Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f_00321b.dll

Overview

General Information

Sample Name:f_00321b.dll
(renamed file extension from none to dll, renamed because original name is a hash value)
Original Sample Name:f_00321b
Analysis ID:829552
MD5:bfc060937dc90b273eccb6825145f298
SHA1:c156c00c7e918f0cb7363614fb1f177c90d8108a
SHA256:2f39c2879989ddd7f9ecf52b6232598e5595f8bf367846ff188c9dfbf1251253
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Queues an APC in another process (thread injection)
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4224 cmdline: loaddll64.exe "C:\Users\user\Desktop\f_00321b.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 2516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 3216 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 1264 cmdline: rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • regsvr32.exe (PID: 5968 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RymKYMmySRfU\EAqrfXJOpHznppsf.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • regsvr32.exe (PID: 4888 cmdline: regsvr32.exe /s C:\Users\user\Desktop\f_00321b.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 1312 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZbmMPnDvLqwXll\QyzgcRWJYZS.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 1240 cmdline: rundll32.exe C:\Users\user\Desktop\f_00321b.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
      • regsvr32.exe (PID: 4768 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IzuSuDitBV\QmEREbzuu.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
      • conhost.exe (PID: 5432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj50W/ClAAOAIo=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2xW++lAAKAJA="]}
SourceRuleDescriptionAuthorStrings
00000004.00000002.320583141.0000024067ED1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000006.00000002.839406801.0000000002031000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Emotet_3Yara detected EmotetJoe Security
        00000006.00000002.839356776.0000000001FE0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            5.2.rundll32.exe.1caef360000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.2.rundll32.exe.24067ea0000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                4.2.rundll32.exe.24067ea0000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.2.regsvr32.exe.22d0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    3.2.regsvr32.exe.22d0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.4213.239.212.5497294432404320 03/18/23-16:00:53.457464
                      SID:2404320
                      Source Port:49729
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.4104.168.155.1434970580802404302 03/18/23-15:58:29.445426
                      SID:2404302
                      Source Port:49705
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.445.235.8.304973380802404324 03/18/23-16:00:58.958124
                      SID:2404324
                      Source Port:49733
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.4167.172.199.1654970380802404310 03/18/23-15:58:19.699415
                      SID:2404310
                      Source Port:49703
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.4164.90.222.65497044432404308 03/18/23-15:58:24.948314
                      SID:2404308
                      Source Port:49704
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.4187.63.160.8849702802404314 03/18/23-15:58:11.945439
                      SID:2404314
                      Source Port:49702
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.41.234.2.2324971980802404304 03/18/23-15:59:46.453351
                      SID:2404304
                      Source Port:49719
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.491.121.146.474969580802404344 03/18/23-15:57:43.982133
                      SID:2404344
                      Source Port:49695
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.4206.189.28.1994972180802404318 03/18/23-16:00:02.963968
                      SID:2404318
                      Source Port:49721
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.466.228.32.314969770802404330 03/18/23-15:57:49.653644
                      SID:2404330
                      Source Port:49697
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.4182.162.143.56496984432404312 03/18/23-15:58:05.445458
                      SID:2404312
                      Source Port:49698
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: f_00321b.dllVirustotal: Detection: 60%Perma Link
                      Source: f_00321b.dllReversingLabs: Detection: 79%
                      Source: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/0uAvira URL Cloud: Label: malware
                      Source: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb//Avira URL Cloud: Label: malware
                      Source: https://213.239.212.5/~Avira URL Cloud: Label: malware
                      Source: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://213.239.212.5/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://82.223.21.224:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://107.170.39.149:8080/Avira URL Cloud: Label: malware
                      Source: https://167.172.199.165:8080/YAvira URL Cloud: Label: malware
                      Source: https://82.223.21.224:8080/Avira URL Cloud: Label: malware
                      Source: https://91.207.28.33:8080/-Avira URL Cloud: Label: malware
                      Source: https://159.65.88.10:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://104.168.155.143:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/?Avira URL Cloud: Label: malware
                      Source: https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb//KAvira URL Cloud: Label: malware
                      Source: https://164.90.222.65:443/nnukk/upfurpftd/ltwomnfleb/b/XAvira URL Cloud: Label: malware
                      Source: https://91.121.146.47:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://107.170.39.149:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://91.121.146.47:8080/Avira URL Cloud: Label: malware
                      Source: https://119.59.103.152:8080/Avira URL Cloud: Label: malware
                      Source: https://119.59.103.152:8080/l/zAvira URL Cloud: Label: malware
                      Source: https://167.172.199.165:8080/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://187.63.160.88:80/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://45.235.8.30:8080/Avira URL Cloud: Label: malware
                      Source: https://167.172.199.165:8080/oAvira URL Cloud: Label: malware
                      Source: https://66.228.32.31:7080/Avira URL Cloud: Label: malware
                      Source: https://167.172.199.165:8080/Avira URL Cloud: Label: malware
                      Source: https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/wAvira URL Cloud: Label: malware
                      Source: https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/Avira URL Cloud: Label: malware
                      Source: https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/%Avira URL Cloud: Label: malware
                      Source: https://164.90.222.65/wnAvira URL Cloud: Label: malware
                      Source: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/YAvira URL Cloud: Label: malware
                      Source: https://213.239.212.5:443/nnukk/upfurpftd/ltwomnfleb/NAvira URL Cloud: Label: malware
                      Source: 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj50W/ClAAOAIo=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2xW++lAAKAJA="]}
                      Source: unknownHTTPS traffic detected: 164.90.222.65:443 -> 192.168.2.4:49704 version: TLS 1.2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D28 FindFirstFileExW,3_2_0000000180008D28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D28 FindFirstFileExW,4_2_0000000180008D28

