0x7ffa532adcd3
                                                                    0x7ffa532adcdd
                                                                    0x7ffa532adce7
                                                                    0x7ffa532adce9
                                                                    0x7ffa532adcf2
                                                                    0x7ffa532adcf6
                                                                    0x7ffa532adcff
                                                                    0x7ffa532add03
                                                                    0x7ffa532add0c
                                                                    0x7ffa532add10
                                                                    0x7ffa532add16
                                                                    0x7ffa532add1e
                                                                    0x7ffa532add27
                                                                    0x7ffa532add3b
                                                                    0x7ffa532add3d
                                                                    0x7ffa532add4a
                                                                    0x7ffa532add53
                                                                    0x7ffa532add5c
                                                                    0x7ffa532add66
                                                                    0x7ffa532add6a
                                                                    0x7ffa532add7f
                                                                    0x7ffa532add88
                                                                    0x7ffa532adda0
                                                                    0x7ffa532adda2
                                                                    0x7ffa532addaf
                                                                    0x7ffa532addb8
                                                                    0x7ffa532addba
                                                                    0x7ffa532addc2
                                                                    0x7ffa532addd7
                                                                    0x7ffa532adde8
                                                                    0x7ffa532addf7
                                                                    0x7ffa532ade01
                                                                    0x7ffa532ade0f
                                                                    0x7ffa532ade19
                                                                    0x7ffa532ade1f
                                                                    0x7ffa532ade32
                                                                    0x7ffa532ade40
                                                                    0x7ffa532ade4c
                                                                    0x7ffa532ade54
                                                                    0x7ffa532ade5d
                                                                    0x7ffa532ade61
                                                                    0x7ffa532ade6a
                                                                    0x7ffa532ade80
                                                                    0x7ffa532ade91
                                                                    0x7ffa532ade9f
                                                                    0x7ffa532adeab
                                                                    0x7ffa532adeb3
                                                                    0x7ffa532adec6
                                                                    0x7ffa532aded7
                                                                    0x7ffa532adee5
                                                                    0x7ffa532adef1
                                                                    0x7ffa532adef9
                                                                    0x7ffa532adf09
                                                                    0x7ffa532adf19
                                                                    0x7ffa532adf29
                                                                    0x7ffa532adf39
                                                                    0x7ffa532adf49
                                                                    0x7ffa532adf59
                                                                    0x7ffa532adf5b
                                                                    0x7ffa532adf5d
                                                                    0x7ffa532adf68
                                                                    0x7ffa532adf6d
                                                                    0x7ffa532adf76
                                                                    0x7ffa532adf7a
                                                                    0x7ffa532adf80
                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-734865713
                                                                    • Opcode ID: f70cefb569721d9d21904d9e7ba8b3a65f1b1d02a652e36c9b8a6a51e541d649
                                                                    • Instruction ID: 33bfdae4ec42076ccf8cfc0885ebf08f6e48e4d1bdbc1089d6b80fdc258ab472
                                                                    • Opcode Fuzzy Hash: f70cefb569721d9d21904d9e7ba8b3a65f1b1d02a652e36c9b8a6a51e541d649
                                                                    • Instruction Fuzzy Hash: 09413AB291CFC18AE3708B24E4503AEB6A2FBE6344F448135E68D97A99DB7CD441CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 28%
                                                                    			E00007FFA7FFA532ABCBD(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t184;
                                                                    				char* _t204;
                                                                    				char* _t205;
                                                                    
                                                                    				_a112 = 0;
                                                                    				_a108 = _a112;
                                                                    				_a88 = _a108;
                                                                    				_a92 = _a88;
                                                                    				_a80 = 0;
                                                                    				_a116 = 0xffffffff;
                                                                    				_a76 = 0;
                                                                    				_a968 = _a696 & 0x000000ff;
                                                                    				if (_a968 == 0x20) goto 0x532abd57;
                                                                    				if (_a968 == 0x23) goto 0x532abd64;
                                                                    				if (_a968 == 0x2b) goto 0x532abd4a;
                                                                    				if (_a968 == 0x2d) goto 0x532abd3d;
                                                                    				if (_a968 == 0x30) goto 0x532abd72;
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0x532abd7d;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0x532abd7d;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if (_a696 != 0x2a) goto 0x532abdbe;
                                                                    				_t204 =  &_a1112;
                                                                    				_a88 = E00007FFA7FFA532A1E40(_t204);
                                                                    				if (_a88 >= 0) goto 0x532abdbc;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0x532abdd5;
                                                                    				_a88 = _t184 + _t204 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0x532abe16;
                                                                    				_t205 =  &_a1112;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t205);
                                                                    				if (_a116 >= 0) goto 0x532abe14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532abe2d;
                                                                    				_a116 = _t184 + _t205 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0x532abeb7;
                                                                    				if (_a972 == 0x68) goto 0x532abfc0;
                                                                    				if (_a972 == 0x6c) goto 0x532abe76;
                                                                    				if (_a972 == 0x77) goto 0x532abfcd;
                                                                    				goto 0x532abfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0x532abea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532abeb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0x532abf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0x532abf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0x532abf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0x532abf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x69) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x75) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x78) goto 0x532abfac;
                                                                    				if ( *_a1096 != 0x58) goto 0x532abfae;
                                                                    				goto 0x532abfbe;
                                                                    				_a704 = 0;
                                                                    				goto E00007FFA7FFA532ABB66;
                                                                    				goto 0x532abfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0x532aca31;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7ffa532abcbd
                                                                    0x7ffa532abcc9
                                                                    0x7ffa532abcd1
                                                                    0x7ffa532abcd9
                                                                    0x7ffa532abcdd
                                                                    0x7ffa532abce5
                                                                    0x7ffa532abced
                                                                    0x7ffa532abd02
                                                                    0x7ffa532abd11
                                                                    0x7ffa532abd1b
                                                                    0x7ffa532abd25
                                                                    0x7ffa532abd2f
                                                                    0x7ffa532abd39
                                                                    0x7ffa532abd3b
                                                                    0x7ffa532abd44
                                                                    0x7ffa532abd48
                                                                    0x7ffa532abd51
                                                                    0x7ffa532abd55
                                                                    0x7ffa532abd5e
                                                                    0x7ffa532abd62
                                                                    0x7ffa532abd68
                                                                    0x7ffa532abd70
                                                                    0x7ffa532abd79
                                                                    0x7ffa532abd8d
                                                                    0x7ffa532abd8f
                                                                    0x7ffa532abd9c
                                                                    0x7ffa532abda5
                                                                    0x7ffa532abdae
                                                                    0x7ffa532abdb8
                                                                    0x7ffa532abdbc
                                                                    0x7ffa532abdd1
                                                                    0x7ffa532abdda
                                                                    0x7ffa532abdf2
                                                                    0x7ffa532abdf4
                                                                    0x7ffa532abe01
                                                                    0x7ffa532abe0a
                                                                    0x7ffa532abe0c
                                                                    0x7ffa532abe14
                                                                    0x7ffa532abe29
                                                                    0x7ffa532abe3a
                                                                    0x7ffa532abe49
                                                                    0x7ffa532abe53
                                                                    0x7ffa532abe61
                                                                    0x7ffa532abe6b
                                                                    0x7ffa532abe71
                                                                    0x7ffa532abe84
                                                                    0x7ffa532abe91
                                                                    0x7ffa532abe9d
                                                                    0x7ffa532abea5
                                                                    0x7ffa532abeae
                                                                    0x7ffa532abeb2
                                                                    0x7ffa532abebb
                                                                    0x7ffa532abed1
                                                                    0x7ffa532abee2
                                                                    0x7ffa532abef0
                                                                    0x7ffa532abefc
                                                                    0x7ffa532abf04
                                                                    0x7ffa532abf17
                                                                    0x7ffa532abf28
                                                                    0x7ffa532abf36
                                                                    0x7ffa532abf42
                                                                    0x7ffa532abf4a
                                                                    0x7ffa532abf5a
                                                                    0x7ffa532abf6a
                                                                    0x7ffa532abf7a
                                                                    0x7ffa532abf8a
                                                                    0x7ffa532abf9a
                                                                    0x7ffa532abfaa
                                                                    0x7ffa532abfac
                                                                    0x7ffa532abfae
                                                                    0x7ffa532abfb9
                                                                    0x7ffa532abfbe
                                                                    0x7ffa532abfc7
                                                                    0x7ffa532abfcb
                                                                    0x7ffa532abfd1
                                                                    0x7ffa532abfe6
                                                                    0x7ffa532abff7
                                                                    0x7ffa532ac006
                                                                    0x7ffa532ac02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-192189897
                                                                    • Opcode ID: 6e7b2e4602a67de0d8444751781932987c77aea524c4ee0e513499fa92d069a1
                                                                    • Instruction ID: c0f88b2e059d92f5999a082df733e23e60d48e42f42b30bc4e0ec3380aa79e07
                                                                    • Opcode Fuzzy Hash: 6e7b2e4602a67de0d8444751781932987c77aea524c4ee0e513499fa92d069a1
                                                                    • Instruction Fuzzy Hash: 3241177292CFC28AE3708B24E4943AEBBA5E7E6304F484135D69DD6A99DB7CD540CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 28%
                                                                    			E00007FFA7FFA532ADC41(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, char _a1200, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, intOrPtr _a1536, signed short* _a1544, char _a1560) {
                                                                    				void* _t190;
                                                                    				char* _t210;
                                                                    				char* _t211;
                                                                    
                                                                    				_a76 = 1;
                                                                    				E00007FFA7FFA532AEE40(_a1208 & 0x0000ffff, _a1536,  &_a1200);
                                                                    				_a112 = 0;
                                                                    				_a108 = _a112;
                                                                    				_a88 = _a108;
                                                                    				_a92 = _a88;
                                                                    				_a80 = 0;
                                                                    				_a116 = 0xffffffff;
                                                                    				_a76 = 0;
                                                                    				_a1404 = _a1208 & 0x0000ffff;
                                                                    				if (_a1404 == 0x20) goto 0x532add05;
                                                                    				if (_a1404 == 0x23) goto 0x532add12;
                                                                    				if (_a1404 == 0x2b) goto 0x532adcf8;
                                                                    				if (_a1404 == 0x2d) goto 0x532adceb;
                                                                    				if (_a1404 == 0x30) goto 0x532add20;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0x532add2b;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0x532add2b;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532add6c;
                                                                    				_t210 =  &_a1560;
                                                                    				_a88 = E00007FFA7FFA532A1E40(_t210);
                                                                    				if (_a88 >= 0) goto 0x532add6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0x532add83;
                                                                    				_a88 = _t190 + _t210 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532addc4;
                                                                    				_t211 =  &_a1560;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t211);
                                                                    				if (_a116 >= 0) goto 0x532addc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532adddb;
                                                                    				_a116 = _t190 + _t211 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0x532ade66;
                                                                    				if (_a1408 == 0x68) goto 0x532adf6f;
                                                                    				if (_a1408 == 0x6c) goto 0x532ade24;
                                                                    				if (_a1408 == 0x77) goto 0x532adf7c;
                                                                    				goto 0x532adf88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0x532ade56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532ade61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0x532adeb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0x532adeb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0x532adefb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0x532adefb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0x532adf5d;
                                                                    				goto 0x532adf6d;
                                                                    				_a1216 = 0;
                                                                    				goto E00007FFA7FFA532ADC41;
                                                                    				goto 0x532adf88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7ffa532adc41
                                                                    0x7ffa532adc61
                                                                    0x7ffa532adc6b
                                                                    0x7ffa532adc77
                                                                    0x7ffa532adc7f
                                                                    0x7ffa532adc87
                                                                    0x7ffa532adc8b
                                                                    0x7ffa532adc93
                                                                    0x7ffa532adc9b
                                                                    0x7ffa532adcb0
                                                                    0x7ffa532adcbf
                                                                    0x7ffa532adcc9
                                                                    0x7ffa532adcd3
                                                                    0x7ffa532adcdd
                                                                    0x7ffa532adce7
                                                                    0x7ffa532adce9
                                                                    0x7ffa532adcf2
                                                                    0x7ffa532adcf6
                                                                    0x7ffa532adcff
                                                                    0x7ffa532add03
                                                                    0x7ffa532add0c
                                                                    0x7ffa532add10
                                                                    0x7ffa532add16
                                                                    0x7ffa532add1e
                                                                    0x7ffa532add27
                                                                    0x7ffa532add3b
                                                                    0x7ffa532add3d
                                                                    0x7ffa532add4a
                                                                    0x7ffa532add53
                                                                    0x7ffa532add5c
                                                                    0x7ffa532add66
                                                                    0x7ffa532add6a
                                                                    0x7ffa532add7f
                                                                    0x7ffa532add88
                                                                    0x7ffa532adda0
                                                                    0x7ffa532adda2
                                                                    0x7ffa532addaf
                                                                    0x7ffa532addb8
                                                                    0x7ffa532addba
                                                                    0x7ffa532addc2
                                                                    0x7ffa532addd7
                                                                    0x7ffa532adde8
                                                                    0x7ffa532addf7
                                                                    0x7ffa532ade01
                                                                    0x7ffa532ade0f
                                                                    0x7ffa532ade19
                                                                    0x7ffa532ade1f
                                                                    0x7ffa532ade32
                                                                    0x7ffa532ade40
                                                                    0x7ffa532ade4c
                                                                    0x7ffa532ade54
                                                                    0x7ffa532ade5d
                                                                    0x7ffa532ade61
                                                                    0x7ffa532ade6a
                                                                    0x7ffa532ade80
                                                                    0x7ffa532ade91
                                                                    0x7ffa532ade9f
                                                                    0x7ffa532adeab
                                                                    0x7ffa532adeb3
                                                                    0x7ffa532adec6
                                                                    0x7ffa532aded7
                                                                    0x7ffa532adee5
                                                                    0x7ffa532adef1
                                                                    0x7ffa532adef9
                                                                    0x7ffa532adf09
                                                                    0x7ffa532adf19
                                                                    0x7ffa532adf29
                                                                    0x7ffa532adf39
                                                                    0x7ffa532adf49
                                                                    0x7ffa532adf59
                                                                    0x7ffa532adf5b
                                                                    0x7ffa532adf5d
                                                                    0x7ffa532adf68
                                                                    0x7ffa532adf6d
                                                                    0x7ffa532adf76
                                                                    0x7ffa532adf7a
                                                                    0x7ffa532adf80
                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-734865713
                                                                    • Opcode ID: 7ccb00da1bd0fb9220a44591d36c0492ce99534c897a7d6a17d24537f8dc2fa2
                                                                    • Instruction ID: 600ef46c93d50f9bbc8208356bbe705208a567756910f413194e99442c57461a
                                                                    • Opcode Fuzzy Hash: 7ccb00da1bd0fb9220a44591d36c0492ce99534c897a7d6a17d24537f8dc2fa2
                                                                    • Instruction Fuzzy Hash: 9C4127A292CFC286E7708B14E4603BE72A2FBE6345F448136D68E93995DF7CD441CB14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E00007FFA7FFA532ABDDA(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t114;
                                                                    				char* _t134;
                                                                    
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0x532abe16;
                                                                    				_t134 =  &_a1112;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t134);
                                                                    				if (_a116 >= 0) goto 0x532abe14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532abe2d;
                                                                    				_a116 = _t114 + _t134 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0x532abeb7;
                                                                    				if (_a972 == 0x68) goto 0x532abfc0;
                                                                    				if (_a972 == 0x6c) goto 0x532abe76;
                                                                    				if (_a972 == 0x77) goto 0x532abfcd;
                                                                    				goto 0x532abfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0x532abea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532abeb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0x532abf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0x532abf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0x532abf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0x532abf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532abfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x69) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x75) goto 0x532abfac;
                                                                    				if ( *_a1096 == 0x78) goto 0x532abfac;
                                                                    				if ( *_a1096 != 0x58) goto 0x532abfae;
                                                                    				goto 0x532abfbe;
                                                                    				_a704 = 0;
                                                                    				goto E00007FFA7FFA532ABB66;
                                                                    				goto 0x532abfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532abfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0x532aca31;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7ffa532abdda
                                                                    0x7ffa532abdf2
                                                                    0x7ffa532abdf4
                                                                    0x7ffa532abe01
                                                                    0x7ffa532abe0a
                                                                    0x7ffa532abe0c
                                                                    0x7ffa532abe14
                                                                    0x7ffa532abe29
                                                                    0x7ffa532abe3a
                                                                    0x7ffa532abe49
                                                                    0x7ffa532abe53
                                                                    0x7ffa532abe61
                                                                    0x7ffa532abe6b
                                                                    0x7ffa532abe71
                                                                    0x7ffa532abe84
                                                                    0x7ffa532abe91
                                                                    0x7ffa532abe9d
                                                                    0x7ffa532abea5
                                                                    0x7ffa532abeae
                                                                    0x7ffa532abeb2
                                                                    0x7ffa532abebb
                                                                    0x7ffa532abed1
                                                                    0x7ffa532abee2
                                                                    0x7ffa532abef0
                                                                    0x7ffa532abefc
                                                                    0x7ffa532abf04
                                                                    0x7ffa532abf17
                                                                    0x7ffa532abf28
                                                                    0x7ffa532abf36
                                                                    0x7ffa532abf42
                                                                    0x7ffa532abf4a
                                                                    0x7ffa532abf5a
                                                                    0x7ffa532abf6a
                                                                    0x7ffa532abf7a
                                                                    0x7ffa532abf8a
                                                                    0x7ffa532abf9a
                                                                    0x7ffa532abfaa
                                                                    0x7ffa532abfac
                                                                    0x7ffa532abfae
                                                                    0x7ffa532abfb9
                                                                    0x7ffa532abfbe
                                                                    0x7ffa532abfc7
                                                                    0x7ffa532abfcb
                                                                    0x7ffa532abfd1
                                                                    0x7ffa532abfe6
                                                                    0x7ffa532abff7
                                                                    0x7ffa532ac006
                                                                    0x7ffa532ac02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-192189897
                                                                    • Opcode ID: 365a2dca31272ad0c00aec3a5831cb280a19fde5761ae3667445a1def64af164
                                                                    • Instruction ID: ec50244b0b908a3b4a3ffafdcae8533c5006b220f0e2200339aca88801a0a640
                                                                    • Opcode Fuzzy Hash: 365a2dca31272ad0c00aec3a5831cb280a19fde5761ae3667445a1def64af164
                                                                    • Instruction Fuzzy Hash: 7A416D6292CFC286E7719B24E4943BEBBA6EBE6304F484135D68DD2995DF6CD140CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E00007FFA7FFA532ADD88(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t114;
                                                                    				char* _t134;
                                                                    
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0x532addc4;
                                                                    				_t134 =  &_a1560;
                                                                    				_a116 = E00007FFA7FFA532A1E40(_t134);
                                                                    				if (_a116 >= 0) goto 0x532addc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0x532adddb;
                                                                    				_a116 = _t114 + _t134 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0x532ade66;
                                                                    				if (_a1408 == 0x68) goto 0x532adf6f;
                                                                    				if (_a1408 == 0x6c) goto 0x532ade24;
                                                                    				if (_a1408 == 0x77) goto 0x532adf7c;
                                                                    				goto 0x532adf88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0x532ade56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0x532ade61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0x532adeb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0x532adeb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0x532adefb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0x532adefb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0x532adf6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0x532adf5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0x532adf5d;
                                                                    				goto 0x532adf6d;
                                                                    				_a1216 = 0;
                                                                    				goto E00007FFA7FFA532ADC41;
                                                                    				goto 0x532adf88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0x532adf88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0x532aea2a;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7ffa532add88
                                                                    0x7ffa532adda0
                                                                    0x7ffa532adda2
                                                                    0x7ffa532addaf
                                                                    0x7ffa532addb8
                                                                    0x7ffa532addba
                                                                    0x7ffa532addc2
                                                                    0x7ffa532addd7
                                                                    0x7ffa532adde8
                                                                    0x7ffa532addf7
                                                                    0x7ffa532ade01
                                                                    0x7ffa532ade0f
                                                                    0x7ffa532ade19
                                                                    0x7ffa532ade1f
                                                                    0x7ffa532ade32
                                                                    0x7ffa532ade40
                                                                    0x7ffa532ade4c
                                                                    0x7ffa532ade54
                                                                    0x7ffa532ade5d
                                                                    0x7ffa532ade61
                                                                    0x7ffa532ade6a
                                                                    0x7ffa532ade80
                                                                    0x7ffa532ade91
                                                                    0x7ffa532ade9f
                                                                    0x7ffa532adeab
                                                                    0x7ffa532adeb3
                                                                    0x7ffa532adec6
                                                                    0x7ffa532aded7
                                                                    0x7ffa532adee5
                                                                    0x7ffa532adef1
                                                                    0x7ffa532adef9
                                                                    0x7ffa532adf09
                                                                    0x7ffa532adf19
                                                                    0x7ffa532adf29
                                                                    0x7ffa532adf39
                                                                    0x7ffa532adf49
                                                                    0x7ffa532adf59
                                                                    0x7ffa532adf5b
                                                                    0x7ffa532adf5d
                                                                    0x7ffa532adf68
                                                                    0x7ffa532adf6d
                                                                    0x7ffa532adf76
                                                                    0x7ffa532adf7a
                                                                    0x7ffa532adf80
                                                                    0x7ffa532adf95
                                                                    0x7ffa532adfa6
                                                                    0x7ffa532adfb5
                                                                    0x7ffa532adfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-734865713
                                                                    • Opcode ID: 18be2ec324f4e6ddaf4da83870b7f9445444224664337f66457babe689a72d53
                                                                    • Instruction ID: dfea45f8b22e644c8397b1f68ef8b001dc8de9d9bff7934a01a525a43d17ad88
                                                                    • Opcode Fuzzy Hash: 18be2ec324f4e6ddaf4da83870b7f9445444224664337f66457babe689a72d53
                                                                    • Instruction Fuzzy Hash: 804137A292CFC286E7708B24E4603BE72A2FBE6345F448135D68D97995DF7CD441CB14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • ("Invalid file descriptor. File possibly closed by a different thread",0), xrefs: 00007FFA532A9563
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c, xrefs: 00007FFA532A9578
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer__doserrno_dosmaperr
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                                    • API String ID: 275287319-2412454244
                                                                    • Opcode ID: c7efb4c2b63aa0ea1a393bbb45a77ac8f6d4c0e98eaf8d85a5d097220697af2b
                                                                    • Instruction ID: b1f91207981d413397b6e39d35c41ec7d89d1c9e6d65a586fff6ee0dc27f80f4
                                                                    • Opcode Fuzzy Hash: c7efb4c2b63aa0ea1a393bbb45a77ac8f6d4c0e98eaf8d85a5d097220697af2b
                                                                    • Instruction Fuzzy Hash: 4B316F72A28F8586D6108B25E49112E7762FBD67A0F548335E6BE57AE9CF3CD400CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_unlock
                                                                    • String ID: (fNewBits==_CRTDBG_REPORT_FLAG) || ((fNewBits & 0x0ffff & ~(_CRTDBG_ALLOC_MEM_DF | _CRTDBG_DELAY_FREE_MEM_DF | _CRTDBG_CHECK_ALWAY$_CrtSetDbgFlag$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 2816345473-1282596470
                                                                    • Opcode ID: 3f7f838120eed42c27c7ea3ce685aad0c3061be731b7dc7317e8a9b82dec8473
                                                                    • Instruction ID: 7ec391750b3aac8a3fb0a234d4b4aeb7ce8f04613e7da8517317c94138d06c98
                                                                    • Opcode Fuzzy Hash: 3f7f838120eed42c27c7ea3ce685aad0c3061be731b7dc7317e8a9b82dec8473
                                                                    • Instruction Fuzzy Hash: D9313BB2D3CF428AE3509B54E85573D72A2FBA6360F08D534E25EA66D4DB7CE4848B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _free_nolock$_unlock
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\prebuild\eh\typname.cpp$pNode->_Next != NULL
                                                                    • API String ID: 2500497606-1087415141
                                                                    • Opcode ID: 73e945bef0fa2e243f2cc79ce7faf04cefa07676de83a818dd77e5436e879e5d
                                                                    • Instruction ID: c93d55d97c1441932be2f78fde3213dbaa7b42202bb517ee33e42e55b0d93a0e
                                                                    • Opcode Fuzzy Hash: 73e945bef0fa2e243f2cc79ce7faf04cefa07676de83a818dd77e5436e879e5d
                                                                    • Instruction Fuzzy Hash: 8A213B22A39F8591EB419B11E4A032EA3A1FBD5B90F58D435EA8E537A4CF7CD480C701
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Exception$Rethrow$DestroyedFindFrameObjectRaiseUnlink
                                                                    • String ID: csm
                                                                    • API String ID: 933340387-1018135373
                                                                    • Opcode ID: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                                    • Instruction ID: 3fa4524b13f94f3919449cf868004233e5d11209f88d5c52833cd54081d61afd
                                                                    • Opcode Fuzzy Hash: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                                    • Instruction Fuzzy Hash: 63216B32928F4183DA209F16E08026E77A1FBE2B55F659136EB9E177A5CF7CD441CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno_invalid_parameter
                                                                    • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 4140903211-23161695
                                                                    • Opcode ID: 32410c4887627c76782b03988199a8b6bafae630e8670220b1a4c16fdf178152
                                                                    • Instruction ID: 1e5adc075da11e987d6fb4e184c328760a4dd3030e38fb44996affe1ef258d01
                                                                    • Opcode Fuzzy Hash: 32410c4887627c76782b03988199a8b6bafae630e8670220b1a4c16fdf178152
                                                                    • Instruction Fuzzy Hash: 1C115AB1938F468AE7509B11E46036E32A2FBE2744F489535E24E62AD4DFBCE5848B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno_invalid_parameter
                                                                    • String ID: (buf != NULL)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 4140903211-3042049227
                                                                    • Opcode ID: b156558e5a530bd8cc364ecba4e09f8d8b9f154ab820f1b2babcd7abee70c9c3
                                                                    • Instruction ID: ec258fa176e7ade924a4747d240994305c97072c7383c7beaf790788f048160c
                                                                    • Opcode Fuzzy Hash: b156558e5a530bd8cc364ecba4e09f8d8b9f154ab820f1b2babcd7abee70c9c3
                                                                    • Instruction Fuzzy Hash: 6B118E71A2CF869AF7219B21E4613AE6352EFE2754F488036D18D52AD5CFBCE584CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno_invalid_parameter
                                                                    • String ID: (_osfile(fh) & FOPEN)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 4140903211-1338331675
                                                                    • Opcode ID: 11864ca282438847dd27f4dc85d1758fde49d78cd6d39020a8393d86cd701a27
                                                                    • Instruction ID: 257c4d59c7c974823b1da5477c404c3ced44eb1f6352337544f2d56f7648c0d1
                                                                    • Opcode Fuzzy Hash: 11864ca282438847dd27f4dc85d1758fde49d78cd6d39020a8393d86cd701a27
                                                                    • Instruction Fuzzy Hash: 45015EB192CF8686FB209F15E45036D3662FBE2394F588135E24E63AD5DFBCE5848B10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer__doserrno_invalid_parameter
                                                                    • String ID: ((cnt & 1) == 0)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 1098298932-1795423647
                                                                    • Opcode ID: 17be20b0b4ddc98d10ae5d9642fe0f8cd8b1b2069c373d6ecdcef621e5a80c70
                                                                    • Instruction ID: 3fbc55ed47d33b5962c36f90c34bee0b97d5f1d14d15d1b3894971faedd19d0f
                                                                    • Opcode Fuzzy Hash: 17be20b0b4ddc98d10ae5d9642fe0f8cd8b1b2069c373d6ecdcef621e5a80c70
                                                                    • Instruction Fuzzy Hash: 0EE06DA293CF4691F6219F10E8213ED2312BFE2B48F888232D14D6B6D2CF7CA5458B40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 20%
                                                                    			E00007FFA7FFA532AFF00(intOrPtr __ecx, intOrPtr _a8) {
                                                                    				signed int _v16;
                                                                    				signed int _v20;
                                                                    				signed int _v24;
                                                                    
                                                                    				_a8 = __ecx;
                                                                    				_v24 = 0;
                                                                    				_v16 = 0;
                                                                    				0x53299300();
                                                                    				_v20 = 0;
                                                                    				_v20 = _v20 + 1;
                                                                    				if (_v20 -  *0x532be520 >= 0) goto 0x532b0042;
                                                                    				if ( *((long long*)( *0x532bd500 + _v20 * 8)) == 0) goto 0x532b003d;
                                                                    				if (( *( *((intOrPtr*)( *0x532bd500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0x532b003d;
                                                                    				E00007FFA7FFA532AAE90(_v20,  *((intOrPtr*)( *0x532bd500 + _v20 * 8)));
                                                                    				if (( *( *((intOrPtr*)( *0x532bd500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0x532b0024;
                                                                    				if (_a8 != 1) goto 0x532affe1;
                                                                    				if (E00007FFA7FFA532AFD70( *((intOrPtr*)( *0x532bd500 + _v20 * 8))) == 0xffffffff) goto 0x532affdf;
                                                                    				_v24 = _v24 + 1;
                                                                    				goto 0x532b0024;
                                                                    				if (_a8 != 0) goto 0x532b0024;
                                                                    				if (( *( *((intOrPtr*)( *0x532bd500 + _v20 * 8)) + 0x18) & 0x00000002) == 0) goto 0x532b0024;
                                                                    				if (E00007FFA7FFA532AFD70( *((intOrPtr*)( *0x532bd500 + _v20 * 8))) != 0xffffffff) goto 0x532b0024;
                                                                    				_v16 = 0xffffffff;
                                                                    				E00007FFA7FFA532AAF60(_v20,  *((intOrPtr*)( *0x532bd500 + _v20 * 8)));
                                                                    				goto L1;
                                                                    				__ecx = 1;
                                                                    				__eax = E00007FFA7FFA53299360(__eax, 1);
                                                                    				if (_a8 != 1) goto 0x532b005b;
                                                                    				__eax = _v24;
                                                                    				goto 0x532b005f;
                                                                    				__eax = _v16;
                                                                    				return _v16;
                                                                    			}






                                                                    0x7ffa532aff00
                                                                    0x7ffa532aff08
                                                                    0x7ffa532aff10
                                                                    0x7ffa532aff1d
                                                                    0x7ffa532aff23
                                                                    0x7ffa532aff33
                                                                    0x7ffa532aff41
                                                                    0x7ffa532aff58
                                                                    0x7ffa532aff78
                                                                    0x7ffa532aff92
                                                                    0x7ffa532affb2
                                                                    0x7ffa532affb9
                                                                    0x7ffa532affd3
                                                                    0x7ffa532affdb
                                                                    0x7ffa532affdf
                                                                    0x7ffa532affe6
                                                                    0x7ffa532b0000
                                                                    0x7ffa532b001a
                                                                    0x7ffa532b001c
                                                                    0x7ffa532b0038
                                                                    0x7ffa532b003d
                                                                    0x7ffa532b0042
                                                                    0x7ffa532b0047
                                                                    0x7ffa532b0051
                                                                    0x7ffa532b0053
                                                                    0x7ffa532b0059
                                                                    0x7ffa532b005b
                                                                    0x7ffa532b0063