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 213.239.212.5 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 186.194.240.217 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 119.59.103.152 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.89.202.34 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 160.16.142.56 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.207.28.33 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.43.75.120 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.235.8.30 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 72.15.201.15 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 206.189.28.199 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 107.170.39.149 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 82.223.21.224 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 149.56.131.28 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 169.57.156.166 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 1.234.2.232 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080Jump to behavior
                      Source: TrafficSnort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.2.4:49704 -> 164.90.222.65:443
                      Source: TrafficSnort IDS: 2404344 ET CNC Feodo Tracker Reported CnC Server TCP group 23 192.168.2.4:49695 -> 91.121.146.47:8080
                      Source: TrafficSnort IDS: 2404330 ET CNC Feodo Tracker Reported CnC Server TCP group 16 192.168.2.4:49697 -> 66.228.32.31:7080
                      Source: TrafficSnort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.2.4:49698 -> 182.162.143.56:443
                      Source: TrafficSnort IDS: 2404314 ET CNC Feodo Tracker Reported CnC Server TCP group 8 192.168.2.4:49702 -> 187.63.160.88:80
                      Source: TrafficSnort IDS: 2404310 ET CNC Feodo Tracker Reported CnC Server TCP group 6 192.168.2.4:49703 -> 167.172.199.165:8080
                      Source: TrafficSnort IDS: 2404302 ET CNC Feodo Tracker Reported CnC Server TCP group 2 192.168.2.4:49705 -> 104.168.155.143:8080
                      Source: TrafficSnort IDS: 2404304 ET CNC Feodo Tracker Reported CnC Server TCP group 3 192.168.2.4:49719 -> 1.234.2.232:8080
                      Source: TrafficSnort IDS: 2404318 ET CNC Feodo Tracker Reported CnC Server TCP group 10 192.168.2.4:49721 -> 206.189.28.199:8080
                      Source: TrafficSnort IDS: 2404320 ET CNC Feodo Tracker Reported CnC Server TCP group 11 192.168.2.4:49729 -> 213.239.212.5:443
                      Source: TrafficSnort IDS: 2404324 ET CNC Feodo Tracker Reported CnC Server TCP group 13 192.168.2.4:49733 -> 45.235.8.30:8080
                      Source: Malware configuration extractorIPs: 91.121.146.47:8080
                      Source: Malware configuration extractorIPs: 66.228.32.31:7080
                      Source: Malware configuration extractorIPs: 182.162.143.56:443
                      Source: Malware configuration extractorIPs: 187.63.160.88:80
                      Source: Malware configuration extractorIPs: 167.172.199.165:8080
                      Source: Malware configuration extractorIPs: 164.90.222.65:443
                      Source: Malware configuration extractorIPs: 104.168.155.143:8080
                      Source: Malware configuration extractorIPs: 163.44.196.120:8080
                      Source: Malware configuration extractorIPs: 160.16.142.56:8080
                      Source: Malware configuration extractorIPs: 159.89.202.34:443
                      Source: Malware configuration extractorIPs: 159.65.88.10:8080
                      Source: Malware configuration extractorIPs: 186.194.240.217:443
                      Source: Malware configuration extractorIPs: 149.56.131.28:8080
                      Source: Malware configuration extractorIPs: 72.15.201.15:8080
                      Source: Malware configuration extractorIPs: 1.234.2.232:8080
                      Source: Malware configuration extractorIPs: 82.223.21.224:8080
                      Source: Malware configuration extractorIPs: 206.189.28.199:8080
                      Source: Malware configuration extractorIPs: 169.57.156.166:8080
                      Source: Malware configuration extractorIPs: 107.170.39.149:8080
                      Source: Malware configuration extractorIPs: 103.43.75.120:443
                      Source: Malware configuration extractorIPs: 91.207.28.33:8080
                      Source: Malware configuration extractorIPs: 213.239.212.5:443
                      Source: Malware configuration extractorIPs: 45.235.8.30:8080
                      Source: Malware configuration extractorIPs: 119.59.103.152:8080
                      Source: Malware configuration extractorIPs: 164.68.99.3:8080
                      Source: Malware configuration extractorIPs: 95.217.221.146:8080
                      Source: Malware configuration extractorIPs: 153.126.146.25:7080
                      Source: Malware configuration extractorIPs: 197.242.150.244:8080
                      Source: Malware configuration extractorIPs: 202.129.205.3:8080
                      Source: Malware configuration extractorIPs: 103.132.242.26:8080
                      Source: Malware configuration extractorIPs: 139.59.126.41:443
                      Source: Malware configuration extractorIPs: 110.232.117.186:8080
                      Source: Malware configuration extractorIPs: 183.111.227.137:8080
                      Source: Malware configuration extractorIPs: 5.135.159.50:443
                      Source: Malware configuration extractorIPs: 201.94.166.162:443
                      Source: Malware configuration extractorIPs: 103.75.201.2:443
                      Source: Malware configuration extractorIPs: 79.137.35.198:8080
                      Source: Malware configuration extractorIPs: 172.105.226.75:8080
                      Source: Malware configuration extractorIPs: 94.23.45.86:4143
                      Source: Malware configuration extractorIPs: 115.68.227.76:8080
                      Source: Malware configuration extractorIPs: 153.92.5.27:8080
                      Source: Malware configuration extractorIPs: 167.172.253.162:8080
                      Source: Malware configuration extractorIPs: 188.44.20.25:443
                      Source: Malware configuration extractorIPs: 147.139.166.154:8080
                      Source: Malware configuration extractorIPs: 129.232.188.93:443
                      Source: Malware configuration extractorIPs: 173.212.193.249:8080
                      Source: Malware configuration extractorIPs: 185.4.135.165:8080
                      Source: Malware configuration extractorIPs: 45.176.232.124:443
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 8916410db85077a5460817142dcbc8de
                      Source: global trafficHTTP traffic detected: POST /nnukk/upfurpftd/ltwomnfleb/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 164.90.222.65
                      Source: Joe Sandbox ViewIP Address: 159.65.88.10 159.65.88.10
                      Source: global trafficTCP traffic: 192.168.2.4:49695 -> 91.121.146.47:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49697 -> 66.228.32.31:7080
                      Source: global trafficTCP traffic: 192.168.2.4:49703 -> 167.172.199.165:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49705 -> 104.168.155.143:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49706 -> 163.44.196.120:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49707 -> 160.16.142.56:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49712 -> 159.65.88.10:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49717 -> 149.56.131.28:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49718 -> 72.15.201.15:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49719 -> 1.234.2.232:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49720 -> 82.223.21.224:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49721 -> 206.189.28.199:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49722 -> 169.57.156.166:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49723 -> 107.170.39.149:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49728 -> 91.207.28.33:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49733 -> 45.235.8.30:8080
                      Source: global trafficTCP traffic: 192.168.2.4:49734 -> 119.59.103.152:8080
                      Source: unknownNetwork traffic detected: IP country count 17
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: regsvr32.exe, 00000006.00000003.405236343.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000006.00000003.403176312.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.403664983.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                      Source: regsvr32.exe, 00000006.00000003.403176312.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.403664983.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com//
                      Source: regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.6.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000006.00000003.403176312.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?1bee005e237d0
                      Source: regsvr32.exe, 00000006.00000003.405118809.000000000075A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490542704.000000000075A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.404596026.000000000075A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839083307.000000000075A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/end
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.44.196.120:8080/
                      Source: regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://104.168.155.143:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://107.170.39.149:8080/
                      Source: regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://107.170.39.149:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839483293.00000000027F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/l/z
                      Source: regsvr32.exe, 00000006.00000002.839161422.00000000007DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/%
                      Source: regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/?
                      Source: regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.65.88.10:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490542704.0000000000755000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/
                      Source: regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb//K
                      Source: regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/w
                      Source: regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/wn
                      Source: regsvr32.exe, 00000006.00000003.489477256.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65:443/nnukk/upfurpftd/ltwomnfleb/b/X
                      Source: regsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/
                      Source: regsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/Y
                      Source: regsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/o
                      Source: regsvr32.exe, 00000006.00000003.490542704.000000000075A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://187.172.199.165:8080/
                      Source: regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489477256.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://187.63.160.88:80/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839483293.00000000027F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://189.56.131.28:8080/
                      Source: regsvr32.exe, 00000006.00000002.839483293.00000000027F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://21.235.8.30:8080/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://213.239.212.5/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://213.239.212.5/~
                      Source: regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://213.239.212.5:443/nnukk/upfurpftd/ltwomnfleb/N
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/
                      Source: regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb//
                      Source: regsvr32.exe, 00000006.00000002.839161422.00000000007DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/0u
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/Y
                      Source: regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://66.228.32.31:7080/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://82.223.21.224:8080/
                      Source: regsvr32.exe, 00000006.00000002.839161422.00000000007DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://82.223.21.224:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/
                      Source: regsvr32.exe, 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839083307.0000000000783000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490273767.0000000000783000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.404883022.0000000000783000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/nnukk/upfurpftd/ltwomnfleb/
                      Source: regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.207.28.33:8080/-
                      Source: unknownHTTP traffic detected: POST /nnukk/upfurpftd/ltwomnfleb/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 164.90.222.65
                      Source: unknownHTTPS traffic detected: 164.90.222.65:443 -> 192.168.2.4:49704 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.rundll32.exe.1caef360000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.24067ea0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.24067ea0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.22d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.22d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1caef360000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.1fe0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.1fe0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.320583141.0000024067ED1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.839406801.0000000002031000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.839356776.0000000001FE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.319426857.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.320938696.000001CAEF360000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.320487184.0000024067EA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.320983303.000001CAEF391000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\ZbmMPnDvLqwXll\QyzgcRWJYZS.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\ZbmMPnDvLqwXll\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800068183_2_0000000180006818
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B8783_2_000000018000B878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800071103_2_0000000180007110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D283_2_0000000180008D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800145553_2_0000000180014555
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_022A00003_2_022A0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230263C3_2_0230263C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02308BC83_2_02308BC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02318FC83_2_02318FC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230CC143_2_0230CC14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231A0003_2_0231A000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231709C3_2_0231709C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02307D6C3_2_02307D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230BA2C3_2_0230BA2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02318A2C3_2_02318A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02310E2C3_2_02310E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231662C3_2_0231662C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023042143_2_02304214
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230461C3_2_0230461C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02315A003_2_02315A00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02328A003_2_02328A00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02318E083_2_02318E08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02303E0C3_2_02303E0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231020C3_2_0231020C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02310A703_2_02310A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023032743_2_02303274
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230A6603_2_0230A660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230B2583_2_0230B258
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230F65C3_2_0230F65C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231A2443_2_0231A244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230AAB83_2_0230AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02304EB83_2_02304EB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02303ABC3_2_02303ABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231A6BC3_2_0231A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230BE903_2_0230BE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02314A903_2_02314A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02308A8C3_2_02308A8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02324E8C3_2_02324E8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023092F03_2_023092F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023196D43_2_023196D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231EAC03_2_0231EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230D6CC3_2_0230D6CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230D33C3_2_0230D33C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231E3103_2_0231E310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230EF143_2_0230EF14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02313B143_2_02313B14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02314F183_2_02314F18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231D7703_2_0231D770
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231CF703_2_0231CF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023083783_2_02308378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230F77C3_2_0230F77C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231E7503_2_0231E750
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023047583_2_02304758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230975C3_2_0230975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02308FB03_2_02308FB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230FFB83_2_0230FFB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02318BB83_2_02318BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230DBA03_2_0230DBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02301B943_2_02301B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023153843_2_02315384
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230A7F03_2_0230A7F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023227EC3_2_023227EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02313FD03_2_02313FD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02302FD43_2_02302FD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023033D43_2_023033D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023197CC3_2_023197CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023110303_2_02311030
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231EC303_2_0231EC30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230B83C3_2_0230B83C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0232181C3_2_0232181C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023010003_2_02301000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023094083_2_02309408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02307C083_2_02307C08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02316C703_2_02316C70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230D4743_2_0230D474
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02302C783_2_02302C78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230C0783_2_0230C078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230B07C3_2_0230B07C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231B4603_2_0231B460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023254503_2_02325450
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231C0583_2_0231C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023078403_2_02307840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231C44C3_2_0231C44C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231A8B03_2_0231A8B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230DCB83_2_0230DCB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023294BC3_2_023294BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023098AC3_2_023098AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230AC943_2_0230AC94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023158803_2_02315880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02304C843_2_02304C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231CC843_2_0231CC84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02303CF43_2_02303CF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023090F83_2_023090F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023048FC3_2_023048FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023120E03_2_023120E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023014D43_2_023014D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02313CD43_2_02313CD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023018DC3_2_023018DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230F8C43_2_0230F8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02315CC43_2_02315CC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023080CC3_2_023080CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023108CC3_2_023108CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023075303_2_02307530
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231B1303_2_0231B130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023061383_2_02306138
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02314D203_2_02314D20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023119243_2_02311924
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231AD283_2_0231AD28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023299103_2_02329910
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023175183_2_02317518
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023285003_2_02328500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231610C3_2_0231610C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023095BC3_2_023095BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231BDA03_2_0231BDA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231D5F03_2_0231D5F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023115C83_2_023115C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800068184_2_0000000180006818
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B8784_2_000000018000B878
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800071104_2_0000000180007110
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D284_2_0000000180008D28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800145554_2_0000000180014555
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067E900004_2_0000024067E90000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED263C4_2_0000024067ED263C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED7D6C4_2_0000024067ED7D6C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE709C4_2_0000024067EE709C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEA0004_2_0000024067EEA000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDCC144_2_0000024067EDCC14
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED8BC84_2_0000024067ED8BC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE8FC84_2_0000024067EE8FC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDBA2C4_2_0000024067EDBA2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE8A2C4_2_0000024067EE8A2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE0E2C4_2_0000024067EE0E2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE662C4_2_0000024067EE662C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED3E0C4_2_0000024067ED3E0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE020C4_2_0000024067EE020C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE8E084_2_0000024067EE8E08
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE5A004_2_0000024067EE5A00
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF8A004_2_0000024067EF8A00
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED461C4_2_0000024067ED461C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED42144_2_0000024067ED4214
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EED5F04_2_0000024067EED5F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE15C84_2_0000024067EE15C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEBDA04_2_0000024067EEBDA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED95BC4_2_0000024067ED95BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEAD284_2_0000024067EEAD28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE19244_2_0000024067EE1924
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE4D204_2_0000024067EE4D20
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED61384_2_0000024067ED6138
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED75304_2_0000024067ED7530
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEB1304_2_0000024067EEB130
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE610C4_2_0000024067EE610C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF85004_2_0000024067EF8500
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE75184_2_0000024067EE7518
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF99104_2_0000024067EF9910
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE20E04_2_0000024067EE20E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED48FC4_2_0000024067ED48FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED90F84_2_0000024067ED90F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED3CF44_2_0000024067ED3CF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED80CC4_2_0000024067ED80CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE08CC4_2_0000024067EE08CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE5CC44_2_0000024067EE5CC4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDF8C44_2_0000024067EDF8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED18DC4_2_0000024067ED18DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED14D44_2_0000024067ED14D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE3CD44_2_0000024067EE3CD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED98AC4_2_0000024067ED98AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF94BC4_2_0000024067EF94BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDDCB84_2_0000024067EDDCB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEA8B04_2_0000024067EEA8B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED4C844_2_0000024067ED4C84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EECC844_2_0000024067EECC84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE58804_2_0000024067EE5880
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDAC944_2_0000024067EDAC94
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEB4604_2_0000024067EEB460
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDB07C4_2_0000024067EDB07C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED2C784_2_0000024067ED2C78
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDC0784_2_0000024067EDC078
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDD4744_2_0000024067EDD474
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE6C704_2_0000024067EE6C70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEC44C4_2_0000024067EEC44C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED78404_2_0000024067ED7840
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEC0584_2_0000024067EEC058
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF54504_2_0000024067EF5450
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDB83C4_2_0000024067EDB83C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE10304_2_0000024067EE1030
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEEC304_2_0000024067EEEC30
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED94084_2_0000024067ED9408
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED7C084_2_0000024067ED7C08
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED10004_2_0000024067ED1000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF181C4_2_0000024067EF181C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF27EC4_2_0000024067EF27EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDA7F04_2_0000024067EDA7F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE97CC4_2_0000024067EE97CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED2FD44_2_0000024067ED2FD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED33D44_2_0000024067ED33D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE3FD04_2_0000024067EE3FD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDDBA04_2_0000024067EDDBA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDFFB84_2_0000024067EDFFB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE8BB84_2_0000024067EE8BB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED8FB04_2_0000024067ED8FB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE53844_2_0000024067EE5384
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED1B944_2_0000024067ED1B94
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDF77C4_2_0000024067EDF77C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED83784_2_0000024067ED8378
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EED7704_2_0000024067EED770
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EECF704_2_0000024067EECF70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED975C4_2_0000024067ED975C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED47584_2_0000024067ED4758
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEE7504_2_0000024067EEE750
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDD33C4_2_0000024067EDD33C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE4F184_2_0000024067EE4F18
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDEF144_2_0000024067EDEF14
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE3B144_2_0000024067EE3B14
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEE3104_2_0000024067EEE310
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED92F04_2_0000024067ED92F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDD6CC4_2_0000024067EDD6CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEEAC04_2_0000024067EEEAC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE96D44_2_0000024067EE96D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED3ABC4_2_0000024067ED3ABC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEA6BC4_2_0000024067EEA6BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDAAB84_2_0000024067EDAAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED4EB84_2_0000024067ED4EB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED8A8C4_2_0000024067ED8A8C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EF4E8C4_2_0000024067EF4E8C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDBE904_2_0000024067EDBE90
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE4A904_2_0000024067EE4A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDA6604_2_0000024067EDA660
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED32744_2_0000024067ED3274
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE0A704_2_0000024067EE0A70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEA2444_2_0000024067EEA244
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDF65C4_2_0000024067EDF65C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDB2584_2_0000024067EDB258
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3500005_2_000001CAEF350000
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A8FC85_2_000001CAEF3A8FC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF398BC85_2_000001CAEF398BC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AA0005_2_000001CAEF3AA000
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39CC145_2_000001CAEF39CC14
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39263C5_2_000001CAEF39263C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A709C5_2_000001CAEF3A709C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF397D6C5_2_000001CAEF397D6C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39FFB85_2_000001CAEF39FFB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A8BB85_2_000001CAEF3A8BB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF398FB05_2_000001CAEF398FB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39DBA05_2_000001CAEF39DBA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF391B945_2_000001CAEF391B94
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3994085_2_000001CAEF399408
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF397C085_2_000001CAEF397C08
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3910005_2_000001CAEF391000
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B27EC5_2_000001CAEF3B27EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39A7F05_2_000001CAEF39A7F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF392FD45_2_000001CAEF392FD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3933D45_2_000001CAEF3933D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A97CC5_2_000001CAEF3A97CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A3FD05_2_000001CAEF3A3FD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39B83C5_2_000001CAEF39B83C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3978405_2_000001CAEF397840
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A10305_2_000001CAEF3A1030
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AEC305_2_000001CAEF3AEC30
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B181C5_2_000001CAEF3B181C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3ACC845_2_000001CAEF3ACC84
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF394C845_2_000001CAEF394C84
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39B07C5_2_000001CAEF39B07C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A58805_2_000001CAEF3A5880
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39D4745_2_000001CAEF39D474
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF392C785_2_000001CAEF392C78
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39C0785_2_000001CAEF39C078
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A6C705_2_000001CAEF3A6C70
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AB4605_2_000001CAEF3AB460
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AC0585_2_000001CAEF3AC058
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AC44C5_2_000001CAEF3AC44C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B54505_2_000001CAEF3B5450
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AA6BC5_2_000001CAEF3AA6BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF393ABC5_2_000001CAEF393ABC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AEAC05_2_000001CAEF3AEAC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39AAB85_2_000001CAEF39AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF394EB85_2_000001CAEF394EB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B4E8C5_2_000001CAEF3B4E8C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF398A8C5_2_000001CAEF398A8C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A4A905_2_000001CAEF3A4A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39BE905_2_000001CAEF39BE90
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3992F05_2_000001CAEF3992F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A96D45_2_000001CAEF3A96D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39D6CC5_2_000001CAEF39D6CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39D33C5_2_000001CAEF39D33C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39EF145_2_000001CAEF39EF14
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A3B145_2_000001CAEF3A3B14
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A4F185_2_000001CAEF3A4F18
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AE3105_2_000001CAEF3AE310
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A53845_2_000001CAEF3A5384
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39F77C5_2_000001CAEF39F77C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3983785_2_000001CAEF398378
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AD7705_2_000001CAEF3AD770
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3ACF705_2_000001CAEF3ACF70
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39975C5_2_000001CAEF39975C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3947585_2_000001CAEF394758
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AE7505_2_000001CAEF3AE750
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A15C85_2_000001CAEF3A15C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3995BC5_2_000001CAEF3995BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3ABDA05_2_000001CAEF3ABDA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A8E085_2_000001CAEF3A8E08
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A5A005_2_000001CAEF3A5A00
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B8A005_2_000001CAEF3B8A00
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AD5F05_2_000001CAEF3AD5F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AA2445_2_000001CAEF3AA244
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A8A2C5_2_000001CAEF3A8A2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A0E2C5_2_000001CAEF3A0E2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A662C5_2_000001CAEF3A662C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39BA2C5_2_000001CAEF39BA2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39461C5_2_000001CAEF39461C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3942145_2_000001CAEF394214
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A020C5_2_000001CAEF3A020C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF393E0C5_2_000001CAEF393E0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3932745_2_000001CAEF393274
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A0A705_2_000001CAEF3A0A70
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39F65C5_2_000001CAEF39F65C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39A6605_2_000001CAEF39A660
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39B2585_2_000001CAEF39B258
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A5CC45_2_000001CAEF3A5CC4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39F8C45_2_000001CAEF39F8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B94BC5_2_000001CAEF3B94BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39DCB85_2_000001CAEF39DCB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3998AC5_2_000001CAEF3998AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AA8B05_2_000001CAEF3AA8B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF39AC945_2_000001CAEF39AC94
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3948FC5_2_000001CAEF3948FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B85005_2_000001CAEF3B8500
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF393CF45_2_000001CAEF393CF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3990F85_2_000001CAEF3990F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3918DC5_2_000001CAEF3918DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A20E05_2_000001CAEF3A20E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A3CD45_2_000001CAEF3A3CD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3914D45_2_000001CAEF3914D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A08CC5_2_000001CAEF3A08CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3980CC5_2_000001CAEF3980CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3961385_2_000001CAEF396138
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AB1305_2_000001CAEF3AB130
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3975305_2_000001CAEF397530
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A19245_2_000001CAEF3A1924
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3AAD285_2_000001CAEF3AAD28
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A4D205_2_000001CAEF3A4D20
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A75185_2_000001CAEF3A7518
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3A610C5_2_000001CAEF3A610C
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001CAEF3B99105_2_000001CAEF3B9910
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_01FD00006_2_01FD0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020506186_2_02050618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02036E426_2_02036E42
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02039B796_2_02039B79
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020573A46_2_020573A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02038BC86_2_02038BC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02048FC86_2_02048FC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02043FD06_2_02043FD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020363F46_2_020363F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203640A6_2_0203640A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203CC146_2_0203CC14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020408CC6_2_020408CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02037D6C6_2_02037D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02045A006_2_02045A00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02058A006_2_02058A00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204020C6_2_0204020C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02048E086_2_02048E08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02033E0C6_2_02033E0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020342146_2_02034214
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203461C6_2_0203461C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02048A2C6_2_02048A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02040E2C6_2_02040E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204662C6_2_0204662C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203BA2C6_2_0203BA2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203263C6_2_0203263C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204A2446_2_0204A244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02056E486_2_02056E48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203B2586_2_0203B258
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203F65C6_2_0203F65C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203A6606_2_0203A660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02040A706_2_02040A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020332746_2_02033274
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02052E846_2_02052E84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02054E8C6_2_02054E8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02038A8C6_2_02038A8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203BE906_2_0203BE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02044A906_2_02044A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02052AB06_2_02052AB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204A6BC6_2_0204A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02047EBE6_2_02047EBE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203AAB86_2_0203AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02034EB86_2_02034EB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02033ABC6_2_02033ABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204EAC06_2_0204EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203D6CC6_2_0203D6CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020496D46_2_020496D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020392F06_2_020392F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020536FC6_2_020536FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02043B146_2_02043B14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204E3106_2_0204E310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020583106_2_02058310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203EF146_2_0203EF14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02055B1C6_2_02055B1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02044F186_2_02044F18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203D33C6_2_0203D33C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204E7506_2_0204E750
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020347586_2_02034758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203975C6_2_0203975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02058B686_2_02058B68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204D7706_2_0204D770
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204CF706_2_0204CF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020383786_2_02038378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203F77C6_2_0203F77C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020453846_2_02045384
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02031B946_2_02031B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204779A6_2_0204779A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203DBA06_2_0203DBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020547A86_2_020547A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02038FB06_2_02038FB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203FFB86_2_0203FFB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02048BB86_2_02048BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020497CC6_2_020497CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02032FD46_2_02032FD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020333D46_2_020333D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020527EC6_2_020527EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203A7F06_2_0203A7F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204FFFC6_2_0204FFFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020310006_2_02031000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204A0006_2_0204A000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020394086_2_02039408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02037C086_2_02037C08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020374106_2_02037410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0205181C6_2_0205181C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020410306_2_02041030
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204EC306_2_0204EC30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203B83C6_2_0203B83C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020378406_2_02037840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204C44C6_2_0204C44C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020554506_2_02055450
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204C0586_2_0204C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204B4606_2_0204B460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020558686_2_02055868
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02046C706_2_02046C70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203D4746_2_0203D474
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02032C786_2_02032C78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203C0786_2_0203C078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203B07C6_2_0203B07C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204CC846_2_0204CC84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020458806_2_02045880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02034C846_2_02034C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0205488C6_2_0205488C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020514946_2_02051494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203AC946_2_0203AC94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204709C6_2_0204709C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020544A86_2_020544A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020398AC6_2_020398AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204A8B06_2_0204A8B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020594BC6_2_020594BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203DCB86_2_0203DCB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02045CC46_2_02045CC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0203F8C46_2_0203F8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020380CC6_2_020380CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02043CD46_2_02043CD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02051CD46_2_02051CD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020314D46_2_020314D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020318DC6_2_020318DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020420E06_2_020420E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02033CF46_2_02033CF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020390F86_2_020390F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020348FC6_2_020348FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020585006_2_02058500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020521006_2_02052100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204610C6_2_0204610C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020599106_2_02059910
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020475186_2_02047518
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020419246_2_02041924
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02044D206_2_02044D20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204AD286_2_0204AD28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204B1306_2_0204B130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020361386_2_02036138
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02054D646_2_02054D64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204BDA06_2_0204BDA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020395BC6_2_020395BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_020415C86_2_020415C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0204D5F06_2_0204D5F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,3_2_0000000180010C10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010AC0 ExitProcess,RtlQueueApcWow64Thread,NtTestAlert,3_2_0000000180010AC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010DB0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject,3_2_0000000180010DB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,4_2_0000000180010C10
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010AC0 ExitProcess,RtlQueueApcWow64Thread,NtTestAlert,4_2_0000000180010AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010DB0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject,4_2_0000000180010DB0
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: f_00321b.dllVirustotal: Detection: 60%
                      Source: f_00321b.dllReversingLabs: Detection: 79%
                      Source: f_00321b.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\f_00321b.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\f_00321b.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\f_00321b.dll,DllRegisterServer
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZbmMPnDvLqwXll\QyzgcRWJYZS.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RymKYMmySRfU\EAqrfXJOpHznppsf.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IzuSuDitBV\QmEREbzuu.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\f_00321b.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\f_00321b.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZbmMPnDvLqwXll\QyzgcRWJYZS.dll"Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RymKYMmySRfU\EAqrfXJOpHznppsf.dll"Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IzuSuDitBV\QmEREbzuu.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@17/2@0/48
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02308BC8 Process32NextW,Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification,3_2_02308BC8
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2516:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5432:120:WilError_01
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: f_00321b.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: f_00321b.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: f_00321b.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: f_00321b.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: f_00321b.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: f_00321b.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: f_00321b.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: f_00321b.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: f_00321b.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: f_00321b.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: f_00321b.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: f_00321b.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: f_00321b.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005C69 push rdi; ret 3_2_0000000180005C72
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800056DD push rdi; ret 3_2_00000001800056E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230A26E push ebp; ret 3_2_0230A26F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02317EAF push 458BCC5Ah; retf 3_2_02317EBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02309E8B push eax; retf 3_2_02309E8E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231C731 push esi; iretd 3_2_0231C732
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02306C9F pushad ; ret 3_2_02306CAA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230A0FC push ebp; iretd 3_2_0230A0FD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023180D7 push ebp; retf 3_2_023180D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02306CDE push esi; iretd 3_2_02306CDF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02317D3C push ebp; retf 3_2_02317D3D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02317D25 push 4D8BFFFFh; retf 3_2_02317D2A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02309D51 push ebp; retf 3_2_02309D5A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02318157 push ebp; retf 3_2_02318158
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02317D4E push ebp; iretd 3_2_02317D4F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02317987 push ebp; iretd 3_2_0231798F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0230A1D2 push ebp; iretd 3_2_0230A1D3
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180005C69 push rdi; ret 4_2_0000000180005C72
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800056DD push rdi; ret 4_2_00000001800056E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDA1D2 push ebp; iretd 4_2_0000024067EDA1D3
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE7987 push ebp; iretd 4_2_0000024067EE798F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE7D4E push ebp; iretd 4_2_0000024067EE7D4F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE8157 push ebp; retf 4_2_0000024067EE8158
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED9D51 push ebp; retf 4_2_0000024067ED9D5A
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE7D25 push 4D8BFFFFh; retf 4_2_0000024067EE7D2A
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE7D3C push ebp; retf 4_2_0000024067EE7D3D
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EDA0FC push ebp; iretd 4_2_0000024067EDA0FD
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED6CDE push esi; iretd 4_2_0000024067ED6CDF
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EE80D7 push ebp; retf 4_2_0000024067EE80D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067ED6C9F pushad ; ret 4_2_0000024067ED6CAA
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000024067EEC731 push esi; iretd 4_2_0000024067EEC732
                      Source: f_00321b.dllStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\f_00321b.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\ZbmMPnDvLqwXll\QyzgcRWJYZS.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\ZbmMPnDvLqwXll\QyzgcRWJYZS.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\RymKYMmySRfU\EAqrfXJOpHznppsf.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\IzuSuDitBV\QmEREbzuu.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 5164Thread sleep time: -660000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 9.3 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D28 FindFirstFileExW,3_2_0000000180008D28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D28 FindFirstFileExW,4_2_0000000180008D28
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: regsvr32.exe, 00000006.00000003.405236343.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWN
                      Source: regsvr32.exe, 00000006.00000003.405236343.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490273767.000000000074B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.404596026.000000000074B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839083307.000000000074B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: rundll32.exe, 00000004.00000003.318175405.0000024067CAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000000180001C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A878 GetProcessHeap,3_2_000000018000A878
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory,3_2_0000000180010C10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000000180001C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800082EC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00000001800082EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800017DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00000001800017DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000000180001C48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800082EC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00000001800082EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800017DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00000001800017DC

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\cmd.exeProcess created / APC Queued / Resumed: C:\Windows\System32\rundll32.exeJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 213.239.212.5 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 186.194.240.217 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 119.59.103.152 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.89.202.34 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 160.16.142.56 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.207.28.33 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.43.75.120 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.235.8.30 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 72.15.201.15 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 163.44.196.120 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 206.189.28.199 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 107.170.39.149 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 82.223.21.224 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 149.56.131.28 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 169.57.156.166 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 1.234.2.232 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeThread APC queued: target process: C:\Windows\System32\rundll32.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800070A0 cpuid 3_2_00000001800070A0
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001D98 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_0000000180001D98

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.rundll32.exe.1caef360000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.24067ea0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.24067ea0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.22d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.22d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1caef360000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.1fe0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.1fe0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.320583141.0000024067ED1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.839406801.0000000002031000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.839356776.0000000001FE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.319426857.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.320938696.000001CAEF360000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.320487184.0000024067EA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.320983303.000001CAEF391000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      311
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)311
                      Process Injection
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Hidden Files and Directories
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer12
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Regsvr32
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Rundll32
                      DCSync24
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      File Deletion
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 829552 Sample: f_00321b Startdate: 18/03/2023 Architecture: WINDOWS Score: 100 32 129.232.188.93 xneeloZA South Africa 2->32 34 185.4.135.165 TOPHOSTGR Greece 2->34 36 22 other IPs or domains 2->36 44 Snort IDS alert for network traffic 2->44 46 Antivirus detection for URL or domain 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 2 other signatures 2->50 9 loaddll64.exe 1 2->9         started        signatures3 process4 process5 11 regsvr32.exe 2 9->11         started        14 cmd.exe 1 9->14         started        16 rundll32.exe 2 9->16         started        18 conhost.exe 9->18         started        signatures6 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 11->56 58 Queues an APC in another process (thread injection) 11->58 20 regsvr32.exe 11->20         started        60 Early bird code injection technique detected 14->60 24 rundll32.exe 2 14->24         started        26 regsvr32.exe 16->26         started        28 conhost.exe 16->28         started        process7 dnsIp8 38 45.235.8.30, 49733, 8080 WIKINETTELECOMUNICACOESBR Brazil 20->38 40 169.57.156.166, 8080 SOFTLAYERUS United States 20->40 42 22 other IPs or domains 20->42 52 System process connects to network (likely due to code injection or exploit) 20->52 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->54 30 regsvr32.exe 24->30         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      f_00321b.dll60%VirustotalBrowse
                      f_00321b.dll79%ReversingLabsWin64.Trojan.Emotet
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      5.2.rundll32.exe.1caef360000.1.unpack100%AviraHEUR/AGEN.1215476Download File
                      4.2.rundll32.exe.24067ea0000.1.unpack100%AviraHEUR/AGEN.1215476Download File
                      3.2.regsvr32.exe.22d0000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                      6.2.regsvr32.exe.1fe0000.0.unpack100%AviraHEUR/AGEN.1215476Download File
                      SourceDetectionScannerLabelLink
                      c-0001.c-msedge.net0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://164.90.222.65/0%URL Reputationsafe
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/0u100%Avira URL Cloudmalware
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb//100%Avira URL Cloudmalware
                      https://213.239.212.5/~100%Avira URL Cloudmalware
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://21.235.8.30:8080/0%Avira URL Cloudsafe
                      https://213.239.212.5/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://82.223.21.224:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://107.170.39.149:8080/100%Avira URL Cloudmalware
                      https://167.172.199.165:8080/Y100%Avira URL Cloudmalware
                      https://82.223.21.224:8080/100%Avira URL Cloudmalware
                      https://91.207.28.33:8080/-100%Avira URL Cloudmalware
                      https://159.65.88.10:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://104.168.155.143:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/?100%Avira URL Cloudmalware
                      https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb//K100%Avira URL Cloudmalware
                      https://164.90.222.65:443/nnukk/upfurpftd/ltwomnfleb/b/X100%Avira URL Cloudmalware
                      https://91.121.146.47:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://189.56.131.28:8080/0%Avira URL Cloudsafe
                      https://107.170.39.149:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://91.121.146.47:8080/100%Avira URL Cloudmalware
                      https://119.59.103.152:8080/100%Avira URL Cloudmalware
                      https://119.59.103.152:8080/l/z100%Avira URL Cloudmalware
                      https://187.172.199.165:8080/0%Avira URL Cloudsafe
                      https://167.172.199.165:8080/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://187.63.160.88:80/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://45.235.8.30:8080/100%Avira URL Cloudmalware
                      https://167.172.199.165:8080/o100%Avira URL Cloudmalware
                      https://66.228.32.31:7080/100%Avira URL Cloudmalware
                      https://167.172.199.165:8080/100%Avira URL Cloudmalware
                      https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/w100%Avira URL Cloudmalware
                      https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/100%Avira URL Cloudmalware
                      https://103.44.196.120:8080/0%Avira URL Cloudsafe
                      https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/%100%Avira URL Cloudmalware
                      https://164.90.222.65/wn100%Avira URL Cloudmalware
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/Y100%Avira URL Cloudmalware
                      https://213.239.212.5:443/nnukk/upfurpftd/ltwomnfleb/N100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      c-0001.c-msedge.net
                      13.107.4.50
                      truefalseunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/true
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb//regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/0uregsvr32.exe, 00000006.00000002.839161422.00000000007DE000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://167.172.199.165:8080/Yregsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://213.239.212.5/~regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839161422.00000000007DE000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://21.235.8.30:8080/regsvr32.exe, 00000006.00000002.839483293.00000000027F0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://164.90.222.65/regsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490542704.0000000000755000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://213.239.212.5/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://82.223.21.224:8080/regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://107.170.39.149:8080/regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://82.223.21.224:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839161422.00000000007DE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://91.207.28.33:8080/-regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://159.65.88.10:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb//Kregsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://104.168.155.143:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/?regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://164.90.222.65:443/nnukk/upfurpftd/ltwomnfleb/b/Xregsvr32.exe, 00000006.00000003.489477256.000000000285E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://91.121.146.47:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839083307.0000000000783000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490273767.0000000000783000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.404883022.0000000000783000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://189.56.131.28:8080/regsvr32.exe, 00000006.00000002.839483293.00000000027F0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://107.170.39.149:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://119.59.103.152:8080/regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839483293.00000000027F0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://119.59.103.152:8080/l/zregsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://91.121.146.47:8080/regsvr32.exe, 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://187.172.199.165:8080/regsvr32.exe, 00000006.00000003.490542704.000000000075A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://167.172.199.165:8080/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://187.63.160.88:80/nnukk/upfurpftd/ltwomnfleb/regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489477256.000000000285E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://45.235.8.30:8080/regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://167.172.199.165:8080/oregsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://66.228.32.31:7080/regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://167.172.199.165:8080/regsvr32.exe, 00000006.00000003.489636970.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://119.59.103.152:8080/nnukk/upfurpftd/ltwomnfleb/%regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://164.90.222.65/nnukk/upfurpftd/ltwomnfleb/wregsvr32.exe, 00000006.00000003.490273767.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.839161422.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490454644.0000000000797000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.490651926.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://164.90.222.65/wnregsvr32.exe, 00000006.00000003.489636970.0000000000797000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.44.196.120:8080/regsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://45.235.8.30:8080/nnukk/upfurpftd/ltwomnfleb/Yregsvr32.exe, 00000006.00000002.839305348.00000000007F4000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://213.239.212.5:443/nnukk/upfurpftd/ltwomnfleb/Nregsvr32.exe, 00000006.00000002.839483293.000000000285E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      159.65.88.10
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      172.105.226.75
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      164.90.222.65
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      110.232.117.186
                      unknownAustralia
                      56038RACKCORP-APRackCorpAUtrue
                      213.239.212.5
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      5.135.159.50
                      unknownFrance
                      16276OVHFRtrue
                      186.194.240.217
                      unknownBrazil
                      262733NetceteraTelecomunicacoesLtdaBRtrue
                      103.132.242.26
                      unknownIndia
                      45117INPL-IN-APIshansNetworkINtrue
                      104.168.155.143
                      unknownUnited States
                      54290HOSTWINDSUStrue
                      119.59.103.152
                      unknownThailand
                      56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                      79.137.35.198
                      unknownFrance
                      16276OVHFRtrue
                      159.89.202.34
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      91.121.146.47
                      unknownFrance
                      16276OVHFRtrue
                      160.16.142.56
                      unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                      201.94.166.162
                      unknownBrazil
                      28573CLAROSABRtrue
                      91.207.28.33
                      unknownKyrgyzstan
                      39819PROHOSTKGtrue
                      103.75.201.2
                      unknownThailand
                      133496CDNPLUSCOLTD-AS-APCDNPLUSCOLTDTHtrue
                      103.43.75.120
                      unknownJapan20473AS-CHOOPAUStrue
                      115.68.227.76
                      unknownKorea Republic of
                      38700SMILESERV-AS-KRSMILESERVKRtrue
                      188.44.20.25
                      unknownMacedonia
                      57374GIV-ASMKtrue
                      45.235.8.30
                      unknownBrazil
                      267405WIKINETTELECOMUNICACOESBRtrue
                      153.126.146.25
                      unknownJapan7684SAKURA-ASAKURAInternetIncJPtrue
                      72.15.201.15
                      unknownUnited States
                      13649ASN-VINSUStrue
                      163.44.196.120
                      unknownSingapore
                      135161GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGtrue
                      206.189.28.199
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      107.170.39.149
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      66.228.32.31
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      187.63.160.88
                      unknownBrazil
                      28169BITCOMPROVEDORDESERVICOSDEINTERNETLTDABRtrue
                      82.223.21.224
                      unknownSpain
                      8560ONEANDONE-ASBrauerstrasse48DEtrue
                      197.242.150.244
                      unknownSouth Africa
                      37611AfrihostZAtrue
                      173.212.193.249
                      unknownGermany
                      51167CONTABODEtrue
                      185.4.135.165
                      unknownGreece
                      199246TOPHOSTGRtrue
                      183.111.227.137
                      unknownKorea Republic of
                      4766KIXS-AS-KRKoreaTelecomKRtrue
                      45.176.232.124
                      unknownColombia
                      267869CABLEYTELECOMUNICACIONESDECOLOMBIASASCABLETELCOCtrue
                      95.217.221.146
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      149.56.131.28
                      unknownCanada
                      16276OVHFRtrue
                      169.57.156.166
                      unknownUnited States
                      36351SOFTLAYERUStrue
                      164.68.99.3
                      unknownGermany
                      51167CONTABODEtrue
                      182.162.143.56
                      unknownKorea Republic of
                      3786LGDACOMLGDACOMCorporationKRtrue
                      139.59.126.41
                      unknownSingapore
                      14061DIGITALOCEAN-ASNUStrue
                      1.234.2.232
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      167.172.253.162
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      129.232.188.93
                      unknownSouth Africa
                      37153xneeloZAtrue
                      167.172.199.165
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      202.129.205.3
                      unknownThailand
                      45328NIPA-AS-THNIPATECHNOLOGYCOLTDTHtrue
                      147.139.166.154
                      unknownUnited States
                      45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                      153.92.5.27
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      94.23.45.86
                      unknownFrance
                      16276OVHFRtrue
                      Joe Sandbox Version:37.0.0 Beryl
                      Analysis ID:829552
                      Start date and time:2023-03-18 15:56:02 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 9m 56s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample file name:f_00321b.dll
                      (renamed file extension from none to dll, renamed because original name is a hash value)
                      Original Sample Name:f_00321b
                      Detection:MAL
                      Classification:mal100.troj.evad.winDLL@17/2@0/48
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 50.2% (good quality ratio 42.4%)
                      • Quality average: 60.5%
                      • Quality standard deviation: 35.6%
                      HCA Information:
                      • Successful, ratio: 84%
                      • Number of executed functions: 35
                      • Number of non-executed functions: 160
                      Cookbook Comments:
                      • Override analysis time to 240s for rundll32
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, backgroundTaskHost.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.4.50
                      • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      15:57:44API Interceptor23x Sleep call for process: regsvr32.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      159.65.88.10aOHLlvfakv.dllGet hashmaliciousEmotetBrowse
                        aOHLlvfakv.dllGet hashmaliciousEmotetBrowse
                          Form - 16 Mar, 2023.oneGet hashmaliciousEmotetBrowse
                            MBQ24253060297767042_202303161424.oneGet hashmaliciousEmotetBrowse
                              iMedPub_LTD_4.oneGet hashmaliciousEmotetBrowse
                                iMedPub_LTD_6.oneGet hashmaliciousEmotetBrowse
                                  INNOVINC.oneGet hashmaliciousEmotetBrowse
                                    Insight_Medical_Publishing_2.oneGet hashmaliciousEmotetBrowse
                                      Insight_Medical_Publishing_1.oneGet hashmaliciousEmotetBrowse
                                        Insight_Medical_Publishing_3.oneGet hashmaliciousEmotetBrowse
                                          Insight_Medical_Publishing_4.oneGet hashmaliciousEmotetBrowse
                                            OMICS_Online_1.oneGet hashmaliciousEmotetBrowse
                                              Insight_Medical_Publishing.oneGet hashmaliciousEmotetBrowse
                                                Omics_Journal.oneGet hashmaliciousEmotetBrowse
                                                  OMICS.oneGet hashmaliciousEmotetBrowse
                                                    OPAST_GROUP_1.oneGet hashmaliciousEmotetBrowse
                                                      OPAST_GROUP_LLC.oneGet hashmaliciousEmotetBrowse
                                                        OPAST_GROUP.oneGet hashmaliciousEmotetBrowse
                                                          Opast_International.oneGet hashmaliciousEmotetBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            c-0001.c-msedge.nethttps://www.dropbox.com/scl/fi/1nqyu0mxlcuol77cvuzhq/Please-kindly-preview-the-paper-document-below..paper?dl=0&rlkey=px6p30z2du1tnve24vqyow1seGet hashmaliciousHTMLPhisherBrowse
                                                            • 13.107.4.50
                                                            http://13.107.4.50Get hashmaliciousUnknownBrowse
                                                            • 13.107.4.50
                                                            DISCOUNT_PRICES.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                            • 13.107.4.50
                                                            New_Order.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 13.107.4.50
                                                            https://midcoastsupplies.com.auGet hashmaliciousUnknownBrowse
                                                            • 13.107.4.50
                                                            DHL_Original_Document.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 13.107.4.50
                                                            Insight_Medical_Publishing.oneGet hashmaliciousEmotetBrowse
                                                            • 13.107.4.50
                                                            Omics_Journal.oneGet hashmaliciousEmotetBrowse
                                                            • 13.107.4.50
                                                            PurchaseOrder-pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 13.107.4.50
                                                            WIFhAJKfNY.dllGet hashmaliciousEmotetBrowse
                                                            • 13.107.4.50
                                                            NG7553084292252526_202303161746.oneGet hashmaliciousEmotetBrowse
                                                            • 13.107.4.50
                                                            EOPXCLX23550.vbsGet hashmaliciousAsyncRATBrowse
                                                            • 13.107.4.50
                                                            SecuriteInfo.com.Variant.Razy.447182.26738.13493.exeGet hashmaliciousUnknownBrowse
                                                            • 13.107.4.50
                                                            wDIpNqyTA2.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 13.107.4.50
                                                            DKUVWEO27j.exeGet hashmaliciousAveMaria, UACMeBrowse
                                                            • 13.107.4.50
                                                            ATT98089.htmGet hashmaliciousHTMLPhisherBrowse
                                                            • 13.107.4.50
                                                            Ro.jsGet hashmaliciousQbotBrowse
                                                            • 13.107.4.50
                                                            INVOICE_VM220200200208.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 13.107.4.50
                                                            TitleContractDocs.pdf.lnkGet hashmaliciousUnknownBrowse
                                                            • 13.107.4.50
                                                            file.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 13.107.4.50
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            DIGITALOCEAN-ASNUSx86.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 157.245.170.65
                                                            wE6nyFav1l.elfGet hashmaliciousUnknownBrowse
                                                            • 157.230.217.69
                                                            iekih3ewfo.elfGet hashmaliciousMiraiBrowse
                                                            • 157.230.217.69
                                                            F81iFExXxR.elfGet hashmaliciousUnknownBrowse
                                                            • 157.230.217.69
                                                            2Zq8f4veB3.elfGet hashmaliciousMiraiBrowse
                                                            • 157.230.217.69
                                                            doZa4wByEK.elfGet hashmaliciousMiraiBrowse
                                                            • 157.230.217.69
                                                            lcjsGw2zy5.elfGet hashmaliciousMiraiBrowse
                                                            • 157.230.217.69
                                                            zRmIi0pNmI.elfGet hashmaliciousMiraiBrowse
                                                            • 157.230.217.69
                                                            z2H8jaZbYg.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 104.248.213.183
                                                            loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                                            • 167.71.31.167
                                                            https://knowledgeburrow.com/did-benjamin-franklin-really-say-if-you-fail-to-plan-you-are-planning-to-fail/Get hashmaliciousUnknownBrowse
                                                            • 161.35.253.218
                                                            d1mhDLrdaN.elfGet hashmaliciousMiraiBrowse
                                                            • 159.65.218.65
                                                            http://searchunify.comGet hashmaliciousUnknownBrowse
                                                            • 209.97.144.176
                                                            arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 157.245.169.66
                                                            aOHLlvfakv.dllGet hashmaliciousEmotetBrowse
                                                            • 159.89.202.34
                                                            aOHLlvfakv.dllGet hashmaliciousEmotetBrowse
                                                            • 159.89.202.34
                                                            Form - 16 Mar, 2023.oneGet hashmaliciousEmotetBrowse
                                                            • 159.89.202.34
                                                            ccdc 5b contract explained 17361.jsGet hashmaliciousUnknownBrowse
                                                            • 167.71.236.170
                                                            https://wx6j1u05.page.link/NLtkGet hashmaliciousGRQ ScamBrowse
                                                            • 198.211.98.91
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            8916410db85077a5460817142dcbc8deForm - 16 Mar, 2023.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            MBQ24253060297767042_202303161424.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            iMedPub_LTD_4.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            iMedPub_LTD_6.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            INNOVINC.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Insight_Medical_Publishing_2.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Insight_Medical_Publishing_1.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Insight_Medical_Publishing_3.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Insight_Medical_Publishing_4.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            OMICS_Online_1.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Insight_Medical_Publishing.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Omics_Journal.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            OMICS.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            OPAST_GROUP_1.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            OPAST_GROUP_LLC.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            OPAST_GROUP.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Opast_International.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            opastonline.com.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Opast_Publishing_Group_1.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            Opast_Publishing_Group.oneGet hashmaliciousEmotetBrowse
                                                            • 164.90.222.65
                                                            No context
                                                            Process:C:\Windows\System32\regsvr32.exe
                                                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                            Category:dropped
                                                            Size (bytes):62582
                                                            Entropy (8bit):7.996063107774368
                                                            Encrypted:true
                                                            SSDEEP:1536:Jk3XPi43VgGp0gB2itudTSRAn/TWTdWftu:CHa43V5p022iZ4CgA
                                                            MD5:E71C8443AE0BC2E282C73FAEAD0A6DD3
                                                            SHA1:0C110C1B01E68EDFACAEAE64781A37B1995FA94B
                                                            SHA-256:95B0A5ACC5BF70D3ABDFD091D0C9F9063AA4FDE65BD34DBF16786082E1992E72
                                                            SHA-512:B38458C7FA2825AFB72794F374827403D5946B1132E136A0CE075DFD351277CF7D957C88DC8A1E4ADC3BCAE1FA8010DAE3831E268E910D517691DE24326391A6
                                                            Malicious:false