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _fflush_nolock$_lock_file2_unlock_unlock_file2
                                                                    • String ID:
                                                                    • API String ID: 1144694634-0
                                                                    • Opcode ID: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                                    • Instruction ID: 928414c5ae15e9ad86164d01ef00c1563dd9207dce9d5a3b982fd327ba0dedcd
                                                                    • Opcode Fuzzy Hash: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                                    • Instruction Fuzzy Hash: 8641CC36928F01C6EA308B19D4A133D63A1FBEAB58F188235E65D977A5CF3DD941CB10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E00007FFA7FFA532A3CC0(void* __edx, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int* _a40, char _a48, signed int _a56, signed int _a64) {
                                                                    				long long _v16;
                                                                    				long long _v24;
                                                                    				intOrPtr _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				intOrPtr _v52;
                                                                    				intOrPtr _v56;
                                                                    				signed int _v64;
                                                                    				long long _v72;
                                                                    				char _v80;
                                                                    				long long _v88;
                                                                    				void* _t135;
                                                                    				void* _t145;
                                                                    				void* _t147;
                                                                    				void* _t148;
                                                                    				void* _t149;
                                                                    				signed int* _t200;
                                                                    				intOrPtr _t206;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				0x53294000();
                                                                    				if ( *((intOrPtr*)(__rax + 0x2c0)) != 0) goto 0x532a3d6c;
                                                                    				if ( *_a8 == 0xe06d7363) goto 0x532a3d6c;
                                                                    				if ( *_a8 != 0x80000029) goto 0x532a3d2a;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 0xf) goto 0x532a3d2a;
                                                                    				if ( *((long long*)(_a8 + 0x60)) == 0x19930520) goto 0x532a3d6c;
                                                                    				if ( *_a8 == 0x80000026) goto 0x532a3d6c;
                                                                    				if (( *_a40 & 0x1fffffff) - 0x19930522 < 0) goto 0x532a3d6c;
                                                                    				if ((_a40[9] & 0x00000001) == 0) goto 0x532a3d6c;
                                                                    				goto 0x532a409c;
                                                                    				if (( *(_a8 + 4) & 0x00000066) == 0) goto 0x532a3ef3;
                                                                    				if (_a40[1] == 0) goto 0x532a3ee4;
                                                                    				if (_a48 != 0) goto 0x532a3ee4;
                                                                    				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0x532a3e40;
                                                                    				if ( *_a8 != 0x80000026) goto 0x532a3e40;
                                                                    				_v56 = E00007FFA7FFA532A3A60(_a24, _a40, _a32,  *((intOrPtr*)(_a24 + 0xf8)));
                                                                    				if (_v56 - 0xffffffff < 0) goto 0x532a3e0a;
                                                                    				if (_v56 - _a40[1] >= 0) goto 0x532a3e0a;
                                                                    				goto 0x532a3e0f;
                                                                    				E00007FFA7FFA5329CF80(_a40);
                                                                    				r9d = _v56;
                                                                    				E00007FFA7FFA532A4F20(_a40, _a16, _a32, _a40);
                                                                    				goto 0x532a3ec7;
                                                                    				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0x532a3ec7;
                                                                    				if ( *_a8 != 0x80000029) goto 0x532a3ec7;
                                                                    				_v48 = _a8;
                                                                    				_v52 =  *((intOrPtr*)(_v48 + 0x38));
                                                                    				if (_v52 - 0xffffffff < 0) goto 0x532a3e95;
                                                                    				if (_v52 - _a40[1] >= 0) goto 0x532a3e95;
                                                                    				goto 0x532a3e9a;
                                                                    				E00007FFA7FFA5329CF80(_a40);
                                                                    				r9d = _v52;
                                                                    				E00007FFA7FFA532A4F20(_v48,  *((intOrPtr*)(_v48 + 0x28)), _a32, _a40);
                                                                    				goto 0x532a409c;
                                                                    				E00007FFA7FFA5329E790(_v52 - _a40[1], _v48, _a16, _a32, _a40);
                                                                    				goto 0x532a4097;
                                                                    				if (_a40[3] != 0) goto 0x532a3f59;
                                                                    				if (( *_a40 & 0x1fffffff) - 0x19930521 < 0) goto 0x532a4097;
                                                                    				_t200 = _a40;
                                                                    				if ( *((intOrPtr*)(_t200 + 0x20)) == 0) goto 0x532a3f44;
                                                                    				_t135 = E00007FFA7FFA5329E680( *_a40 & 0x1fffffff, _t200);
                                                                    				_v24 = _t200 + _a40[8];
                                                                    				goto 0x532a3f4d;
                                                                    				_v24 = 0;
                                                                    				if (_v24 == 0) goto 0x532a4097;
                                                                    				if ( *_a8 != 0xe06d7363) goto 0x532a4041;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) - 3 < 0) goto 0x532a4041;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) - 0x19930522 <= 0) goto 0x532a4041;
                                                                    				_t206 =  *((intOrPtr*)(_a8 + 0x30));
                                                                    				if ( *((intOrPtr*)(_t206 + 8)) == 0) goto 0x532a3fc5;
                                                                    				E00007FFA7FFA5329E6A0(_t135, _t206);
                                                                    				_v16 = _t206 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 8));
                                                                    				goto 0x532a3fce;
                                                                    				_v16 = 0;
                                                                    				_v40 = _v16;
                                                                    				_t177 = _v40;
                                                                    				if (_v40 == 0) goto 0x532a4041;
                                                                    				_v64 = _a64 & 0x000000ff;
                                                                    				_v72 = _a56;
                                                                    				_v80 = _a48;
                                                                    				_v88 = _a40;
                                                                    				_v32 = _v40();
                                                                    				goto 0x532a4097;
                                                                    				_v64 = _a56;
                                                                    				_v72 = _a48;
                                                                    				_v80 = _a64 & 0x000000ff;
                                                                    				_v88 = _a40;
                                                                    				E00007FFA7FFA532A40B0(_t145, _t147, _t148, _t149, _t177, _a40, _a8, _a16, _a24, _a32);
                                                                    				return 1;
                                                                    			}





















                                                                    0x7ffa532a3cc0
                                                                    0x7ffa532a3cc5
                                                                    0x7ffa532a3cca
                                                                    0x7ffa532a3ccf
                                                                    0x7ffa532a3cd8
                                                                    0x7ffa532a3ce4
                                                                    0x7ffa532a3cf8
                                                                    0x7ffa532a3d08
                                                                    0x7ffa532a3d16
                                                                    0x7ffa532a3d28
                                                                    0x7ffa532a3d38
                                                                    0x7ffa532a3d4e
                                                                    0x7ffa532a3d60
                                                                    0x7ffa532a3d67
                                                                    0x7ffa532a3d7c
                                                                    0x7ffa532a3d8e
                                                                    0x7ffa532a3d9c
                                                                    0x7ffa532a3db2
                                                                    0x7ffa532a3dc6
                                                                    0x7ffa532a3dec
                                                                    0x7ffa532a3df5
                                                                    0x7ffa532a3e06
                                                                    0x7ffa532a3e08
                                                                    0x7ffa532a3e0a
                                                                    0x7ffa532a3e0f
                                                                    0x7ffa532a3e2c
                                                                    0x7ffa532a3e3b
                                                                    0x7ffa532a3e50
                                                                    0x7ffa532a3e60
                                                                    0x7ffa532a3e6a
                                                                    0x7ffa532a3e77
                                                                    0x7ffa532a3e80
                                                                    0x7ffa532a3e91
                                                                    0x7ffa532a3e93
                                                                    0x7ffa532a3e95
                                                                    0x7ffa532a3e9a
                                                                    0x7ffa532a3eb8
                                                                    0x7ffa532a3ec2
                                                                    0x7ffa532a3edf
                                                                    0x7ffa532a3eee
                                                                    0x7ffa532a3eff
                                                                    0x7ffa532a3f15
                                                                    0x7ffa532a3f1b
                                                                    0x7ffa532a3f27
                                                                    0x7ffa532a3f29
                                                                    0x7ffa532a3f3d
                                                                    0x7ffa532a3f42
                                                                    0x7ffa532a3f44
                                                                    0x7ffa532a3f53
                                                                    0x7ffa532a3f67
                                                                    0x7ffa532a3f79
                                                                    0x7ffa532a3f8e
                                                                    0x7ffa532a3f9c
                                                                    0x7ffa532a3fa4
                                                                    0x7ffa532a3fa6
                                                                    0x7ffa532a3fbe
                                                                    0x7ffa532a3fc3
                                                                    0x7ffa532a3fc5
                                                                    0x7ffa532a3fd3
                                                                    0x7ffa532a3fd8
                                                                    0x7ffa532a3fde
                                                                    0x7ffa532a3fe8
                                                                    0x7ffa532a3ff4
                                                                    0x7ffa532a4000
                                                                    0x7ffa532a400c
                                                                    0x7ffa532a4035
                                                                    0x7ffa532a403f
                                                                    0x7ffa532a4049
                                                                    0x7ffa532a4055
                                                                    0x7ffa532a4061
                                                                    0x7ffa532a406d
                                                                    0x7ffa532a4092
                                                                    0x7ffa532a40a0

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _inconsistency
                                                                    • String ID: csm$csm
                                                                    • API String ID: 32975420-3733052814
                                                                    • Opcode ID: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                                    • Instruction ID: 704e6a50205ea3cc026de3859a20521161d5c52879894d8022c1552b046401a0
                                                                    • Opcode Fuzzy Hash: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                                    • Instruction Fuzzy Hash: 0EA1E536618F85CAD6708B55E0403AEB7A1FBD6B90F548026EB8D97B99CF7CD840CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca, xrefs: 00007FFA5329991D
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c, xrefs: 00007FFA53299932
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __free_lconv_mon__free_lconv_num
                                                                    • String ID: ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c
                                                                    • API String ID: 2148069796-2706031433
                                                                    • Opcode ID: 5d60d57c9e58d07f7621284f5e9f8ee1c279b3f05538a913626922df64b73307
                                                                    • Instruction ID: 9f7c24cdb2fb767be36ceb5045487b0ccbac0b3897c6a6ce1ff13f5fc7b5f799
                                                                    • Opcode Fuzzy Hash: 5d60d57c9e58d07f7621284f5e9f8ee1c279b3f05538a913626922df64b73307
                                                                    • Instruction Fuzzy Hash: 60A14F73628F8581EB508B45E0853BEA3A2F7E5B50F599036EA4E577A5CFBCD481C700
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-3717698799
                                                                    • Opcode ID: 9007319e5b81e0e19641b6dff6978a626c4b249898d68e368399ad5d9614f895
                                                                    • Instruction ID: f5316176a1bfbda7e3d69219af289b2793d1feac4251c8596e9965f20cd2e2de
                                                                    • Opcode Fuzzy Hash: 9007319e5b81e0e19641b6dff6978a626c4b249898d68e368399ad5d9614f895
                                                                    • Instruction Fuzzy Hash: 0F81503292CF868ADA708B14E44036DB3A2F7D6764F148635E6AE93BD5DF7CD4858B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 20%
                                                                    			E00007FFA7FFA532AC719(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                    				signed int _t212;
                                                                    				signed char _t217;
                                                                    				intOrPtr _t252;
                                                                    				signed int _t327;
                                                                    				signed int _t328;
                                                                    				signed long long _t331;
                                                                    				intOrPtr* _t354;
                                                                    				signed long long _t379;
                                                                    
                                                                    				_t327 = __rax;
                                                                    				_a708 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ac754;
                                                                    				_a84 = 0x30;
                                                                    				_a85 = _a708 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ac777;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0x532ac79e;
                                                                    				E00007FFA7FFA532A1EA0( &_a1112);
                                                                    				_a824 = _t327;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0x532ac7c5;
                                                                    				E00007FFA7FFA532A1EA0( &_a1112);
                                                                    				_a824 = _t327;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0x532ac810;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac7f6;
                                                                    				_t328 = E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				goto 0x532ac80e;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac834;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				goto 0x532ac84b;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac882;
                                                                    				if (_a824 >= 0) goto 0x532ac882;
                                                                    				_a832 =  ~_a824;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0x532ac892;
                                                                    				_t331 = _a824;
                                                                    				_a832 = _t331;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0x532ac8c7;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0x532ac8c7;
                                                                    				_a832 = _a832 & _t331;
                                                                    				if (_a116 >= 0) goto 0x532ac8d8;
                                                                    				_a116 = 1;
                                                                    				goto 0x532ac8f5;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0x532ac8f5;
                                                                    				_a116 = 0x200;
                                                                    				if (_a832 != 0) goto 0x532ac908;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t212 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t212 > 0) goto 0x532ac936;
                                                                    				if (_a832 == 0) goto 0x532ac9d3;
                                                                    				_a1040 = _a72;
                                                                    				_a816 = _t212 / _a1040 + 0x30;
                                                                    				_a1048 = _a72;
                                                                    				if (_a816 - 0x39 <= 0) goto 0x532ac9b2;
                                                                    				_t217 = _a816 + _a708;
                                                                    				_a816 = _t217;
                                                                    				 *_a64 = _a816 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0x532ac915;
                                                                    				_a104 = _t217;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0x532aca31;
                                                                    				if (_a104 == 0) goto 0x532aca12;
                                                                    				if ( *_a64 == 0x30) goto 0x532aca31;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0x532acc6e;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0x532aca63;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0x532aca7d;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0x532aca95;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a840 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0x532acad5;
                                                                    				E00007FFA7FFA532ACF10(0x20, _a840, _a1088,  &_a688);
                                                                    				E00007FFA7FFA532ACF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0x532acb27;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0x532acb27;
                                                                    				E00007FFA7FFA532ACF10(0x30, _a840, _a1088,  &_a688);
                                                                    				if (_a76 == 0) goto 0x532acc1d;
                                                                    				if (_a104 <= 0) goto 0x532acc1d;
                                                                    				_a872 = 0;
                                                                    				_a848 = _a64;
                                                                    				_a856 = _a104;
                                                                    				_a856 = _a856 - 1;
                                                                    				if (_a856 == 0) goto 0x532acc1b;
                                                                    				_a1056 =  *_a848 & 0x0000ffff;
                                                                    				r9d = _a1056 & 0x0000ffff;
                                                                    				r8d = 6;
                                                                    				_a872 = E00007FFA7FFA532AB530( &_a860,  &_a864, _a1088);
                                                                    				_a848 =  &(_a848[1]);
                                                                    				if (_a872 != 0) goto 0x532acbe5;
                                                                    				if (_a860 != 0) goto 0x532acbf2;
                                                                    				_a688 = 0xffffffff;
                                                                    				goto 0x532acc1b;
                                                                    				E00007FFA7FFA532ACF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                    				goto 0x532acb60;
                                                                    				goto 0x532acc3b;
                                                                    				E00007FFA7FFA532ACF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                    				if (_a688 < 0) goto 0x532acc6e;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0x532acc6e;
                                                                    				E00007FFA7FFA532ACF10(0x20, _a840, _a1088,  &_a688);
                                                                    				if (_a96 == 0) goto 0x532acc8e;
                                                                    				0x53295330();
                                                                    				_a96 = 0;
                                                                    				goto 0x532ab99c;
                                                                    				if (_a704 == 0) goto 0x532accb4;
                                                                    				if (_a704 == 7) goto 0x532accb4;
                                                                    				_a1060 = 0;
                                                                    				goto 0x532accbf;
                                                                    				_a1060 = 1;
                                                                    				_t252 = _a1060;
                                                                    				_a876 = _t252;
                                                                    				if (_a876 != 0) goto 0x532acd05;
                                                                    				_t354 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t354;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0x5329b3b0();
                                                                    				if (_t252 != 1) goto 0x532acd05;
                                                                    				asm("int3");
                                                                    				if (_a876 != 0) goto 0x532acd61;
                                                                    				0x5329ab30();
                                                                    				 *_t354 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E00007FFA7FFA5329BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a912 = 0xffffffff;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				goto 0x532acd80;
                                                                    				_a916 = _a688;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				return E00007FFA7FFA53293280(_a916, 2, 2, _a1064 ^ _t379, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}











                                                                    0x7ffa532ac719
                                                                    0x7ffa532ac719
                                                                    0x7ffa532ac724
                                                                    0x7ffa532ac737
                                                                    0x7ffa532ac739
                                                                    0x7ffa532ac748
                                                                    0x7ffa532ac74c
                                                                    0x7ffa532ac756
                                                                    0x7ffa532ac769
                                                                    0x7ffa532ac76f
                                                                    0x7ffa532ac782
                                                                    0x7ffa532ac78c
                                                                    0x7ffa532ac791
                                                                    0x7ffa532ac799
                                                                    0x7ffa532ac7a9
                                                                    0x7ffa532ac7b3
                                                                    0x7ffa532ac7b8
                                                                    0x7ffa532ac7c0
                                                                    0x7ffa532ac7ce
                                                                    0x7ffa532ac7d9
                                                                    0x7ffa532ac7e8
                                                                    0x7ffa532ac7ec
                                                                    0x7ffa532ac7f4
                                                                    0x7ffa532ac7fe
                                                                    0x7ffa532ac806
                                                                    0x7ffa532ac80e
                                                                    0x7ffa532ac819
                                                                    0x7ffa532ac823
                                                                    0x7ffa532ac82a
                                                                    0x7ffa532ac832
                                                                    0x7ffa532ac83c
                                                                    0x7ffa532ac843
                                                                    0x7ffa532ac854
                                                                    0x7ffa532ac85f
                                                                    0x7ffa532ac86c
                                                                    0x7ffa532ac878
                                                                    0x7ffa532ac880
                                                                    0x7ffa532ac882
                                                                    0x7ffa532ac88a
                                                                    0x7ffa532ac89d
                                                                    0x7ffa532ac8aa
                                                                    0x7ffa532ac8bf
                                                                    0x7ffa532ac8cc
                                                                    0x7ffa532ac8ce
                                                                    0x7ffa532ac8d6
                                                                    0x7ffa532ac8df
                                                                    0x7ffa532ac8eb
                                                                    0x7ffa532ac8ed
                                                                    0x7ffa532ac8fe
                                                                    0x7ffa532ac900
                                                                    0x7ffa532ac910
                                                                    0x7ffa532ac915
                                                                    0x7ffa532ac91f
                                                                    0x7ffa532ac925
                                                                    0x7ffa532ac930
                                                                    0x7ffa532ac93b
                                                                    0x7ffa532ac95e
                                                                    0x7ffa532ac96a
                                                                    0x7ffa532ac997
                                                                    0x7ffa532ac9a9
                                                                    0x7ffa532ac9ab
                                                                    0x7ffa532ac9bf
                                                                    0x7ffa532ac9c9
                                                                    0x7ffa532ac9ce
                                                                    0x7ffa532ac9e0
                                                                    0x7ffa532ac9ec
                                                                    0x7ffa532ac9fc
                                                                    0x7ffa532aca03
                                                                    0x7ffa532aca10
                                                                    0x7ffa532aca1a
                                                                    0x7ffa532aca24
                                                                    0x7ffa532aca2d
                                                                    0x7ffa532aca36
                                                                    0x7ffa532aca45
                                                                    0x7ffa532aca52
                                                                    0x7ffa532aca54
                                                                    0x7ffa532aca59
                                                                    0x7ffa532aca61
                                                                    0x7ffa532aca6c
                                                                    0x7ffa532aca6e
                                                                    0x7ffa532aca73
                                                                    0x7ffa532aca7b
                                                                    0x7ffa532aca86
                                                                    0x7ffa532aca88
                                                                    0x7ffa532aca8d
                                                                    0x7ffa532acaa5
                                                                    0x7ffa532acab5
                                                                    0x7ffa532acad0
                                                                    0x7ffa532acaee
                                                                    0x7ffa532acafc
                                                                    0x7ffa532acb07
                                                                    0x7ffa532acb22
                                                                    0x7ffa532acb2c
                                                                    0x7ffa532acb37
                                                                    0x7ffa532acb3d
                                                                    0x7ffa532acb4d
                                                                    0x7ffa532acb59
                                                                    0x7ffa532acb70
                                                                    0x7ffa532acb79
                                                                    0x7ffa532acb8a
                                                                    0x7ffa532acb92
                                                                    0x7ffa532acb9b
                                                                    0x7ffa532acbb6
                                                                    0x7ffa532acbc9
                                                                    0x7ffa532acbd9
                                                                    0x7ffa532acbe3
                                                                    0x7ffa532acbe5
                                                                    0x7ffa532acbf0
                                                                    0x7ffa532acc11
                                                                    0x7ffa532acc16
                                                                    0x7ffa532acc1b
                                                                    0x7ffa532acc36
                                                                    0x7ffa532acc43
                                                                    0x7ffa532acc4e
                                                                    0x7ffa532acc69
                                                                    0x7ffa532acc74
                                                                    0x7ffa532acc80
                                                                    0x7ffa532acc85
                                                                    0x7ffa532acc8e
                                                                    0x7ffa532acc9b
                                                                    0x7ffa532acca5
                                                                    0x7ffa532acca7
                                                                    0x7ffa532accb2
                                                                    0x7ffa532accb4
                                                                    0x7ffa532accbf
                                                                    0x7ffa532accc6
                                                                    0x7ffa532accd5
                                                                    0x7ffa532accd7
                                                                    0x7ffa532accde
                                                                    0x7ffa532acce3
                                                                    0x7ffa532acce6
                                                                    0x7ffa532accf8
                                                                    0x7ffa532acd00
                                                                    0x7ffa532acd02
                                                                    0x7ffa532acd0d
                                                                    0x7ffa532acd0f
                                                                    0x7ffa532acd14
                                                                    0x7ffa532acd1a
                                                                    0x7ffa532acd23
                                                                    0x7ffa532acd3e
                                                                    0x7ffa532acd43
                                                                    0x7ffa532acd53
                                                                    0x7ffa532acd5f
                                                                    0x7ffa532acd68
                                                                    0x7ffa532acd74
                                                                    0x7ffa532acd97

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: '$0$9
                                                                    • API String ID: 1967237116-269856862
                                                                    • Opcode ID: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                                    • Instruction ID: bef3e8e1a418636a1ad48ab231b19a56b8119c8dd8673f72083ac6145e35b8a9
                                                                    • Opcode Fuzzy Hash: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                                    • Instruction Fuzzy Hash: 2641C13261DFC18BE7668B19E4817AEB7A5F7D5750F084125E68C96B88DBBCE540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Frame$CreateDestroyedExceptionFindInfoObjectUnlink
                                                                    • String ID: csm
                                                                    • API String ID: 2005287440-1018135373
                                                                    • Opcode ID: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                                    • Instruction ID: dd670256ceef999f3a539faf15edc890dbcb0ef0eb84c6d2282e3ae0c40467af
                                                                    • Opcode Fuzzy Hash: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                                    • Instruction Fuzzy Hash: B051F436618F8682DA609F1AE08036EB7A1F7D5B94F158135EACD17BA5CF79D490CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-3717698799
                                                                    • Opcode ID: 902fc8e7192f88527d8aa4075598999d81e9371814558b5bb1293b80f5ddf804
                                                                    • Instruction ID: df39da4dad87b26e4267cf2f462d361c66e987faa2fcee675c7e7e17e24c353b
                                                                    • Opcode Fuzzy Hash: 902fc8e7192f88527d8aa4075598999d81e9371814558b5bb1293b80f5ddf804
                                                                    • Instruction Fuzzy Hash: 3E41623192CF868AEA708B24E45437D62A2FBE6764F148335D6AD527D5DF7CD4848B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalFileInitializeSectionSpinType_calloc_dbg_calloc_dbg_impl
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                                    • API String ID: 2306298712-3864165772
                                                                    • Opcode ID: f8d8197c346db0ac09b323a6feea4d94d972fc61056f87e4c857bffc3443442c
                                                                    • Instruction ID: a6db5f1a7d0b5986db201884534f272674760197512a1937502093e530f21bcd
                                                                    • Opcode Fuzzy Hash: f8d8197c346db0ac09b323a6feea4d94d972fc61056f87e4c857bffc3443442c
                                                                    • Instruction Fuzzy Hash: E1314A62A19F8985E7708B19E84076E73A2FBE6750F488235CAAE977D4DF3CD440CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _wcstombs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                                    • API String ID: 2123368286-2562677240
                                                                    • Opcode ID: f1a9f826516545701b922f50b6ebdc9d8be9d112825cbb7a30042366d5f9c4a9
                                                                    • Instruction ID: fab1e1b6d1317f376902790a00fe99b5abebda5a7f8f0bcdaa51521f53fa7427
                                                                    • Opcode Fuzzy Hash: f1a9f826516545701b922f50b6ebdc9d8be9d112825cbb7a30042366d5f9c4a9
                                                                    • Instruction Fuzzy Hash: A3313A3292CF8686E6709B48E44036E77A2EBE6790F148135D6AD93BD4DFBCD444CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter$__doserrno
                                                                    • String ID: (str != NULL)$_fclose_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c
                                                                    • API String ID: 1181141450-2845860089
                                                                    • Opcode ID: 60dcfdadd0e03516a84dc335c67980ba4999d51805a5974115e67aa140ed36a2
                                                                    • Instruction ID: 6d659d469b37de7aab1d9b0089b2ee0653992b18019d24b5bad5483d9e878525
                                                                    • Opcode Fuzzy Hash: 60dcfdadd0e03516a84dc335c67980ba4999d51805a5974115e67aa140ed36a2
                                                                    • Instruction Fuzzy Hash: 27319A72938F8286E7519B11E4A072E73A2FBE2744F149131E68E53BE5CF3CD8408B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_isatty$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isatty.c
                                                                    • API String ID: 2123368286-160817255
                                                                    • Opcode ID: eccc8fed36cae0d9a6e14cbb0507e08d02c226084f69b474f0b5454228c7b857
                                                                    • Instruction ID: 7465fa585769e6f4a480c72b370036c73ac4f01f033cd96d6006ca4225a91098
                                                                    • Opcode Fuzzy Hash: eccc8fed36cae0d9a6e14cbb0507e08d02c226084f69b474f0b5454228c7b857
                                                                    • Instruction Fuzzy Hash: C6215E72938F828AE7509B10E49536DB3A3FBE1354F48D635E19E67AD4DBBCD4408B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (stream != NULL)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c$fclose
                                                                    • API String ID: 2123368286-3409824857
                                                                    • Opcode ID: d31558689191b30e1debc2aa339dabcf4ed505ad636b5f29a69950b4dd90694d
                                                                    • Instruction ID: d51018c1c46144d1dd71c9fd54aadbea5f89714ef78ab2357b14728138b40240
                                                                    • Opcode Fuzzy Hash: d31558689191b30e1debc2aa339dabcf4ed505ad636b5f29a69950b4dd90694d
                                                                    • Instruction Fuzzy Hash: 4F217C7293CF8286EB509B10E4A076E7762FBE2754F049131E68E67A94CFBCD444CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_
                                                                    • String ID: (unsigned)(c + 1) <= 256$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isctype.c
                                                                    • API String ID: 1901436342-3621827421
                                                                    • Opcode ID: 291659c115524f578e2ce7e37289a3f2ddc7b5bd59cb83b4eaeda8d1fa0b4c89
                                                                    • Instruction ID: f230d5b1ad3230e670f0a8f821edb6c80425e38c90b897fcaf581233dde8c988
                                                                    • Opcode Fuzzy Hash: 291659c115524f578e2ce7e37289a3f2ddc7b5bd59cb83b4eaeda8d1fa0b4c89
                                                                    • Instruction Fuzzy Hash: B6214C73928F9186E710DB14E4912AEB7A1FBD1B90F548031E78E87AA9DF3CD484CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Invalid error_mode", 0)$_set_error_mode$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\errmode.c
                                                                    • API String ID: 2123368286-2972513288
                                                                    • Opcode ID: 8fb5a3cdd681d6a82b02ff81c277c719a79eaaec91177dc4ca99e8a0364f32ec
                                                                    • Instruction ID: cbdee759eb67d441903ed9921b1715724bb59a06c13bb4315571d8725c2b9d6d
                                                                    • Opcode Fuzzy Hash: 8fb5a3cdd681d6a82b02ff81c277c719a79eaaec91177dc4ca99e8a0364f32ec
                                                                    • Instruction Fuzzy Hash: 4F21397193CF428BE6608B14E49076D72A2ABA6344F489435F54EA2A95DBBCE584CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$string != NULL && sizeInBytes > 0
                                                                    • API String ID: 2123368286-367560414
                                                                    • Opcode ID: 9835c0e10505228e0bf6b58a8474be5f834255bb2e0cd334fa5f5b7dd6645e21
                                                                    • Instruction ID: 140c0a610217dff93f82ac4f078e8005de3ee9ad5294aa591b70d8e62f96c3f8
                                                                    • Opcode Fuzzy Hash: 9835c0e10505228e0bf6b58a8474be5f834255bb2e0cd334fa5f5b7dd6645e21
                                                                    • Instruction Fuzzy Hash: 42114C3192CF468AE7608B14E4553AD62A2EBE2344F588035D24DA66E5DFBCE5C88F00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _wcstombs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$pwcs != NULL
                                                                    • API String ID: 2123368286-2992382544
                                                                    • Opcode ID: 9cdd31bc13f045a84d1723aba15172f6d66e597d1102c0836733c4c00faf9839
                                                                    • Instruction ID: a924f74a03d89f487a620ecd34bc1874e7733970d895d46ff1eae0aeb6df0a1e
                                                                    • Opcode Fuzzy Hash: 9cdd31bc13f045a84d1723aba15172f6d66e597d1102c0836733c4c00faf9839
                                                                    • Instruction Fuzzy Hash: CE118B31928F8696E6708B68E4543BE6293FBE6354F848239C19DA26C4DFBCD184CB04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (stream != NULL)$_fileno$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fileno.c
                                                                    • API String ID: 2123368286-3532421942
                                                                    • Opcode ID: c9b4c7eaa6f702e756935e157fc704da053bc53339d856ee334f13e3a5237ddc
                                                                    • Instruction ID: ece93090757e29924385368667127123d2698df196a941525480054abd0bd53c
                                                                    • Opcode Fuzzy Hash: c9b4c7eaa6f702e756935e157fc704da053bc53339d856ee334f13e3a5237ddc
                                                                    • Instruction Fuzzy Hash: 4B114872A3CF468AE7509B10E45476E73A2FBE1344F449235E68D92A94CFBCD449CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (dst != NULL && sizeInBytes > 0) || (dst == NULL && sizeInBytes == 0)$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                                    • API String ID: 2123368286-152112980
                                                                    • Opcode ID: bee2d7726ac50f9e7da98411c921f1d389d1484d621cac995bcaec902168c7d6
                                                                    • Instruction ID: 4555ba2bca718930968cfa7a8afefef9805253012313829533778e458640efed
                                                                    • Opcode Fuzzy Hash: bee2d7726ac50f9e7da98411c921f1d389d1484d621cac995bcaec902168c7d6
                                                                    • Instruction Fuzzy Hash: A2118F7192CF4286F7209B48E5143BE76A3FBE2344F548439D64C92AD4CFBCD8888B44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock$CurrentThreadValue_calloc_dbg_calloc_dbg_impl
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dllcrt0.c
                                                                    • API String ID: 433497747-929597301
                                                                    • Opcode ID: 96304afd3892c75cf4395cc6993819dfb8aeff123cb8b241378233d51ad23f1a
                                                                    • Instruction ID: 7b5a3d74c79446008cbdccae02ed418a7568efbf050549fb2b58b98537d8277e
                                                                    • Opcode Fuzzy Hash: 96304afd3892c75cf4395cc6993819dfb8aeff123cb8b241378233d51ad23f1a
                                                                    • Instruction Fuzzy Hash: B10112A2A3CF4286E3519B54D45473E6352FBDAB50F58D631E65F926D5CF3CE4408700
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (count == 0) || (string != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-3131718208
                                                                    • Opcode ID: 43b2844285fd77a1982b218cfc07c90d3f3fad476d4107e0837d5d8b2ccbe159
                                                                    • Instruction ID: 8397138b4c91906547820fe2358b9f19261f9a2b67e8529f6deaaa8d14350238
                                                                    • Opcode Fuzzy Hash: 43b2844285fd77a1982b218cfc07c90d3f3fad476d4107e0837d5d8b2ccbe159
                                                                    • Instruction Fuzzy Hash: EE117C7192CF028AE7209B24E41036D26A2ABF6748F548135D6AC63AE5DF7CE588CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (format != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-1927795013
                                                                    • Opcode ID: 98ed0b5fdb5fc60e70232fca9ee65f87cb4d2692f01eaf8ea89a3da70423e3bd
                                                                    • Instruction ID: 6e74943772171d575dddd6d3f7ee4b10fcb1de013a7a49fe139c63ddf7d3cff4
                                                                    • Opcode Fuzzy Hash: 98ed0b5fdb5fc60e70232fca9ee65f87cb4d2692f01eaf8ea89a3da70423e3bd
                                                                    • Instruction Fuzzy Hash: AB014C71D2CF468BF7208B24E45076D2292BBE2354F548235E65C626E5DF7CE585CB10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL
                                                                    • API String ID: 2123368286-577066449
                                                                    • Opcode ID: e471ef19857bf677b9863c0521a2362ee6eb8c4f9ff1322e4db10fa111c1afe4
                                                                    • Instruction ID: a27c07103cf444e28064ff09c905045d568fba96ace7be995994291ad55ea340
                                                                    • Opcode Fuzzy Hash: e471ef19857bf677b9863c0521a2362ee6eb8c4f9ff1322e4db10fa111c1afe4
                                                                    • Instruction Fuzzy Hash: 9E01B17192CF068AE7208B10E4513AD2252AFE6754F848035E64EA2AE8DF7CE584CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _msize_dbg$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pUserData != NULL
                                                                    • API String ID: 2123368286-563024394
                                                                    • Opcode ID: 4f42008d2eeb6119988a971f0b8ebe92e3bb2dd5d0d6607e11ba140e367e8579
                                                                    • Instruction ID: f4124f275b278abd7ec18a24d734cf3dee4348de9d5a91f2d5ad8f93b309d746
                                                                    • Opcode Fuzzy Hash: 4f42008d2eeb6119988a971f0b8ebe92e3bb2dd5d0d6607e11ba140e367e8579
                                                                    • Instruction Fuzzy Hash: 1D015EB2A28F0686E7209B10E45036D7262BBE2364F688639D26D626D4DF7DD584CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 1646373207-1276376045
                                                                    • Opcode ID: 5b280635b15effc0f011d898b8b9467002935a92ac88a45419cb005d03af6660
                                                                    • Instruction ID: 02988ff4348b7a6aa1face88e50a226b78bf111c5ef41074de90459dc1d5aa46
                                                                    • Opcode Fuzzy Hash: 5b280635b15effc0f011d898b8b9467002935a92ac88a45419cb005d03af6660
                                                                    • Instruction Fuzzy Hash: 71F0F832928F42C2D620DB04F45832E6771FBE5348F484134E6CE52664CF3CD588CA00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 41%
                                                                    			E00007FFA7FFA532B0C80(signed int __ecx, void* __eflags, void* __rax, void* __r8, signed int _a8) {
                                                                    				signed long long _v16;
                                                                    				long _v24;
                                                                    				void* _t57;
                                                                    				signed long long _t59;
                                                                    