                                                            Preview:MSCF....v.......,...................I.................BVrl .authroot.stl....oJ5..CK..8U....a..3.1.P. J.".t..2F2e.dHH......$E.KB.2D..-SJE....^..'..y.}..,{m.....\...]4.G.......h....148...e.gr.....48:.L...g.....Xef.x:..t...J...6-....kW6Z>....&......ye.U.Q&z:.vZ..._....a...]..T.E.....B.h.,...[....V.O.3..EW.x.?.Q..$.@.W..=.B.f..8a.Y.JK..g./%p..C.4CD.s..Jd.u..@.g=...a.. .h%..'.xjy7.E..\.....A..':.4TdW?Ko3$.Hg.z.d~....../q..C.....`...A[ W(.........9...GZ.;....l&?........F...p?... .p.....{S.L4..v.+...7.T?.....p..`..&..9.......f...0+.L.....1.2b)..vX5L'.~....2vz.,E.Ni.{#...o..w.?.#.3..h.v<.S%.].tD@!Le.w.q.7.8....QW.FT.....hE.........Y............./.%Q...k...*.Y.n..v.A..../...>B..5\..-Ko.......O<.b.K.{.O.b...._.7...4.;%9N..K.X>......kg-9..r.c.g.G|.*[.-...HT...",?.q...ad....7RE.......!f..#../....?.-.^.K.c^...+{.g......]<..$.=.O....ii7.wJ+S..Z..d.....>..J*...T..Q7..`.r,<$....\d:K`..T.n....N.....C..j.;.1SX..j....1...R....+....Yg....]....3..9..S..D..`.
                                                            Process:C:\Windows\System32\regsvr32.exe
                                                            File Type:data
                                                            Category:modified
                                                            Size (bytes):328
                                                            Entropy (8bit):3.123641537625697
                                                            Encrypted:false
                                                            SSDEEP:6:kKOry/7UN+SkQlPlEGYRMY9z+4KlDA3RUecZUt:mCvkPlE99SNxAhUext
                                                            MD5:1D721B64039DC653E2772556CCB02D45
                                                            SHA1:804188A5F346A929ADFE4618FBE24CDF9BB0C38F
                                                            SHA-256:10F85BCAB9F99A4D5BF26EA9A275348685020D302B71C4CAF4ABB46EA66940B4
                                                            SHA-512:BAC9FCC93AD14D431147EDBB4C1986839274A47B1E53BF0C9085F445AD6B8B654F51DAC40E21ADD3F44F66FA891C1C6C7471B75159D7BF3A3AAF68866BE25CB8
                                                            Malicious:false
                                                            Preview:p...... ........9....Y..(....................................................... ..........).K......&...........v...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.2.f.9.2.9.a.7.4.b.d.9.1.:.0."...
                                                            File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Entropy (8bit):7.337848702590508
                                                            TrID:
                                                            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                            • Win64 Executable (generic) (12005/4) 10.17%
                                                            • Generic Win/DOS Executable (2004/3) 1.70%
                                                            • DOS Executable Generic (2002/1) 1.70%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                            File name:f_00321b.dll
                                                            File size:316928
                                                            MD5:bfc060937dc90b273eccb6825145f298
                                                            SHA1:c156c00c7e918f0cb7363614fb1f177c90d8108a
                                                            SHA256:2f39c2879989ddd7f9ecf52b6232598e5595f8bf367846ff188c9dfbf1251253
                                                            SHA512:cc1fee19314b0a0f9e292fa84f6e98f087033d77db937848dda1da0c88f49997866cba5465df04bf929b810b42fdb81481341064c4565c9b6272fa7f3b473ac5
                                                            SSDEEP:6144:cwNQMQTlfdUPABVy559hhR3iP7TfPYbrF1EFVw0todxKROsCt:rNbadDBkZ6rPeEFizdxxsCt
                                                            TLSH:2C649D47E2A601E7FC62763DA0734708A766B0524314EB5F02B04F5B2F637A3FD5AA25
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......L`.=...n...n...nCy.o...nCy.o...nCy.o...n.z.o(..n.z.o...n.z.o...nCy.o...n...nq..n.z.o...n.z.o...n.zsn...n...n...n.z.o...nRich...
                                                            Icon Hash:74f0e4ecccdce0e4
                                                            Entrypoint:0x18000179c
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x180000000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                                            DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                                                            Time Stamp:0x640B360F [Fri Mar 10 13:52:15 2023 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:6
                                                            OS Version Minor:0
                                                            File Version Major:6
                                                            File Version Minor:0
                                                            Subsystem Version Major:6
                                                            Subsystem Version Minor:0
                                                            Import Hash:abb9300283e542fb453de5c4c87cd55d
                                                            Instruction
                                                            dec eax
                                                            mov dword ptr [esp+08h], ebx
                                                            dec eax
                                                            mov dword ptr [esp+10h], esi
                                                            push edi
                                                            dec eax
                                                            sub esp, 20h
                                                            dec ecx
                                                            mov edi, eax
                                                            mov ebx, edx
                                                            dec eax
                                                            mov esi, ecx
                                                            cmp edx, 01h
                                                            jne 00007FDE20B6DC67h
                                                            call 00007FDE20B6E240h
                                                            dec esp
                                                            mov eax, edi
                                                            mov edx, ebx
                                                            dec eax
                                                            mov ecx, esi
                                                            dec eax
                                                            mov ebx, dword ptr [esp+30h]
                                                            dec eax
                                                            mov esi, dword ptr [esp+38h]
                                                            dec eax
                                                            add esp, 20h
                                                            pop edi
                                                            jmp 00007FDE20B6DAF4h
                                                            int3
                                                            int3
                                                            int3
                                                            inc eax
                                                            push ebx
                                                            dec eax
                                                            sub esp, 20h
                                                            dec eax
                                                            mov ebx, ecx
                                                            xor ecx, ecx
                                                            call dword ptr [00014903h]
                                                            dec eax
                                                            mov ecx, ebx
                                                            call dword ptr [000148F2h]
                                                            call dword ptr [000148FCh]
                                                            dec eax
                                                            mov ecx, eax
                                                            mov edx, C0000409h
                                                            dec eax
                                                            add esp, 20h
                                                            pop ebx
                                                            dec eax
                                                            jmp dword ptr [000148F0h]
                                                            dec eax
                                                            mov dword ptr [esp+08h], ecx
                                                            dec eax
                                                            sub esp, 38h
                                                            mov ecx, 00000017h
                                                            call dword ptr [000148E4h]
                                                            test eax, eax
                                                            je 00007FDE20B6DC69h
                                                            mov ecx, 00000002h
                                                            int 29h
                                                            dec eax
                                                            lea ecx, dword ptr [0002038Ah]
                                                            call 00007FDE20B6DE2Eh
                                                            dec eax
                                                            mov eax, dword ptr [esp+38h]
                                                            dec eax
                                                            mov dword ptr [00020471h], eax
                                                            dec eax
                                                            lea eax, dword ptr [esp+38h]
                                                            dec eax
                                                            add eax, 08h
                                                            dec eax
                                                            mov dword ptr [00020401h], eax
                                                            dec eax
                                                            mov eax, dword ptr [0002045Ah]
                                                            dec eax
                                                            mov dword ptr [000202CBh], eax
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x1f9100x54.rdata
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1f9640x64.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x2bd28.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x230000x11a0.pdata
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x520000x684.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x1e1b00x38.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1e0700x140.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x160000x360.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x144150x14600False0.5082438650306749data6.388870950832575IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x160000xa4b40xa600False0.4210749246987952data4.746360898517369IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x210000x1ea40xc00False0.1513671875DOS executable (block device driver \322f\324\377\3772)2.0951973339816368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .pdata0x230000x11a00x1200False0.4715711805555556data4.892908366942992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            _RDATA0x250000x15c0x200False0.408203125data2.8023223995708944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .rsrc0x260000x2bd280x2be00False0.8690349002849003data7.841437382818367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x520000x6840x800False0.51708984375data4.920748452777265IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountry
                                                            LXGUM0x261300xa2cdataEnglishUnited States
                                                            LXGUM0x26b600x2b000dataEnglishUnited States
                                                            RT_STRING0x51b600x48dataEnglishUnited States
                                                            RT_MANIFEST0x51ba80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                                                            DLLImport
                                                            KERNEL32.dllSetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, WriteFile, FlushFileBuffers, SetStdHandle, HeapSize, GetStringTypeW, GetFileType, GetStdHandle, GetProcessHeap, CreateFileW, CloseHandle, WriteConsoleW, ExitProcess, HeapReAlloc, GetLastError, LCMapStringW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, InterlockedFlushSList, SetLastError, EncodePointer, RaiseException, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, RtlPcToFileHeader, GetModuleHandleExW, GetModuleFileNameW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW
                                                            USER32.dllGetGestureInfo, InvalidateRect, ScreenToClient, CloseGestureInfoHandle, EndPaint, BeginPaint, UpdateWindow, PostQuitMessage, LoadCursorW, GetMessageW, DefWindowProcW, DestroyWindow, CreateWindowExW, RegisterClassExW, LoadStringW, ShowWindow, DispatchMessageW, SetGestureConfig, TranslateAcceleratorW, TranslateMessage
                                                            GDI32.dllPolyline, LineTo, CreatePen, MoveToEx, DeleteObject, SelectObject
                                                            ntdll.dllNtQueueApcThread, ZwOpenSymbolicLinkObject, LdrFindResource_U, NtAllocateVirtualMemory, NtTestAlert, LdrAccessResource, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind
                                                            NameOrdinalAddress
                                                            DllRegisterServer10x180010a70
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            192.168.2.4213.239.212.5497294432404320 03/18/23-16:00:53.457464TCP2404320ET CNC Feodo Tracker Reported CnC Server TCP group 1149729443192.168.2.4213.239.212.5
                                                            192.168.2.4104.168.155.1434970580802404302 03/18/23-15:58:29.445426TCP2404302ET CNC Feodo Tracker Reported CnC Server TCP group 2497058080192.168.2.4104.168.155.143
                                                            192.168.2.445.235.8.304973380802404324 03/18/23-16:00:58.958124TCP2404324ET CNC Feodo Tracker Reported CnC Server TCP group 13497338080192.168.2.445.235.8.30
                                                            192.168.2.4167.172.199.1654970380802404310 03/18/23-15:58:19.699415TCP2404310ET CNC Feodo Tracker Reported CnC Server TCP group 6497038080192.168.2.4167.172.199.165
                                                            192.168.2.4164.90.222.65497044432404308 03/18/23-15:58:24.948314TCP2404308ET CNC Feodo Tracker Reported CnC Server TCP group 549704443192.168.2.4164.90.222.65
                                                            192.168.2.4187.63.160.8849702802404314 03/18/23-15:58:11.945439TCP2404314ET CNC Feodo Tracker Reported CnC Server TCP group 84970280192.168.2.4187.63.160.88
                                                            192.168.2.41.234.2.2324971980802404304 03/18/23-15:59:46.453351TCP2404304ET CNC Feodo Tracker Reported CnC Server TCP group 3497198080192.168.2.41.234.2.232
                                                            192.168.2.491.121.146.474969580802404344 03/18/23-15:57:43.982133TCP2404344ET CNC Feodo Tracker Reported CnC Server TCP group 23496958080192.168.2.491.121.146.47
                                                            192.168.2.4206.189.28.1994972180802404318 03/18/23-16:00:02.963968TCP2404318ET CNC Feodo Tracker Reported CnC Server TCP group 10497218080192.168.2.4206.189.28.199
                                                            192.168.2.466.228.32.314969770802404330 03/18/23-15:57:49.653644TCP2404330ET CNC Feodo Tracker Reported CnC Server TCP group 16496977080192.168.2.466.228.32.31
                                                            192.168.2.4182.162.143.56496984432404312 03/18/23-15:58:05.445458TCP2404312ET CNC Feodo Tracker Reported CnC Server TCP group 749698443192.168.2.4182.162.143.56
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Mar 18, 2023 15:57:43.982132912 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:44.010421038 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:44.010539055 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:44.013843060 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:44.041975975 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:44.064595938 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:44.064632893 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:44.064770937 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:44.077897072 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:44.107184887 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:44.155500889 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:45.521246910 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:45.521328926 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:45.553070068 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:45.563245058 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:45.608760118 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:48.559087038 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:48.559130907 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:48.559294939 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:48.559461117 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:48.559514999 CET496958080192.168.2.491.121.146.47
                                                            Mar 18, 2023 15:57:48.587496996 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:48.587532997 CET80804969591.121.146.47192.168.2.4
                                                            Mar 18, 2023 15:57:49.653644085 CET496977080192.168.2.466.228.32.31
                                                            Mar 18, 2023 15:57:52.656811953 CET496977080192.168.2.466.228.32.31
                                                            Mar 18, 2023 15:57:58.703701019 CET496977080192.168.2.466.228.32.31
                                                            Mar 18, 2023 15:58:05.445457935 CET49698443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.445525885 CET44349698182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:05.445621014 CET49698443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.446594000 CET49698443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.446608067 CET44349698182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:05.713150024 CET44349698182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:05.713974953 CET49699443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.714050055 CET44349699182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:05.714160919 CET49699443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.715395927 CET49699443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.715436935 CET44349699182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:05.987780094 CET44349699182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:05.989764929 CET49700443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.989820957 CET44349700182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:05.990039110 CET49700443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.991280079 CET49700443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:05.991303921 CET44349700182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:06.239960909 CET44349700182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:06.241710901 CET49701443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:06.241755962 CET44349701182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:06.241857052 CET49701443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:06.242470980 CET49701443192.168.2.4182.162.143.56
                                                            Mar 18, 2023 15:58:06.242486954 CET44349701182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:06.501095057 CET44349701182.162.143.56192.168.2.4
                                                            Mar 18, 2023 15:58:11.945439100 CET4970280192.168.2.4187.63.160.88
                                                            Mar 18, 2023 15:58:12.179195881 CET8049702187.63.160.88192.168.2.4
                                                            Mar 18, 2023 15:58:12.689225912 CET4970280192.168.2.4187.63.160.88
                                                            Mar 18, 2023 15:58:12.922725916 CET8049702187.63.160.88192.168.2.4
                                                            Mar 18, 2023 15:58:13.423608065 CET4970280192.168.2.4187.63.160.88
                                                            Mar 18, 2023 15:58:13.661552906 CET8049702187.63.160.88192.168.2.4
                                                            Mar 18, 2023 15:58:19.699414968 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:19.867234945 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:19.867444038 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:19.868233919 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:20.035275936 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:20.045103073 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:20.045140028 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:20.045212030 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:20.051392078 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:20.219124079 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:20.220163107 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:20.428314924 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:21.038682938 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:21.080550909 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:24.038556099 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:24.038588047 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:24.038654089 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:24.039973974 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:24.040021896 CET497038080192.168.2.4167.172.199.165
                                                            Mar 18, 2023 15:58:24.207125902 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:24.207159042 CET808049703167.172.199.165192.168.2.4
                                                            Mar 18, 2023 15:58:24.948313951 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:24.948385954 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:24.948482990 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:24.949033022 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:24.949058056 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.070983887 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.071180105 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:25.075246096 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:25.075273991 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.075628996 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.127825975 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:25.402632952 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:25.402668953 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.615834951 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.615917921 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.616075039 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:25.616332054 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:25.616355896 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:25.616396904 CET49704443192.168.2.4164.90.222.65
                                                            Mar 18, 2023 15:58:25.616406918 CET44349704164.90.222.65192.168.2.4
                                                            Mar 18, 2023 15:58:29.445425987 CET497058080192.168.2.4104.168.155.143
                                                            Mar 18, 2023 15:58:29.608290911 CET808049705104.168.155.143192.168.2.4
                                                            Mar 18, 2023 15:58:30.112575054 CET497058080192.168.2.4104.168.155.143
                                                            Mar 18, 2023 15:58:30.275592089 CET808049705104.168.155.143192.168.2.4
                                                            Mar 18, 2023 15:58:30.784570932 CET497058080192.168.2.4104.168.155.143
                                                            Mar 18, 2023 15:58:30.947439909 CET808049705104.168.155.143192.168.2.4
                                                            Mar 18, 2023 15:58:37.206897020 CET497068080192.168.2.4163.44.196.120
                                                            Mar 18, 2023 15:58:37.414094925 CET808049706163.44.196.120192.168.2.4
                                                            Mar 18, 2023 15:58:37.925693989 CET497068080192.168.2.4163.44.196.120
                                                            Mar 18, 2023 15:58:38.132889986 CET808049706163.44.196.120192.168.2.4
                                                            Mar 18, 2023 15:58:38.644577980 CET497068080192.168.2.4163.44.196.120
                                                            Mar 18, 2023 15:58:38.851846933 CET808049706163.44.196.120192.168.2.4
                                                            Mar 18, 2023 15:58:44.204273939 CET497078080192.168.2.4160.16.142.56
                                                            Mar 18, 2023 15:58:47.208164930 CET497078080192.168.2.4160.16.142.56
                                                            Mar 18, 2023 15:58:53.223882914 CET497078080192.168.2.4160.16.142.56
                                                            Mar 18, 2023 15:59:01.440913916 CET49708443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:01.440969944 CET44349708159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:01.441087008 CET49708443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:01.441631079 CET49708443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:01.441662073 CET44349708159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:01.732642889 CET44349708159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:01.739085913 CET49709443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:01.739130974 CET44349709159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:01.739490032 CET49709443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:01.740029097 CET49709443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:01.740045071 CET44349709159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:01.997771025 CET44349709159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:02.001648903 CET49710443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:02.001723051 CET44349710159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:02.001868963 CET49710443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:02.002549887 CET49710443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:02.002579927 CET44349710159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:02.266993046 CET44349710159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:02.268584013 CET49711443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:02.268667936 CET44349711159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:02.280921936 CET49711443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:02.282046080 CET49711443192.168.2.4159.89.202.34
                                                            Mar 18, 2023 15:59:02.282097101 CET44349711159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:02.570384026 CET44349711159.89.202.34192.168.2.4
                                                            Mar 18, 2023 15:59:07.957743883 CET497128080192.168.2.4159.65.88.10
                                                            Mar 18, 2023 15:59:07.991372108 CET808049712159.65.88.10192.168.2.4
                                                            Mar 18, 2023 15:59:08.506562948 CET497128080192.168.2.4159.65.88.10
                                                            Mar 18, 2023 15:59:08.538861990 CET808049712159.65.88.10192.168.2.4
                                                            Mar 18, 2023 15:59:09.053390980 CET497128080192.168.2.4159.65.88.10
                                                            Mar 18, 2023 15:59:09.088993073 CET808049712159.65.88.10192.168.2.4
                                                            Mar 18, 2023 15:59:14.449083090 CET49713443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.449156046 CET44349713186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:14.449254990 CET49713443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.450041056 CET49713443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.450057983 CET44349713186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:14.686491013 CET44349713186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:14.687273026 CET49714443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.687319040 CET44349714186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:14.687402964 CET49714443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.688045025 CET49714443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.688057899 CET44349714186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:14.909670115 CET44349714186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:14.910675049 CET49715443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.910744905 CET44349715186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:14.910902023 CET49715443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.911706924 CET49715443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:14.911735058 CET44349715186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:15.141199112 CET44349715186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:15.142324924 CET49716443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:15.142395020 CET44349716186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:15.142493010 CET49716443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:15.143629074 CET49716443192.168.2.4186.194.240.217