                                                                    				_t57 = __rax;
                                                                    				_a8 = __ecx;
                                                                    				E00007FFA7FFA532AF900(_a8);
                                                                    				if (_t57 == 0xffffffff) goto 0x532b0d05;
                                                                    				if (_a8 != 1) goto 0x532b0cb3;
                                                                    				if (( *( *0x532be560 + 0xb8) & 0x00000001) != 0) goto 0x532b0ccc;
                                                                    				if (_a8 != 2) goto 0x532b0cef;
                                                                    				_t59 =  *0x532be560;
                                                                    				if (( *(_t59 + 0x60) & 0x00000001) == 0) goto 0x532b0cef;
                                                                    				E00007FFA7FFA532AF900(1);
                                                                    				_v16 = _t59;
                                                                    				E00007FFA7FFA532AF900(2);
                                                                    				if (_v16 == _t59) goto 0x532b0d05;
                                                                    				E00007FFA7FFA532AF900(_a8);
                                                                    				if (CloseHandle(??) == 0) goto 0x532b0d0f;
                                                                    				_v24 = 0;
                                                                    				goto 0x532b0d19;
                                                                    				_v24 = GetLastError();
                                                                    				E00007FFA7FFA532AF7D0(_a8, _t59);
                                                                    				 *((char*)( *((intOrPtr*)(0x532be560 + _t59 * 8)) + 8 + (_a8 & 0x0000001f) * 0x58)) = 0;
                                                                    				if (_v24 == 0) goto 0x532b0d60;
                                                                    				E00007FFA7FFA5329AA70(_v24,  *((intOrPtr*)(0x532be560 + _t59 * 8)));
                                                                    				goto 0x532b0d62;
                                                                    				return 0;
                                                                    			}







                                                                    0x7ffa532b0c80
                                                                    0x7ffa532b0c80
                                                                    0x7ffa532b0c8c
                                                                    0x7ffa532b0c95
                                                                    0x7ffa532b0c9c
                                                                    0x7ffa532b0cb1
                                                                    0x7ffa532b0cb8
                                                                    0x7ffa532b0cba
                                                                    0x7ffa532b0cca
                                                                    0x7ffa532b0cd1
                                                                    0x7ffa532b0cd6
                                                                    0x7ffa532b0ce0
                                                                    0x7ffa532b0ced
                                                                    0x7ffa532b0cf3
                                                                    0x7ffa532b0d03
                                                                    0x7ffa532b0d05
                                                                    0x7ffa532b0d0d
                                                                    0x7ffa532b0d15
                                                                    0x7ffa532b0d1d
                                                                    0x7ffa532b0d44
                                                                    0x7ffa532b0d4e
                                                                    0x7ffa532b0d54
                                                                    0x7ffa532b0d5e
                                                                    0x7ffa532b0d66

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CloseErrorHandleLast__doserrno_dosmaperr_free_osfhnd
                                                                    • String ID:
                                                                    • API String ID: 1551955814-0
                                                                    • Opcode ID: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                                    • Instruction ID: ef58bcd8b9eb259d0b2f2c4248bc06c57787907ece7fdbe92d1ecb363c1e8127
                                                                    • Opcode Fuzzy Hash: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                                    • Instruction Fuzzy Hash: B6216032A2CF4687E6219B10E86123E76A3FBE6354F18C235D65E576E5DF2CE841CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FormatLocaleThread$DateTime
                                                                    • String ID:
                                                                    • API String ID: 3587784874-0
                                                                    • Opcode ID: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                                    • Instruction ID: 2eb2d87e021567c9d587532640b2d897cb8f175f341f29aa2c45b62d1ddca162
                                                                    • Opcode Fuzzy Hash: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                                    • Instruction Fuzzy Hash: 2C11C132618F8086E3208F65F44015EB7A1FB99BA4F588B34EE9D57B98CE3DD1418B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 35%
                                                                    			E00007FFA7FFA532A4960(void* __ecx, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int _a40, intOrPtr _a48, long long _a56, long long _a64) {
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				long long _v56;
                                                                    				char _v60;
                                                                    				char _v64;
                                                                    				signed int _v72;
                                                                    				char _v80;
                                                                    				char _v88;
                                                                    				long long _v96;
                                                                    				intOrPtr _v104;
                                                                    				long long _v112;
                                                                    				long long _v120;
                                                                    				long long _v128;
                                                                    				signed int _v136;
                                                                    				void* _t106;
                                                                    				void* _t117;
                                                                    				void* _t118;
                                                                    				void* _t119;
                                                                    				void* _t120;
                                                                    				void* _t121;
                                                                    				long long _t153;
                                                                    				signed int _t161;
                                                                    				signed int _t165;
                                                                    				long long _t166;
                                                                    				long long _t169;
                                                                    				long long _t170;
                                                                    				intOrPtr _t174;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_t153 = _a8;
                                                                    				if ( *_t153 != 0x80000003) goto 0x532a4990;
                                                                    				goto 0x532a4cc6;
                                                                    				0x53294000();
                                                                    				if ( *((long long*)(_t153 + 0xe0)) == 0) goto 0x532a4a33;
                                                                    				0x53294000();
                                                                    				_v56 = _t153;
                                                                    				E00007FFA7FFA53293D00(_t106);
                                                                    				if ( *((intOrPtr*)(_v56 + 0xe0)) == _t153) goto 0x532a4a33;
                                                                    				if ( *_a8 == 0xe0434f4d) goto 0x532a4a33;
                                                                    				if ( *_a8 == 0xe0434352) goto 0x532a4a33;
                                                                    				_v120 = _a64;
                                                                    				_v128 = _a56;
                                                                    				_v136 = _a40;
                                                                    				if (E00007FFA7FFA5329E9B0(_a8, _a16, _a24, _a32) == 0) goto 0x532a4a33;
                                                                    				goto 0x532a4cc6;
                                                                    				if ( *((intOrPtr*)(_a40 + 0xc)) == 0) goto 0x532a4a43;
                                                                    				goto 0x532a4a48;
                                                                    				E00007FFA7FFA5329CF80(_a40);
                                                                    				_v120 = _a32;
                                                                    				_v128 =  &_v60;
                                                                    				_t161 =  &_v64;
                                                                    				_v136 = _t161;
                                                                    				r9d = _a48;
                                                                    				r8d = _a56;
                                                                    				E00007FFA7FFA5329EA30(_a16, _a40);
                                                                    				_v72 = _t161;
                                                                    				_v64 = _v64 + 1;
                                                                    				_v72 = _v72 + 0x14;
                                                                    				if (_v64 - _v60 >= 0) goto 0x532a4cc6;
                                                                    				if (_a48 -  *_v72 < 0) goto 0x532a4c2b;
                                                                    				_t165 = _v72;
                                                                    				if (_a48 -  *((intOrPtr*)(_t165 + 4)) > 0) goto 0x532a4c2b;
                                                                    				_t117 = E00007FFA7FFA5329E680( *((intOrPtr*)(_t165 + 4)), _t165);
                                                                    				_t166 = _t165 +  *((intOrPtr*)(_v72 + 0x10));
                                                                    				if ( *((intOrPtr*)(_t166 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0x532a4b53;
                                                                    				_t118 = E00007FFA7FFA5329E680(_t117, _t166);
                                                                    				_v48 = _t166;
                                                                    				_t119 = E00007FFA7FFA5329E680(_t118, _t166);
                                                                    				_t169 = _v48 +  *((intOrPtr*)(_t166 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                                    				_v40 = _t169;
                                                                    				goto 0x532a4b5f;
                                                                    				_v40 = 0;
                                                                    				if (_v40 == 0) goto 0x532a4bff;
                                                                    				_t120 = E00007FFA7FFA5329E680(_t119, _t169);
                                                                    				_t170 = _t169 +  *((intOrPtr*)(_v72 + 0x10));
                                                                    				if ( *((intOrPtr*)(_t170 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0x532a4be3;
                                                                    				_t121 = E00007FFA7FFA5329E680(_t120, _t170);
                                                                    				_v32 = _t170;
                                                                    				E00007FFA7FFA5329E680(_t121, _t170);
                                                                    				_v24 = _v32 +  *((intOrPtr*)(_t170 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                                    				goto 0x532a4bef;
                                                                    				_v24 = 0;
                                                                    				_t174 = _v24;
                                                                    				if ( *((char*)(_t174 + 0x10)) != 0) goto 0x532a4c2b;
                                                                    				E00007FFA7FFA5329E680( *((char*)(_t174 + 0x10)), _t174);
                                                                    				if (( *(_t174 +  *((intOrPtr*)(_v72 + 0x10)) + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14) & 0x00000040) == 0) goto 0x532a4c30;
                                                                    				goto L1;
                                                                    				__eax = E00007FFA7FFA5329E680(__eax, __rax);
                                                                    				_v72 =  *((intOrPtr*)(_v72 + 0x10));
                                                                    				__rax = __rax +  *((intOrPtr*)(_v72 + 0x10));
                                                                    				_v72 =  *((intOrPtr*)(_v72 + 0xc)) - 1;
                                                                    				__rcx = ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                                    				__rax = __rax + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                                    				__eflags = __rax;
                                                                    				_v80 = 0;
                                                                    				_v88 = 1;
                                                                    				__rcx = _a64;
                                                                    				_v96 = _a64;
                                                                    				_v104 = _a56;
                                                                    				__rcx = _v72;
                                                                    				_v112 = _v72;
                                                                    				_v120 = 0;
                                                                    				_v128 = __rax;
                                                                    				__rax = _a40;
                                                                    				_v136 = _a40;
                                                                    				__r9 = _a32;
                                                                    				__r8 = _a24;
                                                                    				__rdx = _a16;
                                                                    				__rcx = _a8;
                                                                    				__eax = E00007FFA7FFA532A5180(__edi, __esi, __esp, __eflags, _a8, _a16, _a24, _a32);
                                                                    				goto L1;
                                                                    				return __eax;
                                                                    			}
































                                                                    0x7ffa532a4960
                                                                    0x7ffa532a4965
                                                                    0x7ffa532a496a
                                                                    0x7ffa532a496f
                                                                    0x7ffa532a497b
                                                                    0x7ffa532a4989
                                                                    0x7ffa532a498b
                                                                    0x7ffa532a4990
                                                                    0x7ffa532a499d
                                                                    0x7ffa532a49a3
                                                                    0x7ffa532a49a8
                                                                    0x7ffa532a49ad
                                                                    0x7ffa532a49be
                                                                    0x7ffa532a49ce
                                                                    0x7ffa532a49de
                                                                    0x7ffa532a49e8
                                                                    0x7ffa532a49f4
                                                                    0x7ffa532a4a00
                                                                    0x7ffa532a4a2c
                                                                    0x7ffa532a4a2e
                                                                    0x7ffa532a4a3f
                                                                    0x7ffa532a4a41
                                                                    0x7ffa532a4a43
                                                                    0x7ffa532a4a50
                                                                    0x7ffa532a4a5a
                                                                    0x7ffa532a4a5f
                                                                    0x7ffa532a4a64
                                                                    0x7ffa532a4a69
                                                                    0x7ffa532a4a71
                                                                    0x7ffa532a4a89
                                                                    0x7ffa532a4a8e
                                                                    0x7ffa532a4a9b
                                                                    0x7ffa532a4aa8
                                                                    0x7ffa532a4ab5
                                                                    0x7ffa532a4ac9
                                                                    0x7ffa532a4acf
                                                                    0x7ffa532a4ade
                                                                    0x7ffa532a4ae4
                                                                    0x7ffa532a4af2
                                                                    0x7ffa532a4b0b
                                                                    0x7ffa532a4b0d
                                                                    0x7ffa532a4b12
                                                                    0x7ffa532a4b17
                                                                    0x7ffa532a4b46
                                                                    0x7ffa532a4b49
                                                                    0x7ffa532a4b51
                                                                    0x7ffa532a4b53
                                                                    0x7ffa532a4b68
                                                                    0x7ffa532a4b6e
                                                                    0x7ffa532a4b7c
                                                                    0x7ffa532a4b95
                                                                    0x7ffa532a4b97
                                                                    0x7ffa532a4b9c
                                                                    0x7ffa532a4ba4
                                                                    0x7ffa532a4bd9
                                                                    0x7ffa532a4be1
                                                                    0x7ffa532a4be3
                                                                    0x7ffa532a4bef
                                                                    0x7ffa532a4bfd
                                                                    0x7ffa532a4bff
                                                                    0x7ffa532a4c29
                                                                    0x7ffa532a4c2b
                                                                    0x7ffa532a4c30
                                                                    0x7ffa532a4c3a
                                                                    0x7ffa532a4c3e
                                                                    0x7ffa532a4c4b
                                                                    0x7ffa532a4c4e
                                                                    0x7ffa532a4c52
                                                                    0x7ffa532a4c52
                                                                    0x7ffa532a4c55
                                                                    0x7ffa532a4c5a
                                                                    0x7ffa532a4c5f
                                                                    0x7ffa532a4c67
                                                                    0x7ffa532a4c73
                                                                    0x7ffa532a4c77
                                                                    0x7ffa532a4c7c
                                                                    0x7ffa532a4c81
                                                                    0x7ffa532a4c8a
                                                                    0x7ffa532a4c8f
                                                                    0x7ffa532a4c97
                                                                    0x7ffa532a4c9c
                                                                    0x7ffa532a4ca4
                                                                    0x7ffa532a4cac
                                                                    0x7ffa532a4cb4
                                                                    0x7ffa532a4cbc
                                                                    0x7ffa532a4cc1
                                                                    0x7ffa532a4ccd

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 0-2084237596
                                                                    • Opcode ID: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                                    • Instruction ID: 055c4fcc41f47dac43392a38baa1f61e088768ee9e4a9fe6b21833c58a2ca340
                                                                    • Opcode Fuzzy Hash: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                                    • Instruction Fuzzy Hash: 0091F73261DF8182DA64DB45E09136EB3A2FBD5B44F148436EA8E93B99CF7CE051CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 19%
                                                                    			E00007FFA7FFA532AC6F8(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                    				signed int _t217;
                                                                    				signed char _t222;
                                                                    				intOrPtr _t257;
                                                                    				signed int _t332;
                                                                    				signed int _t333;
                                                                    				signed long long _t336;
                                                                    				intOrPtr* _t359;
                                                                    				signed long long _t384;
                                                                    
                                                                    				_t332 = __rax;
                                                                    				_a116 = 0x10;
                                                                    				asm("bts eax, 0xf");
                                                                    				_a708 = 7;
                                                                    				_a708 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ac754;
                                                                    				_a84 = 0x30;
                                                                    				_a85 = _a708 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ac777;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0x532ac79e;
                                                                    				E00007FFA7FFA532A1EA0( &_a1112);
                                                                    				_a824 = _t332;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0x532ac7c5;
                                                                    				E00007FFA7FFA532A1EA0( &_a1112);
                                                                    				_a824 = _t332;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0x532ac810;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac7f6;
                                                                    				_t333 = E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				goto 0x532ac80e;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				goto 0x532ac84b;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac834;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				goto 0x532ac84b;
                                                                    				E00007FFA7FFA532A1E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ac882;
                                                                    				if (_a824 >= 0) goto 0x532ac882;
                                                                    				_a832 =  ~_a824;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0x532ac892;
                                                                    				_t336 = _a824;
                                                                    				_a832 = _t336;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0x532ac8c7;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0x532ac8c7;
                                                                    				_a832 = _a832 & _t336;
                                                                    				if (_a116 >= 0) goto 0x532ac8d8;
                                                                    				_a116 = 1;
                                                                    				goto 0x532ac8f5;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0x532ac8f5;
                                                                    				_a116 = 0x200;
                                                                    				if (_a832 != 0) goto 0x532ac908;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t217 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t217 > 0) goto 0x532ac936;
                                                                    				if (_a832 == 0) goto 0x532ac9d3;
                                                                    				_a1040 = _a72;
                                                                    				_a816 = _t217 / _a1040 + 0x30;
                                                                    				_a1048 = _a72;
                                                                    				if (_a816 - 0x39 <= 0) goto 0x532ac9b2;
                                                                    				_t222 = _a816 + _a708;
                                                                    				_a816 = _t222;
                                                                    				 *_a64 = _a816 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0x532ac915;
                                                                    				_a104 = _t222;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0x532aca31;
                                                                    				if (_a104 == 0) goto 0x532aca12;
                                                                    				if ( *_a64 == 0x30) goto 0x532aca31;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0x532acc6e;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0x532aca63;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0x532aca7d;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aca95;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0x532aca95;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a840 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0x532acad5;
                                                                    				E00007FFA7FFA532ACF10(0x20, _a840, _a1088,  &_a688);
                                                                    				E00007FFA7FFA532ACF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0x532acb27;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0x532acb27;
                                                                    				E00007FFA7FFA532ACF10(0x30, _a840, _a1088,  &_a688);
                                                                    				if (_a76 == 0) goto 0x532acc1d;
                                                                    				if (_a104 <= 0) goto 0x532acc1d;
                                                                    				_a872 = 0;
                                                                    				_a848 = _a64;
                                                                    				_a856 = _a104;
                                                                    				_a856 = _a856 - 1;
                                                                    				if (_a856 == 0) goto 0x532acc1b;
                                                                    				_a1056 =  *_a848 & 0x0000ffff;
                                                                    				r9d = _a1056 & 0x0000ffff;
                                                                    				r8d = 6;
                                                                    				_a872 = E00007FFA7FFA532AB530( &_a860,  &_a864, _a1088);
                                                                    				_a848 =  &(_a848[1]);
                                                                    				if (_a872 != 0) goto 0x532acbe5;
                                                                    				if (_a860 != 0) goto 0x532acbf2;
                                                                    				_a688 = 0xffffffff;
                                                                    				goto 0x532acc1b;
                                                                    				E00007FFA7FFA532ACF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                    				goto 0x532acb60;
                                                                    				goto 0x532acc3b;
                                                                    				E00007FFA7FFA532ACF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                    				if (_a688 < 0) goto 0x532acc6e;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0x532acc6e;
                                                                    				E00007FFA7FFA532ACF10(0x20, _a840, _a1088,  &_a688);
                                                                    				if (_a96 == 0) goto 0x532acc8e;
                                                                    				0x53295330();
                                                                    				_a96 = 0;
                                                                    				goto 0x532ab99c;
                                                                    				if (_a704 == 0) goto 0x532accb4;
                                                                    				if (_a704 == 7) goto 0x532accb4;
                                                                    				_a1060 = 0;
                                                                    				goto 0x532accbf;
                                                                    				_a1060 = 1;
                                                                    				_t257 = _a1060;
                                                                    				_a876 = _t257;
                                                                    				if (_a876 != 0) goto 0x532acd05;
                                                                    				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t359;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0x5329b3b0();
                                                                    				if (_t257 != 1) goto 0x532acd05;
                                                                    				asm("int3");
                                                                    				if (_a876 != 0) goto 0x532acd61;
                                                                    				0x5329ab30();
                                                                    				 *_t359 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E00007FFA7FFA5329BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a912 = 0xffffffff;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				goto 0x532acd80;
                                                                    				_a916 = _a688;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				return E00007FFA7FFA53293280(_a916, 2, 2, _a1064 ^ _t384, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}











                                                                    0x7ffa532ac6f8
                                                                    0x7ffa532ac6f8
                                                                    0x7ffa532ac704
                                                                    0x7ffa532ac70c
                                                                    0x7ffa532ac719
                                                                    0x7ffa532ac724
                                                                    0x7ffa532ac737
                                                                    0x7ffa532ac739
                                                                    0x7ffa532ac748
                                                                    0x7ffa532ac74c
                                                                    0x7ffa532ac756
                                                                    0x7ffa532ac769
                                                                    0x7ffa532ac76f
                                                                    0x7ffa532ac782
                                                                    0x7ffa532ac78c
                                                                    0x7ffa532ac791
                                                                    0x7ffa532ac799
                                                                    0x7ffa532ac7a9
                                                                    0x7ffa532ac7b3
                                                                    0x7ffa532ac7b8
                                                                    0x7ffa532ac7c0
                                                                    0x7ffa532ac7ce
                                                                    0x7ffa532ac7d9
                                                                    0x7ffa532ac7e8
                                                                    0x7ffa532ac7ec
                                                                    0x7ffa532ac7f4
                                                                    0x7ffa532ac7fe
                                                                    0x7ffa532ac806
                                                                    0x7ffa532ac80e
                                                                    0x7ffa532ac819
                                                                    0x7ffa532ac823
                                                                    0x7ffa532ac82a
                                                                    0x7ffa532ac832
                                                                    0x7ffa532ac83c
                                                                    0x7ffa532ac843
                                                                    0x7ffa532ac854
                                                                    0x7ffa532ac85f
                                                                    0x7ffa532ac86c
                                                                    0x7ffa532ac878
                                                                    0x7ffa532ac880
                                                                    0x7ffa532ac882
                                                                    0x7ffa532ac88a
                                                                    0x7ffa532ac89d
                                                                    0x7ffa532ac8aa
                                                                    0x7ffa532ac8bf
                                                                    0x7ffa532ac8cc
                                                                    0x7ffa532ac8ce
                                                                    0x7ffa532ac8d6
                                                                    0x7ffa532ac8df
                                                                    0x7ffa532ac8eb
                                                                    0x7ffa532ac8ed
                                                                    0x7ffa532ac8fe
                                                                    0x7ffa532ac900
                                                                    0x7ffa532ac910
                                                                    0x7ffa532ac915
                                                                    0x7ffa532ac91f
                                                                    0x7ffa532ac925
                                                                    0x7ffa532ac930
                                                                    0x7ffa532ac93b
                                                                    0x7ffa532ac95e
                                                                    0x7ffa532ac96a
                                                                    0x7ffa532ac997
                                                                    0x7ffa532ac9a9
                                                                    0x7ffa532ac9ab
                                                                    0x7ffa532ac9bf
                                                                    0x7ffa532ac9c9
                                                                    0x7ffa532ac9ce
                                                                    0x7ffa532ac9e0
                                                                    0x7ffa532ac9ec
                                                                    0x7ffa532ac9fc
                                                                    0x7ffa532aca03
                                                                    0x7ffa532aca10
                                                                    0x7ffa532aca1a
                                                                    0x7ffa532aca24
                                                                    0x7ffa532aca2d
                                                                    0x7ffa532aca36
                                                                    0x7ffa532aca45
                                                                    0x7ffa532aca52
                                                                    0x7ffa532aca54
                                                                    0x7ffa532aca59
                                                                    0x7ffa532aca61
                                                                    0x7ffa532aca6c
                                                                    0x7ffa532aca6e
                                                                    0x7ffa532aca73
                                                                    0x7ffa532aca7b
                                                                    0x7ffa532aca86
                                                                    0x7ffa532aca88
                                                                    0x7ffa532aca8d
                                                                    0x7ffa532acaa5
                                                                    0x7ffa532acab5
                                                                    0x7ffa532acad0
                                                                    0x7ffa532acaee
                                                                    0x7ffa532acafc
                                                                    0x7ffa532acb07
                                                                    0x7ffa532acb22
                                                                    0x7ffa532acb2c
                                                                    0x7ffa532acb37
                                                                    0x7ffa532acb3d
                                                                    0x7ffa532acb4d
                                                                    0x7ffa532acb59
                                                                    0x7ffa532acb70
                                                                    0x7ffa532acb79
                                                                    0x7ffa532acb8a
                                                                    0x7ffa532acb92
                                                                    0x7ffa532acb9b
                                                                    0x7ffa532acbb6
                                                                    0x7ffa532acbc9
                                                                    0x7ffa532acbd9
                                                                    0x7ffa532acbe3
                                                                    0x7ffa532acbe5
                                                                    0x7ffa532acbf0
                                                                    0x7ffa532acc11
                                                                    0x7ffa532acc16
                                                                    0x7ffa532acc1b
                                                                    0x7ffa532acc36
                                                                    0x7ffa532acc43
                                                                    0x7ffa532acc4e
                                                                    0x7ffa532acc69
                                                                    0x7ffa532acc74
                                                                    0x7ffa532acc80
                                                                    0x7ffa532acc85
                                                                    0x7ffa532acc8e
                                                                    0x7ffa532acc9b
                                                                    0x7ffa532acca5
                                                                    0x7ffa532acca7
                                                                    0x7ffa532accb2
                                                                    0x7ffa532accb4
                                                                    0x7ffa532accbf
                                                                    0x7ffa532accc6
                                                                    0x7ffa532accd5
                                                                    0x7ffa532accd7
                                                                    0x7ffa532accde
                                                                    0x7ffa532acce3
                                                                    0x7ffa532acce6
                                                                    0x7ffa532accf8
                                                                    0x7ffa532acd00
                                                                    0x7ffa532acd02
                                                                    0x7ffa532acd0d
                                                                    0x7ffa532acd0f
                                                                    0x7ffa532acd14
                                                                    0x7ffa532acd1a
                                                                    0x7ffa532acd23
                                                                    0x7ffa532acd3e
                                                                    0x7ffa532acd43
                                                                    0x7ffa532acd53
                                                                    0x7ffa532acd5f
                                                                    0x7ffa532acd68
                                                                    0x7ffa532acd74
                                                                    0x7ffa532acd97

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: 0$9
                                                                    • API String ID: 1967237116-1975997740
                                                                    • Opcode ID: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                                    • Instruction ID: 875188e87403ea03489753c5e7ea8929fcf5097a908cc9b6d57f769775d25d17
                                                                    • Opcode Fuzzy Hash: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                                    • Instruction Fuzzy Hash: C641D23261DFD18BE7658B19E4813AEB7A5F7D5750F084125E78C86A88DBBCE540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 23%
                                                                    			E00007FFA7FFA532AE70C(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                                    				signed int _t213;
                                                                    				signed char _t218;
                                                                    				void* _t249;
                                                                    				intOrPtr _t257;
                                                                    				signed int _t331;
                                                                    				signed int _t332;
                                                                    				signed long long _t335;
                                                                    				intOrPtr* _t354;
                                                                    				intOrPtr* _t359;
                                                                    				signed long long _t389;
                                                                    
                                                                    				_t331 = __rax;
                                                                    				_a1220 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ae74d;
                                                                    				_a84 = 0x30;
                                                                    				_a86 = _a1220 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0x532ae770;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0x532ae797;
                                                                    				E00007FFA7FFA532A1EA0( &_a1560);
                                                                    				_a1304 = _t331;
                                                                    				goto 0x532ae844;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0x532ae7be;
                                                                    				E00007FFA7FFA532A1EA0( &_a1560);
                                                                    				_a1304 = _t331;
                                                                    				goto 0x532ae844;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0x532ae809;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ae7ef;
                                                                    				_t332 = E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				goto 0x532ae807;
                                                                    				E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				goto 0x532ae844;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ae82d;
                                                                    				E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				goto 0x532ae844;
                                                                    				E00007FFA7FFA532A1E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532ae87b;
                                                                    				if (_a1304 >= 0) goto 0x532ae87b;
                                                                    				_a1312 =  ~_a1304;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0x532ae88b;
                                                                    				_t335 = _a1304;
                                                                    				_a1312 = _t335;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0x532ae8c0;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0x532ae8c0;
                                                                    				_a1312 = _a1312 & _t335;
                                                                    				if (_a116 >= 0) goto 0x532ae8d1;
                                                                    				_a116 = 1;
                                                                    				goto 0x532ae8ee;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0x532ae8ee;
                                                                    				_a116 = 0x200;
                                                                    				if (_a1312 != 0) goto 0x532ae901;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t213 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t213 > 0) goto 0x532ae92f;
                                                                    				if (_a1312 == 0) goto 0x532ae9cc;
                                                                    				_a1480 = _a72;
                                                                    				_a1296 = _t213 / _a1480 + 0x30;
                                                                    				_a1488 = _a72;
                                                                    				if (_a1296 - 0x39 <= 0) goto 0x532ae9ab;
                                                                    				_t218 = _a1296 + _a1220;
                                                                    				_a1296 = _t218;
                                                                    				 *_a64 = _a1296 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0x532ae90e;
                                                                    				_a104 = _t218;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0x532aea2a;
                                                                    				if (_a104 == 0) goto 0x532aea0b;
                                                                    				if ( *_a64 == 0x30) goto 0x532aea2a;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0x532aec7c;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0x532aea9d;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0x532aea61;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aea9d;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0x532aea80;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0x532aea9d;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0x532aea9d;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a1320 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0x532aeadf;
                                                                    				E00007FFA7FFA532AEEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				E00007FFA7FFA532AEF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0x532aeb33;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0x532aeb33;
                                                                    				E00007FFA7FFA532AEEC0(0x30, _a1320, _a1536,  &_a1200);
                                                                    				if (_a76 != 0) goto 0x532aec29;
                                                                    				if (_a104 <= 0) goto 0x532aec29;
                                                                    				_t354 = _a64;
                                                                    				_a1328 = _t354;
                                                                    				_a1336 = _a104;
                                                                    				_a1336 = _a1336 - 1;
                                                                    				if (_a1336 <= 0) goto 0x532aec27;
                                                                    				_t249 = E00007FFA7FFA53296840(_a1336,  &_a120);
                                                                    				_a1496 = _t354;
                                                                    				E00007FFA7FFA53296840(_t249,  &_a120);
                                                                    				_a1340 = E00007FFA7FFA532AF000( &_a1212, _a1328,  *((intOrPtr*)( *_t354 + 0x10c)), _a1496);
                                                                    				if (_a1340 > 0) goto 0x532aebe7;
                                                                    				_a1200 = 0xffffffff;
                                                                    				goto 0x532aec27;
                                                                    				E00007FFA7FFA532AEE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                                    				_a1328 = _a1328 + _a1340;
                                                                    				goto 0x532aeb61;
                                                                    				goto 0x532aec47;
                                                                    				E00007FFA7FFA532AEF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                                    				if (_a1200 < 0) goto 0x532aec7c;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0x532aec7c;
                                                                    				E00007FFA7FFA532AEEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				if (_a96 == 0) goto 0x532aec9c;
                                                                    				0x53295330();
                                                                    				_a96 = 0;
                                                                    				goto 0x532ada75;
                                                                    				if (_a1216 == 0) goto 0x532aecc2;
                                                                    				if (_a1216 == 7) goto 0x532aecc2;
                                                                    				_a1504 = 0;
                                                                    				goto 0x532aeccd;
                                                                    				_a1504 = 1;
                                                                    				_t257 = _a1504;
                                                                    				_a1344 = _t257;
                                                                    				if (_a1344 != 0) goto 0x532aed13;
                                                                    				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t359;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0x5329b3b0();
                                                                    				if (_t257 != 1) goto 0x532aed13;
                                                                    				asm("int3");
                                                                    				if (_a1344 != 0) goto 0x532aed6f;
                                                                    				0x5329ab30();
                                                                    				 *_t359 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E00007FFA7FFA5329BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a1376 = 0xffffffff;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				goto 0x532aed8e;
                                                                    				_a1380 = _a1200;
                                                                    				E00007FFA7FFA53296800( &_a120);
                                                                    				return E00007FFA7FFA53293280(_a1380, 2, 2, _a1512 ^ _t389, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}













                                                                    0x7ffa532ae70c
                                                                    0x7ffa532ae70c
                                                                    0x7ffa532ae717
                                                                    0x7ffa532ae72a
                                                                    0x7ffa532ae731
                                                                    0x7ffa532ae740
                                                                    0x7ffa532ae745
                                                                    0x7ffa532ae74f
                                                                    0x7ffa532ae762
                                                                    0x7ffa532ae768
                                                                    0x7ffa532ae77b
                                                                    0x7ffa532ae785
                                                                    0x7ffa532ae78a
                                                                    0x7ffa532ae792
                                                                    0x7ffa532ae7a2
                                                                    0x7ffa532ae7ac
                                                                    0x7ffa532ae7b1
                                                                    0x7ffa532ae7b9
                                                                    0x7ffa532ae7c7
                                                                    0x7ffa532ae7d2
                                                                    0x7ffa532ae7e1
                                                                    0x7ffa532ae7e5
                                                                    0x7ffa532ae7ed
                                                                    0x7ffa532ae7f7
                                                                    0x7ffa532ae7ff
                                                                    0x7ffa532ae807
                                                                    0x7ffa532ae812
                                                                    0x7ffa532ae81c
                                                                    0x7ffa532ae823
                                                                    0x7ffa532ae82b
                                                                    0x7ffa532ae835
                                                                    0x7ffa532ae83c
                                                                    0x7ffa532ae84d
                                                                    0x7ffa532ae858
                                                                    0x7ffa532ae865
                                                                    0x7ffa532ae871
                                                                    0x7ffa532ae879
                                                                    0x7ffa532ae87b
                                                                    0x7ffa532ae883
                                                                    0x7ffa532ae896
                                                                    0x7ffa532ae8a3
                                                                    0x7ffa532ae8b8
                                                                    0x7ffa532ae8c5
                                                                    0x7ffa532ae8c7
                                                                    0x7ffa532ae8cf
                                                                    0x7ffa532ae8d8
                                                                    0x7ffa532ae8e4
                                                                    0x7ffa532ae8e6
                                                                    0x7ffa532ae8f7
                                                                    0x7ffa532ae8f9
                                                                    0x7ffa532ae909
                                                                    0x7ffa532ae90e
                                                                    0x7ffa532ae918
                                                                    0x7ffa532ae91e
                                                                    0x7ffa532ae929
                                                                    0x7ffa532ae934
                                                                    0x7ffa532ae957
                                                                    0x7ffa532ae963
                                                                    0x7ffa532ae990
                                                                    0x7ffa532ae9a2
                                                                    0x7ffa532ae9a4
                                                                    0x7ffa532ae9b8
                                                                    0x7ffa532ae9c2
                                                                    0x7ffa532ae9c7
                                                                    0x7ffa532ae9d9
                                                                    0x7ffa532ae9e5
                                                                    0x7ffa532ae9f5
                                                                    0x7ffa532ae9fc
                                                                    0x7ffa532aea09
                                                                    0x7ffa532aea13
                                                                    0x7ffa532aea1d
                                                                    0x7ffa532aea26
                                                                    0x7ffa532aea2f
                                                                    0x7ffa532aea3e
                                                                    0x7ffa532aea4b
                                                                    0x7ffa532aea52
                                                                    0x7ffa532aea57
                                                                    0x7ffa532aea5f
                                                                    0x7ffa532aea6a
                                                                    0x7ffa532aea71
                                                                    0x7ffa532aea76
                                                                    0x7ffa532aea7e
                                                                    0x7ffa532aea89
                                                                    0x7ffa532aea90
                                                                    0x7ffa532aea95
                                                                    0x7ffa532aeaad
                                                                    0x7ffa532aeabd
                                                                    0x7ffa532aeada
                                                                    0x7ffa532aeaf8
                                                                    0x7ffa532aeb06
                                                                    0x7ffa532aeb11
                                                                    0x7ffa532aeb2e
                                                                    0x7ffa532aeb38
                                                                    0x7ffa532aeb43
                                                                    0x7ffa532aeb49
                                                                    0x7ffa532aeb4e
                                                                    0x7ffa532aeb5a
                                                                    0x7ffa532aeb71
                                                                    0x7ffa532aeb7a
                                                                    0x7ffa532aeb85
                                                                    0x7ffa532aeb8a
                                                                    0x7ffa532aeb97
                                                                    0x7ffa532aebc9
                                                                    0x7ffa532aebd8
                                                                    0x7ffa532aebda
                                                                    0x7ffa532aebe5
                                                                    0x7ffa532aebff
                                                                    0x7ffa532aec1a
                                                                    0x7ffa532aec22
                                                                    0x7ffa532aec27
                                                                    0x7ffa532aec42
                                                                    0x7ffa532aec4f
                                                                    0x7ffa532aec5a
                                                                    0x7ffa532aec77
                                                                    0x7ffa532aec82
                                                                    0x7ffa532aec8e
                                                                    0x7ffa532aec93
                                                                    0x7ffa532aec9c
                                                                    0x7ffa532aeca9
                                                                    0x7ffa532aecb3
                                                                    0x7ffa532aecb5
                                                                    0x7ffa532aecc0
                                                                    0x7ffa532aecc2
                                                                    0x7ffa532aeccd
                                                                    0x7ffa532aecd4
                                                                    0x7ffa532aece3
                                                                    0x7ffa532aece5
                                                                    0x7ffa532aecec
                                                                    0x7ffa532aecf1
                                                                    0x7ffa532aecf4
                                                                    0x7ffa532aed06
                                                                    0x7ffa532aed0e
                                                                    0x7ffa532aed10
                                                                    0x7ffa532aed1b
                                                                    0x7ffa532aed1d
                                                                    0x7ffa532aed22
                                                                    0x7ffa532aed28
                                                                    0x7ffa532aed31
                                                                    0x7ffa532aed4c
                                                                    0x7ffa532aed51
                                                                    0x7ffa532aed61
                                                                    0x7ffa532aed6d
                                                                    0x7ffa532aed76
                                                                    0x7ffa532aed82
                                                                    0x7ffa532aeda5