                                                            Mar 18, 2023 15:59:15.143656969 CET44349716186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:15.365222931 CET44349716186.194.240.217192.168.2.4
                                                            Mar 18, 2023 15:59:20.736360073 CET497178080192.168.2.4149.56.131.28
                                                            Mar 18, 2023 15:59:20.840053082 CET808049717149.56.131.28192.168.2.4
                                                            Mar 18, 2023 15:59:21.351337910 CET497178080192.168.2.4149.56.131.28
                                                            Mar 18, 2023 15:59:21.455054998 CET808049717149.56.131.28192.168.2.4
                                                            Mar 18, 2023 15:59:21.960804939 CET497178080192.168.2.4149.56.131.28
                                                            Mar 18, 2023 15:59:22.064337015 CET808049717149.56.131.28192.168.2.4
                                                            Mar 18, 2023 15:59:27.954616070 CET497188080192.168.2.472.15.201.15
                                                            Mar 18, 2023 15:59:30.961610079 CET497188080192.168.2.472.15.201.15
                                                            Mar 18, 2023 15:59:36.962234020 CET497188080192.168.2.472.15.201.15
                                                            Mar 18, 2023 15:59:46.453351021 CET497198080192.168.2.41.234.2.232
                                                            Mar 18, 2023 15:59:46.723201036 CET8080497191.234.2.232192.168.2.4
                                                            Mar 18, 2023 15:59:47.228558064 CET497198080192.168.2.41.234.2.232
                                                            Mar 18, 2023 15:59:47.498555899 CET8080497191.234.2.232192.168.2.4
                                                            Mar 18, 2023 15:59:48.009881973 CET497198080192.168.2.41.234.2.232
                                                            Mar 18, 2023 15:59:50.024698019 CET8080497191.234.2.232192.168.2.4
                                                            Mar 18, 2023 15:59:55.459563017 CET497208080192.168.2.482.223.21.224
                                                            Mar 18, 2023 15:59:55.513474941 CET80804972082.223.21.224192.168.2.4
                                                            Mar 18, 2023 15:59:56.026175022 CET497208080192.168.2.482.223.21.224
                                                            Mar 18, 2023 15:59:56.077433109 CET80804972082.223.21.224192.168.2.4
                                                            Mar 18, 2023 15:59:56.588773966 CET497208080192.168.2.482.223.21.224
                                                            Mar 18, 2023 15:59:56.640219927 CET80804972082.223.21.224192.168.2.4
                                                            Mar 18, 2023 16:00:02.963968039 CET497218080192.168.2.4206.189.28.199
                                                            Mar 18, 2023 16:00:02.995054007 CET808049721206.189.28.199192.168.2.4
                                                            Mar 18, 2023 16:00:03.495625019 CET497218080192.168.2.4206.189.28.199
                                                            Mar 18, 2023 16:00:03.536531925 CET808049721206.189.28.199192.168.2.4
                                                            Mar 18, 2023 16:00:04.042516947 CET497218080192.168.2.4206.189.28.199
                                                            Mar 18, 2023 16:00:04.083252907 CET808049721206.189.28.199192.168.2.4
                                                            Mar 18, 2023 16:00:09.459182978 CET497228080192.168.2.4169.57.156.166
                                                            Mar 18, 2023 16:00:12.449493885 CET497228080192.168.2.4169.57.156.166
                                                            Mar 18, 2023 16:00:18.465661049 CET497228080192.168.2.4169.57.156.166
                                                            Mar 18, 2023 16:00:25.460607052 CET497238080192.168.2.4107.170.39.149
                                                            Mar 18, 2023 16:00:25.567009926 CET808049723107.170.39.149192.168.2.4
                                                            Mar 18, 2023 16:00:26.075587988 CET497238080192.168.2.4107.170.39.149
                                                            Mar 18, 2023 16:00:26.175313950 CET808049723107.170.39.149192.168.2.4
                                                            Mar 18, 2023 16:00:26.685185909 CET497238080192.168.2.4107.170.39.149
                                                            Mar 18, 2023 16:00:26.785379887 CET808049723107.170.39.149192.168.2.4
                                                            Mar 18, 2023 16:00:32.208268881 CET49724443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.208323002 CET44349724103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:32.208444118 CET49724443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.209636927 CET49724443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.209666967 CET44349724103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:32.495301962 CET44349724103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:32.496603012 CET49725443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.496659040 CET44349725103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:32.496797085 CET49725443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.498522997 CET49725443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.498543024 CET44349725103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:32.788578033 CET44349725103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:32.790932894 CET49726443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.791076899 CET44349726103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:32.791184902 CET49726443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.792073965 CET49726443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:32.792126894 CET44349726103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:33.080167055 CET44349726103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:33.081132889 CET49727443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:33.081198931 CET44349727103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:33.081309080 CET49727443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:33.082089901 CET49727443192.168.2.4103.43.75.120
                                                            Mar 18, 2023 16:00:33.082115889 CET44349727103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:33.371627092 CET44349727103.43.75.120192.168.2.4
                                                            Mar 18, 2023 16:00:38.713119030 CET497288080192.168.2.491.207.28.33
                                                            Mar 18, 2023 16:00:41.717679024 CET497288080192.168.2.491.207.28.33
                                                            Mar 18, 2023 16:00:47.733720064 CET497288080192.168.2.491.207.28.33
                                                            Mar 18, 2023 16:00:53.457463980 CET49729443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.457525969 CET44349729213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.457608938 CET49729443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.458457947 CET49729443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.458487988 CET44349729213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.483563900 CET44349729213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.484528065 CET49730443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.484595060 CET44349730213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.484688044 CET49730443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.490484953 CET49730443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.490525007 CET44349730213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.517394066 CET44349730213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.518778086 CET49731443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.518850088 CET44349731213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.518938065 CET49731443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.520023108 CET49731443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.520087957 CET44349731213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.545201063 CET44349731213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.546549082 CET49732443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.546617985 CET44349732213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.546742916 CET49732443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.548105001 CET49732443192.168.2.4213.239.212.5
                                                            Mar 18, 2023 16:00:53.548135996 CET44349732213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:53.574625015 CET44349732213.239.212.5192.168.2.4
                                                            Mar 18, 2023 16:00:58.958123922 CET497338080192.168.2.445.235.8.30
                                                            Mar 18, 2023 16:00:59.204256058 CET80804973345.235.8.30192.168.2.4
                                                            Mar 18, 2023 16:00:59.719082117 CET497338080192.168.2.445.235.8.30
                                                            Mar 18, 2023 16:00:59.963083982 CET80804973345.235.8.30192.168.2.4
                                                            Mar 18, 2023 16:01:00.469141006 CET497338080192.168.2.445.235.8.30
                                                            Mar 18, 2023 16:01:00.715471029 CET80804973345.235.8.30192.168.2.4
                                                            Mar 18, 2023 16:01:06.209254980 CET497348080192.168.2.4119.59.103.152
                                                            Mar 18, 2023 16:01:06.509252071 CET808049734119.59.103.152192.168.2.4
                                                            Mar 18, 2023 16:01:07.016586065 CET497348080192.168.2.4119.59.103.152
                                                            Mar 18, 2023 16:01:07.329204082 CET808049734119.59.103.152192.168.2.4
                                                            Mar 18, 2023 16:01:07.829144001 CET497348080192.168.2.4119.59.103.152
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Mar 18, 2023 15:57:44.642750978 CET8.8.8.8192.168.2.40x901aNo error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                            Mar 18, 2023 15:57:44.642750978 CET8.8.8.8192.168.2.40x901aNo error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                                                            • 164.90.222.65
                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            0192.168.2.449704164.90.222.65443C:\Windows\System32\regsvr32.exe
                                                            TimestampkBytes transferredDirectionData
                                                            2023-03-18 14:58:25 UTC0OUTPOST /nnukk/upfurpftd/ltwomnfleb/ HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Length: 0
                                                            Host: 164.90.222.65
                                                            2023-03-18 14:58:25 UTC0INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Sat, 18 Mar 2023 14:58:25 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            2023-03-18 14:58:25 UTC0INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:15:57:02
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\loaddll64.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:loaddll64.exe "C:\Users\user\Desktop\f_00321b.dll"
                                                            Imagebase:0x7ff73c1f0000
                                                            File size:139776 bytes
                                                            MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:1
                                                            Start time:15:57:02
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7c72c0000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:2
                                                            Start time:15:57:02
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1
                                                            Imagebase:0x7ff632260000
                                                            File size:273920 bytes
                                                            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Target ID:3
                                                            Start time:15:57:02
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\regsvr32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:regsvr32.exe /s C:\Users\user\Desktop\f_00321b.dll
                                                            Imagebase:0x7ff6746f0000
                                                            File size:24064 bytes
                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.319426857.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            Target ID:4
                                                            Start time:15:57:02
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\rundll32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:rundll32.exe "C:\Users\user\Desktop\f_00321b.dll",#1
                                                            Imagebase:0x7ff669490000
                                                            File size:69632 bytes
                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.320583141.0000024067ED1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.320487184.0000024067EA0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            Target ID:5
                                                            Start time:15:57:02
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\rundll32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:rundll32.exe C:\Users\user\Desktop\f_00321b.dll,DllRegisterServer
                                                            Imagebase:0x7ff669490000
                                                            File size:69632 bytes
                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.320938696.000001CAEF360000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.320983303.000001CAEF391000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            Target ID:6
                                                            Start time:15:57:04
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\regsvr32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZbmMPnDvLqwXll\QyzgcRWJYZS.dll"
                                                            Imagebase:0x7ff6746f0000
                                                            File size:24064 bytes
                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.839406801.0000000002031000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Emotet_3, Description: Yara detected Emotet, Source: 00000006.00000002.839010466.000000000072B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.839356776.0000000001FE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                                                            Target ID:7
                                                            Start time:15:57:05
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\regsvr32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\RymKYMmySRfU\EAqrfXJOpHznppsf.dll"
                                                            Imagebase:0x7ff6746f0000
                                                            File size:24064 bytes
                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            Target ID:8
                                                            Start time:15:57:05
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\regsvr32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IzuSuDitBV\QmEREbzuu.dll"
                                                            Imagebase:0x7ff6746f0000
                                                            File size:24064 bytes
                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            Target ID:10
                                                            Start time:15:57:50
                                                            Start date:18/03/2023
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7c72c0000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:8.5%
                                                              Dynamic/Decrypted Code Coverage:7.5%
                                                              Signature Coverage:6%
                                                              Total number of Nodes:332
                                                              Total number of Limit Nodes:11
                                                              execution_graph 8532 180001184 8539 180002a30 8532->8539 8535 180001191 8548 180002d5c 8539->8548 8542 180006cf0 8573 180007f30 GetLastError 8542->8573 8544 18000119a 8544->8535 8545 180002a44 8544->8545 8634 180002cf0 8545->8634 8547 180002a4f 8547->8535 8549 18000118d 8548->8549 8550 180002d7b GetLastError 8548->8550 8549->8535 8549->8542 8560 18000479c 8550->8560 8564 1800045bc 8560->8564 8565 1800046d6 TlsGetValue 8564->8565 8571 180004600 __vcrt_FlsAlloc 8564->8571 8566 18000462e LoadLibraryExW 8568 1800046a5 8566->8568 8569 18000464f GetLastError 8566->8569 8567 1800046c5 GetProcAddress 8567->8565 8568->8567 8570 1800046bc FreeLibrary 8568->8570 8569->8571 8570->8567 8571->8565 8571->8566 8571->8567 8572 180004671 LoadLibraryExW 8571->8572 8572->8568 8572->8571 8574 180007f71 FlsSetValue 8573->8574 8579 180007f54 8573->8579 8575 180007f83 8574->8575 8578 180007f61 SetLastError 8574->8578 8590 180008714 8575->8590 8578->8544 8579->8574 8579->8578 8581 180007fb0 FlsSetValue 8584 180007fbc FlsSetValue 8581->8584 8585 180007fce 8581->8585 8582 180007fa0 FlsSetValue 8583 180007fa9 8582->8583 8597 18000878c 8583->8597 8584->8583 8603 180007b24 8585->8603 8595 180008725 Concurrency::details::SchedulerProxy::DeleteThis 8590->8595 8591 18000875a RtlAllocateHeap 8593 180007f92 8591->8593 8591->8595 8592 180008776 8611 1800086f4 8592->8611 8593->8581 8593->8582 8595->8591 8595->8592 8608 18000abf8 8595->8608 8598 180008791 HeapFree 8597->8598 8599 1800087c0 8597->8599 8598->8599 8600 1800087ac GetLastError 8598->8600 8599->8578 8601 1800087b9 Concurrency::details::SchedulerProxy::DeleteThis 8600->8601 8602 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 9 API calls 8601->8602 8602->8599 8620 1800079fc 8603->8620 8614 18000ac38 8608->8614 8612 180007f30 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8611->8612 8613 1800086fd 8612->8613 8613->8593 8619 180008160 EnterCriticalSection 8614->8619 8632 180008160 EnterCriticalSection 8620->8632 8635 180002d04 8634->8635 8639 180002d1e __std_exception_copy 8634->8639 8636 180002d0e 8635->8636 8637 18000479c __vcrt_freeptd 6 API calls 8635->8637 8640 1800047e4 8636->8640 8637->8636 8639->8547 8641 1800045bc __vcrt_FlsAlloc 5 API calls 8640->8641 8642 180004812 8641->8642 8643 180004824 TlsSetValue 8642->8643 8644 18000481c 8642->8644 8643->8644 8644->8639 8678 180006554 8679 18000656d 8678->8679 8688 180006569 8678->8688 8693 180009cd8 8679->8693 8684 18000658b 8720 1800065c8 8684->8720 8685 18000657f 8686 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8685->8686 8686->8688 8690 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8691 1800065b2 8690->8691 8692 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8691->8692 8692->8688 8694 180006572 8693->8694 8695 180009ce5 8693->8695 8699 18000a234 GetEnvironmentStringsW 8694->8699 8739 180007e8c 8695->8739 8700 18000a264 8699->8700 8701 180006577 8699->8701 8702 18000a154 WideCharToMultiByte 8700->8702 8701->8684 8701->8685 8703 18000a2b5 8702->8703 8704 18000a2c7 8703->8704 8705 18000a2bc FreeEnvironmentStringsW 8703->8705 8706 18000b4c4 shared_ptr 12 API calls 8704->8706 8705->8701 8707 18000a2cf 8706->8707 8708 18000a2d7 8707->8708 8709 18000a2e0 8707->8709 8710 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8708->8710 8711 18000a154 WideCharToMultiByte 8709->8711 8712 18000a2de 8710->8712 8713 18000a303 8711->8713 8712->8705 8714 18000a311 8713->8714 8715 18000a307 8713->8715 8716 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8714->8716 8717 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8715->8717 8718 18000a30f FreeEnvironmentStringsW 8716->8718 8717->8718 8718->8701 8721 1800065ed 8720->8721 8722 180008714 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8721->8722 8723 180006623 8722->8723 8726 18000669e 8723->8726 8728 180008714 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8723->8728 8729 18000668d 8723->8729 8733 1800066c3 8723->8733 8736 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8723->8736 8737 18000662b 8723->8737 9119 180006e88 8723->9119 8724 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8725 180006593 8724->8725 8725->8690 8727 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8726->8727 8727->8725 8728->8723 9128 1800066d8 8729->9128 8735 1800085d8 _invalid_parameter_noinfo 17 API calls 8733->8735 8734 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8734->8737 8738 1800066d6 8735->8738 8736->8723 8737->8724 8740 180007eb8 FlsSetValue 8739->8740 8741 180007e9d FlsGetValue 8739->8741 8742 180007ec5 8740->8742 8743 180007eaa 8740->8743 8741->8743 8744 180007eb2 8741->8744 8746 180008714 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8742->8746 8747 180007eb0 8743->8747 8782 180006e28 8743->8782 8744->8740 8749 180007ed4 8746->8749 8759 1800099b0 8747->8759 8750 180007ef2 FlsSetValue 8749->8750 8751 180007ee2 FlsSetValue 8749->8751 8753 180007efe FlsSetValue 8750->8753 8754 180007f10 8750->8754 8752 180007eeb 8751->8752 8755 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8752->8755 8753->8752 8756 180007b24 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8754->8756 8755->8743 8757 180007f18 8756->8757 8758 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8757->8758 8758->8747 8960 180009c20 8759->8960 8761 1800099e5 8975 1800096b0 8761->8975 8764 180009a02 8764->8694 8766 180009a13 8767 180009a1b 8766->8767 8769 180009a2a 8766->8769 8768 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8767->8768 8768->8764 8769->8769 8989 180009d54 8769->8989 8772 180009b26 8773 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8772->8773 8775 180009b2b 8773->8775 8774 180009b81 8778 180009be8 8774->8778 9000 1800094e0 8774->9000 8776 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8775->8776 8776->8764 8777 180009b40 8777->8774 8779 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8777->8779 8781 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8778->8781 8779->8774 8781->8764 8791 18000acb8 8782->8791 8825 18000ac70 8791->8825 8830 180008160 EnterCriticalSection 8825->8830 8961 180009c43 8960->8961 8963 180009c4d 8961->8963 9015 180008160 EnterCriticalSection 8961->9015 8964 180009cbf 8963->8964 8967 180006e28 __CxxCallCatchBlock 47 API calls 8963->8967 8964->8761 8968 180009cd7 8967->8968 8971 180009d2a 8968->8971 8972 180007e8c 52 API calls 8968->8972 8971->8761 8973 180009d14 8972->8973 8974 1800099b0 67 API calls 8973->8974 8974->8971 9016 1800091fc 8975->9016 8978 1800096e2 8980 1800096f7 8978->8980 8981 1800096e7 GetACP 8978->8981 8979 1800096d0 GetOEMCP 8979->8980 8980->8764 8982 18000b4c4 8980->8982 8981->8980 8983 18000b50f 8982->8983 8987 18000b4d3 Concurrency::details::SchedulerProxy::DeleteThis 8982->8987 8984 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 8983->8984 8986 18000b50d 8984->8986 8985 18000b4f6 HeapAlloc 8985->8986 8985->8987 8986->8766 8987->8983 8987->8985 8988 18000abf8 Concurrency::details::SchedulerProxy::DeleteThis 2 API calls 8987->8988 8988->8987 8990 1800096b0 49 API calls 8989->8990 8991 180009d81 8990->8991 8992 180009ed7 8991->8992 8994 180009dbe IsValidCodePage 8991->8994 8999 180009dd8 __CxxCallCatchBlock 8991->8999 8993 1800010b0 _log10_special 8 API calls 8992->8993 8995 180009b1d 8993->8995 8994->8992 8996 180009dcf 8994->8996 8995->8772 8995->8777 8997 180009dfe GetCPInfo 8996->8997 8996->8999 8997->8992 8997->8999 9032 1800097c8 8999->9032 9118 180008160 EnterCriticalSection 9000->9118 9017 18000921b 9016->9017 9018 180009220 9016->9018 9017->8978 9017->8979 9018->9017 9019 180007db8 __CxxCallCatchBlock 47 API calls 9018->9019 9020 18000923b 9019->9020 9024 18000b524 9020->9024 9025 18000b539 9024->9025 9026 18000925e 9024->9026 9025->9026 9027 18000bfb4 _invalid_parameter_noinfo 47 API calls 9025->9027 9028 18000b590 9026->9028 9027->9026 9029 18000b5a5 9028->9029 9031 18000b5b8 9028->9031 9030 180009d38 _invalid_parameter_noinfo 47 API calls 9029->9030 9029->9031 9030->9031 9031->9017 9033 180009805 GetCPInfo 9032->9033 9034 1800098fb 9032->9034 9033->9034 9039 180009818 9033->9039 9035 1800010b0 _log10_special 8 API calls 9034->9035 9036 18000999a 9035->9036 9036->8992 9043 18000caa4 9039->9043 9044 1800091fc 47 API calls 9043->9044 9045 18000cae6 9044->9045 9063 18000a0c4 9045->9063 9065 18000a0cd MultiByteToWideChar 9063->9065 9120 180006e9f 9119->9120 9121 180006e95 9119->9121 9122 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9120->9122 9121->9120 9126 180006eba 9121->9126 9123 180006ea6 9122->9123 9124 1800085b8 _invalid_parameter_noinfo 47 API calls 9123->9124 9125 180006eb2 9124->9125 9125->8723 9126->9125 9127 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9126->9127 9127->9123 9129 1800066dd 9128->9129 9133 180006695 9128->9133 9130 180006706 9129->9130 9131 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9129->9131 9132 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9130->9132 9131->9129 9132->9133 9133->8734 8645 2304214 8646 2304256 8645->8646 8649 2313988 8646->8649 8648 23044c6 8651 2313a29 8649->8651 8650 2313acc CreateProcessW 8650->8648 8651->8650 9134 180001138 9135 180001141 __scrt_acquire_startup_lock 9134->9135 9137 180001145 9135->9137 9138 1800063cc 9135->9138 9139 1800063ec 9138->9139 9140 180006403 9138->9140 9141 1800063f4 9139->9141 9142 18000640a 9139->9142 9140->9137 9144 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9141->9144 9143 180009cd8 67 API calls 9142->9143 9145 18000640f 9143->9145 9146 1800063f9 9144->9146 9170 1800093bc GetModuleFileNameW 9145->9170 9148 1800085b8 _invalid_parameter_noinfo 47 API calls 9146->9148 9148->9140 9154 180006481 9157 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9154->9157 9155 180006499 9156 1800061a4 47 API calls 9155->9156 9163 1800064b5 9156->9163 9158 180006486 9157->9158 9160 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9158->9160 9159 1800064bb 9162 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9159->9162 9161 180006494 9160->9161 9161->9140 9162->9140 9163->9159 9164 1800064e7 9163->9164 9165 180006500 9163->9165 9166 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9164->9166 9168 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9165->9168 9167 1800064f0 9166->9167 9169 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9167->9169 9168->9159 9169->9161 9171 180009401 GetLastError 9170->9171 9172 180009415 9170->9172 9194 180008668 9171->9194 9174 1800091fc 47 API calls 9172->9174 9176 180009443 9174->9176 9175 18000940e 9177 1800010b0 _log10_special 8 API calls 9175->9177 9181 180009454 9176->9181 9199 18000a5f0 9176->9199 9180 180006426 9177->9180 9182 1800061a4 9180->9182 9202 1800092a0 9181->9202 9184 1800061e2 9182->9184 9186 18000624e 9184->9186 9216 18000a088 9184->9216 9185 18000633f 9188 18000636c 9185->9188 9186->9185 9187 18000a088 47 API calls 9186->9187 9187->9186 9189 1800063bc 9188->9189 9190 180006384 9188->9190 9189->9154 9189->9155 9190->9189 9191 180008714 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9190->9191 9192 1800063b2 9191->9192 9193 18000878c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9192->9193 9193->9189 9195 180007f30 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9194->9195 9196 180008675 Concurrency::details::SchedulerProxy::DeleteThis 9195->9196 9197 180007f30 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9196->9197 9198 180008697 9197->9198 9198->9175 9200 18000a3dc 5 API calls 9199->9200 9201 18000a610 9200->9201 9201->9181 9203 1800092df 9202->9203 9204 1800092c4 9202->9204 9205 18000a154 WideCharToMultiByte 9203->9205 9209 1800092e4 9203->9209 9204->9175 9206 18000933b 9205->9206 9208 180009342 GetLastError 9206->9208 9206->9209 9210 18000936d 9206->9210 9207 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9207->9204 9211 180008668 11 API calls 9208->9211 9209->9204 9209->9207 9213 18000a154 WideCharToMultiByte 9210->9213 9212 18000934f 9211->9212 9214 1800086f4 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 9212->9214 9215 180009394 9213->9215 9214->9204 9215->9204 9215->9208 9217 18000a014 9216->9217 9218 1800091fc 47 API calls 9217->9218 9219 18000a038 9218->9219 9219->9184 8652 22a0000 8653 22a015a 8652->8653 8654 22a033f GetNativeSystemInfo 8653->8654 8658 22a08eb 8653->8658 8655 22a0377 VirtualAlloc 8654->8655 8654->8658 8656 22a0395 VirtualAlloc 8655->8656 8661 22a03aa 8655->8661 8656->8661 8657 22a0873 8657->8658 8659 22a08c6 RtlAddFunctionTable 8657->8659 8659->8658 8660 22a084b VirtualProtect 8660->8661 8661->8657 8661->8660 8661->8661 8662 180010a8e ExitProcess 8665 180014c90 LoadStringW LoadStringW 8662->8665 8674 1800109d0 LoadCursorW RegisterClassExW 8665->8674 8667 180014cec 8675 180010910 CreateWindowExW 8667->8675 8669 180014cfa 8670 180014d02 GetMessageW 8669->8670 8671 180010ab3 8669->8671 8670->8671 8672 180014d19 TranslateAcceleratorW 8670->8672 8672->8669 8673 180014d2f TranslateMessage DispatchMessageW 8672->8673 8673->8669 8674->8667 8676 1800109a1 ShowWindow UpdateWindow 8675->8676 8677 18001099d 8675->8677 8676->8677 8677->8669 9220 23080cc 9222 23080f3 9220->9222 9221 23082ba 9222->9221 9224 231e9e8 9222->9224 9227 2308bc8 9224->9227 9226 231eab4 9226->9222 9229 2308c02 9227->9229 9228 2308eb8 9228->9226 9229->9228 9230 2308d6f Process32FirstW 9229->9230 9230->9229