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: '$9
                                                                    • API String ID: 1967237116-1823400153
                                                                    • Opcode ID: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                                    • Instruction ID: 8c7361c9d1ca315b601f1428248873b132625d7ba03909036265967e2b317f00
                                                                    • Opcode Fuzzy Hash: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                                    • Instruction Fuzzy Hash: 5241E13261EFC58BE7608B09E8413ABB3A1FBD6751F044125E69CC7A98EBBCD4418F44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock
                                                                    • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgdel.cpp
                                                                    • API String ID: 2480363372-1749241151
                                                                    • Opcode ID: 69826465c09442dd62c721ef0480ef2ecfb8ed15fa83514cc39f9f882c8ed808
                                                                    • Instruction ID: bb6aefa819e18ab064ff56ec65444b23176f5dbb7a3807efb837974b085585ea
                                                                    • Opcode Fuzzy Hash: 69826465c09442dd62c721ef0480ef2ecfb8ed15fa83514cc39f9f882c8ed808
                                                                    • Instruction Fuzzy Hash: F3116D36A38F8286EBA89B14D851A2D6362FBD6750F488035E64E53BA4CE7CE400CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyedExceptionFindFrameObjectUnlink
                                                                    • String ID: csm
                                                                    • API String ID: 1826589669-1018135373
                                                                    • Opcode ID: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                                    • Instruction ID: 672fd2c03e68215d8c74073af9aa249d68985bcc27bebee2756f6f4550678327
                                                                    • Opcode Fuzzy Hash: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                                    • Instruction Fuzzy Hash: 9E114932924F92CADF109F26C4901AD37A2EBA6B84F595131E64E577A1CF24E881C200
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.451412765.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000002.00000002.451406176.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451623193.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451660851.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000002.00000002.451701410.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7ffa53290000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _free_nolock
                                                                    • String ID: ("Corrupted pointer passed to _freea", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\malloc.h
                                                                    • API String ID: 2882679554-3458198949
                                                                    • Opcode ID: 9de8216f17933041b20e0427cd6b955395f4fe92a776214bf069d9d6f9ded054
                                                                    • Instruction ID: 2f2f649f1c2e2cdc76ddbfc0ba1a42bf1ebdeb23a430ddc2078fce3d14672ee0
                                                                    • Opcode Fuzzy Hash: 9de8216f17933041b20e0427cd6b955395f4fe92a776214bf069d9d6f9ded054
                                                                    • Instruction Fuzzy Hash: 15017162A3CF82D6EB909B64E44472EA392F7D1340F449535E68E92F94DFBCD0448B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:5.9%
                                                                    Dynamic/Decrypted Code Coverage:0.6%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:1858
                                                                    Total number of Limit Nodes:41
                                                                    execution_graph 12415 7ffa53296ff2 12416 7ffa53296ffe 12415->12416 12419 7ffa5329ca00 12416->12419 12418 7ffa53297011 _initterm_e 12420 7ffa5329ca0e 12419->12420 12421 7ffa5329ca23 RtlEncodePointer 12420->12421 12422 7ffa5329ca4b 12420->12422 12421->12420 12422->12418 12705 7ffa532991ea 12706 7ffa532991ef 12705->12706 12707 7ffa532974e0 __crtExitProcess 3 API calls 12706->12707 12708 7ffa53299203 12707->12708 14218 7ffa532964eb 14219 7ffa532964f8 14218->14219 14222 7ffa53296504 14219->14222 14223 7ffa53299360 LeaveCriticalSection 14219->14223 14221 7ffa53296655 14223->14221 14224 7ffa5329d0ea 14225 7ffa5329d0ef 14224->14225 14226 7ffa53297090 _exit 33 API calls 14225->14226 14227 7ffa5329d209 14225->14227 14231 7ffa5329d0fc 14225->14231 14226->14227 14229 7ffa5329d289 14227->14229 14232 7ffa53293d00 RtlEncodePointer 14227->14232 14229->14231 14233 7ffa53299360 LeaveCriticalSection 14229->14233 14232->14229 14233->14231 14234 7ffa532a9aeb 14235 7ffa532a9b18 14234->14235 14236 7ffa532a9b2c 14234->14236 14237 7ffa532a9520 19 API calls 14235->14237 14238 7ffa532aab10 17 API calls 14236->14238 14237->14236 14244 7ffa532a9b38 14238->14244 14239 7ffa532a9c04 14240 7ffa532aa1cb 14239->14240 14241 7ffa532a9c23 GetConsoleCP 14239->14241 14242 7ffa532aa205 14240->14242 14243 7ffa532aa8ad WriteFile 14240->14243 14266 7ffa532a9c4d 14241->14266 14247 7ffa532aa21a 14242->14247 14248 7ffa532aa400 14242->14248 14245 7ffa532aa923 GetLastError 14243->14245 14246 7ffa532a9dd9 _dosmaperr __doserrno 14243->14246 14244->14239 14251 7ffa532a9bae GetConsoleMode 14244->14251 14245->14246 14253 7ffa53293280 __GSHandlerCheck 8 API calls 14246->14253 14247->14246 14252 7ffa532aa33e WriteFile 14247->14252 14249 7ffa532aa5f3 14248->14249 14250 7ffa532aa40e 14248->14250 14249->14246 14257 7ffa532aa726 WideCharToMultiByte 14249->14257 14263 7ffa532aa7b0 WriteFile 14249->14263 14250->14246 14254 7ffa532aa531 WriteFile 14250->14254 14251->14239 14252->14247 14258 7ffa532aa3ea GetLastError 14252->14258 14255 7ffa532aa9f5 14253->14255 14254->14250 14259 7ffa532aa5dd GetLastError 14254->14259 14256 7ffa532a9f66 WideCharToMultiByte 14256->14246 14260 7ffa532a9fbf WriteFile 14256->14260 14257->14249 14261 7ffa532aa791 GetLastError 14257->14261 14258->14246 14259->14246 14262 7ffa532aa050 GetLastError 14260->14262 14260->14266 14261->14246 14262->14246 14262->14266 14263->14249 14264 7ffa532aa857 GetLastError 14263->14264 14264->14249 14265 7ffa532aa158 GetLastError 14265->14246 14266->14246 14266->14256 14266->14265 14267 7ffa532aa06d WriteFile 14266->14267 14268 7ffa532af330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 14266->14268 14270 7ffa532afc00 WriteConsoleW CreateFileW _putwch_nolock 14266->14270 14271 7ffa532aa1b5 GetLastError 14266->14271 14267->14266 14269 7ffa532aa103 GetLastError 14267->14269 14268->14266 14269->14246 14270->14266 14271->14246 12709 7ffa5329f7f1 12710 7ffa5329f80d 12709->12710 12728 7ffa5329f8de _wcsftime_l 12709->12728 12766 7ffa532a6fb0 12710->12766 12712 7ffa5329fa70 12777 7ffa532a69c0 12712->12777 12714 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12717 7ffa5329f85a OutputDebugStringA 12714->12717 12716 7ffa5329f9f4 12716->12712 12719 7ffa5329d490 std::exception::_Copy_str 17 API calls 12716->12719 12720 7ffa5329f872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 12717->12720 12718 7ffa5329fa8a 12721 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12718->12721 12722 7ffa5329fa43 12719->12722 12764 7ffa5329f8ce 12720->12764 12724 7ffa5329fab7 12721->12724 12725 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12722->12725 12726 7ffa5329fb24 12724->12726 12729 7ffa532a69c0 17 API calls 12724->12729 12741 7ffa5329fb6a 12724->12741 12725->12712 12727 7ffa532a69c0 17 API calls 12726->12727 12730 7ffa5329fb3d 12727->12730 12728->12716 12736 7ffa5329f996 12728->12736 12773 7ffa53296ea0 12728->12773 12731 7ffa5329faf7 12729->12731 12733 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12730->12733 12732 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12731->12732 12732->12726 12733->12741 12734 7ffa53293280 __GSHandlerCheck 8 API calls 12737 7ffa532a011d 12734->12737 12736->12716 12738 7ffa5329d490 std::exception::_Copy_str 17 API calls 12736->12738 12739 7ffa5329f9c7 12738->12739 12740 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12739->12740 12740->12716 12742 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 12741->12742 12744 7ffa5329fc39 12741->12744 12742->12744 12743 7ffa5329fc97 12790 7ffa532a6970 12743->12790 12744->12743 12745 7ffa5329d490 std::exception::_Copy_str 17 API calls 12744->12745 12746 7ffa5329fc6a 12745->12746 12748 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12746->12748 12748->12743 12750 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 12751 7ffa5329fd6e 12750->12751 12762 7ffa5329fdbb 12751->12762 12793 7ffa532a1640 12751->12793 12753 7ffa5329fd8e 12754 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12753->12754 12754->12762 12755 7ffa5329ffef 12756 7ffa532a0016 12755->12756 12757 7ffa532a0008 OutputDebugStringA 12755->12757 12761 7ffa532a6fb0 _itow_s 17 API calls 12756->12761 12756->12764 12757->12756 12759 7ffa5329ff03 std::exception::_Copy_str 12759->12755 12760 7ffa5329ffaa WriteFile 12759->12760 12759->12764 12760->12755 12763 7ffa532a0065 12761->12763 12762->12759 12803 7ffa53299360 LeaveCriticalSection 12762->12803 12765 7ffa53297ff0 _invoke_watson_if_error 16 API calls 12763->12765 12764->12734 12765->12764 12767 7ffa532a7003 12766->12767 12768 7ffa532a6fd6 12766->12768 12769 7ffa532a7030 _itow_s 17 API calls 12767->12769 12768->12767 12770 7ffa532a6fdd 12768->12770 12771 7ffa5329f82d 12769->12771 12804 7ffa532a7030 12770->12804 12771->12714 12774 7ffa53296ebd 12773->12774 12775 7ffa53296ed1 12773->12775 12774->12775 12776 7ffa5329be00 _invoke_watson_if_error 16 API calls 12774->12776 12775->12736 12776->12775 12779 7ffa532a69e1 12777->12779 12778 7ffa532a6a42 12780 7ffa5329bd70 _invalid_parameter 17 API calls 12778->12780 12779->12778 12781 7ffa532a6a80 _calloc_dbg_impl 12779->12781 12785 7ffa532a6a76 _calloc_dbg_impl 12780->12785 12782 7ffa532a6b6e 12781->12782 12783 7ffa532a6bac _calloc_dbg_impl 12781->12783 12786 7ffa5329bd70 _invalid_parameter 17 API calls 12782->12786 12784 7ffa532a6ce8 12783->12784 12787 7ffa532a6d26 _calloc_dbg_impl 12783->12787 12788 7ffa5329bd70 _invalid_parameter 17 API calls 12784->12788 12785->12718 12786->12785 12787->12785 12789 7ffa5329bd70 _invalid_parameter 17 API calls 12787->12789 12788->12785 12789->12785 12820 7ffa532a63e0 12790->12820 12792 7ffa5329fd20 12792->12750 12794 7ffa532a1661 12793->12794 12795 7ffa532a16c2 12794->12795 12798 7ffa532a1700 _calloc_dbg_impl 12794->12798 12797 7ffa5329bd70 _invalid_parameter 17 API calls 12795->12797 12796 7ffa532a1832 _calloc_dbg_impl 12800 7ffa532a16f6 _calloc_dbg_impl 12796->12800 12802 7ffa5329bd70 _invalid_parameter 17 API calls 12796->12802 12797->12800 12798->12796 12799 7ffa532a17f4 12798->12799 12801 7ffa5329bd70 _invalid_parameter 17 API calls 12799->12801 12800->12753 12801->12800 12802->12800 12803->12759 12805 7ffa532a7055 12804->12805 12806 7ffa532a70ab 12805->12806 12807 7ffa532a70e9 12805->12807 12808 7ffa5329bd70 _invalid_parameter 17 API calls 12806->12808 12809 7ffa532a714a 12807->12809 12811 7ffa532a7188 _calloc_dbg_impl 12807->12811 12817 7ffa532a70df 12808->12817 12810 7ffa5329bd70 _invalid_parameter 17 API calls 12809->12810 12810->12817 12812 7ffa532a7287 12811->12812 12815 7ffa532a72c5 12811->12815 12813 7ffa5329bd70 _invalid_parameter 17 API calls 12812->12813 12813->12817 12814 7ffa532a7338 12816 7ffa5329bd70 _invalid_parameter 17 API calls 12814->12816 12815->12814 12818 7ffa532a7376 12815->12818 12816->12817 12817->12771 12818->12817 12819 7ffa5329bd70 _invalid_parameter 17 API calls 12818->12819 12819->12817 12821 7ffa532a640e 12820->12821 12822 7ffa532a648e 12821->12822 12824 7ffa532a64cc _calloc_dbg_impl 12821->12824 12823 7ffa5329bd70 _invalid_parameter 17 API calls 12822->12823 12831 7ffa532a64c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 12823->12831 12825 7ffa532a663f 12824->12825 12826 7ffa532a668e _CrtMemDumpAllObjectsSince 12824->12826 12827 7ffa5329bd70 _invalid_parameter 17 API calls 12825->12827 12832 7ffa532a5ea0 12826->12832 12827->12831 12829 7ffa532a66b5 _calloc_dbg_impl 12830 7ffa5329bd70 _invalid_parameter 17 API calls 12829->12830 12829->12831 12830->12831 12831->12792 12833 7ffa532a5ecf 12832->12833 12834 7ffa532a5fae 12833->12834 12835 7ffa532a5f6e 12833->12835 12844 7ffa532a5eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 12833->12844 12837 7ffa532a5fcf _CrtMemDumpAllObjectsSince 12834->12837 12838 7ffa532a62e1 _CrtMemDumpAllObjectsSince 12834->12838 12836 7ffa5329bd70 _invalid_parameter 17 API calls 12835->12836 12836->12844 12839 7ffa532a60a1 MultiByteToWideChar 12837->12839 12837->12844 12840 7ffa532a632f MultiByteToWideChar 12838->12840 12838->12844 12841 7ffa532a610e GetLastError 12839->12841 12839->12844 12840->12844 12843 7ffa532a6154 _CrtMemDumpAllObjectsSince wcsxfrm 12841->12843 12841->12844 12842 7ffa532a6238 MultiByteToWideChar 12842->12844 12843->12842 12843->12844 12844->12829 14314 7ffa532a12e3 LoadLibraryW 14315 7ffa532a1304 GetProcAddress 14314->14315 14324 7ffa532a12fd 14314->14324 14316 7ffa532a132a 7 API calls 14315->14316 14315->14324 14317 7ffa532a13b3 GetProcAddress EncodePointer 14316->14317 14318 7ffa532a13d5 14316->14318 14317->14318 14321 7ffa532a1428 DecodePointer 14318->14321 14322 7ffa532a13f9 DecodePointer DecodePointer 14318->14322 14319 7ffa53293280 __GSHandlerCheck 8 API calls 14320 7ffa532a157a 14319->14320 14321->14324 14322->14321 14324->14319 12506 7ffa53297ae3 12509 7ffa53297af3 12506->12509 12507 7ffa53297ce0 SetHandleCount 12508 7ffa53297c74 12507->12508 12509->12507 12510 7ffa53297b95 GetStdHandle 12509->12510 12511 7ffa53297c7b 12509->12511 12510->12511 12512 7ffa53297bb9 12510->12512 12511->12507 12512->12511 12513 7ffa53297bc8 GetFileType 12512->12513 12513->12511 12514 7ffa53297beb InitializeCriticalSectionAndSpinCount 12513->12514 12514->12508 12514->12511 14329 7ffa532a44e5 14333 7ffa532a445a __SehTransFilter 14329->14333 14330 7ffa532a47d7 14331 7ffa532a485b 14330->14331 14332 7ffa5329cf80 _inconsistency 36 API calls 14330->14332 14332->14331 14334 7ffa532a466c __SehTransFilter 14333->14334 14337 7ffa532a5180 __SehTransFilter 38 API calls 14333->14337 14334->14330 14335 7ffa532a5bb0 __SehTransFilter 36 API calls 14334->14335 14336 7ffa532a4727 14335->14336 14336->14330 14338 7ffa5329e500 __SetUnwindTryBlock 37 API calls 14336->14338 14337->14333 14339 7ffa532a4767 14338->14339 14340 7ffa5329edc0 __SehTransFilter 9 API calls 14339->14340 14340->14330 14341 7ffa532970e6 14342 7ffa53297090 _exit 33 API calls 14341->14342 14343 7ffa532970f0 14342->14343 12850 7ffa5329a7e9 12851 7ffa5329a7f9 12850->12851 12852 7ffa53293280 __GSHandlerCheck 8 API calls 12851->12852 12853 7ffa5329a80a 12851->12853 12854 7ffa5329aa30 12852->12854 12855 7ffa5329c7e9 12856 7ffa5329c90c EncodePointer EncodePointer 12855->12856 12859 7ffa5329c80d 12855->12859 12857 7ffa5329c8ca 12856->12857 12858 7ffa5329c872 12858->12857 12861 7ffa53294a00 _realloc_dbg 30 API calls 12858->12861 12862 7ffa5329c8ce EncodePointer 12858->12862 12859->12858 12864 7ffa53294a00 12859->12864 12863 7ffa5329c8bd 12861->12863 12862->12856 12863->12857 12863->12862 12865 7ffa53294a22 12864->12865 12870 7ffa53294a70 12865->12870 12867 7ffa53294a4c 12881 7ffa53299360 LeaveCriticalSection 12867->12881 12869 7ffa53294a5b 12869->12858 12872 7ffa53294ad4 _realloc_dbg 12870->12872 12880 7ffa53294aae _calloc_dbg_impl 12870->12880 12872->12880 12882 7ffa53296380 12872->12882 12873 7ffa53294f64 12886 7ffa5329bc30 12873->12886 12874 7ffa53294f90 12901 7ffa5329ba60 12874->12901 12876 7ffa53294e2c 12876->12873 12876->12874 12876->12880 12878 7ffa53294fa6 12879 7ffa53294fba HeapSize 12878->12879 12878->12880 12879->12880 12880->12867 12881->12869 12883 7ffa53296395 _CrtIsValidPointer 12882->12883 12884 7ffa53296391 12882->12884 12883->12884 12885 7ffa532963b6 HeapValidate 12883->12885 12884->12876 12885->12884 12887 7ffa5329bc5f 12886->12887 12888 7ffa5329bc50 12886->12888 12890 7ffa5329bc67 12887->12890 12895 7ffa5329bc78 12887->12895 12912 7ffa5329abf0 12888->12912 12918 7ffa5329c020 12890->12918 12892 7ffa5329bcba 12894 7ffa5329abb0 _callnewh DecodePointer 12892->12894 12893 7ffa5329bc9a HeapReAlloc 12893->12895 12898 7ffa5329bc5a _get_errno_from_oserr 12894->12898 12895->12892 12895->12893 12896 7ffa5329bce4 12895->12896 12899 7ffa5329abb0 _callnewh DecodePointer 12895->12899 12900 7ffa5329bd1f GetLastError 12895->12900 12897 7ffa5329bcee GetLastError 12896->12897 12896->12898 12897->12898 12898->12880 12899->12895 12900->12898 12902 7ffa5329ba76 12901->12902 12903 7ffa5329bb07 12902->12903 12904 7ffa5329bacc 12902->12904 12905 7ffa5329bb32 HeapSize HeapReAlloc 12903->12905 12909 7ffa5329bb00 _get_errno_from_oserr 12903->12909 12907 7ffa5329bd70 _invalid_parameter 17 API calls 12904->12907 12906 7ffa5329bb74 12905->12906 12905->12909 12908 7ffa5329bba0 GetLastError 12906->12908 12922 7ffa5329bbd0 HeapQueryInformation 12906->12922 12907->12909 12908->12909 12909->12878 12913 7ffa5329ac4d 12912->12913 12915 7ffa5329ac0a 12912->12915 12914 7ffa5329abb0 _callnewh DecodePointer 12913->12914 12917 7ffa5329ac21 12914->12917 12916 7ffa5329abb0 _callnewh DecodePointer 12915->12916 12915->12917 12916->12915 12917->12898 12919 7ffa5329c03b HeapFree 12918->12919 12921 7ffa5329c039 _get_errno_from_oserr 12918->12921 12920 7ffa5329c05a GetLastError 12919->12920 12919->12921 12920->12921 12921->12898 12923 7ffa5329bb90 12922->12923 12923->12908 12923->12909 12924 7ffa532a75e9 12925 7ffa532a75f4 12924->12925 12928 7ffa532a75fb 12924->12928 12926 7ffa53293280 __GSHandlerCheck 8 API calls 12925->12926 12927 7ffa532a7d85 12926->12927 12929 7ffa5329bd70 _invalid_parameter 17 API calls 12928->12929 12929->12925 14348 7ffa532966da 14349 7ffa53296725 14348->14349 14350 7ffa53296745 14348->14350 14349->14350 14354 7ffa53299a70 14349->14354 14351 7ffa5329677f 14350->14351 14353 7ffa53299b10 __updatetmbcinfo LeaveCriticalSection 14350->14353 14353->14351 14355 7ffa53299a79 _updatetlocinfoEx_nolock 14354->14355 14356 7ffa53299ad8 14355->14356 14358 7ffa53299360 LeaveCriticalSection 14355->14358 14356->14350 14358->14356 12955 7ffa532aade0 12960 7ffa532afee0 12955->12960 12958 7ffa532aadf9 12970 7ffa532aff00 12960->12970 12962 7ffa532aade9 12962->12958 12963 7ffa532afc70 12962->12963 12964 7ffa532afc86 12963->12964 12965 7ffa532afd59 12964->12965 12969 7ffa532afd09 DeleteCriticalSection 12964->12969 13046 7ffa532b0580 12964->13046 13057 7ffa53299360 LeaveCriticalSection 12965->13057 12967 7ffa532afd63 12967->12958 12969->12964 12971 7ffa532aff22 12970->12971 12972 7ffa532b0042 12971->12972 12973 7ffa532aff47 12971->12973 13003 7ffa53299360 LeaveCriticalSection 12972->13003 12974 7ffa532b003d 12973->12974 12985 7ffa532aae90 12973->12985 12974->12962 12976 7ffa532b004c 12976->12962 12978 7ffa532aff97 12979 7ffa532affd0 12978->12979 12980 7ffa532affbb 12978->12980 12981 7ffa532affe1 12978->12981 12998 7ffa532aaf60 12979->12998 12988 7ffa532afd70 12980->12988 12981->12979 12984 7ffa532afd70 _fflush_nolock 25 API calls 12981->12984 12984->12979 12986 7ffa532aaec8 EnterCriticalSection 12985->12986 12987 7ffa532aaea4 12985->12987 12986->12987 12987->12978 12989 7ffa532afd8a 12988->12989 12990 7ffa532afd81 12988->12990 13004 7ffa532afdf0 12989->13004 12991 7ffa532aff00 _fflush_nolock 25 API calls 12990->12991 12997 7ffa532afd88 12991->12997 12993 7ffa532afd94 12993->12997 13008 7ffa532aafb0 12993->13008 12997->12979 12999 7ffa532aaf74 12998->12999 13000 7ffa532aaf98 LeaveCriticalSection 12998->13000 13045 7ffa53299360 LeaveCriticalSection 12999->13045 13002 7ffa532aaf96 13000->13002 13002->12974 13003->12976 13005 7ffa532afe1f 13004->13005 13007 7ffa532afe5d 13004->13007 13006 7ffa532aafb0 _fflush_nolock 17 API calls 13005->13006 13005->13007 13006->13007 13007->12993 13010 7ffa532aafc1 13008->13010 13009 7ffa532ab04b 13012 7ffa532b07c0 13009->13012 13010->13009 13011 7ffa5329bd70 _invalid_parameter 17 API calls 13010->13011 13011->13009 13013 7ffa532b07d3 13012->13013 13015 7ffa532b07e8 13012->13015 13013->12997 13014 7ffa532b0851 13017 7ffa5329bd70 _invalid_parameter 17 API calls 13014->13017 13015->13014 13016 7ffa532b088f 13015->13016 13018 7ffa532b0913 13016->13018 13019 7ffa532b0951 13016->13019 13017->13013 13022 7ffa5329bd70 _invalid_parameter 17 API calls 13018->13022 13028 7ffa532afae0 13019->13028 13022->13013 13024 7ffa532b0992 FlushFileBuffers 13025 7ffa532b099f GetLastError 13024->13025 13027 7ffa532b09ab __doserrno 13024->13027 13025->13027 13043 7ffa532afbc0 LeaveCriticalSection 13027->13043 13029 7ffa532afb25 13028->13029 13030 7ffa532afb7a 13028->13030 13033 7ffa532afb3b InitializeCriticalSectionAndSpinCount 13029->13033 13034 7ffa532afb56 13029->13034 13031 7ffa532afbb1 13030->13031 13032 7ffa532afb81 EnterCriticalSection 13030->13032 13031->13027 13036 7ffa532af900 13031->13036 13032->13031 13033->13034 13044 7ffa53299360 LeaveCriticalSection 13034->13044 13037 7ffa532af935 13036->13037 13038 7ffa532af913 __doserrno 13036->13038 13039 7ffa532af99e __doserrno 13037->13039 13041 7ffa532af9e9 __doserrno 13037->13041 13038->13024 13040 7ffa5329bd70 _invalid_parameter 17 API calls 13039->13040 13040->13038 13041->13038 13042 7ffa5329bd70 _invalid_parameter 17 API calls 13041->13042 13042->13038 13043->13013 13044->13030 13045->13002 13047 7ffa532b0599 13046->13047 13048 7ffa532b062a 13047->13048 13049 7ffa532b05ef 13047->13049 13050 7ffa532b0623 13048->13050 13058 7ffa532aae10 13048->13058 13052 7ffa5329bd70 _invalid_parameter 17 API calls 13049->13052 13050->12964 13052->13050 13053 7ffa532b0651 13062 7ffa532b0680 13053->13062 13055 7ffa532b065c 13073 7ffa532aaee0 13055->13073 13057->12967 13059 7ffa532aae77 EnterCriticalSection 13058->13059 13060 7ffa532aae27 13058->13060 13061 7ffa532aae3b 13059->13061 13060->13059 13060->13061 13061->13053 13063 7ffa532b0699 13062->13063 13064 7ffa532b072d 13063->13064 13065 7ffa532b06ef 13063->13065 13066 7ffa532b0723 13064->13066 13067 7ffa532afdf0 _fflush_nolock 17 API calls 13064->13067 13068 7ffa5329bd70 _invalid_parameter 17 API calls 13065->13068 13066->13055 13069 7ffa532b0752 13067->13069 13068->13066 13070 7ffa532aafb0 _fflush_nolock 17 API calls 13069->13070 13071 7ffa532b076a 13070->13071 13079 7ffa532b0a20 13071->13079 13074 7ffa532aaf47 LeaveCriticalSection 13073->13074 13075 7ffa532aaef7 13073->13075 13077 7ffa532aaf45 13074->13077 13075->13074 13076 7ffa532aaf0b 13075->13076 13115 7ffa53299360 LeaveCriticalSection 13076->13115 13077->13050 13080 7ffa532b0a53 13079->13080 13081 7ffa532b0a33 __doserrno 13079->13081 13082 7ffa532b0abc __doserrno 13080->13082 13083 7ffa532b0b05 13080->13083 13081->13066 13085 7ffa5329bd70 _invalid_parameter 17 API calls 13082->13085 13084 7ffa532b0bd2 13083->13084 13088 7ffa532b0b89 __doserrno 13083->13088 13086 7ffa532afae0 _fflush_nolock 3 API calls 13084->13086 13085->13081 13087 7ffa532b0bdb 13086->13087 13091 7ffa532b0c13 13087->13091 13093 7ffa532b0c80 13087->13093 13090 7ffa5329bd70 _invalid_parameter 17 API calls 13088->13090 13090->13081 13106 7ffa532afbc0 LeaveCriticalSection 13091->13106 13094 7ffa532af900 _fflush_nolock 17 API calls 13093->13094 13096 7ffa532b0c91 13094->13096 13095 7ffa532b0d05 13107 7ffa532af7d0 13095->13107 13096->13095 13097 7ffa532b0ce5 13096->13097 13099 7ffa532af900 _fflush_nolock 17 API calls 13096->13099 13097->13095 13100 7ffa532af900 _fflush_nolock 17 API calls 13097->13100 13101 7ffa532b0cd6 13099->13101 13102 7ffa532b0cf8 CloseHandle 13100->13102 13103 7ffa532af900 _fflush_nolock 17 API calls 13101->13103 13102->13095 13104 7ffa532b0d0f GetLastError 13102->13104 13103->13097 13104->13095 13105 7ffa532b0d22 _dosmaperr 13105->13091 13106->13081 13108 7ffa532af7e3 13107->13108 13109 7ffa532af878 __doserrno 13107->13109 13108->13109 13110 7ffa532af87a SetStdHandle 13108->13110 13111 7ffa532af86a 13108->13111 13109->13105 13110->13109 13112 7ffa532af889 SetStdHandle 13111->13112 13113 7ffa532af871 13111->13113 13112->13109 13113->13109 13114 7ffa532af898 SetStdHandle 13113->13114 13114->13109 13115->13077 12543 7ffa53297de0 12544 7ffa53297ded 12543->12544 12547 7ffa53297df2 std::exception::_Copy_str _calloc_dbg 12543->12547 12550 7ffa5329aa40 12544->12550 12546 7ffa53297e0e 12547->12546 12554 7ffa5329d490 12547->12554 12564 7ffa53297ff0 12547->12564 12551 7ffa5329aa4d 12550->12551 12553 7ffa5329aa57 12550->12553 12568 7ffa53299c10 12551->12568 12553->12547 12555 7ffa5329d4b1 12554->12555 12556 7ffa5329d512 12555->12556 12558 7ffa5329d550 _calloc_dbg_impl 12555->12558 12659 7ffa5329bd70 DecodePointer 12556->12659 12559 7ffa5329d63e 12558->12559 12562 7ffa5329d67c _calloc_dbg_impl 12558->12562 12561 7ffa5329bd70 _invalid_parameter 17 API calls 12559->12561 12560 7ffa5329d546 _calloc_dbg_impl 12560->12547 12561->12560 12562->12560 12563 7ffa5329bd70 _invalid_parameter 17 API calls 12562->12563 12563->12560 12565 7ffa5329800e 12564->12565 12566 7ffa53298010 12564->12566 12565->12547 12567 7ffa5329be00 _invoke_watson_if_error 16 API calls 12566->12567 12567->12565 12569 7ffa53299c2a 12568->12569 12578 7ffa53299b10 12569->12578 12571 7ffa53299c34 12582 7ffa53299f20 12571->12582 12573 7ffa53299c51 12576 7ffa53299ecd 12573->12576 12588 7ffa5329a000 12573->12588 12575 7ffa53299ce8 12575->12576 12603 7ffa53299360 LeaveCriticalSection 12575->12603 12576->12553 12579 7ffa53299b19 12578->12579 12581 7ffa53299bde 12579->12581 12604 7ffa53299360 LeaveCriticalSection 12579->12604 12581->12571 12583 7ffa53299f49 12582->12583 12584 7ffa53299f5b GetOEMCP 12583->12584 12585 7ffa53299f81 12583->12585 12587 7ffa53299f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 12584->12587 12586 7ffa53299f88 GetACP 12585->12586 12585->12587 12586->12587 12587->12573 12589 7ffa53299f20 __initmbctable 2 API calls 12588->12589 12591 7ffa5329a028 12589->12591 12590 7ffa5329a234 12593 7ffa5329a25d IsValidCodePage 12590->12593 12597 7ffa5329a039 __initmbctable 12590->12597 12591->12590 12591->12597 12598 7ffa5329a08e __initmbctable 12591->12598 12595 7ffa5329a27b GetCPInfo 12593->12595 12593->12597 12594 7ffa5329a470 12594->12575 12596 7ffa5329a444 12595->12596 12601 7ffa5329a295 __initmbctable 12595->12601 12596->12597 12617 7ffa53293280 12597->12617 12599 7ffa5329a220 12598->12599 12600 7ffa5329a5e0 __initmbctable 19 API calls 12599->12600 12600->12597 12605 7ffa5329a5e0 GetCPInfo 12601->12605 12603->12576 12604->12581 12612 7ffa5329a61f 12605->12612 12616 7ffa5329a7dc 12605->12616 12606 7ffa5329a901 12607 7ffa53293280 __GSHandlerCheck 8 API calls 12606->12607 12608 7ffa5329aa30 12607->12608 12608->12597 12610 7ffa5329a80a 12610->12597 12611 7ffa5329a734 12632 7ffa5329ef00 12611->12632 12628 7ffa5329f4d0 12612->12628 12614 7ffa5329a788 12615 7ffa5329ef00 __initmbctable 7 API calls 12614->12615 12615->12616 12616->12606 12616->12610 12618 7ffa53293289 12617->12618 12619 7ffa53293720 RtlCaptureContext RtlLookupFunctionEntry 12618->12619 12620 7ffa53293294 12618->12620 12621 7ffa53293764 RtlVirtualUnwind 12619->12621 12622 7ffa532937a5 12619->12622 12620->12594 12623 7ffa532937c7 IsDebuggerPresent 12621->12623 12622->12623 12658 7ffa53298d90 12623->12658 12625 7ffa53293826 SetUnhandledExceptionFilter UnhandledExceptionFilter 12626 7ffa53293844 __GSHandlerCheck 12625->12626 12627 7ffa5329384e GetCurrentProcess TerminateProcess 12625->12627 12626->12627 12627->12594 12629 7ffa5329f4f9 _CrtMemDumpAllObjectsSince 12628->12629 12636 7ffa5329f570 12629->12636 12631 7ffa5329f550 _LocaleUpdate::~_LocaleUpdate 12631->12611 12633 7ffa5329ef2c _CrtMemDumpAllObjectsSince 12632->12633 12643 7ffa5329efb0 12633->12643 12635 7ffa5329ef8e _LocaleUpdate::~_LocaleUpdate 12635->12614 12637 7ffa5329f599 MultiByteToWideChar 12636->12637 12639 7ffa5329f60b malloc _calloc_dbg_impl _MarkAllocaS 12637->12639 12642 7ffa5329f604 _CrtMemDumpAllObjectsSince_stat 12637->12642 12640 7ffa5329f68b MultiByteToWideChar 12639->12640 12639->12642 12641 7ffa5329f6ca GetStringTypeW 12640->12641 12640->12642 12641->12642 12642->12631 12644 7ffa5329efd4 __initmbctable 12643->12644 12645 7ffa5329f068 MultiByteToWideChar 12644->12645 12646 7ffa5329f0a5 _CrtMemDumpAllObjectsSince_stat 12645->12646 12651 7ffa5329f0ac malloc _MarkAllocaS 12645->12651 12646->12635 12647 7ffa5329f122 MultiByteToWideChar 12647->12646 12648 7ffa5329f164 LCMapStringW 12647->12648 12648->12646 12649 7ffa5329f1a8 12648->12649 12650 7ffa5329f1b8 12649->12650 12657 7ffa5329f222 malloc _MarkAllocaS 12649->12657 12650->12646 12652 7ffa5329f1d9 LCMapStringW 12650->12652 12651->12646 12651->12647 12652->12646 12653 7ffa5329f2ac LCMapStringW 12653->12646 12654 7ffa5329f2ea 12653->12654 12655 7ffa5329f2f4 WideCharToMultiByte 12654->12655 12656 7ffa5329f341 WideCharToMultiByte 12654->12656 12655->12646 12656->12646 12657->12646 12657->12653 12658->12625 12660 7ffa5329bdac 12659->12660 12661 7ffa5329bdd0 12659->12661 12660->12560 12663 7ffa5329be00 12661->12663 12666 7ffa5329be50 12663->12666 12667 7ffa5329be8d RtlCaptureContext RtlLookupFunctionEntry 12666->12667 12668 7ffa5329be81 __GSHandlerCheck 12666->12668 12669 7ffa5329bf64 12667->12669 12670 7ffa5329bf1c RtlVirtualUnwind 12667->12670 12668->12667 12671 7ffa5329bf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12669->12671 12670->12671 12672 7ffa5329bfde __GSHandlerCheck 12671->12672 12673 7ffa53293280 __GSHandlerCheck 8 API calls 12672->12673 12674 7ffa5329be2d GetCurrentProcess TerminateProcess 12673->12674 12674->12660 13125 7ffa532abfde 13135 7ffa532ac00c 13125->13135 13126 7ffa532acc93 13128 7ffa5329bd70 _invalid_parameter 17 API calls 13126->13128 13131 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 13126->13131 13128->13131 13129 7ffa532abada 13134 7ffa5329bd70 _invalid_parameter 17 API calls 13129->13134 13130 7ffa53293280 __GSHandlerCheck 8 API calls 13133 7ffa532acd90 13130->13133 13131->13130 13132 7ffa532ab99c 13132->13126 13132->13129 13134->13131 13135->13132 13136 7ffa532ab530 13135->13136 13139 7ffa532ab090 13136->13139 13138 7ffa532ab56c 13138->13135 13140 7ffa532ab0b7 13139->13140 13141 7ffa532ab168 13140->13141 13143 7ffa532ab1a6 _CrtMemDumpAllObjectsSince 13140->13143 13146 7ffa532ab0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 13140->13146 13142 7ffa5329bd70 _invalid_parameter 17 API calls 13141->13142 13142->13146 13144 7ffa532ab347 _CrtMemDumpAllObjectsSince 13143->13144 13145 7ffa532ab1cf 13143->13145 13147 7ffa532ab359 WideCharToMultiByte 13144->13147 13145->13146 13150 7ffa5329bd70 _invalid_parameter 17 API calls 13145->13150 13146->13138 13148 7ffa532ab3ab 13147->13148 13148->13146 13149 7ffa532ab3c1 GetLastError 13148->13149 13149->13146 13151 7ffa532ab3d0 _calloc_dbg_impl 13149->13151 13150->13146 13151->13146 13152 7ffa5329bd70 _invalid_parameter 17 API calls 13151->13152 13152->13146 14382 7ffa532a14e1 14383 7ffa532a14ef DecodePointer 14382->14383 14384 7ffa532a1520 DecodePointer 14382->14384 14383->14384 14385 7ffa532a150f 14383->14385 14386 7ffa532a1540 14384->14386 14385->14384 14387 7ffa53293280 __GSHandlerCheck 8 API calls 14386->14387 14388 7ffa532a157a 14387->14388 12680 7ffa532935e1 12681 7ffa532935f1 12680->12681 12685 7ffa532935ea 12680->12685 12681->12685 12686 7ffa532912b0 12681->12686 12684 7ffa532912b0 14 API calls 12684->12685 12687 7ffa532912de CoLoadLibrary 12686->12687 12695 7ffa532930ca 12686->12695 12689 7ffa53292f2e VirtualAlloc RtlAllocateHeap 12687->12689 12690 7ffa53292f0f MessageBoxA ExitProcess 12687->12690 12688 7ffa53293280 __GSHandlerCheck 8 API calls 12692 7ffa532930ff 12688->12692 12691 7ffa53292f73 _calloc_dbg_impl 12689->12691 12694 7ffa53292f8c 12689->12694 12693 7ffa53292f83 RtlDeleteBoundaryDescriptor 12691->12693 12692->12684 12692->12685 12693->12694 12694->12695 12695->12688 13153 7ffa53293fe1 13154 7ffa53293fea SetLastError 13153->13154 13155 7ffa532a5de0 13160 7ffa53293170 13155->13160 13158 7ffa532a5e86 13161 7ffa532931ac 13160->13161 13162 7ffa53293280 __GSHandlerCheck 8 API calls 13161->13162 13163 7ffa53293263 13162->13163 13163->13158 13164 7ffa53293870 13163->13164 13165 7ffa532938de __SehTransFilter 13164->13165 13166 7ffa532939db __SehTransFilter 13164->13166 13165->13166 13167 7ffa53293a71 RtlUnwindEx 13165->13167 13166->13158 13167->13166 14389 7ffa532a48e0 14390 7ffa532a48f7 std::bad_exception::~bad_exception 14389->14390 14391 7ffa532a490c 14390->14391 14392 7ffa532ad710 _Ref_count LeaveCriticalSection 14390->14392 14392->14391 14393 7ffa532934d5 14394 7ffa532934da _calloc_dbg 14393->14394 14395 7ffa5329350b FlsSetValue 14394->14395 14396 7ffa53293548 14394->14396 14395->14396 14397 7ffa53293520 14395->14397 14398 7ffa53293e30 LeaveCriticalSection 14397->14398 14399 7ffa5329352c GetCurrentThreadId 14398->14399 14399->14396 13168 7ffa532933d6 13171 7ffa532988d0 HeapDestroy 13168->13171 13170 7ffa532933db 13171->13170 14411 7ffa53295ad9 14412 7ffa53295add 14411->14412 14413 7ffa53296380 _CrtIsValidHeapPointer HeapValidate 14412->14413 14414 7ffa53295b3a 14413->14414 14417 7ffa53299360 LeaveCriticalSection 14414->14417 14416 7ffa53295c14 14417->14416 13180 7ffa532b11d0 13181 7ffa532b11f7 ExFilterRethrow 13180->13181 13184 7ffa5329ed30 13181->13184 13183 7ffa532b1212 _IsExceptionObjectToBeDestroyed __SehTransFilter 13185 7ffa5329ed3e 13184->13185 13188 7ffa5329ed4c 13185->13188 13190 7ffa5329cf80 DecodePointer 13185->13190 13187 7ffa5329ed88 13187->13183 13188->13187 13189 7ffa5329cf80 _inconsistency 36 API calls 13188->13189 13189->13187 13193 7ffa5329cf9e 13190->13193 13194 7ffa5329cf50 13193->13194 13196 7ffa5329cf59 13194->13196 13198 7ffa532a39e0 13196->13198 13199 7ffa532a39fa 13198->13199 13208 7ffa5329d430 DecodePointer 13199->13208 13201 7ffa532a3a09 13202 7ffa532a3a20 13201->13202 13209 7ffa5329cff0 13201->13209 13204 7ffa532a3a42 13202->13204 13205 7ffa5329be50 _invoke_watson_if_error 14 API calls 13202->13205 13221 7ffa53297090 13204->13221 13205->13204 13208->13201 13210 7ffa5329d02a 13209->13210 13211 7ffa5329d1d8 DecodePointer 13210->13211 13212 7ffa5329d19a 13210->13212 13213 7ffa5329d1e8 13211->13213 13215 7ffa5329bd70 _invalid_parameter 17 API calls 13212->13215 13214 7ffa5329d1ce 13213->13214 13216 7ffa53297090 _exit 33 API calls 13213->13216 13217 7ffa5329d209 13213->13217 13214->13202 13215->13214 13216->13217 13219 7ffa5329d289 13217->13219 13224 7ffa53293d00 RtlEncodePointer 13217->13224 13219->13214 13225 7ffa53299360 LeaveCriticalSection 13219->13225 13226 7ffa53297280 13221->13226 13224->13219 13225->13214 13227 7ffa53297296 _exit 13226->13227 13228 7ffa532972c7 DecodePointer 13227->13228 13231 7ffa53297368 _initterm 13227->13231 13247 7ffa5329744e 13227->13247 13230 7ffa532972e5 DecodePointer 13228->13230 13228->13231 13229 7ffa5329745e 13233 7ffa532970a9 13229->13233 13234 7ffa53297520 _exit LeaveCriticalSection 13229->13234 13243 7ffa53297314 13230->13243 13231->13247 13250 7ffa53296210 13231->13250 13232 7ffa53297520 _exit LeaveCriticalSection 13232->13229 13233->13188 13235 7ffa53297479 13234->13235 13236 7ffa532974e0 __crtExitProcess 3 API calls 13235->13236 13236->13233 13240 7ffa5329736d DecodePointer 13249 7ffa53293d00 RtlEncodePointer 13240->13249 13243->13231 13243->13240 13246 7ffa53297391 DecodePointer DecodePointer 13243->13246 13248 7ffa53293d00 RtlEncodePointer 13243->13248 13244 7ffa53297449 13263 7ffa53296f10 13244->13263 13246->13243 13247->13229 13247->13232 13248->13243 13249->13243 13252 7ffa53296229 13250->13252 13251 7ffa5329628f 13254 7ffa5329bd70 _invalid_parameter 17 API calls 13251->13254 13252->13251 13253 7ffa532962cb 13252->13253 13270 7ffa53299360 LeaveCriticalSection 13253->13270 13256 7ffa532962c3 13254->13256 13256->13247 13257 7ffa53297100 13256->13257 13258 7ffa53297112 13257->13258 13259 7ffa532971e4 DecodePointer 13258->13259 13260 7ffa532971fe 13259->13260 13271 7ffa53293d00 RtlEncodePointer 13260->13271 13262 7ffa53297219 13262->13244 13272 7ffa532963e0 13263->13272 13265 7ffa53296f33 13268 7ffa53296f8e 13265->13268 13280 7ffa53296660 13265->13280 13267 7ffa53293280 __GSHandlerCheck 8 API calls 13269 7ffa53296fa7 13267->13269 13268->13267 13269->13247 13270->13256 13271->13262 13273 7ffa532963f1 13272->13273 13274 7ffa53296447 13273->13274 13277 7ffa53296480 13273->13277 13275 7ffa5329bd70 _invalid_parameter 17 API calls 13274->13275 13276 7ffa5329647b 13275->13276 13276->13265 13279 7ffa53296504 13277->13279 13284 7ffa53299360 LeaveCriticalSection 13277->13284 13279->13265 13281 7ffa53296681 _CrtMemDumpAllObjectsSince 13280->13281 13285 7ffa53296850 13281->13285 13283 7ffa53296698 _LocaleUpdate::~_LocaleUpdate 13283->13268 13284->13276 13286 7ffa53296871 13285->13286 13287 7ffa53296ba6 13286->13287 13290 7ffa532968ed _CrtIsValidPointer 13286->13290 13315 7ffa53299360 LeaveCriticalSection 13287->13315 13289 7ffa53296bb0 13289->13283 13291 7ffa53296976 13290->13291 13292 7ffa5329695e IsBadReadPtr 13290->13292 13300 7ffa5329692f 13290->13300 13293 7ffa53296ad2 13291->13293 13294 7ffa53296a29 13291->13294 13292->13291 13295 7ffa53296add 13293->13295 13298 7ffa53296b2d 13293->13298 13296 7ffa53296a86 IsBadReadPtr 13294->13296 13297 7ffa53296abe 13294->13297 13299 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 13295->13299 13296->13297 13296->13300 13303 7ffa53296bf0 13297->13303 13298->13300 13302 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 13298->13302 13299->13300 13300->13283 13302->13300 13304 7ffa53296c28 13303->13304 13305 7ffa53296e25 _LocaleUpdate::~_LocaleUpdate 13304->13305 13306 7ffa53296c7a _CrtMemDumpAllObjectsSince 13304->13306 13307 7ffa53293280 __GSHandlerCheck 8 API calls 13305->13307 13309 7ffa5329c260 _CrtMemDumpAllObjectsSince_stat MultiByteToWideChar MultiByteToWideChar GetStringTypeW 13306->13309 13310 7ffa53296ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 13306->13310 13308 7ffa53296e89 13307->13308 13308->13300 13309->13310 13311 7ffa5329c0c0 _swprintf_p 17 API calls 13310->13311 13313 7ffa53296dc7 13311->13313 13312 7ffa53296e12 13312->13300 13313->13312 13314 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 13313->13314 13314->13312 13315->13289 14418 7ffa532968c4 14419 7ffa532968d1 14418->14419 14420 7ffa53296ba6 14419->14420 14423 7ffa532968ed _CrtIsValidPointer 14419->14423 14436 7ffa53299360 LeaveCriticalSection 14420->14436 14422 7ffa53296bb0 14424 7ffa53296976 14423->14424 14425 7ffa5329695e IsBadReadPtr 14423->14425 14434 7ffa5329692f 14423->14434 14426 7ffa53296ad2 14424->14426 14429 7ffa53296a29 14424->14429 14425->14424 14427 7ffa53296b2d 14426->14427 14428 7ffa53296add 14426->14428 14427->14434 14435 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 14427->14435 14432 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 14428->14432 14430 7ffa53296a86 IsBadReadPtr 14429->14430 14431 7ffa53296abe 14429->14431 14430->14431 14430->14434 14433 7ffa53296bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 14431->14433 14432->14434 14433->14434 14435->14434 14436->14422 14460 7ffa532abcbd 14461 7ffa532ab99c 14460->14461 14462 7ffa532acc93 14461->14462 14464 7ffa532abada 14461->14464 14463 7ffa5329bd70 _invalid_parameter 17 API calls 14462->14463 14466 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 14462->14466 14463->14466 14468 7ffa5329bd70 _invalid_parameter 17 API calls 14464->14468 14465 7ffa53293280 __GSHandlerCheck 8 API calls 14467 7ffa532acd90 14465->14467 14466->14465 14468->14466 13316 7ffa532a9fba 13319 7ffa532a9c4d 13316->13319 13317 7ffa532aa06d WriteFile 13318 7ffa532aa103 GetLastError 13317->13318 13317->13319 13324 7ffa532a9dd9 _dosmaperr __doserrno 13318->13324 13319->13317 13322 7ffa532a9f66 WideCharToMultiByte 13319->13322 13319->13324 13326 7ffa532aa158 GetLastError 13319->13326 13327 7ffa532af330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 13319->13327 13328 7ffa532afc00 WriteConsoleW CreateFileW _putwch_nolock 13319->13328 13329 7ffa532aa1b5 GetLastError 13319->13329 13320 7ffa53293280 __GSHandlerCheck 8 API calls 13321 7ffa532aa9f5 13320->13321 13323 7ffa532a9fbf WriteFile 13322->13323 13322->13324 13323->13319 13325 7ffa532aa050 GetLastError 13323->13325 13324->13320 13325->13319 13325->13324 13326->13324 13327->13319 13328->13319 13329->13324 14469 7ffa532b0ec0 14476 7ffa53299360 LeaveCriticalSection 14469->14476 14471 7ffa532b0ed3 14477 7ffa53299360 LeaveCriticalSection 14471->14477 14473 7ffa532b0ef3 14478 7ffa53299360 LeaveCriticalSection 14473->14478 14475 7ffa532b0f13 14476->14471 14477->14473 14478->14475 14479 7ffa532a76c0 14480 7ffa532a7be3 _CrtMemDumpAllObjectsSince 14479->14480 14481 7ffa532a76cf _CrtMemDumpAllObjectsSince 14479->14481 14482 7ffa532a7cc6 WideCharToMultiByte 14480->14482 14491 7ffa532a76e6 _LocaleUpdate::~_LocaleUpdate 14480->14491 14483 7ffa532a7905 _CrtMemDumpAllObjectsSince 14481->14483 14484 7ffa532a77f5 _CrtMemDumpAllObjectsSince wcsncnt 14481->14484 14481->14491 14482->14491 14486 7ffa532a790f WideCharToMultiByte 14483->14486 14487 7ffa532a7827 WideCharToMultiByte 14484->14487 14485 7ffa53293280 __GSHandlerCheck 8 API calls 14488 7ffa532a7d85 14485->14488 14489 7ffa532a7965 14486->14489 14487->14491 14490 7ffa532a799a GetLastError 14489->14490 14489->14491 14490->14491 14493 7ffa532a79d3 _CrtMemDumpAllObjectsSince 14490->14493 14491->14485 14492 7ffa532a7a05 WideCharToMultiByte 14492->14491 14492->14493 14493->14491 14493->14492 13330 7ffa53296c32 13331 7ffa53296c3c 13330->13331 13332 7ffa53296e25 _LocaleUpdate::~_LocaleUpdate 13331->13332 13333 7ffa53296c7a _CrtMemDumpAllObjectsSince 13331->13333 13334 7ffa53293280 __GSHandlerCheck 8 API calls 13332->13334 13337 7ffa53296ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 13333->13337 13342 7ffa5329c260 13333->13342 13335 7ffa53296e89 13334->13335 13346 7ffa5329c0c0 13337->13346 13339 7ffa53296e12 13340 7ffa53296dc7 13340->13339 13341 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 13340->13341 13341->13339 13344 7ffa5329c286 _CrtMemDumpAllObjectsSince wcsxfrm 13342->13344 13343 7ffa5329c29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 13343->13337 13344->13343 13345 7ffa5329f4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 13344->13345 13345->13343 13349 7ffa532a2260 13346->13349 13348 7ffa5329c103 13348->13340 13350 7ffa532a228b 13349->13350 13351 7ffa532a22e1 13350->13351 13352 7ffa532a231f 13350->13352 13353 7ffa5329bd70 _invalid_parameter 17 API calls 13351->13353 13354 7ffa532a2385 13352->13354 13357 7ffa532a23c3 _calloc_dbg_impl 13352->13357 13356 7ffa532a2315 _calloc_dbg_impl 13353->13356 13355 7ffa5329bd70 _invalid_parameter 17 API calls 13354->13355 13355->13356 13356->13348 13357->13356 13358 7ffa5329bd70 _invalid_parameter 17 API calls 13357->13358 13358->13356 12423 7ffa53293433 12424 7ffa53293437 12423->12424 12425 7ffa53293446 12423->12425 12431 7ffa53297d00 12424->12431 12432 7ffa53297d0e 12431->12432 12433 7ffa5329343c 12432->12433 12434 7ffa53297d87 DeleteCriticalSection 12432->12434 12435 7ffa53293e00 12433->12435 12434->12432 12436 7ffa53293e23 12435->12436 12437 7ffa53293e0d FlsFree 12435->12437 12441 7ffa532990b0 12436->12441 12437->12436 12440 7ffa532988d0 HeapDestroy 12440->12425 12445 7ffa532990be 12441->12445 12442 7ffa53293441 12442->12440 12443 7ffa532990fd DeleteCriticalSection 12443->12445 12444 7ffa5329914d 12444->12442 12446 7ffa53299196 DeleteCriticalSection 12444->12446 12445->12443 12445->12444 12446->12444 13359 7ffa532ac435 13360 7ffa532ac479 _CrtMemDumpAllObjectsSince 13359->13360 13361 7ffa532ac598 DecodePointer 13360->13361 13362 7ffa532ac60d _CrtMemDumpAllObjectsSince 13361->13362 13363 7ffa532ac62b DecodePointer 13362->13363 13364 7ffa532ac652 _CrtMemDumpAllObjectsSince 13362->13364 13363->13364 13365 7ffa532ac676 DecodePointer 13364->13365 13375 7ffa532ac69d std::exception::_Copy_str 13364->13375 13365->13375 13366 7ffa532ab99c 13367 7ffa532acc93 13366->13367 13370 7ffa532abada 13366->13370 13369 7ffa5329bd70 _invalid_parameter 17 API calls 13367->13369 13372 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 13367->13372 13368 7ffa532ab530 wctomb_s 19 API calls 13368->13375 13369->13372 13374 7ffa5329bd70 _invalid_parameter 17 API calls 13370->13374 13371 7ffa53293280 __GSHandlerCheck 8 API calls 13373 7ffa532acd90 13371->13373 13372->13371 13374->13372 13375->13366 13375->13368 14494 7ffa532a9939 14495 7ffa532a9951 __doserrno 14494->14495 14496 7ffa5329bd70 _invalid_parameter 17 API calls 14495->14496 14497 7ffa532a99d7 14496->14497 14498 7ffa53293280 __GSHandlerCheck 8 API calls 14497->14498 14499 7ffa532aa9f5 14498->14499 14511 7ffa5329b12b 14512 7ffa5329b14c 14511->14512 14513 7ffa5329b2e0 14512->14513 14514 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 14512->14514 14515 7ffa5329b33e 14513->14515 14517 7ffa5329d490 std::exception::_Copy_str 17 API calls 14513->14517 14514->14513 14516 7ffa532a0cc0 25 API calls 14515->14516 14518 7ffa5329b358 14516->14518 14519 7ffa5329b311 14517->14519 14521 7ffa5329b37d 14518->14521 14522 7ffa5329cff0 terminate 34 API calls 14518->14522 14520 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14519->14520 14520->14515 14525 7ffa53293280 __GSHandlerCheck 8 API calls 14521->14525 14523 7ffa5329b373 14522->14523 14524 7ffa53297090 _exit 33 API calls 14523->14524 14524->14521 14526 7ffa5329b3a0 14525->14526 14527 7ffa532aff2d 14528 7ffa532aff37 14527->14528 14529 7ffa532b0042 14528->14529 14530 7ffa532aff47 14528->14530 14542 7ffa53299360 LeaveCriticalSection 14529->14542 14531 7ffa532b003d 14530->14531 14534 7ffa532aae90 _lock_file2 EnterCriticalSection 14530->14534 14533 7ffa532b004c 14535 7ffa532aff97 14534->14535 14536 7ffa532affd0 14535->14536 14537 7ffa532affbb 14535->14537 14538 7ffa532affe1 14535->14538 14539 7ffa532aaf60 _unlock_file2 2 API calls 14536->14539 14540 7ffa532afd70 _fflush_nolock 25 API calls 14537->14540 14538->14536 14541 7ffa532afd70 _fflush_nolock 25 API calls 14538->14541 14539->14531 14540->14536 14541->14536 14542->14533 13385 7ffa532ad830 13386 7ffa532ad8aa 13385->13386 13387 7ffa532ad926 13386->13387 13388 7ffa532ad97b 13386->13388 13389 7ffa5329bd70 _invalid_parameter 17 API calls 13387->13389 13390 7ffa532ad9ee 13388->13390 13397 7ffa532ada43 13388->13397 13392 7ffa532ad95a _LocaleUpdate::~_LocaleUpdate 13389->13392 13391 7ffa5329bd70 _invalid_parameter 17 API calls 13390->13391 13391->13392 13393 7ffa53293280 __GSHandlerCheck 8 API calls 13392->13393 13394 7ffa532aed9e 13393->13394 13395 7ffa532aeca1 13395->13392 13396 7ffa5329bd70 _invalid_parameter 17 API calls 13395->13396 13396->13392 13397->13395 13398 7ffa532adbb5 13397->13398 13399 7ffa5329bd70 _invalid_parameter 17 API calls 13398->13399 13399->13392 14543 7ffa532b1330 14556 7ffa53299360 LeaveCriticalSection 14543->14556 14545 7ffa532b1343 14557 7ffa53299360 LeaveCriticalSection 14545->14557 14547 7ffa532b1363 14548 7ffa532aaf60 _unlock_file2 2 API calls 14547->14548 14549 7ffa532b1390 14548->14549 14558 7ffa53299360 LeaveCriticalSection 14549->14558 14551 7ffa532b13b3 14559 7ffa53299360 LeaveCriticalSection 14551->14559 14553 7ffa532b13d3 14554 7ffa532aaee0 _mtinitlocknum$fin$0 2 API calls 14553->14554 14555 7ffa532b13f2 14554->14555 14556->14545 14557->14547 14558->14551 14559->14553 12460 7ffa53293d30 12478 7ffa53297540 12460->12478 12465 7ffa53293d42 12467 7ffa53293e00 3 API calls 12465->12467 12466 7ffa53293d4e FlsAlloc 12468 7ffa53293d6a 12466->12468 12470 7ffa53293d73 _calloc_dbg 12466->12470 12471 7ffa53293d47 12467->12471 12469 7ffa53293e00 3 API calls 12468->12469 12469->12471 12472 7ffa53293da4 FlsSetValue 12470->12472 12473 7ffa53293db9 12470->12473 12472->12473 12474 7ffa53293dc2 12472->12474 12475 7ffa53293e00 3 API calls 12473->12475 12487 7ffa53293e30 12474->12487 12475->12471 12493 7ffa53293d00 RtlEncodePointer 12478->12493 12480 7ffa53297549 _initp_misc_winsig 12494 7ffa5329cf20 EncodePointer 12480->12494 12482 7ffa53293d39 12483 7ffa53298fe0 12482->12483 12485 7ffa53298ff6 12483->12485 12484 7ffa53299022 InitializeCriticalSectionAndSpinCount 12484->12485 12486 7ffa53293d3e 12484->12486 12485->12484 12485->12486 12486->12465 12486->12466 12488 7ffa53293ead 12487->12488 12495 7ffa53299360 LeaveCriticalSection 12488->12495 12490 7ffa53293ec7 _updatetlocinfoEx_nolock 12496 7ffa53299360 LeaveCriticalSection 12490->12496 12492 7ffa53293dce GetCurrentThreadId 12492->12471 12493->12480 12494->12482 12495->12490 12496->12492 14569 7ffa53293130 14570 7ffa53293170 __GSHandlerCheck 8 API calls 14569->14570 14571 7ffa53293160 14570->14571 13400 7ffa5329e830 13401 7ffa5329e857 13400->13401 13404 7ffa532a3cc0 13401->13404 13405 7ffa532a3cdd 13404->13405 13407 7ffa532a3d82 13405->13407 13412 7ffa532a3ef3 __SehTransFilter 13405->13412 13415 7ffa5329e8e3 13405->13415 13409 7ffa532a3dc8 13407->13409 13413 7ffa532a3e40 13407->13413 13407->13415 13408 7ffa532a3ebd 13408->13415 13435 7ffa5329e790 13408->13435 13422 7ffa532a3a60 13409->13422 13412->13415 13442 7ffa532a40b0 13412->13442 13413->13408 13416 7ffa532a3e93 13413->13416 13417 7ffa5329cf80 _inconsistency 36 API calls 13413->13417 13420 7ffa532a4f20 __SehTransFilter 36 API calls 13416->13420 13417->13416 13418 7ffa532a3e08 13428 7ffa532a4f20 13418->13428 13419 7ffa5329cf80 _inconsistency 36 API calls 13419->13418 13420->13408 13423 7ffa532a3a7b 13422->13423 13424 7ffa532a3a7d 13422->13424 13426 7ffa532a3aa5 13423->13426 13427 7ffa5329cf80 _inconsistency 36 API calls 13423->13427 13425 7ffa5329cf80 _inconsistency 36 API calls 13424->13425 13425->13423 13426->13418 13426->13419 13427->13426 13487 7ffa532a3b70 13428->13487 13430 7ffa532a4f55 __SehTransFilter _SetImageBase __SetState 13431 7ffa532a5103 13430->13431 13432 7ffa5329cf80 _inconsistency 36 API calls 13430->13432 13433 7ffa532a514a __SetState 13431->13433 13434 7ffa5329cf80 _inconsistency 36 API calls 13431->13434 13432->13430 13433->13415 13434->13433 13494 7ffa5329e500 13435->13494 13438 7ffa532a3b40 __StateFromControlPc 36 API calls 13439 7ffa5329e7d0 __SehTransFilter 13438->13439 13440 7ffa532a4f20 __SehTransFilter 36 API calls 13439->13440 13441 7ffa5329e81e 13440->13441 13441->13415 13443 7ffa532a3b40 __StateFromControlPc 36 API calls 13442->13443 13444 7ffa532a40ea 13443->13444 13445 7ffa5329e500 __SetUnwindTryBlock 37 API calls 13444->13445 13446 7ffa532a4110 13445->13446 13499 7ffa532a3c70 13446->13499 13449 7ffa532a4133 __SetState 13502 7ffa532a3c00 13449->13502 13450 7ffa532a4176 13451 7ffa532a3c70 __GetUnwindTryBlock 37 API calls 13450->13451 13452 7ffa532a4174 13451->13452 13454 7ffa532a41af _ValidateRead _SetThrowImageBase 13452->13454 13455 7ffa5329cf80 _inconsistency 36 API calls 13452->13455 13463 7ffa532a4235 13454->13463 13471 7ffa5329cf80 _inconsistency 36 API calls 13454->13471 13473 7ffa532a428e 13454->13473 13479 7ffa532a4347 13454->13479 13455->13454 13456 7ffa532a47d9 13457 7ffa532a47f3 13456->13457 13458 7ffa532a4847 13456->13458 13459 7ffa532a47d7 13456->13459 13532 7ffa532a4960 13457->13532 13462 7ffa5329cf50 terminate 35 API calls 13458->13462 13459->13463 13465 7ffa5329cf80 _inconsistency 36 API calls 13459->13465 13460 7ffa532a43f5 13466 7ffa532a466c __SehTransFilter 13460->13466 13517 7ffa5329ea30 13460->13517 13462->13459 13463->13415 13465->13463 13466->13459 13467 7ffa532a5bb0 __SehTransFilter 36 API calls 13466->13467 13468 7ffa532a4727 13467->13468 13468->13459 13469 7ffa5329e500 __SetUnwindTryBlock 37 API calls 13468->13469 13470 7ffa532a4767 13469->13470 13529 7ffa5329edc0 RtlUnwindEx 13470->13529 13471->13473 13474 7ffa5329cf80 _inconsistency 36 API calls 13473->13474 13475 7ffa532a42fa 13473->13475 13474->13475 13475->13479 13505 7ffa532a5bb0 13475->13505 13476 7ffa532a4450 __SehTransFilter 13476->13466 13522 7ffa532a5180 13476->13522 13479->13456 13479->13460 13480 7ffa532a4340 __SehTransFilter 13480->13479 13481 7ffa532a4393 13480->13481 13482 7ffa532a435a __SehTransFilter 13480->13482 13483 7ffa5329cf50 terminate 35 API calls 13481->13483 13511 7ffa532a4870 13482->13511 13483->13479 13488 7ffa532a3b9a 13487->13488 13489 7ffa532a3ba9 13487->13489 13491 7ffa532a3b40 13488->13491 13489->13430 13492 7ffa532a3a60 __StateFromControlPc 36 API calls 13491->13492 13493 7ffa532a3b65 13492->13493 13493->13489 13495 7ffa532a3b40 __StateFromControlPc 36 API calls 13494->13495 13497 7ffa5329e539 13495->13497 13496 7ffa5329e601 13496->13438 13497->13496 13498 7ffa5329e5c2 RtlLookupFunctionEntry 13497->13498 13498->13496 13500 7ffa5329e500 __SetUnwindTryBlock 37 API calls 13499->13500 13501 7ffa532a3c9c 13500->13501 13501->13449 13501->13450 13503 7ffa5329e500 __SetUnwindTryBlock 37 API calls 13502->13503 13504 7ffa532a3c31 13503->13504 13504->13452 13506 7ffa532a5bc6 13505->13506 13507 7ffa532a5bc8 13505->13507 13509 7ffa5329cf50 terminate 35 API calls 13506->13509 13510 7ffa532a5bda __SehTransFilter 13506->13510 13508 7ffa5329cf80 _inconsistency 36 API calls 13507->13508 13508->13506 13509->13510 13510->13480 13542 7ffa532ad4e0 13511->13542 13514 7ffa532ad320 13515 7ffa532ad375 13514->13515 13516 7ffa532ad3ba RaiseException 13515->13516 13516->13479 13518 7ffa532a3b40 __StateFromControlPc 36 API calls 13517->13518 13519 7ffa5329ea6f 13518->13519 13520 7ffa5329cf80 _inconsistency 36 API calls 13519->13520 13521 7ffa5329ea7a 13519->13521 13520->13521 13521->13476 13523 7ffa5329e500 __SetUnwindTryBlock 37 API calls 13522->13523 13524 7ffa532a51c1 13523->13524 13525 7ffa532a51f0 __SehTransFilter 13524->13525 13549 7ffa532a5970 13524->13549 13527 7ffa5329edc0 __SehTransFilter 9 API calls 13525->13527 13528 7ffa532a5259 13527->13528 13528->13476 13530 7ffa53293280 __GSHandlerCheck 8 API calls 13529->13530 13531 7ffa5329eee7 13530->13531 13531->13459 13533 7ffa532a4990 13532->13533 13539 7ffa532a498b 13532->13539 13538 7ffa532a49b2 __SehTransFilter 13533->13538 13566 7ffa53293d00 RtlEncodePointer 13533->13566 13534 7ffa532a4a41 13536 7ffa5329ea30 __SehTransFilter 36 API calls 13534->13536 13535 7ffa5329cf80 _inconsistency 36 API calls 13535->13534 13540 7ffa532a4a8e __SehTransFilter 13536->13540 13538->13534 13538->13535 13538->13539 13539->13459 13540->13539 13541 7ffa532a5180 __SehTransFilter 38 API calls 13540->13541 13541->13539 13545 7ffa532ad660 13542->13545 13546 7ffa532a437d 13545->13546 13547 7ffa532ad676 std::exception::_Copy_str malloc 13545->13547 13546->13514 13547->13546 13548 7ffa5329d490 std::exception::_Copy_str 17 API calls 13547->13548 13548->13546 13550 7ffa532a5998 13549->13550 13553 7ffa532a55f0 13550->13553 13552 7ffa532a59d3 __SehTransFilter __AdjustPointer 13552->13525 13554 7ffa532a561e __SehTransFilter 13553->13554 13555 7ffa532a5765 13554->13555 13556 7ffa532a56fa _ValidateRead 13554->13556 13564 7ffa532a56aa __SehTransFilter __AdjustPointer 13554->13564 13557 7ffa532a577a _ValidateRead 13555->13557 13558 7ffa532a5813 __SehTransFilter 13555->13558 13560 7ffa5329cf80 _inconsistency 36 API calls 13556->13560 13556->13564 13561 7ffa5329cf80 _inconsistency 36 API calls 13557->13561 13557->13564 13559 7ffa532a584d _ValidateRead 13558->13559 13565 7ffa532a58c6 __SehTransFilter _ValidateExecute _ValidateRead 13558->13565 13562 7ffa5329cf80 _inconsistency 36 API calls 13559->13562 13559->13564 13560->13564 13561->13564 13562->13564 13563 7ffa5329cf80 _inconsistency 36 API calls 13563->13564 13564->13552 13565->13563 13565->13564 13566->13538 13567 7ffa532ae424 13568 7ffa532ae469 _CrtMemDumpAllObjectsSince 13567->13568 13569 7ffa532ae588 DecodePointer 13568->13569 13570 7ffa532ae5fd _CrtMemDumpAllObjectsSince 13569->13570 13571 7ffa532ae642 _CrtMemDumpAllObjectsSince 13570->13571 13572 7ffa532ae61b DecodePointer 13570->13572 13573 7ffa532ae666 DecodePointer 13571->13573 13574 7ffa532ae68d std::exception::_Copy_str 13571->13574 13572->13571 13573->13574 13575 7ffa532aeadf 13574->13575 13585 7ffa532ada75 13574->13585 13596 7ffa532aeec0 13574->13596 13600 7ffa532aef10 13575->13600 13578 7ffa532aeafd 13579 7ffa532aeb33 13578->13579 13581 7ffa532aeec0 25 API calls 13578->13581 13580 7ffa532aec29 13579->13580 13594 7ffa532aeb49 _CrtMemDumpAllObjectsSince 13579->13594 13583 7ffa532aebda 13580->13583 13584 7ffa532aef10 25 API calls 13580->13584 13581->13579 13582 7ffa532aeca1 13587 7ffa5329bd70 _invalid_parameter 17 API calls 13582->13587 13588 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 13582->13588 13583->13585 13586 7ffa532aeec0 25 API calls 13583->13586 13584->13583 13585->13582 13589 7ffa532adbb5 13585->13589 13586->13585 13587->13588 13590 7ffa53293280 __GSHandlerCheck 8 API calls 13588->13590 13592 7ffa5329bd70 _invalid_parameter 17 API calls 13589->13592 13591 7ffa532aed9e 13590->13591 13592->13588 13594->13583 13604 7ffa532af000 13594->13604 13611 7ffa532aee40 13594->13611 13597 7ffa532aeed7 13596->13597 13598 7ffa532aef07 13597->13598 13599 7ffa532aee40 25 API calls 13597->13599 13598->13575 13599->13597 13602 7ffa532aef2c 13600->13602 13601 7ffa532aef4d 13601->13578 13602->13601 13603 7ffa532aee40 25 API calls 13602->13603 13603->13602 13605 7ffa532af026 _CrtMemDumpAllObjectsSince wcsxfrm 13604->13605 13608 7ffa532af031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 13604->13608 13606 7ffa532af276 _CrtMemDumpAllObjectsSince 13605->13606 13605->13608 13609 7ffa532af146 _CrtMemDumpAllObjectsSince 13605->13609 13607 7ffa532af29d MultiByteToWideChar 13606->13607 13607->13608 13608->13594 13609->13608 13610 7ffa532af1b5 MultiByteToWideChar 13609->13610 13610->13608 13612 7ffa532aee62 13611->13612 13614 7ffa532aee6e 13612->13614 13615 7ffa532af360 13612->13615 13614->13594 13616 7ffa532af719 13615->13616 13617 7ffa532af399 13615->13617 13619 7ffa532b0170 23 API calls 13616->13619 13650 7ffa532af4f2 13616->13650 13618 7ffa532aafb0 _fflush_nolock 17 API calls 13617->13618 13622 7ffa532af3a6 13618->13622 13619->13650 13620 7ffa53293280 __GSHandlerCheck 8 API calls 13623 7ffa532af7c5 13620->13623 13621 7ffa532af3ed 13625 7ffa532af4c7 13621->13625 13627 7ffa532aafb0 _fflush_nolock 17 API calls 13621->13627 13622->13621 13624 7ffa532aafb0 _fflush_nolock 17 API calls 13622->13624 13623->13614 13626 7ffa532af3b8 13624->13626 13625->13650 13651 7ffa532b0170 13625->13651 13626->13621 13628 7ffa532aafb0 _fflush_nolock 17 API calls 13626->13628 13630 7ffa532af43d 13627->13630 13631 7ffa532af3ca 13628->13631 13632 7ffa532af484 13630->13632 13634 7ffa532aafb0 _fflush_nolock 17 API calls 13630->13634 13633 7ffa532aafb0 _fflush_nolock 17 API calls 13631->13633 13632->13625 13635 7ffa532af561 13632->13635 13633->13621 13636 7ffa532af44f 13634->13636 13637 7ffa532aafb0 _fflush_nolock 17 API calls 13635->13637 13636->13632 13639 7ffa532aafb0 _fflush_nolock 17 API calls 13636->13639 13638 7ffa532af56e 13637->13638 13640 7ffa532af5b8 13638->13640 13643 7ffa532aafb0 _fflush_nolock 17 API calls 13638->13643 13641 7ffa532af461 13639->13641 13640->13616 13644 7ffa532af604 13640->13644 13642 7ffa532aafb0 _fflush_nolock 17 API calls 13641->13642 13642->13632 13645 7ffa532af580 13643->13645 13646 7ffa532ab530 wctomb_s 19 API calls 13644->13646 13645->13640 13647 7ffa532aafb0 _fflush_nolock 17 API calls 13645->13647 13646->13650 13648 7ffa532af592 13647->13648 13649 7ffa532aafb0 _fflush_nolock 17 API calls 13648->13649 13649->13640 13650->13620 13653 7ffa532b0185 13651->13653 13652 7ffa532aafb0 _fflush_nolock 17 API calls 13654 7ffa532b01c7 13652->13654 13653->13652 13656 7ffa532b0326 13654->13656 13657 7ffa532b01dc 13654->13657 13659 7ffa532aab10 13654->13659 13656->13657 13663 7ffa532a9290 13656->13663 13657->13650 13660 7ffa532aab23 13659->13660 13661 7ffa532aab35 13659->13661 13660->13656 13661->13660 13662 7ffa5329bd70 _invalid_parameter 17 API calls 13661->13662 13662->13660 13664 7ffa532a92d8 13663->13664 13670 7ffa532a92b6 __doserrno 13663->13670 13665 7ffa532a938c 13664->13665 13666 7ffa532a9341 __doserrno 13664->13666 13667 7ffa532a945b 13665->13667 13672 7ffa532a9410 __doserrno 13665->13672 13668 7ffa5329bd70 _invalid_parameter 17 API calls 13666->13668 13669 7ffa532afae0 _fflush_nolock 3 API calls 13667->13669 13668->13670 13671 7ffa532a9464 13669->13671 13670->13657 13675 7ffa532a94a6 __doserrno 13671->13675 13677 7ffa532a9520 13671->13677 13674 7ffa5329bd70 _invalid_parameter 17 API calls 13672->13674 13674->13670 13683 7ffa532afbc0 LeaveCriticalSection 13675->13683 13678 7ffa532af900 _fflush_nolock 17 API calls 13677->13678 13679 7ffa532a9545 13678->13679 13680 7ffa532a959d SetFilePointer 13679->13680 13682 7ffa532a9552 _dosmaperr 13679->13682 13681 7ffa532a95c1 GetLastError 13680->13681 13680->13682 13681->13682 13682->13675 13683->13670 13684 7ffa53295a25 13685 7ffa53295a37 13684->13685 13686 7ffa5329bd70 _invalid_parameter 17 API calls 13685->13686 13687 7ffa53295aaf 13686->13687 14572 7ffa53299328 14573 7ffa53299336 EnterCriticalSection 14572->14573 14574 7ffa5329932c 14572->14574 14574->14573 12538 7ffa5329461b 12541 7ffa53294625 _calloc_dbg_impl 12538->12541 12540 7ffa532948be 12542 7ffa53299360 LeaveCriticalSection 12541->12542 12542->12540 14583 7ffa532a4920 14586 7ffa532ad530 14583->14586 14589 7ffa532ad580 14586->14589 14590 7ffa532ad59a std::exception::_Tidy 14589->14590 14591 7ffa532a493d 14589->14591 14590->14591 14592 7ffa532ad660 std::exception::_Copy_str 17 API calls 14590->14592 14592->14591 13688 7ffa532a0215 13689 7ffa532a0231 13688->13689 13695 7ffa532a0302 13688->13695 13759 7ffa532a8c80 13689->13759 13692 7ffa532a0489 13769 7ffa532a2d80 13692->13769 13693 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13696 7ffa532a027e OutputDebugStringW 13693->13696 13698 7ffa532a040d 13695->13698 13766 7ffa532a8c30 13695->13766 13700 7ffa532a0296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 13696->13700 13697 7ffa532a04a3 13701 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13697->13701 13698->13692 13699 7ffa532a1640 17 API calls 13698->13699 13702 7ffa532a045c 13699->13702 13707 7ffa532a02f2 13700->13707 13704 7ffa532a04d0 13701->13704 13706 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13702->13706 13708 7ffa532a053d 13704->13708 13709 7ffa532a2d80 17 API calls 13704->13709 13712 7ffa532a0583 13704->13712 13706->13692 13716 7ffa53293280 __GSHandlerCheck 8 API calls 13707->13716 13710 7ffa532a2d80 17 API calls 13708->13710 13713 7ffa532a0510 13709->13713 13714 7ffa532a0556 13710->13714 13711 7ffa532a0357 13717 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 13711->13717 13718 7ffa532a03af 13711->13718 13782 7ffa532a1590 13712->13782 13719 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13713->13719 13715 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13714->13715 13715->13712 13720 7ffa532a0cae 13716->13720 13717->13718 13718->13698 13721 7ffa532a1640 17 API calls 13718->13721 13719->13708 13723 7ffa532a03e0 13721->13723 13724 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13723->13724 13724->13698 13725 7ffa532a05fa 13726 7ffa532a0652 13725->13726 13728 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 13725->13728 13727 7ffa532a06b0 13726->13727 13729 7ffa532a1640 17 API calls 13726->13729 13732 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 13727->13732 13728->13726 13730 7ffa532a0683 13729->13730 13731 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13730->13731 13731->13727 13733 7ffa532a0769 13732->13733 13734 7ffa5329d490 std::exception::_Copy_str 17 API calls 13733->13734 13747 7ffa532a07bd 13733->13747 13735 7ffa532a0790 13734->13735 13736 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13735->13736 13736->13747 13737 7ffa532a0905 13737->13707 13738 7ffa532a0a26 13737->13738 13742 7ffa532a09a4 GetFileType 13737->13742 13739 7ffa532a0ba5 13738->13739 13740 7ffa532a0b97 OutputDebugStringW 13738->13740 13739->13707 13744 7ffa532a0c23 13739->13744 13746 7ffa532a8c80 _itow_s 17 API calls 13739->13746 13740->13739 13743 7ffa532a09d0 13742->13743 13749 7ffa532a09ce 13742->13749 13745 7ffa532a09dd WriteConsoleW 13743->13745 13786 7ffa5329b470 13744->13786 13745->13738 13748 7ffa532a0a2b GetLastError 13745->13748 13750 7ffa532a0bf6 13746->13750 13747->13737 13785 7ffa53299360 LeaveCriticalSection 13747->13785 13748->13738 13748->13749 13751 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 13749->13751 13752 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13750->13752 13754 7ffa532a0ab5 13751->13754 13752->13744 13755 7ffa532a0b26 WriteFile 13754->13755 13757 7ffa532a0ad0 13754->13757 13755->13738 13758 7ffa532a0add WriteFile 13757->13758 13758->13738 13760 7ffa532a8cd3 13759->13760 13761 7ffa532a8ca6 13759->13761 13763 7ffa532a8d00 _itow_s 17 API calls 13760->13763 13761->13760 13762 7ffa532a8cad 13761->13762 13812 7ffa532a8d00 13762->13812 13765 7ffa532a0251 13763->13765 13765->13693 13828 7ffa532a86b0 13766->13828 13768 7ffa532a8c74 13768->13711 13770 7ffa532a2da1 13769->13770 13771 7ffa532a2e02 13770->13771 13773 7ffa532a2e40 _calloc_dbg_impl 13770->13773 13772 7ffa5329bd70 _invalid_parameter 17 API calls 13771->13772 13777 7ffa532a2e36 _calloc_dbg_impl 13772->13777 13774 7ffa532a2f34 13773->13774 13775 7ffa532a2f72 _calloc_dbg_impl 13773->13775 13778 7ffa5329bd70 _invalid_parameter 17 API calls 13774->13778 13776 7ffa532a30b5 13775->13776 13780 7ffa532a30f3 _calloc_dbg_impl 13775->13780 13779 7ffa5329bd70 _invalid_parameter 17 API calls 13776->13779 13777->13697 13778->13777 13779->13777 13780->13777 13781 7ffa5329bd70 _invalid_parameter 17 API calls 13780->13781 13781->13777 13783 7ffa532a86b0 _snwprintf_s 17 API calls 13782->13783 13784 7ffa532a15de 13783->13784 13784->13725 13785->13737 13787 7ffa5329b48d 13786->13787 13788 7ffa5329b4c4 13787->13788 13789 7ffa5329b4ce GetModuleFileNameW 13787->13789 13792 7ffa53293280 __GSHandlerCheck 8 API calls 13788->13792 13790 7ffa5329b4f2 13789->13790 13796 7ffa5329b538 13789->13796 13791 7ffa532a1640 17 API calls 13790->13791 13793 7ffa5329b50b 13791->13793 13794 7ffa5329ba58 13792->13794 13795 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13793->13795 13794->13707 13795->13796 13800 7ffa5329b5f2 13796->13800 13850 7ffa532a0fd0 13796->13850 13798 7ffa5329b5c5 13799 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13798->13799 13799->13800 13801 7ffa532a1590 _snwprintf_s 17 API calls 13800->13801 13802 7ffa5329b940 13801->13802 13803 7ffa5329b998 13802->13803 13804 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 13802->13804 13805 7ffa532a1640 17 API calls 13803->13805 13808 7ffa5329b9f6 13803->13808 13804->13803 13806 7ffa5329b9c9 13805->13806 13807 7ffa53297ff0 _invoke_watson_if_error 16 API calls 13806->13807 13807->13808 13808->13788 13809 7ffa5329cff0 terminate 34 API calls 13808->13809 13810 7ffa5329ba2b 13809->13810 13811 7ffa53297090 _exit 33 API calls 13810->13811 13811->13788 13814 7ffa532a8d25 13812->13814 13813 7ffa532a8d7b 13815 7ffa5329bd70 _invalid_parameter 17 API calls 13813->13815 13814->13813 13817 7ffa532a8db9 13814->13817 13825 7ffa532a8daf 13815->13825 13816 7ffa532a8e1a 13818 7ffa5329bd70 _invalid_parameter 17 API calls 13816->13818 13817->13816 13819 7ffa532a8e58 _calloc_dbg_impl 13817->13819 13818->13825 13820 7ffa532a8f5d 13819->13820 13822 7ffa532a8f9b 13819->13822 13821 7ffa5329bd70 _invalid_parameter 17 API calls 13820->13821 13821->13825 13823 7ffa532a900e 13822->13823 13826 7ffa532a904c 13822->13826 13824 7ffa5329bd70 _invalid_parameter 17 API calls 13823->13824 13824->13825 13825->13765 13826->13825 13827 7ffa5329bd70 _invalid_parameter 17 API calls 13826->13827 13827->13825 13829 7ffa532a86e6 13828->13829 13830 7ffa532a873c 13829->13830 13832 7ffa532a877a 13829->13832 13831 7ffa5329bd70 _invalid_parameter 17 API calls 13830->13831 13841 7ffa532a8770 _calloc_dbg_impl 13831->13841 13833 7ffa532a884c 13832->13833 13834 7ffa532a880e 13832->13834 13832->13841 13835 7ffa532a8992 13833->13835 13836 7ffa532a8862 13833->13836 13837 7ffa5329bd70 _invalid_parameter 17 API calls 13834->13837 13839 7ffa532a8350 _snwprintf_s 17 API calls 13835->13839 13843 7ffa532a8350 13836->13843 13837->13841 13840 7ffa532a88b1 _calloc_dbg_impl 13839->13840 13840->13841 13842 7ffa5329bd70 _invalid_parameter 17 API calls 13840->13842 13841->13768 13842->13841 13844 7ffa532a839b 13843->13844 13845 7ffa532a83f1 13844->13845 13847 7ffa532a842f 13844->13847 13846 7ffa5329bd70 _invalid_parameter 17 API calls 13845->13846 13849 7ffa532a8425 13846->13849 13848 7ffa5329bd70 _invalid_parameter 17 API calls 13847->13848 13847->13849 13848->13849 13849->13840 13851 7ffa532a0ff7 13850->13851 13854 7ffa532a0ff0 __SehTransFilter 13850->13854 13852 7ffa532a1055 13851->13852 13855 7ffa532a1093 _calloc_dbg_impl 13851->13855 13853 7ffa5329bd70 _invalid_parameter 17 API calls 13852->13853 13853->13854 13854->13798 13855->13854 13856 7ffa532a111a 13855->13856 13858 7ffa532a1158 13855->13858 13857 7ffa5329bd70 _invalid_parameter 17 API calls 13856->13857 13857->13854 13858->13854 13859 7ffa5329bd70 _invalid_parameter 17 API calls 13858->13859 13859->13854 13860 7ffa5329ae14 13861 7ffa5329b390 13860->13861 13862 7ffa53293280 __GSHandlerCheck 8 API calls 13861->13862 13863 7ffa5329b3a0 13862->13863 13864 7ffa53297816 13867 7ffa53297826 _calloc_dbg 13864->13867 13865 7ffa53297ab9 13866 7ffa53297ce0 SetHandleCount 13865->13866 13870 7ffa53297b95 GetStdHandle 13865->13870 13872 7ffa53297c7b 13865->13872 13871 7ffa53297aaf 13866->13871 13867->13865 13868 7ffa53297a32 InitializeCriticalSectionAndSpinCount 13867->13868 13869 7ffa53297a19 GetFileType 13867->13869 13868->13865 13868->13871 13869->13865 13869->13868 13870->13872 13873 7ffa53297bb9 13870->13873 13872->13866 13873->13872 13874 7ffa53297bc8 GetFileType 13873->13874 13874->13872 13875 7ffa53297beb InitializeCriticalSectionAndSpinCount 13874->13875 13875->13871 13875->13872 14598 7ffa532ac719 14599 7ffa532ac724 get_int64_arg get_int_arg 14598->14599 14601 7ffa532ab530 wctomb_s 19 API calls 14599->14601 14606 7ffa532ab99c 14599->14606 14600 7ffa532acc93 14602 7ffa5329bd70 _invalid_parameter 17 API calls 14600->14602 14605 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 14600->14605 14601->14599 14602->14605 14603 7ffa532abada 14608 7ffa5329bd70 _invalid_parameter 17 API calls 14603->14608 14604 7ffa53293280 __GSHandlerCheck 8 API calls 14607 7ffa532acd90 14604->14607 14605->14604 14606->14600 14606->14603 14608->14605 14635 7ffa532ac30d 14637 7ffa532ac31a get_int64_arg _get_printf_count_output 14635->14637 14636 7ffa532ac3f2 14643 7ffa532ab99c 14636->14643 14644 7ffa532ab530 wctomb_s 19 API calls 14636->14644 14637->14636 14638 7ffa532ac39d 14637->14638 14639 7ffa5329bd70 _invalid_parameter 17 API calls 14638->14639 14647 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 14639->14647 14640 7ffa53293280 __GSHandlerCheck 8 API calls 14641 7ffa532acd90 14640->14641 14642 7ffa532acc93 14645 7ffa5329bd70 _invalid_parameter 17 API calls 14642->14645 14642->14647 14643->14642 14646 7ffa532abada 14643->14646 14644->14636 14645->14647 14648 7ffa5329bd70 _invalid_parameter 17 API calls 14646->14648 14647->14640 14648->14647 13877 7ffa532ad410 13882 7ffa532ad3e0 13877->13882 13880 7ffa532ad43c 13889 7ffa532b0070 13882->13889 13885 7ffa532ad710 13886 7ffa532ad721 13885->13886 13887 7ffa532ad726 13885->13887 13886->13880 13894 7ffa53299360 LeaveCriticalSection 13887->13894 13892 7ffa532b0083 _free_nolock 13889->13892 13891 7ffa532ad402 13891->13880 13891->13885 13893 7ffa53299360 LeaveCriticalSection 13892->13893 13893->13891 13894->13886 13895 7ffa532a2c10 13896 7ffa532a2c53 13895->13896 13897 7ffa532a2c24 _updatetlocinfoEx_nolock 13895->13897 13899 7ffa53299360 LeaveCriticalSection 13897->13899 13899->13896 13900 7ffa532a6203 13901 7ffa532a616e _CrtMemDumpAllObjectsSince wcsxfrm 13900->13901 13902 7ffa532a6238 MultiByteToWideChar 13901->13902 13903 7ffa532a61c8 _LocaleUpdate::~_LocaleUpdate 13901->13903 13902->13903 13904 7ffa532b0204 13906 7ffa532b023d 13904->13906 13905 7ffa532b03d7 13906->13905 13907 7ffa532aab10 17 API calls 13906->13907 13908 7ffa532b0326 13906->13908 13907->13908 13908->13905 13909 7ffa532a9290 23 API calls 13908->13909 13909->13905 13910 7ffa53293409 13911 7ffa53293e00 3 API calls 13910->13911 13912 7ffa5329340e 13911->13912 13915 7ffa532988d0 HeapDestroy 13912->13915 13914 7ffa53293413 13915->13914 14657 7ffa53293909 14659 7ffa53293913 __SehTransFilter 14657->14659 14658 7ffa532939db __SehTransFilter 14659->14658 14660 7ffa53293a71 RtlUnwindEx 14659->14660 14660->14658 14661 7ffa532ae2fc 14662 7ffa532ae309 get_int64_arg _get_printf_count_output 14661->14662 14663 7ffa532ae3e1 14662->14663 14664 7ffa532ae38c 14662->14664 14665 7ffa532aeadf 14663->14665 14667 7ffa532aeec0 25 API calls 14663->14667 14676 7ffa532ada75 14663->14676 14666 7ffa5329bd70 _invalid_parameter 17 API calls 14664->14666 14668 7ffa532aef10 25 API calls 14665->14668 14681 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 14666->14681 14667->14665 14669 7ffa532aeafd 14668->14669 14670 7ffa532aeb33 14669->14670 14672 7ffa532aeec0 25 API calls 14669->14672 14671 7ffa532aec29 14670->14671 14685 7ffa532aeb49 _CrtMemDumpAllObjectsSince 14670->14685 14674 7ffa532aebda 14671->14674 14675 7ffa532aef10 25 API calls 14671->14675 14672->14670 14673 7ffa532aeca1 14680 7ffa5329bd70 _invalid_parameter 17 API calls 14673->14680 14673->14681 14674->14676 14679 7ffa532aeec0 25 API calls 14674->14679 14675->14674 14676->14673 14682 7ffa532adbb5 14676->14682 14677 7ffa53293280 __GSHandlerCheck 8 API calls 14678 7ffa532aed9e 14677->14678 14679->14676 14680->14681 14681->14677 14683 7ffa5329bd70 _invalid_parameter 17 API calls 14682->14683 14683->14681 14684 7ffa532af000 wcsxfrm 2 API calls 14684->14685 14685->14674 14685->14684 14686 7ffa532aee40 25 API calls 14685->14686 14686->14685 13916 7ffa532953fb 13917 7ffa5329541d _realloc_dbg 13916->13917 13918 7ffa53296380 _CrtIsValidHeapPointer HeapValidate 13917->13918 13920 7ffa53295421 13917->13920 13919 7ffa532954de _calloc_dbg_impl _realloc_dbg 13918->13919 13921 7ffa5329c020 _free_base 2 API calls 13919->13921 13921->13920 12497 7ffa53298670 GetEnvironmentStringsW 12498 7ffa53298690 12497->12498 12502 7ffa53298697 WideCharToMultiByte 12497->12502 12500 7ffa53298733 12501 7ffa5329875f FreeEnvironmentStringsW 12500->12501 12503 7ffa5329876e WideCharToMultiByte 12500->12503 12501->12498 12502->12500 12502->12501 12504 7ffa532987c2 FreeEnvironmentStringsW 12503->12504 12505 7ffa532987aa 12503->12505 12504->12498 12505->12504 13956 7ffa53293471 13957 7ffa5329347a 13956->13957 13966 7ffa532934bc 13956->13966 13958 7ffa53293496 13957->13958 13968 7ffa532970b0 13957->13968 13960 7ffa53297d00 _ioterm DeleteCriticalSection 13958->13960 13961 7ffa5329349b 13960->13961 13962 7ffa53293e00 3 API calls 13961->13962 13963 7ffa532934a0 13962->13963 13971 7ffa532988d0 HeapDestroy 13963->13971 13965 7ffa532934a5 13965->13966 13967 7ffa53293e00 3 API calls 13965->13967 13967->13966 13969 7ffa53297280 _exit 33 API calls 13968->13969 13970 7ffa532970c3 13969->13970 13970->13958 13971->13965 14739 7ffa532a1b64 14742 7ffa532a1b9d 14739->14742 14740 7ffa532a1bed 14741 7ffa532aab10 17 API calls 14743 7ffa532a1c86 14741->14743 14742->14740 14742->14741 14742->14743 14743->14740 14744 7ffa532a9290 23 API calls 14743->14744 14744->14740 14752 7ffa532abb66 14753 7ffa532abb78 _CrtMemDumpAllObjectsSince wcsxfrm 14752->14753 14754 7ffa532abc46 14753->14754 14756 7ffa532ab99c 14753->14756 14755 7ffa5329bd70 _invalid_parameter 17 API calls 14754->14755 14761 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 14755->14761 14757 7ffa532acc93 14756->14757 14759 7ffa532abada 14756->14759 14758 7ffa5329bd70 _invalid_parameter 17 API calls 14757->14758 14757->14761 14758->14761 14763 7ffa5329bd70 _invalid_parameter 17 API calls 14759->14763 14760 7ffa53293280 __GSHandlerCheck 8 API calls 14762 7ffa532acd90 14760->14762 14761->14760 14763->14761 13972 7ffa5329425a FlsGetValue FlsSetValue 13973 7ffa53294283 13972->13973 13986 7ffa5329405b 13988 7ffa5329406e 13986->13988 13992 7ffa53299360 LeaveCriticalSection 13988->13992 13989 7ffa532941bb _updatetlocinfoEx_nolock 13993 7ffa53299360 LeaveCriticalSection 13989->13993 13991 7ffa53294224 13992->13989 13993->13991 14764 7ffa5329e55a 14765 7ffa5329e564 14764->14765 14766 7ffa5329e5c2 RtlLookupFunctionEntry 14765->14766 14767 7ffa5329e601 14765->14767 14766->14767 14768 7ffa532a595c 14769 7ffa5329cf50 terminate 35 API calls 14768->14769 14770 7ffa532a5961 14769->14770 12696 7ffa53298860 HeapCreate 12697 7ffa5329888d 12696->12697 12698 7ffa53298891 GetVersion 12696->12698 12699 7ffa532988a7 HeapSetInformation 12698->12699 12700 7ffa532988c1 12698->12700 12699->12700 12700->12697 13994 7ffa532a5260 13995 7ffa532a5296 __SehTransFilter _CreateFrameInfo 13994->13995 13996 7ffa5329ed30 _FindAndUnlinkFrame 36 API calls 13995->13996 13997 7ffa532a53e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 13996->13997 13998 7ffa53295854 13999 7ffa5329585b _calloc_dbg_impl 13998->13999 14000 7ffa5329c020 _free_base 2 API calls 13999->14000 14001 7ffa532959d5 14000->14001 14002 7ffa5329a057 14003 7ffa5329a061 14002->14003 14004 7ffa5329a234 14003->14004 14010 7ffa5329a08e __initmbctable 14003->14010 14005 7ffa5329a25d IsValidCodePage 14004->14005 14009 7ffa5329a22d __initmbctable 14004->14009 14007 7ffa5329a27b GetCPInfo 14005->14007 14005->14009 14006 7ffa53293280 __GSHandlerCheck 8 API calls 14008 7ffa5329a470 14006->14008 14007->14009 14012 7ffa5329a295 __initmbctable 14007->14012 14009->14006 14011 7ffa5329a5e0 __initmbctable 19 API calls 14010->14011 14011->14009 14013 7ffa5329a5e0 __initmbctable 19 API calls 14012->14013 14013->14009 14771 7ffa53295357 14774 7ffa53299360 LeaveCriticalSection 14771->14774 14773 7ffa53295361 14774->14773 14019 7ffa5329d04a 14020 7ffa5329d1d8 DecodePointer 14019->14020 14021 7ffa5329d1e8 14020->14021 14022 7ffa53297090 _exit 33 API calls 14021->14022 14023 7ffa5329d209 14021->14023 14027 7ffa5329d1f0 14021->14027 14022->14023 14025 7ffa5329d289 14023->14025 14028 7ffa53293d00 RtlEncodePointer 14023->14028 14025->14027 14029 7ffa53299360 LeaveCriticalSection 14025->14029 14028->14025 14029->14027 14786 7ffa5329cb4f 14792 7ffa5329cb5c 14786->14792 14787 7ffa53293280 __GSHandlerCheck 8 API calls 14788 7ffa5329cf0f 14787->14788 14789 7ffa5329cbeb GetStdHandle 14790 7ffa5329cc94 14789->14790 14794 7ffa5329cc07 std::exception::_Copy_str 14789->14794 14790->14787 14791 7ffa5329cc99 14791->14790 14793 7ffa532a1640 17 API calls 14791->14793 14792->14789 14792->14790 14792->14791 14795 7ffa5329cd10 14793->14795 14794->14790 14796 7ffa5329cc73 WriteFile 14794->14796 14797 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14795->14797 14796->14790 14798 7ffa5329cd3d GetModuleFileNameW 14797->14798 14799 7ffa5329cd68 14798->14799 14803 7ffa5329cdb1 14798->14803 14800 7ffa532a1640 17 API calls 14799->14800 14801 7ffa5329cd84 14800->14801 14802 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14801->14802 14802->14803 14804 7ffa5329ce5e 14803->14804 14815 7ffa532a3380 14803->14815 14805 7ffa532a2d80 17 API calls 14804->14805 14806 7ffa5329ce76 14805->14806 14808 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14806->14808 14810 7ffa5329cea3 14808->14810 14809 7ffa5329ce31 14811 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14809->14811 14812 7ffa532a2d80 17 API calls 14810->14812 14811->14804 14813 7ffa5329ceb9 14812->14813 14814 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14813->14814 14814->14790 14816 7ffa532a33a6 14815->14816 14817 7ffa532a342f 14816->14817 14820 7ffa532a346d _calloc_dbg_impl 14816->14820 14822 7ffa532a33bc _calloc_dbg_impl 14816->14822 14818 7ffa5329bd70 _invalid_parameter 17 API calls 14817->14818 14818->14822 14819 7ffa532a35fb 14821 7ffa5329bd70 _invalid_parameter 17 API calls 14819->14821 14820->14819 14820->14822 14823 7ffa532a3639 _calloc_dbg_impl 14820->14823 14821->14822 14822->14809 14823->14822 14824 7ffa5329bd70 _invalid_parameter 17 API calls 14823->14824 14824->14822 14825 7ffa532b0550 14826 7ffa532b0575 14825->14826 14827 7ffa532b055e 14825->14827 14827->14826 14828 7ffa532b0568 CloseHandle 14827->14828 14828->14826 14034 7ffa532a3e3b 14035 7ffa532a3ec7 14034->14035 14036 7ffa5329e790 __SehTransFilter 37 API calls 14035->14036 14037 7ffa532a3ee4 14036->14037 14038 7ffa5329443c 14039 7ffa5329444c 14038->14039 14042 7ffa53299360 LeaveCriticalSection 14039->14042 14041 7ffa532948be 14042->14041 14043 7ffa532b1040 14046 7ffa5329e8f0 14043->14046 14045 7ffa532b108f 14047 7ffa5329e90d 14046->14047 14048 7ffa532a3cc0 __SehTransFilter 39 API calls 14047->14048 14049 7ffa5329e980 14048->14049 14049->14045 14050 7ffa532b0e40 14051 7ffa532b0e50 14050->14051 14052 7ffa532b0e5e 14050->14052 14051->14052 14053 7ffa53293e00 3 API calls 14051->14053 14053->14052 14856 7ffa532b1140 14861 7ffa53299360 LeaveCriticalSection 14856->14861 14858 7ffa532b1153 14862 7ffa532a4e90 14858->14862 14860 7ffa532b1179 14861->14858 14863 7ffa532a4ecf 14862->14863 14864 7ffa532a4ebb 14862->14864 14863->14860 14864->14863 14865 7ffa5329cf50 terminate 35 API calls 14864->14865 14865->14863 14054 7ffa532adc41 14055 7ffa532aee40 25 API calls 14054->14055 14057 7ffa532ada75 14055->14057 14056 7ffa532aeca1 14058 7ffa5329bd70 _invalid_parameter 17 API calls 14056->14058 14059 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 14056->14059 14057->14056 14060 7ffa532adbb5 14057->14060 14058->14059 14061 7ffa53293280 __GSHandlerCheck 8 API calls 14059->14061 14063 7ffa5329bd70 _invalid_parameter 17 API calls 14060->14063 14062 7ffa532aed9e 14061->14062 14063->14059 12675 7ffa53298040 12676 7ffa53298056 12675->12676 12677 7ffa5329805b GetModuleFileNameA 12675->12677 12678 7ffa5329aa40 __initmbctable 24 API calls 12676->12678 12679 7ffa53298083 12677->12679 12678->12677 14064 7ffa53297640 GetStartupInfoW 14065 7ffa53297676 _calloc_dbg 14064->14065 14068 7ffa53297ab9 14065->14068 14074 7ffa53297689 14065->14074 14075 7ffa53297a32 InitializeCriticalSectionAndSpinCount 14065->14075 14076 7ffa53297a19 GetFileType 14065->14076 14066 7ffa53297ce0 SetHandleCount 14066->14074 14067 7ffa53297c7b 14067->14066 14068->14066 14068->14067 14069 7ffa53297b95 GetStdHandle 14068->14069 14069->14067 14070 7ffa53297bb9 14069->14070 14070->14067 14071 7ffa53297bc8 GetFileType 14070->14071 14071->14067 14072 7ffa53297beb InitializeCriticalSectionAndSpinCount 14071->14072 14072->14067 14072->14074 14075->14068 14075->14074 14076->14068 14076->14075 14866 7ffa53291140 14867 7ffa5329116a 14866->14867 14868 7ffa5329118c 14867->14868 14869 7ffa5329119a FileTimeToSystemTime 14867->14869 14871 7ffa53293280 __GSHandlerCheck 8 API calls 14868->14871 14869->14868 14870 7ffa532911ae 14869->14870 14872 7ffa53291000 4 API calls 14870->14872 14873 7ffa532911d0 14871->14873 14872->14868 14874 7ffa532af53e 14875 7ffa532af55c 14874->14875 14876 7ffa532af74d 14875->14876 14877 7ffa532b0170 23 API calls 14875->14877 14878 7ffa53293280 __GSHandlerCheck 8 API calls 14876->14878 14877->14876 14879 7ffa532af7c5 14878->14879 14077 7ffa53299240 14078 7ffa5329924d 14077->14078 14079 7ffa5329925f 14077->14079 14080 7ffa53299281 InitializeCriticalSectionAndSpinCount 14079->14080 14081 7ffa53299295 14079->14081 14080->14081 14083 7ffa53299360 LeaveCriticalSection 14081->14083 14083->14078 14084 7ffa5329ae40 14085 7ffa5329d490 std::exception::_Copy_str 17 API calls 14084->14085 14086 7ffa5329ae59 14085->14086 14087 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14086->14087 14088 7ffa5329ae86 std::exception::_Copy_str 14087->14088 14089 7ffa532a0fd0 17 API calls 14088->14089 14092 7ffa5329af3a std::exception::_Copy_str 14088->14092 14090 7ffa5329af0d 14089->14090 14091 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14090->14091 14091->14092 14093 7ffa53296ea0 _invoke_watson_if_oneof 16 API calls 14092->14093 14094 7ffa5329b2e0 14092->14094 14093->14094 14095 7ffa5329b33e 14094->14095 14097 7ffa5329d490 std::exception::_Copy_str 17 API calls 14094->14097 14107 7ffa532a0cc0 14095->14107 14099 7ffa5329b311 14097->14099 14100 7ffa53297ff0 _invoke_watson_if_error 16 API calls 14099->14100 14100->14095 14101 7ffa5329b37d 14105 7ffa53293280 __GSHandlerCheck 8 API calls 14101->14105 14102 7ffa5329cff0 terminate 34 API calls 14103 7ffa5329b373 14102->14103 14104 7ffa53297090 _exit 33 API calls 14103->14104 14104->14101 14106 7ffa5329b3a0 14105->14106 14125 7ffa53293d00 RtlEncodePointer 14107->14125 14109 7ffa532a0cf6 14110 7ffa532a0d23 LoadLibraryW 14109->14110 14111 7ffa532a0e15 14109->14111 14112 7ffa532a0d44 GetProcAddress 14110->14112 14121 7ffa532a0d3d 14110->14121 14114 7ffa532a0e39 DecodePointer DecodePointer 14111->14114 14124 7ffa532a0e68 14111->14124 14113 7ffa532a0d6a 7 API calls 14112->14113 14112->14121 14113->14111 14116 7ffa532a0df3 GetProcAddress EncodePointer 14113->14116 14114->14124 14115 7ffa532a0f60 DecodePointer 14115->14121 14116->14111 14117 7ffa532a0f0d 14117->14115 14122 7ffa532a0f2f DecodePointer 14117->14122 14118 7ffa532a0eed DecodePointer 14118->14117 14119 7ffa53293280 __GSHandlerCheck 8 API calls 14120 7ffa5329b358 14119->14120 14120->14101 14120->14102 14121->14119 14122->14115 14123 7ffa532a0ec8 14122->14123 14123->14115 14124->14117 14124->14118 14124->14123 14125->14109 14884 7ffa53293faa 14885 7ffa53293e30 LeaveCriticalSection 14884->14885 14886 7ffa53293fb6 GetCurrentThreadId 14885->14886 14887 7ffa53293fea SetLastError 14886->14887 14135 7ffa532910b0 14136 7ffa532910da 14135->14136 14137 7ffa532910fc 14136->14137 14141 7ffa53291000 GetThreadLocale GetDateFormatA 14136->14141 14139 7ffa53293280 __GSHandlerCheck 8 API calls 14137->14139 14140 7ffa5329112c 14139->14140 14142 7ffa53291062 GetThreadLocale GetTimeFormatA 14141->14142 14143 7ffa5329105b 14141->14143 14142->14143 14143->14137 14888 7ffa532ac1a3 14898 7ffa532ac1b0 get_int64_arg 14888->14898 14889 7ffa532ab99c 14890 7ffa532acc93 14889->14890 14893 7ffa532abada 14889->14893 14892 7ffa5329bd70 _invalid_parameter 17 API calls 14890->14892 14895 7ffa532abb0e _LocaleUpdate::~_LocaleUpdate 14890->14895 14891 7ffa532ab530 wctomb_s 19 API calls 14891->14898 14892->14895 14897 7ffa5329bd70 _invalid_parameter 17 API calls 14893->14897 14894 7ffa53293280 __GSHandlerCheck 8 API calls 14896 7ffa532acd90 14894->14896 14895->14894 14897->14895 14898->14889 14898->14891 12527 7ffa5329aca8 12528 7ffa5329acb2 12527->12528 12532 7ffa532974e0 12528->12532 12530 7ffa5329acbc RtlAllocateHeap 12535 7ffa53297490 GetModuleHandleW 12532->12535 12536 7ffa532974b2 GetProcAddress 12535->12536 12537 7ffa532974d1 ExitProcess 12535->12537 12536->12537 14178 7ffa532a809f 14179 7ffa532a80b0 _calloc_dbg_impl 14178->14179 14180 7ffa532a8145 _calloc_dbg_impl 14178->14180 14180->14179 14181 7ffa5329bd70 _invalid_parameter 17 API calls 14180->14181 14181->14179 14182 7ffa532a2c9f 14183 7ffa532a2caf 14182->14183 14184 7ffa532a2ca6 14182->14184 14184->14183 14185 7ffa5329bd70 _invalid_parameter 17 API calls 14184->14185 14185->14183 14907 7ffa532aa7a0 14913 7ffa532aa61f 14907->14913 14908 7ffa532aa726 WideCharToMultiByte 14909 7ffa532aa791 GetLastError 14908->14909 14908->14913 14914 7ffa532aa887 _dosmaperr __doserrno 14909->14914 14910 7ffa532aa7b0 WriteFile 14912 7ffa532aa857 GetLastError 14910->14912 14910->14913 14911 7ffa53293280 __GSHandlerCheck 8 API calls 14915 7ffa532aa9f5 14911->14915 14912->14913 14913->14908 14913->14910 14913->14914 14914->14911 14920 7ffa532a5393 14921 7ffa532a53a0 14920->14921 14922 7ffa532a53b4 __SehTransFilter 14921->14922 14923 7ffa532a53cc 14921->14923 14929 7ffa532a54a0 RaiseException 14922->14929 14930 7ffa532a54a0 RaiseException 14923->14930 14925 7ffa532a53ca 14927 7ffa5329ed30 _FindAndUnlinkFrame 36 API calls 14925->14927 14928 7ffa532a53e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 14927->14928 14929->14925 14930->14925 14194 7ffa532a2695 14196 7ffa532a26a0 14194->14196 14195 7ffa532a26ab 14196->14195 14197 7ffa5329bd70 _invalid_parameter 17 API calls 14196->14197 14197->14195 14198 7ffa532a4a95 14200 7ffa532a4aad __SehTransFilter 14198->14200 14199 7ffa532a4c2b 14200->14199 14201 7ffa532a5180 __SehTransFilter 38 API calls 14200->14201 14201->14199 12447 7ffa53293599 12450 7ffa53298900 12447->12450 12449 7ffa5329359e 12451 7ffa53298936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 12450->12451 12452 7ffa53298920 12450->12452 12453 7ffa532989de 12451->12453 12452->12449 12453->12452 12454 7ffa53294399 12455 7ffa532943a6 12454->12455 12457 7ffa53294377 12454->12457 12457->12454 12457->12455 12458 7ffa5329abb0 DecodePointer 12457->12458 12459 7ffa5329abd3 12458->12459 12459->12457 14940 7ffa532adf8d 14941 7ffa532adfbb 14940->14941 14942 7ffa532aeadf 14941->14942 14943 7ffa532aeec0 25 API calls 14941->14943 14955 7ffa532ada75 14941->14955 14944 7ffa532aef10 25 API calls 14942->14944 14943->14942 14945 7ffa532aeafd 14944->14945 14946 7ffa532aeb33 14945->14946 14948 7ffa532aeec0 25 API calls 14945->14948 14947 7ffa532aec29 14946->14947 14961 7ffa532aeb49 _CrtMemDumpAllObjectsSince 14946->14961 14950 7ffa532aebda 14947->14950 14951 7ffa532aef10 25 API calls 14947->14951 14948->14946 14949 7ffa532aeca1 14953 7ffa5329bd70 _invalid_parameter 17 API calls 14949->14953 14954 7ffa532adbe9 _LocaleUpdate::~_LocaleUpdate 14949->14954 14952 7ffa532aeec0 25 API calls 14950->14952 14950->14955 14951->14950 14952->14955 14953->14954 14957 7ffa53293280 __GSHandlerCheck 8 API calls 14954->14957 14955->14949 14956 7ffa532adbb5 14955->14956 14959 7ffa5329bd70 _invalid_parameter 17 API calls 14956->14959 14958 7ffa532aed9e 14957->14958 14959->14954 14960 7ffa532af000 wcsxfrm 2 API calls 14960->14961 14961->14950 14961->14960 14962 7ffa532aee40 25 API calls 14961->14962 14962->14961 14967 7ffa5329c990 14971 7ffa53294980 14967->14971 14969 7ffa5329c9b8 EncodePointer 14970 7ffa5329c9e5 14969->14970 14972 7ffa532949cb _calloc_dbg_impl 14971->14972 14972->14969 12516 13e99700000 12517 13e99700183 12516->12517 12518 13e9970043e VirtualAlloc 12517->12518 12522 13e99700462 12518->12522 12519 13e99700a7b 12520 13e99700531 GetNativeSystemInfo 12520->12519 12521 13e9970056d VirtualAlloc 12520->12521 12525 13e9970058b 12521->12525 12522->12519 12522->12520 12523 13e99700a00 12523->12519 12524 13e99700a56 RtlAddFunctionTable 12523->12524 12524->12519 12525->12523 12526 13e997009d9 VirtualProtect 12525->12526 12526->12525 15004 7ffa532ab580 15005 7ffa532ab5fa 15004->15005 15006 7ffa532ab676 15005->15006 15007 7ffa532ab6cb 15005->15007 15009 7ffa5329bd70 _invalid_parameter 17 API calls 15006->15009 15008 7ffa532aafb0 _fflush_nolock 17 API calls 15007->15008 15011 7ffa532ab6fe 15007->15011 15008->15011 15014 7ffa532ab6aa _LocaleUpdate::~_LocaleUpdate 15009->15014 15010 7ffa532ab84d 15012 7ffa5329bd70 _invalid_parameter 17 API calls 15010->15012 15011->15010 15017 7ffa532ab8a2 15011->15017 15012->15014 15013 7ffa532ab915 15018 7ffa5329bd70 _invalid_parameter 17 API calls 15013->15018 15015 7ffa53293280 __GSHandlerCheck 8 API calls 15014->15015 15016 7ffa532acd90 15015->15016 15017->15013 15020 7ffa532ab96a 15017->15020 15018->15014 15019 7ffa532acc93 15019->15014 15021 7ffa5329bd70 _invalid_parameter 17 API calls 15019->15021 15020->15019 15022 7ffa532abada 15020->15022 15021->15014 15023 7ffa5329bd70 _invalid_parameter 17 API calls 15022->15023 15023->15014 14205 7ffa5329c080 HeapValidate 14206 7ffa5329c0a2 14205->14206

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 15 13e99700000-13e99700460 call 13e99700aa8 * 2 VirtualAlloc 37 13e99700462-13e99700466 15->37 38 13e9970048a-13e99700494 15->38 39 13e99700468-13e99700488 37->39 41 13e99700a91-13e99700aa6 38->41 42 13e9970049a-13e9970049e 38->42 39->38 39->39 42->41 43 13e997004a4-13e997004a8 42->43 43->41 44 13e997004ae-13e997004b2 43->44 44->41 45 13e997004b8-13e997004bf 44->45 45->41 46 13e997004c5-13e997004d2 45->46 46->41 47 13e997004d8-13e997004e1 46->47 47->41 48 13e997004e7-13e997004f4 47->48 48->41 49 13e997004fa-13e99700507 48->49 50 13e99700531-13e99700567 GetNativeSystemInfo 49->50 51 13e99700509-13e99700511 49->51 50->41 52 13e9970056d-13e99700589 VirtualAlloc 50->52 53 13e99700513-13e99700518 51->53 54 13e997005a0-13e997005ac 52->54 55 13e9970058b-13e9970059e 52->55 56 13e99700521 53->56 57 13e9970051a-13e9970051f 53->57 58 13e997005af-13e997005b2 54->58 55->54 59 13e99700523-13e9970052f 56->59 57->59 61 13e997005c1-13e997005db 58->61 62 13e997005b4-13e997005bf 58->62 59->50 59->53 63 13e9970061b-13e99700622 61->63 64 13e997005dd-13e997005e2 61->64 62->58 66 13e99700628-13e9970062f 63->66 67 13e997006db-13e997006e2 63->67 65 13e997005e4-13e997005ea 64->65 68 13e9970060b-13e99700619 65->68 69 13e997005ec-13e99700609 65->69 66->67 70 13e99700635-13e99700642 66->70 71 13e99700864-13e9970086b 67->71 72 13e997006e8-13e997006f9 67->72 68->63 68->65 69->68 69->69 70->67 76 13e99700648-13e9970064f 70->76 74 13e99700871-13e9970087f 71->74 75 13e99700917-13e99700929 71->75 73 13e99700702-13e99700705 72->73 78 13e99700707-13e9970070a 73->78 79 13e997006fb-13e997006ff 73->79 82 13e9970090e-13e99700911 74->82 80 13e9970092f-13e99700937 75->80 81 13e99700a07-13e99700a1a 75->81 77 13e99700654-13e99700658 76->77 83 13e997006c0-13e997006ca 77->83 84 13e99700788-13e9970078e 78->84 85 13e9970070c-13e9970071d 78->85 79->73 87 13e9970093b-13e9970093f 80->87 102 13e99700a40-13e99700a4a 81->102 103 13e99700a1c-13e99700a27 81->103 82->75 86 13e99700884-13e997008a9 82->86 91 13e9970065a-13e99700669 83->91 92 13e997006cc-13e997006d2 83->92 89 13e99700794-13e997007a2 84->89 88 13e9970071f-13e99700720 85->88 85->89 107 13e99700907-13e9970090c 86->107 108 13e997008ab-13e997008b1 86->108 93 13e99700945-13e9970095a 87->93 94 13e997009ec-13e997009fa 87->94 101 13e99700722-13e99700784 88->101 104 13e997007a8 89->104 105 13e9970085d-13e9970085e 89->105 98 13e9970067a-13e9970067e 91->98 99 13e9970066b-13e99700678 91->99 92->77 106 13e997006d4-13e997006d5 92->106 96 13e9970097b-13e9970097d 93->96 97 13e9970095c-13e9970095e 93->97 94->87 100 13e99700a00-13e99700a01 94->100 112 13e9970097f-13e99700981 96->112 113 13e997009a2-13e997009a4 96->113 109 13e9970096e-13e99700979 97->109 110 13e99700960-13e9970096c 97->110 114 13e99700680-13e9970068a 98->114 115 13e9970068c-13e99700690 98->115 111 13e997006bd-13e997006be 99->111 100->81 101->101 116 13e99700786 101->116 119 13e99700a7b-13e99700a8e 102->119 120 13e99700a4c-13e99700a54 102->120 117 13e99700a38-13e99700a3e 103->117 118 13e997007ae-13e997007d4 104->118 105->71 106->67 107->82 121 13e997008b3-13e997008b9 108->121 122 13e997008bb-13e997008c8 108->122 125 13e997009be-13e997009bf 109->125 110->125 111->83 126 13e99700983-13e99700987 112->126 127 13e99700989-13e9970098b 112->127 131 13e997009a6-13e997009aa 113->131 132 13e997009ac-13e997009bb 113->132 128 13e997006b6-13e997006ba 114->128 129 13e99700692-13e997006a3 115->129 130 13e997006a5-13e997006a9 115->130 116->89 117->102 123 13e99700a29-13e99700a35 117->123 142 13e99700835-13e99700839 118->142 143 13e997007d6-13e997007d9 118->143 119->41 120->119 124 13e99700a56-13e99700a79 RtlAddFunctionTable 120->124 133 13e997008ea-13e997008fe 121->133 134 13e997008d3-13e997008e5 122->134 135 13e997008ca-13e997008d1 122->135 123->117 124->119 140 13e997009c5-13e997009cb 125->140 126->125 127->113 138 13e9970098d-13e9970098f 127->138 128->111 129->128 130->111 139 13e997006ab-13e997006b3 130->139 131->125 132->125 133->107 153 13e99700900-13e99700905 133->153 134->133 135->134 135->135 144 13e99700991-13e99700997 138->144 145 13e99700999-13e997009a0 138->145 139->128 146 13e997009d9-13e997009e9 VirtualProtect 140->146 147 13e997009cd-13e997009d3 140->147 151 13e99700844-13e99700850 142->151 152 13e9970083b 142->152 149 13e997007e3-13e997007f0 143->149 150 13e997007db-13e997007e1 143->150 144->125 145->140 146->94 147->146 155 13e997007f2-13e997007f9 149->155 156 13e997007fb-13e9970080d 149->156 154 13e99700812-13e9970082c 150->154 151->118 157 13e99700856-13e99700857 151->157 152->151 153->108 154->142 159 13e9970082e-13e99700833 154->159 155->155 155->156 156->154 157->105 159->143
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.477036534.0000013E99700000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000013E99700000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_13e99700000_rundll32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 394283112-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: 632ee852cfdb356ea1bf315d3f9d878212b7be00b0c8e060248ef3976956dd90
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: A072C070618B498BDB69DF18C8857F9B7E1FB98319F10462DE88AC3291DF34D642CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.477247410.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000003.00000002.477240245.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477298993.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477305870.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477316556.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7ffa53290000_rundll32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale_unlock$UpdateUpdate::~___updatetmbcinfo
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbctype.c
                                                                    • API String ID: 4112623284-4095683531
                                                                    • Opcode ID: b66405a04a3a9728c5d9656351879e3721474838b591a6bd606a39573e085aac
                                                                    • Instruction ID: 98b90b625304be56ece4621d7c0dad3735fdd41e97a57a70dd7c3a538a2825db
                                                                    • Opcode Fuzzy Hash: b66405a04a3a9728c5d9656351879e3721474838b591a6bd606a39573e085aac
                                                                    • Instruction Fuzzy Hash: AD91547662CF458AD7608B15E49036E77A2F7D97A4F488136EA8E537A8CF3CD581CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.477247410.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000003.00000002.477240245.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477298993.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477305870.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477316556.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7ffa53290000_rundll32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer_initterm_e
                                                                    • String ID: Y
                                                                    • API String ID: 1618838664-1754117475
                                                                    • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction ID: 8ee0f65e0a668ede1cd29fbc551b43e1ef1d2bf359e146ffc26a29a31834eb21
                                                                    • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction Fuzzy Hash: D7E0AC6292CF4697E7209B14E8501BD2362BFE6344F888531D14EA24A5DF2CE984CA00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 517 7ffa5329a000-7ffa5329a037 call 7ffa53299f20 520 7ffa5329a039-7ffa5329a048 call 7ffa5329a4e0 517->520 521 7ffa5329a04d-7ffa5329a069 517->521 527 7ffa5329a463-7ffa5329a474 call 7ffa53293280 520->527 525 7ffa5329a239-7ffa5329a241 521->525 526 7ffa5329a06f-7ffa5329a088 521->526 528 7ffa5329a243-7ffa5329a24e 525->528 529 7ffa5329a271-7ffa5329a276 525->529 530 7ffa5329a234 526->530 531 7ffa5329a08e-7ffa5329a096 526->531 528->529 532 7ffa5329a250-7ffa5329a25b 528->532 529->527 530->525 533 7ffa5329a0a2-7ffa5329a0aa 531->533 532->529 535 7ffa5329a25d-7ffa5329a26f IsValidCodePage 532->535 536 7ffa5329a0ac-7ffa5329a0bd 533->536 537 7ffa5329a0bf-7ffa5329a0c7 533->537 535->529 539 7ffa5329a27b-7ffa5329a28f GetCPInfo 535->539 536->533 541 7ffa5329a0d3-7ffa5329a0d8 537->541 542 7ffa5329a295-7ffa5329a29d 539->542 543 7ffa5329a444-7ffa5329a44b 539->543 544 7ffa5329a197-7ffa5329a1db call 7ffa5329a480 541->544 545 7ffa5329a0de-7ffa5329a101 541->545 549 7ffa5329a2a9-7ffa5329a2b1 542->549 546 7ffa5329a44d-7ffa5329a45c call 7ffa5329a4e0 543->546 547 7ffa5329a45e 543->547 560 7ffa5329a1e7-7ffa5329a1ec 544->560 550 7ffa5329a111-7ffa5329a11b 545->550 546->527 547->527 555 7ffa5329a2b3-7ffa5329a2c4 549->555 556 7ffa5329a2c6-7ffa5329a2ec 549->556 551 7ffa5329a192 550->551 552 7ffa5329a11d-7ffa5329a128 550->552 551->541 552->551 557 7ffa5329a12a-7ffa5329a136 552->557 555->549 562 7ffa5329a2f2-7ffa5329a2fc 556->562 563 7ffa5329a3f4-7ffa5329a3fc 556->563 564 7ffa5329a142-7ffa5329a14f 557->564 565 7ffa5329a1ee-7ffa5329a21e 560->565 566 7ffa5329a220-7ffa5329a22f call 7ffa5329a5e0 560->566 567 7ffa5329a30c-7ffa5329a316 562->567 568 7ffa5329a403-7ffa5329a40b 563->568 572 7ffa5329a18d 564->572 573 7ffa5329a151-7ffa5329a18b 564->573 565->560 566->527 570 7ffa5329a318-7ffa5329a323 567->570 571 7ffa5329a37c-7ffa5329a384 567->571 569 7ffa5329a417-7ffa5329a41c 568->569 577 7ffa5329a433-7ffa5329a43b call 7ffa5329a5e0 569->577 578 7ffa5329a41e-7ffa5329a431 569->578 570->571 579 7ffa5329a325-7ffa5329a331 570->579 582 7ffa5329a390-7ffa5329a398 571->582 572->550 573->564 590 7ffa5329a440-7ffa5329a442 577->590 578->569 584 7ffa5329a33d-7ffa5329a34a 579->584 586 7ffa5329a3c8-7ffa5329a3f2 call 7ffa5329a480 582->586 587 7ffa5329a39a-7ffa5329a3c6 582->587 588 7ffa5329a37a 584->588 589 7ffa5329a34c-7ffa5329a378 584->589 586->568 587->582 588->567 589->584 590->527
                                                                    C-Code - Quality: 47%
                                                                    			E00007FFA7FFA5329A000(signed short __ecx, void* __rcx, long long __rdx, signed int _a8, void* _a16) {
                                                                    				signed int _v24;
                                                                    				signed char* _v32;
                                                                    				char _v50;
                                                                    				char _v56;
                                                                    				signed int _v72;
                                                                    				signed char* _v80;
                                                                    				signed int _v84;
                                                                    				signed int _v88;
                                                                    				signed long long _t204;
                                                                    				signed long long _t205;
                                                                    				signed long long _t206;
                                                                    				signed char* _t215;
                                                                    				signed long long _t218;
                                                                    				signed long long _t233;
                                                                    				signed long long _t234;
                                                                    