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 22a0000-22a029a call 22a091c * 2 13 22a02a0-22a02a4 0->13 14 22a0905 0->14 13->14 16 22a02aa-22a02ae 13->16 15 22a0907-22a091a 14->15 16->14 17 22a02b4-22a02b8 16->17 17->14 18 22a02be-22a02c5 17->18 18->14 19 22a02cb-22a02dc 18->19 19->14 20 22a02e2-22a02eb 19->20 20->14 21 22a02f1-22a02fc 20->21 21->14 22 22a0302-22a0312 21->22 23 22a033f-22a0371 GetNativeSystemInfo 22->23 24 22a0314-22a031a 22->24 23->14 25 22a0377-22a0393 VirtualAlloc 23->25 26 22a031c-22a0324 24->26 27 22a03aa-22a03ae 25->27 28 22a0395-22a03a8 VirtualAlloc 25->28 29 22a032c-22a032d 26->29 30 22a0326-22a032a 26->30 31 22a03dc-22a03e3 27->31 32 22a03b0-22a03c2 27->32 28->27 33 22a032f-22a033d 29->33 30->33 35 22a03fb-22a0417 31->35 36 22a03e5-22a03f9 31->36 34 22a03d4-22a03d8 32->34 33->23 33->26 37 22a03da 34->37 38 22a03c4-22a03d1 34->38 39 22a0458-22a0465 35->39 40 22a0419-22a041a 35->40 36->35 36->36 37->35 38->34 41 22a046b-22a0472 39->41 42 22a0537-22a0542 39->42 43 22a041c-22a0422 40->43 41->42 46 22a0478-22a0485 41->46 44 22a0548-22a0559 42->44 45 22a06e6-22a06ed 42->45 47 22a0448-22a0456 43->47 48 22a0424-22a0446 43->48 49 22a0562-22a0565 44->49 51 22a07ac-22a07c3 45->51 52 22a06f3-22a0707 45->52 46->42 50 22a048b-22a048f 46->50 47->39 47->43 48->47 48->48 53 22a055b-22a055f 49->53 54 22a0567-22a0574 49->54 55 22a051b-22a0525 50->55 58 22a087a-22a088d 51->58 59 22a07c9-22a07cd 51->59 56 22a07a9-22a07aa 52->56 57 22a070d 52->57 53->49 60 22a057a-22a057d 54->60 61 22a060d-22a0619 54->61 64 22a052b-22a0531 55->64 65 22a0494-22a04a8 55->65 56->51 62 22a0712-22a0736 57->62 80 22a088f-22a089a 58->80 81 22a08b3-22a08ba 58->81 63 22a07d0-22a07d3 59->63 60->61 68 22a0583-22a059b 60->68 72 22a061f 61->72 73 22a06e2-22a06e3 61->73 89 22a0738-22a073e 62->89 90 22a0796-22a079f 62->90 70 22a07d9-22a07e9 63->70 71 22a085f-22a086d 63->71 64->42 64->50 66 22a04aa-22a04cd 65->66 67 22a04cf-22a04d3 65->67 75 22a0518-22a0519 66->75 76 22a04e3-22a04e7 67->76 77 22a04d5-22a04e1 67->77 68->61 78 22a059d-22a059e 68->78 82 22a07eb-22a07ed 70->82 83 22a080d-22a080f 70->83 71->63 74 22a0873-22a0874 71->74 84 22a0625-22a0648 72->84 73->45 74->58 75->55 87 22a04e9-22a04fc 76->87 88 22a04fe-22a0502 76->88 85 22a0511-22a0515 77->85 86 22a05a0-22a0605 78->86 91 22a08ab-22a08b1 80->91 94 22a08eb-22a0903 81->94 95 22a08bc-22a08c4 81->95 92 22a07fb-22a080b 82->92 93 22a07ef-22a07f9 82->93 96 22a0822-22a082b 83->96 97 22a0811-22a0820 83->97 113 22a064a-22a064b 84->113 114 22a06b2-22a06b7 84->114 85->75 86->86 101 22a0607 86->101 87->85 88->75 99 22a0504-22a050e 88->99 102 22a0748-22a0754 89->102 103 22a0740-22a0746 89->103 90->62 98 22a07a5-22a07a6 90->98 91->81 104 22a089c-22a08a8 91->104 100 22a082e-22a083d 92->100 93->100 94->15 95->94 106 22a08c6-22a08e9 RtlAddFunctionTable 95->106 96->100 97->100 98->56 99->85 107 22a084b-22a085c VirtualProtect 100->107 108 22a083f-22a0845 100->108 101->61 111 22a0756-22a0757 102->111 112 22a0764-22a0776 102->112 110 22a077b-22a078d 103->110 104->91 106->94 107->71 108->107 110->90 125 22a078f-22a0794 110->125 118 22a0759-22a0762 111->118 112->110 119 22a064e-22a0651 113->119 115 22a06b9-22a06bd 114->115 116 22a06ce-22a06d8 114->116 115->116 124 22a06bf-22a06c3 115->124 116->84 120 22a06de-22a06df 116->120 118->112 118->118 122 22a065b-22a0666 119->122 123 22a0653-22a0659 119->123 120->73 127 22a0668-22a0669 122->127 128 22a0676-22a0688 122->128 126 22a068d-22a06a3 123->126 124->116 129 22a06c5 124->129 125->89 132 22a06ac 126->132 133 22a06a5-22a06aa 126->133 130 22a066b-22a0674 127->130 128->126 129->116 130->128 130->130 132->114 133->119
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319390673.00000000022A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_22a0000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                              • String ID: Cach$Flus$GetN$Libr$Load$RtlA$Slee$Virt$Virt$aryA$ativ$ct$ddFu$eSys$hIns$lloc$ncti$nf$o$onTa$rote$temI$tion$truc$ualA$ualP
                                                              • API String ID: 394283112-3605381585
                                                              • Opcode ID: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction ID: 675c05fbcb6c2539dfea781731734114a8fdeb898dbb97373c7052136746ac93
                                                              • Opcode Fuzzy Hash: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction Fuzzy Hash: 36522530A28B498BD719DF58C8957BAB7F0FB84304F14462DE88BC7615DB34E646CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #Vk$$$8$U[$W(P$_L$_o$k|$xD
                                                              • API String ID: 0-383957222
                                                              • Opcode ID: 3fcaeefa4f3a6a4b2ee736f46ed5ab809e6beb52b42741c15c6946b5de4ec314
                                                              • Instruction ID: 9395ff1f64a69c37675acd386a46e3f38be87d11f77e739b7fa7a9b9771cc80b
                                                              • Opcode Fuzzy Hash: 3fcaeefa4f3a6a4b2ee736f46ed5ab809e6beb52b42741c15c6946b5de4ec314
                                                              • Instruction Fuzzy Hash: 72C1DD71519780AFD398CF28C58A91BBBF1FBD4754F906A1DF88286260D7B4D909CF02
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: AccessAllocateFindMemoryResourceResource_Virtual
                                                              • String ID: @$LXGUM$ad5zS&E7DS(ke9?+qbAC5tqx<Y<h0!QB4H3bk
                                                              • API String ID: 2485490239-3005932707
                                                              • Opcode ID: 72763dadedb1f7e12bf326a7682b4cc9f3b8809a7beac6fa455c8e22944c1181
                                                              • Instruction ID: 10e411743ffb1a55a6adb62272a00c62f4f605c25ab8d9ba5168281e261d5f46
                                                              • Opcode Fuzzy Hash: 72763dadedb1f7e12bf326a7682b4cc9f3b8809a7beac6fa455c8e22944c1181
                                                              • Instruction Fuzzy Hash: 0F41F976218B8486D795CB14F49039AB7B4F388794F505116FADA83BA8DF7DC608CB00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 282 2307d6c-2307d9a 283 2307d9c-2307da4 282->283 284 230804a-23080a9 call 231a474 283->284 285 2307daa-2307dad 283->285 295 23080b5 284->295 296 23080ab-23080b0 284->296 287 2307db3-2307db9 285->287 288 2307ff4-2308045 call 2316048 285->288 291 2307f53-2307fef call 231fdcc 287->291 292 2307dbf-2307dc5 287->292 288->283 291->283 297 23080ba-23080c0 292->297 298 2307dcb-2307ec1 call 231bb78 292->298 295->297 296->283 301 2307f40-2307f52 297->301 302 23080c6 297->302 303 2307ec6-2307ecc 298->303 302->283 304 2307ece-2307ed5 303->304 305 2307edf-2307f3b call 2318f30 303->305 304->305 305->301
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: )s$)y_$3`d!$GX$lo$=
                                                              • API String ID: 0-308291206
                                                              • Opcode ID: fde852a4840d2e352ca3eb00ee2f42bd1f44b3ef619014c8955ce582878b56b5
                                                              • Instruction ID: 0b12b38b0132f5880821e44069736d3d5815bf01dcde675ac41f9459a298fdd9
                                                              • Opcode Fuzzy Hash: fde852a4840d2e352ca3eb00ee2f42bd1f44b3ef619014c8955ce582878b56b5
                                                              • Instruction Fuzzy Hash: 7091487150074A8BDB48CF28C89A4DE3FB1FB58398F65422DEC4AA6290D778D695CFC4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 307 231a000-231a0cc call 2319f38 call 2312404 312 231a0d2-231a16a call 2319424 307->312 313 231a22c-231a243 307->313 315 231a16f-231a227 call 231c2c0 312->315 315->313
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: /Q$;$F8$KT$F$Z
                                                              • API String ID: 0-1951868783
                                                              • Opcode ID: 1dba0b1f5f7bf25f1a94850d34f322108ec8c8f6f4ebff0ec6ff6f465611ff96
                                                              • Instruction ID: 6bb242c8c4b1491bd188f4997aaebc56cde48f370403adcacb38e93c125aa59b
                                                              • Opcode Fuzzy Hash: 1dba0b1f5f7bf25f1a94850d34f322108ec8c8f6f4ebff0ec6ff6f465611ff96
                                                              • Instruction Fuzzy Hash: 3A6146B0E147098FCB48CFA8D88A8DEBBB1FB58314F10821DE846A7290D7749995CFD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              C-Code - Quality: 37%
                                                              			E00000001180010AC0(long long _a8, intOrPtr _a16, long long _a24) {
                                                              				long long _v32;
                                                              				long long _v40;
                                                              				intOrPtr _v48;
                                                              				intOrPtr _v52;
                                                              				intOrPtr _v56;
                                                              				intOrPtr _t15;
                                                              				long long _t19;
                                                              				long long _t20;
                                                              