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __ecx;
                                                                    				_t204 =  *0x532bb018; // 0x6e65c68f3fb3
                                                                    				_t205 = _t204 ^ _t234;
                                                                    				_v24 = _t205;
                                                                    				_a8 = E00007FFA7FFA53299F20(_a8, _t205);
                                                                    				if (_a8 != 0) goto 0x5329a04d;
                                                                    				E00007FFA7FFA5329A4E0(_a16);
                                                                    				goto 0x5329a463;
                                                                    				_v84 = 0;
                                                                    				_v84 = _v84 + 1;
                                                                    				if (_t205 - 5 >= 0) goto 0x5329a239;
                                                                    				_t206 = _t205 * 0x30;
                                                                    				if ( *((intOrPtr*)(0x532bbb70 + _t206)) != _a8) goto 0x5329a234;
                                                                    				_v72 = 0;
                                                                    				goto 0x5329a0a2;
                                                                    				_v72 = _v72 + 1;
                                                                    				if (_v72 - 0x101 >= 0) goto 0x5329a0bf;
                                                                    				 *((char*)(_a16 + _t206 + 0x1c)) = 0;
                                                                    				goto 0x5329a098;
                                                                    				_v88 = 0;
                                                                    				goto 0x5329a0d3;
                                                                    				_v88 = _v88 + 1;
                                                                    				if (_v88 - 4 >= 0) goto 0x5329a197;
                                                                    				_v80 = 0x47fccec899700;
                                                                    				goto 0x5329a111;
                                                                    				_v80 =  &(_v80[2]);
                                                                    				if (( *_v80 & 0x000000ff) == 0) goto 0x5329a192;
                                                                    				if ((_v80[1] & 0x000000ff) == 0) goto 0x5329a192;
                                                                    				_v72 =  *_v80 & 0x000000ff;
                                                                    				goto 0x5329a142;
                                                                    				_v72 = _v72 + 1;
                                                                    				_t215 = _v80;
                                                                    				if (_v72 - ( *(_t215 + 1) & 0x000000ff) > 0) goto 0x5329a18d;
                                                                    				_t233 = _a16;
                                                                    				 *((char*)(_t233 + 0x532bbb70 + _t206 * 0x30 + 0x1c)) =  *(_a16 + _t215 + 0x1c) & 0x000000ff |  *0xFFF4A65776D8;
                                                                    				goto 0x5329a138;
                                                                    				goto 0x5329a103;
                                                                    				goto 0x5329a0c9;
                                                                    				 *(_a16 + 4) = _a8;
                                                                    				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                    				_t218 = _a16;
                                                                    				 *(_a16 + 0xc) = E00007FFA7FFA5329A480( *((intOrPtr*)(_t218 + 4)));
                                                                    				_v88 = 0;
                                                                    				goto 0x5329a1e7;
                                                                    				_v88 = _v88 + 1;
                                                                    				if (_v88 - 6 >= 0) goto 0x5329a220;
                                                                    				_t205 = 0x532bbb70;
                                                                    				 *((short*)(_a16 + 0x10 + _t233 * 2)) =  *(0x532bbb70 + 4 + (0x532bbb70 + _t218 * 0x30) * 2) & 0x0000ffff;
                                                                    				goto 0x5329a1dd;
                                                                    				E00007FFA7FFA5329A5E0(_a16);
                                                                    				goto 0x5329a463;
                                                                    				goto L1;
                                                                    				if (_a8 == 0) goto 0x5329a271;
                                                                    				if (_a8 == 0xfde8) goto 0x5329a271;
                                                                    				if (_a8 == 0xfde9) goto 0x5329a271;
                                                                    				__eax = _a8 & 0x0000ffff;
                                                                    				__ecx = _a8 & 0x0000ffff;
                                                                    				if (IsValidCodePage(??) != 0) goto 0x5329a27b;
                                                                    				__eax = 0xffffffff;
                                                                    				goto 0x5329a463;
                                                                    				__rdx =  &_v56;
                                                                    				__ecx = _a8;
                                                                    				if (GetCPInfo(??, ??) == 0) goto 0x5329a444;
                                                                    				_v72 = 0;
                                                                    				goto 0x5329a2a9;
                                                                    				_v72 = _v72 + 1;
                                                                    				_v72 = _v72 + 1;
                                                                    				if (_v72 - 0x101 >= 0) goto 0x5329a2c6;
                                                                    				__eax = _v72;
                                                                    				__rcx = _a16;
                                                                    				 *((char*)(_a16 + __rax + 0x1c)) = 0;
                                                                    				goto 0x5329a29f;
                                                                    				__rax = _a16;
                                                                    				__ecx = _a8;
                                                                    				 *(_a16 + 4) = _a8;
                                                                    				__rax = _a16;
                                                                    				 *(_a16 + 0xc) = 0;
                                                                    				if (_v56 - 1 <= 0) goto 0x5329a3f4;
                                                                    				__rax =  &_v50;
                                                                    				_v32 =  &_v50;
                                                                    				goto 0x5329a30c;
                                                                    				_v32 =  &(_v32[2]);
                                                                    				_v32 =  &(_v32[2]);
                                                                    				__rax = _v32;
                                                                    				__eax =  *_v32 & 0x000000ff;
                                                                    				if (( *_v32 & 0x000000ff) == 0) goto 0x5329a37c;
                                                                    				__rax = _v32;
                                                                    				__eax =  *(__rax + 1) & 0x000000ff;
                                                                    				if (( *(__rax + 1) & 0x000000ff) == 0) goto 0x5329a37c;
                                                                    				__rax = _v32;
                                                                    				__eax =  *_v32 & 0x000000ff;
                                                                    				_v72 =  *_v32 & 0x000000ff;
                                                                    				goto 0x5329a33d;
                                                                    				_v72 = _v72 + 1;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rax = _v32;
                                                                    				__eax =  *(__rax + 1) & 0x000000ff;
                                                                    				if (_v72 - ( *(__rax + 1) & 0x000000ff) > 0) goto 0x5329a37a;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rcx = _a16;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000004;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rdx = _a16;
                                                                    				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                    				goto 0x5329a333;
                                                                    				goto 0x5329a2fe;
                                                                    				_v72 = 1;
                                                                    				goto 0x5329a390;
                                                                    				_v72 = _v72 + 1;
                                                                    				_v72 = _v72 + 1;
                                                                    				if (_v72 - 0xff >= 0) goto 0x5329a3c8;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rcx = _a16;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000008;
                                                                    				_v72 = _v72 + 1;
                                                                    				__rdx = _a16;
                                                                    				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                    				goto 0x5329a386;
                                                                    				__rax = _a16;
                                                                    				__ecx =  *(_a16 + 4);
                                                                    				__eax = E00007FFA7FFA5329A480( *(_a16 + 4));
                                                                    				__rcx = _a16;
                                                                    				 *(_a16 + 0xc) = __eax;
                                                                    				__rax = _a16;
                                                                    				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                    				goto 0x5329a403;
                                                                    				__rax = _a16;
                                                                    				 *(__rax + 8) = 0;
                                                                    				_v88 = 0;
                                                                    				goto 0x5329a417;
                                                                    				_v88 = _v88 + 1;
                                                                    				_v88 = _v88 + 1;
                                                                    				if (_v88 - 6 >= 0) goto 0x5329a433;
                                                                    				__eax = _v88;
                                                                    				__ecx = 0;
                                                                    				__rdx = _a16;
                                                                    				 *((short*)(_a16 + 0x10 + __rax * 2)) = __cx;
                                                                    				goto 0x5329a40d;
                                                                    				__rcx = _a16;
                                                                    				__eax = E00007FFA7FFA5329A5E0(_a16); // executed
                                                                    				__eax = 0;
                                                                    				goto 0x5329a463;
                                                                    				if ( *0x532bcd68 == 0) goto 0x5329a45e;
                                                                    				__rcx = _a16;
                                                                    				E00007FFA7FFA5329A4E0(_a16) = 0;
                                                                    				goto 0x5329a463;
                                                                    				__eax = 0xffffffff;
                                                                    				__rcx = _v24;
                                                                    				__rcx = _v24 ^ __rsp;
                                                                    				return E00007FFA7FFA53293280(0xffffffff, __ecx, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                                    			}


















                                                                    0x7ffa5329a000
                                                                    0x7ffa5329a005
                                                                    0x7ffa5329a00d
                                                                    0x7ffa5329a014
                                                                    0x7ffa5329a017
                                                                    0x7ffa5329a028
                                                                    0x7ffa5329a037
                                                                    0x7ffa5329a041
                                                                    0x7ffa5329a048
                                                                    0x7ffa5329a04d
                                                                    0x7ffa5329a05d
                                                                    0x7ffa5329a069
                                                                    0x7ffa5329a073
                                                                    0x7ffa5329a088
                                                                    0x7ffa5329a08e
                                                                    0x7ffa5329a096
                                                                    0x7ffa5329a09e
                                                                    0x7ffa5329a0aa
                                                                    0x7ffa5329a0b8
                                                                    0x7ffa5329a0bd
                                                                    0x7ffa5329a0bf
                                                                    0x7ffa5329a0c7
                                                                    0x7ffa5329a0cf
                                                                    0x7ffa5329a0d8
                                                                    0x7ffa5329a0fc
                                                                    0x7ffa5329a101
                                                                    0x7ffa5329a10c
                                                                    0x7ffa5329a11b
                                                                    0x7ffa5329a128
                                                                    0x7ffa5329a132
                                                                    0x7ffa5329a136
                                                                    0x7ffa5329a13e
                                                                    0x7ffa5329a142
                                                                    0x7ffa5329a14f
                                                                    0x7ffa5329a17f
                                                                    0x7ffa5329a187
                                                                    0x7ffa5329a18b
                                                                    0x7ffa5329a18d
                                                                    0x7ffa5329a192
                                                                    0x7ffa5329a1a6
                                                                    0x7ffa5329a1b1
                                                                    0x7ffa5329a1b8
                                                                    0x7ffa5329a1d0
                                                                    0x7ffa5329a1d3
                                                                    0x7ffa5329a1db
                                                                    0x7ffa5329a1e3
                                                                    0x7ffa5329a1ec
                                                                    0x7ffa5329a200
                                                                    0x7ffa5329a218
                                                                    0x7ffa5329a21e
                                                                    0x7ffa5329a228
                                                                    0x7ffa5329a22f
                                                                    0x7ffa5329a234
                                                                    0x7ffa5329a241
                                                                    0x7ffa5329a24e
                                                                    0x7ffa5329a25b
                                                                    0x7ffa5329a25d
                                                                    0x7ffa5329a265
                                                                    0x7ffa5329a26f
                                                                    0x7ffa5329a271
                                                                    0x7ffa5329a276
                                                                    0x7ffa5329a27b
                                                                    0x7ffa5329a280
                                                                    0x7ffa5329a28f
                                                                    0x7ffa5329a295
                                                                    0x7ffa5329a29d
                                                                    0x7ffa5329a2a3
                                                                    0x7ffa5329a2a5
                                                                    0x7ffa5329a2b1
                                                                    0x7ffa5329a2b3
                                                                    0x7ffa5329a2b7
                                                                    0x7ffa5329a2bf
                                                                    0x7ffa5329a2c4
                                                                    0x7ffa5329a2c6
                                                                    0x7ffa5329a2ce
                                                                    0x7ffa5329a2d5
                                                                    0x7ffa5329a2d8
                                                                    0x7ffa5329a2e0
                                                                    0x7ffa5329a2ec
                                                                    0x7ffa5329a2f2
                                                                    0x7ffa5329a2f7
                                                                    0x7ffa5329a2fc
                                                                    0x7ffa5329a303
                                                                    0x7ffa5329a307
                                                                    0x7ffa5329a30c
                                                                    0x7ffa5329a311
                                                                    0x7ffa5329a316
                                                                    0x7ffa5329a318
                                                                    0x7ffa5329a31d
                                                                    0x7ffa5329a323
                                                                    0x7ffa5329a325
                                                                    0x7ffa5329a32a
                                                                    0x7ffa5329a32d
                                                                    0x7ffa5329a331
                                                                    0x7ffa5329a337
                                                                    0x7ffa5329a339
                                                                    0x7ffa5329a33d
                                                                    0x7ffa5329a342
                                                                    0x7ffa5329a34a
                                                                    0x7ffa5329a350
                                                                    0x7ffa5329a354
                                                                    0x7ffa5329a361
                                                                    0x7ffa5329a368
                                                                    0x7ffa5329a36c
                                                                    0x7ffa5329a374
                                                                    0x7ffa5329a378
                                                                    0x7ffa5329a37a
                                                                    0x7ffa5329a37c
                                                                    0x7ffa5329a384
                                                                    0x7ffa5329a38a
                                                                    0x7ffa5329a38c
                                                                    0x7ffa5329a398
                                                                    0x7ffa5329a39e
                                                                    0x7ffa5329a3a2
                                                                    0x7ffa5329a3af
                                                                    0x7ffa5329a3b6
                                                                    0x7ffa5329a3ba
                                                                    0x7ffa5329a3c2
                                                                    0x7ffa5329a3c6
                                                                    0x7ffa5329a3c8
                                                                    0x7ffa5329a3d0
                                                                    0x7ffa5329a3d3
                                                                    0x7ffa5329a3d8
                                                                    0x7ffa5329a3e0
                                                                    0x7ffa5329a3e3
                                                                    0x7ffa5329a3eb
                                                                    0x7ffa5329a3f2
                                                                    0x7ffa5329a3f4
                                                                    0x7ffa5329a3fc
                                                                    0x7ffa5329a403
                                                                    0x7ffa5329a40b
                                                                    0x7ffa5329a411
                                                                    0x7ffa5329a413
                                                                    0x7ffa5329a41c
                                                                    0x7ffa5329a41e
                                                                    0x7ffa5329a422
                                                                    0x7ffa5329a424
                                                                    0x7ffa5329a42c
                                                                    0x7ffa5329a431
                                                                    0x7ffa5329a433
                                                                    0x7ffa5329a43b
                                                                    0x7ffa5329a440
                                                                    0x7ffa5329a442
                                                                    0x7ffa5329a44b
                                                                    0x7ffa5329a44d
                                                                    0x7ffa5329a45a
                                                                    0x7ffa5329a45c
                                                                    0x7ffa5329a45e
                                                                    0x7ffa5329a463
                                                                    0x7ffa5329a468
                                                                    0x7ffa5329a474

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.477247410.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000003.00000002.477240245.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477298993.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477305870.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477316556.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7ffa53290000_rundll32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_
                                                                    • String ID:
                                                                    • API String ID: 1901436342-0
                                                                    • Opcode ID: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                    • Instruction ID: 926cd54e30537231577772bb304792f597df8e03fb72e21f106762ff709accab
                                                                    • Opcode Fuzzy Hash: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                    • Instruction Fuzzy Hash: DBD1097262CB818AD7A48B15E48432EB7A1F7D9754F088136EACF97798DF2CD5858F00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _ioterm.LIBCMTD ref: 00007FFA53293437
                                                                      • Part of subcall function 00007FFA53297D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFA5329343C), ref: 00007FFA53297D93
                                                                      • Part of subcall function 00007FFA53293E00: FlsFree.KERNEL32 ref: 00007FFA53293E13
                                                                      • Part of subcall function 00007FFA53293E00: _mtdeletelocks.LIBCMTD ref: 00007FFA53293E23
                                                                      • Part of subcall function 00007FFA532988D0: HeapDestroy.KERNEL32 ref: 00007FFA532988DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.477247410.00007FFA53291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFA53290000, based on PE: true
                                                                    • Associated: 00000003.00000002.477240245.00007FFA53290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477298993.00007FFA532B2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477305870.00007FFA532BB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000003.00000002.477316556.00007FFA532BF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7ffa53290000_rundll32.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                                    • String ID:
                                                                    • API String ID: 1508997487-0
                                                                    • Opcode ID: 8f8406f5a5b9feed6255c52f4e6aa9aa0153dd1bc57843c66d7c8198eef2426a
                                                                    • Instruction ID: b31a79f7078da69a5adddc2600e1b165537f87191178162b9cf17786f0377e2b
                                                                    • Opcode Fuzzy Hash: 8f8406f5a5b9feed6255c52f4e6aa9aa0153dd1bc57843c66d7c8198eef2426a
                                                                    • Instruction Fuzzy Hash: 42E0B692D2CE078AF21263A4585227D12825FEAB81F4CC030E20FE1292EE5CA8804271
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%