                                                              				_a24 = _t20;
                                                              				_a16 = _t15;
                                                              				_a8 = _t19;
                                                              				_v56 = _a16;
                                                              				if (_v56 == 1) goto 0x80010ae6;
                                                              				goto 0x80010bf4;
                                                              				 *0x80022ca0 = _a8;
                                                              				_v52 = 0x904;
                                                              				_v48 = 0xf9e;
                                                              				_v40 = 0;
                                                              				_v32 = 0;
                                                              				if (E00000001180010DB0(_a16) == 0) goto 0x80010b28;
                                                              				ExitProcess(??);
                                                              			}











                                                              0x180010ac0
                                                              0x180010ac5
                                                              0x180010ac9
                                                              0x180010ad6
                                                              0x180010adf
                                                              0x180010ae1
                                                              0x180010aeb
                                                              0x180010af2
                                                              0x180010afa
                                                              0x180010b02
                                                              0x180010b0b
                                                              0x180010b1b
                                                              0x180010b22

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess
                                                              • String ID:
                                                              • API String ID: 621844428-0
                                                              • Opcode ID: e7061396d7e3d43570edbd3d19f5eed90c055825c823b852da9f6b8b51899770
                                                              • Instruction ID: 35b30a5bd3bbc3bfa3955963e6b6c4c9d1147ff83b5bb424c40f1a31c42fa1fb
                                                              • Opcode Fuzzy Hash: e7061396d7e3d43570edbd3d19f5eed90c055825c823b852da9f6b8b51899770
                                                              • Instruction Fuzzy Hash: AE311671119B489AE782DF54F85438AB7A0F7983D4F608215F6A907BA4CFBDC24CCB40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 358 230cc14-230cc36 359 230cc40 358->359 360 230cc42-230cc48 359->360 361 230cfbb-230d136 call 232826c call 2301718 360->361 362 230cc4e-230cc54 360->362 375 230d138 361->375 376 230d13d-230d314 call 2301718 call 2321ac4 361->376 364 230cfb1-230cfb6 362->364 365 230cc5a-230cc60 362->365 364->360 367 230cc66-230cc73 365->367 368 230d31f-230d325 365->368 371 230ccb0-230cccb 367->371 372 230cc75-230ccae 367->372 368->360 369 230d32b-230d338 368->369 374 230ccd5-230cf8f call 2308870 call 2301718 call 2321ac4 371->374 372->374 388 230cf94-230cf9c 374->388 375->376 376->359 386 230d31a 376->386 386->368 388->369 389 230cfa2-230cfac 388->389
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0c$\$c2&
                                                              • API String ID: 0-1001447681
                                                              • Opcode ID: 77759940156d6b552e519a0717cd81e7aca00c005acef3af4df6aa899143340c
                                                              • Instruction ID: ef47302f9876923395361aaba8ac6986a8a85f53a5c91c1d92a28c3253a64026
                                                              • Opcode Fuzzy Hash: 77759940156d6b552e519a0717cd81e7aca00c005acef3af4df6aa899143340c
                                                              • Instruction Fuzzy Hash: C202E6715083C88BDBBECF64C889ADE7BADFB44708F10521DEA4A9E298DB745744CB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 390 2308bc8-2308c26 call 2319f38 393 2308c2b-2308c30 390->393 394 2308c36-2308c3b 393->394 395 2308e8a-2308e9a call 2302c08 393->395 396 2308c41-2308c43 394->396 397 2308e7b-2308e85 394->397 404 2308ea6 395->404 405 2308e9c-2308ea1 395->405 399 2308eb8-2308f90 call 231c2c0 396->399 400 2308c49-2308c4e 396->400 397->393 410 2308f95-2308fad 399->410 402 2308d71-2308e5f call 23152c0 400->402 403 2308c54-2308c59 400->403 415 2308e64-2308e6b 402->415 407 2308d10-2308d6a call 2318d60 403->407 408 2308c5f-2308c64 403->408 409 2308ea8-2308ead 404->409 405->393 417 2308d6f Process32FirstW 407->417 408->409 412 2308c6a-2308cfb call 231bf94 408->412 409->410 413 2308eb3 409->413 419 2308d00-2308d0b 412->419 413->393 415->410 418 2308e71-2308e76 415->418 417->402 418->393 419->393
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .f$M$N5
                                                              • API String ID: 0-1477915503
                                                              • Opcode ID: 8d1225c7070edb932c8417e1bce8c420d426fdb0b99d3cf29e08fc417a96cbbc
                                                              • Instruction ID: bf851f04863a6550d4edf06ded97e0a4aac5dd343262cdcdce08fde426ea4fc5
                                                              • Opcode Fuzzy Hash: 8d1225c7070edb932c8417e1bce8c420d426fdb0b99d3cf29e08fc417a96cbbc
                                                              • Instruction Fuzzy Hash: 27A170701197449FD7A8DF28C8C959EBBF1FB84704F906A1EF8869B2A0CB74D945CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 464 2318fc8-2318ff9 call 2319f38 467 2319000 464->467 468 2319005-231900b 467->468 469 2319011-2319017 468->469 470 2319354-23193f0 call 231464c 468->470 472 2319134-2319235 call 231eac0 call 2321684 469->472 473 231901d-2319023 469->473 478 23193f5 470->478 486 231923a-231934f call 23087dc 472->486 475 2319029-231902b 473->475 476 231912a-231912f 473->476 479 2319031-2319125 call 23149b0 475->479 480 23193fa-2319400 475->480 476->468 478->480 479->467 480->468 482 2319406-2319421 480->482 486->478
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: A]jN
                                                              • API String ID: 0-1761522205
                                                              • Opcode ID: 43702ad7ebc926fc841c635a5fc759035faaa4ad2df4e1132c12a3653d9fa51d
                                                              • Instruction ID: ad7527d1eee0774eea9160ad1add39826d08a3bc58c542c981c148fbcb17e637
                                                              • Opcode Fuzzy Hash: 43702ad7ebc926fc841c635a5fc759035faaa4ad2df4e1132c12a3653d9fa51d
                                                              • Instruction Fuzzy Hash: D7D1F4B1D0060A8FDF48DFA8C49A4AEBBB1FB58304F11462DD516BB290D7789A46CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: C
                                                              • API String ID: 0-3705061908
                                                              • Opcode ID: 762938c9acd95b28f04d4807fb9ee99926cdc57d0bffae28badc71fa18101beb
                                                              • Instruction ID: 9f60f0b86f0d926e12387810d596ab79f32444e5a7bcf60bba11998541009d2f
                                                              • Opcode Fuzzy Hash: 762938c9acd95b28f04d4807fb9ee99926cdc57d0bffae28badc71fa18101beb
                                                              • Instruction Fuzzy Hash: EE61CE7151C7848BD768DF28C19940FBBF1FBD6748F000A1DE69A862A0D7B6E958CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 134 18000147c-180001482 135 180001484-180001487 134->135 136 1800014bd-1800014c7 134->136 138 1800014b1-1800014f0 call 180001268 135->138 139 180001489-18000148c 135->139 137 1800015e4-1800015f9 136->137 140 180001608-180001622 call 1800010fc 137->140 141 1800015fb 137->141 157 1800014f6-18000150b call 1800010fc 138->157 158 1800015be 138->158 143 1800014a4 __scrt_dllmain_crt_thread_attach 139->143 144 18000148e-180001491 139->144 155 180001624-180001659 call 180001224 call 180001e54 call 180001ed0 call 1800013d8 call 1800013fc call 180001254 140->155 156 18000165b-18000168c call 180001c48 140->156 147 1800015fd-180001607 141->147 149 1800014a9-1800014b0 143->149 145 180001493-18000149c 144->145 146 18000149d-1800014a2 call 1800011ac 144->146 146->149 155->147 166 18000169d-1800016a3 156->166 167 18000168e-180001694 156->167 169 180001511-180001522 call 18000116c 157->169 170 1800015d6-1800015e3 call 180001c48 157->170 161 1800015c0-1800015d5 158->161 172 1800016a5-1800016af 166->172 173 1800016ea-1800016f2 call 180010ac0 166->173 167->166 171 180001696-180001698 167->171 184 180001573-18000157d call 1800013d8 169->184 185 180001524-180001548 call 180001e94 call 180001e44 call 180001e70 call 180006da0 169->185 170->137 179 18000178b-180001798 171->179 180 1800016b1-1800016b9 172->180 181 1800016bb-1800016c9 172->181 186 1800016f7-180001700 173->186 187 1800016cf-1800016d7 call 18000147c 180->187 181->187 201 180001781-180001789 181->201 184->158 204 18000157f-18000158b call 180001e8c 184->204 185->184 234 18000154a-180001551 __scrt_dllmain_after_initialize_c 185->234 190 180001702-180001704 186->190 191 180001738-18000173a 186->191 203 1800016dc-1800016e4 187->203 190->191 198 180001706-180001728 call 180010ac0 call 1800015e4 190->198 199 180001741-180001756 call 18000147c 191->199 200 18000173c-18000173f 191->200 198->191 229 18000172a-18000172f 198->229 199->201 215 180001758-180001762 199->215 200->199 200->201 201->179 203->173 203->201 223 1800015b1-1800015bc 204->223 224 18000158d-180001597 call 180001340 204->224 220 180001764-18000176b 215->220 221 18000176d-18000177d 215->221 220->201 221->201 223->161 224->223 233 180001599-1800015a7 224->233 229->191 233->223 234->184 235 180001553-180001570 call 180006d5c 234->235 235->184
                                                              C-Code - Quality: 100%
                                                              			E0000000118000147C(void* __edx) {
                                                              				void* _t5;
                                                              
                                                              				_t5 = __edx;
                                                              				if (_t5 == 0) goto 0x800014bd;
                                                              				if (_t5 == 0) goto 0x800014b1;
                                                              				if (_t5 == 0) goto 0x800014a4;
                                                              				if (__edx == 1) goto 0x8000149d;
                                                              				return 1;
                                                              			}




                                                              0x180001480
                                                              0x180001482
                                                              0x180001487
                                                              0x18000148c
                                                              0x180001491
                                                              0x18000149c

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: f481a242433e045de9421f6a540d64c2f1c4067185df5e2b4ea36506bf633cb0
                                                              • Instruction ID: c036cf0e1e542974e7afb98f421e14e504817ee7e551922961311e630d73ddb8
                                                              • Opcode Fuzzy Hash: f481a242433e045de9421f6a540d64c2f1c4067185df5e2b4ea36506bf633cb0
                                                              • Instruction Fuzzy Hash: 5881C370A04A4DCEFBD7DB65A8413D932A0AB9D7C2F54C125B909477A6DF38C74D8700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,0000F101478280A5,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007F3F
                                                              • FlsSetValue.KERNEL32(?,?,0000F101478280A5,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007F75
                                                              • FlsSetValue.KERNEL32(?,?,0000F101478280A5,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FA2
                                                              • FlsSetValue.KERNEL32(?,?,0000F101478280A5,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FB3
                                                              • FlsSetValue.KERNEL32(?,?,0000F101478280A5,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FC4
                                                              • SetLastError.KERNEL32(?,?,0000F101478280A5,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FDF
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: eb8af4af359d96366aaa10eae491533e56ca08d7f11ac2249f998e933b1e40b3
                                                              • Instruction ID: b3640c739d53f521f3aff5ec24f9b4829142f54ff52cb57a8f227eaee239dcc8
                                                              • Opcode Fuzzy Hash: eb8af4af359d96366aaa10eae491533e56ca08d7f11ac2249f998e933b1e40b3
                                                              • Instruction Fuzzy Hash: 72115C3070964942FAEBE32195453F972926B9C7F0F18C625B83A077DBDE68C6498701
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              C-Code - Quality: 48%
                                                              			E0000000118000A234(void* __ebp, long long __rbx, long long __rdi, long long __rsi) {
                                                              				void* _t25;
                                                              				signed long long _t45;
                                                              				signed long long _t47;
                                                              				long long _t62;
                                                              				signed long long _t63;
                                                              				signed long long _t70;
                                                              				void* _t71;
                                                              				void* _t75;
                                                              				WCHAR* _t76;
                                                              
                                                              				_t45 = _t70;
                                                              				 *((long long*)(_t45 + 8)) = __rbx;
                                                              				 *((long long*)(_t45 + 0x10)) = _t62;
                                                              				 *((long long*)(_t45 + 0x18)) = __rsi;
                                                              				 *((long long*)(_t45 + 0x20)) = __rdi;
                                                              				_t71 = _t70 - 0x40; // executed
                                                              				GetEnvironmentStringsW(); // executed
                                                              				if (_t45 != 0) goto 0x8000a264;
                                                              				goto 0x8000a327;
                                                              				_t63 = _t45;
                                                              				if ( *_t45 == 0) goto 0x8000a289;
                                                              				_t47 = (_t45 | 0xffffffff) + 1;
                                                              				if ( *((intOrPtr*)(_t63 + _t47 * 2)) != 0) goto 0x8000a270;
                                                              				if ( *((intOrPtr*)(_t63 + _t47 * 2 + 2)) != 0) goto 0x8000a26c;
                                                              				 *((long long*)(_t71 + 0x38)) = __rsi;
                                                              				 *((long long*)(_t71 + 0x30)) = __rsi;
                                                              				r9d = __ebp;
                                                              				 *((intOrPtr*)(_t71 + 0x28)) = 0;
                                                              				 *(_t71 + 0x20) = __rsi;
                                                              				E0000000118000A154();
                                                              				if (0 != 0) goto 0x8000a2c7;
                                                              				FreeEnvironmentStringsW(_t76);
                                                              				goto 0x8000a25d;
                                                              				E0000000118000B4C4(_t47, 0, _t75);
                                                              				_t57 = _t47;
                                                              				if (_t47 != 0) goto 0x8000a2e0;
                                                              				_t25 = E0000000118000878C(_t47, 0);
                                                              				goto 0x8000a2bc;
                                                              				 *((long long*)(_t71 + 0x38)) = __rsi;
                                                              				r9d = __ebp;
                                                              				 *((long long*)(_t71 + 0x30)) = __rsi;
                                                              				 *((intOrPtr*)(_t71 + 0x28)) = r14d;
                                                              				 *(_t71 + 0x20) = _t47;
                                                              				E0000000118000A154();
                                                              				if (_t25 != 0) goto 0x8000a311;
                                                              				E0000000118000878C(_t47, _t47);
                                                              				goto 0x8000a31b;
                                                              				E0000000118000878C(_t47, _t57);
                                                              				return FreeEnvironmentStringsW(??);
                                                              			}












                                                              0x18000a234
                                                              0x18000a237
                                                              0x18000a23b
                                                              0x18000a23f
                                                              0x18000a243
                                                              0x18000a249
                                                              0x18000a24d
                                                              0x18000a25b
                                                              0x18000a25f
                                                              0x18000a264
                                                              0x18000a26a
                                                              0x18000a270
                                                              0x18000a278
                                                              0x18000a287
                                                              0x18000a289
                                                              0x18000a291
                                                              0x18000a2a0
                                                              0x18000a2a3
                                                              0x18000a2a9
                                                              0x18000a2b0
                                                              0x18000a2ba
                                                              0x18000a2bf
                                                              0x18000a2c5
                                                              0x18000a2ca
                                                              0x18000a2cf
                                                              0x18000a2d5
                                                              0x18000a2d9
                                                              0x18000a2de
                                                              0x18000a2e0
                                                              0x18000a2e5
                                                              0x18000a2e8
                                                              0x18000a2f0
                                                              0x18000a2f9
                                                              0x18000a2fe
                                                              0x18000a305
                                                              0x18000a30a
                                                              0x18000a30f
                                                              0x18000a313
                                                              0x18000a341

                                                              APIs
                                                              • GetEnvironmentStringsW.KERNELBASE(?,?,?,?,?,?,?,0000000180006577), ref: 000000018000A24D
                                                              • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,0000000180006577), ref: 000000018000A2BF
                                                                • Part of subcall function 000000018000B4C4: HeapAlloc.KERNEL32(?,?,?,000000018000D071,?,?,00000000,000000018000A3A3,?,?,?,00000001800068CF,?,?,?,00000001800067C5), ref: 000000018000B502
                                                              • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,0000000180006577), ref: 000000018000A31E
                                                                • Part of subcall function 000000018000878C: HeapFree.KERNEL32(?,?,00000000,000000018000E6BE,?,?,?,000000018000E6FB,?,?,00000000,000000018000BED5,?,?,?,000000018000BE07), ref: 00000001800087A2
                                                                • Part of subcall function 000000018000878C: GetLastError.KERNEL32(?,?,00000000,000000018000E6BE,?,?,?,000000018000E6FB,?,?,00000000,000000018000BED5,?,?,?,000000018000BE07), ref: 00000001800087AC
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentFreeStrings$Heap$AllocErrorLast
                                                              • String ID:
                                                              • API String ID: 3331406755-0
                                                              • Opcode ID: 825ce012b9cb48ab94c3413abdd1171c1895b64bc4b61d191bc328906b2b8bd4
                                                              • Instruction ID: 864329f4ba152f277f2adf48c891db3446df78698e664f4bc60f625a72c2a341
                                                              • Opcode Fuzzy Hash: 825ce012b9cb48ab94c3413abdd1171c1895b64bc4b61d191bc328906b2b8bd4
                                                              • Instruction Fuzzy Hash: 64318631608B5881FBA6DF2568403DA7794B78DFD4F48C229FA9A43BD5DF38C6498700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 420 2313988-2313a3e call 2319f38 423 2313a44-2313ac6 call 230a940 420->423 424 2313acc-2313b12 CreateProcessW 420->424 423->424
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID: li
                                                              • API String ID: 963392458-3170889640
                                                              • Opcode ID: df447d1959c748b5d8cf34ebfef7c4b31b83bdbcb52bf56f40cb8f0245456118
                                                              • Instruction ID: 991fc2378a7bd9962551fae910e9c52051daf515ad8ec82cef12e9ec16cc79ff
                                                              • Opcode Fuzzy Hash: df447d1959c748b5d8cf34ebfef7c4b31b83bdbcb52bf56f40cb8f0245456118
                                                              • Instruction Fuzzy Hash: 9341E67091CB848FDBA4DF18D0C979AB7E0FB98315F20495DE588C7295CB789884CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 427 18000d26c-18000d289 428 18000d2b4-18000d2c1 call 180008160 427->428 429 18000d28b-18000d29c call 1800086f4 call 1800085b8 427->429 434 18000d2c7-18000d2ce 428->434 442 18000d29e-18000d2b3 429->442 436 18000d306-18000d312 call 1800081b4 434->436 437 18000d2d0-18000d2db 434->437 436->442 439 18000d2dd 437->439 440 18000d2df call 18000d174 437->440 443 18000d301-18000d304 439->443 446 18000d2e4-18000d2eb 440->446 443->434 447 18000d2f2-18000d2fb 446->447 448 18000d2ed-18000d2f0 446->448 447->443 448->436
                                                              C-Code - Quality: 100%
                                                              			E0000000118000D26C(void* __ecx, intOrPtr* __rax, long long __rbx, long long __rdi, long long __rsi, long long _a8, long long _a16, long long _a24) {
                                                              
                                                              				_a8 = __rbx;
                                                              				_a16 = __rsi;
                                                              				_a24 = __rdi;
                                                              				if (__ecx - 0x2000 < 0) goto 0x8000d2b4;
                                                              				E000000011800086F4(__ecx - 0x2000, __rax);
                                                              				 *__rax = 9;
                                                              				E000000011800085B8();
                                                              				return 9;
                                                              			}



                                                              0x18000d26c
                                                              0x18000d271
                                                              0x18000d276
                                                              0x18000d289
                                                              0x18000d28b
                                                              0x18000d295
                                                              0x18000d297
                                                              0x18000d2b3

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: b2bec9f1c83fd2e5dff941a4990122d97467662781677e8ba2cfdbb0e4efa737
                                                              • Instruction ID: 290c2a04846c9b039a5155463e3184fcb060a742c36b4207bfb39a2b49eb85f2
                                                              • Opcode Fuzzy Hash: b2bec9f1c83fd2e5dff941a4990122d97467662781677e8ba2cfdbb0e4efa737
                                                              • Instruction Fuzzy Hash: 3911AC3210468C82F383DF14E8507D9B7A4FB5C7C0F058426FA9547BAADF38CA199B50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 449 180008714-180008723 450 180008733-180008743 449->450 451 180008725-180008731 449->451 452 18000875a-180008772 RtlAllocateHeap 450->452 451->450 453 180008776-180008781 call 1800086f4 451->453 454 180008774 452->454 455 180008745-18000874c call 18000c08c 452->455 458 180008783-180008788 453->458 454->458 455->453 461 18000874e-180008758 call 18000abf8 455->461 461->452 461->453
                                                              C-Code - Quality: 44%
                                                              			E00000001180008714(void* __eax, signed int __rcx, signed int __rdx) {
                                                              				void* __rbx;
                                                              				intOrPtr* _t22;
                                                              				signed int _t29;
                                                              
                                                              				_t29 = __rdx;
                                                              				if (__rcx == 0) goto 0x80008733;
                                                              				_t1 = _t29 - 0x20; // -32
                                                              				_t22 = _t1;
                                                              				if (_t22 - __rdx < 0) goto 0x80008776;
                                                              				_t25 =  ==  ? _t22 : __rcx * __rdx;
                                                              				goto 0x8000875a;
                                                              				if (E0000000118000C08C() == 0) goto 0x80008776;
                                                              				if (E0000000118000ABF8(_t22,  ==  ? _t22 : __rcx * __rdx,  ==  ? _t22 : __rcx * __rdx) == 0) goto 0x80008776;
                                                              				RtlAllocateHeap(??, ??, ??); // executed
                                                              				if (_t22 == 0) goto 0x80008745;
                                                              				goto 0x80008783;
                                                              				E000000011800086F4(_t22, _t22);
                                                              				 *_t22 = 0xc;
                                                              				return 0;
                                                              			}






                                                              0x180008714
                                                              0x180008723
                                                              0x180008727
                                                              0x180008727
                                                              0x180008731
                                                              0x18000873f
                                                              0x180008743
                                                              0x18000874c
                                                              0x180008758
                                                              0x180008769
                                                              0x180008772
                                                              0x180008774
                                                              0x180008776
                                                              0x18000877b
                                                              0x180008788

                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(?,?,00000000,0000000180007F92,?,?,0000F101478280A5,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000), ref: 0000000180008769
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 7cf3c04cd0eb283655c87112c6735f3b789bd4b36bb41325690c7ae62c9b4c65
                                                              • Instruction ID: 66bea78d34406d615fa8c08e42eaa36a882f8058afe23dfc71e7ff7acb685faa
                                                              • Opcode Fuzzy Hash: 7cf3c04cd0eb283655c87112c6735f3b789bd4b36bb41325690c7ae62c9b4c65
                                                              • Instruction Fuzzy Hash: A1F06D74309A0881FED7D7A599003D522D16F5CBC0F2CD4302D4E863DAEE1CC788A320
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 71%
                                                              			E00000001180001268(void* __ecx) {
                                                              				void* __rbx;
                                                              				void* _t12;
                                                              				void* _t17;
                                                              				void* _t18;
                                                              				void* _t19;
                                                              				void* _t20;
                                                              				void* _t21;
                                                              
                                                              				_t2 =  ==  ? 1 :  *0x80021ae0 & 0x000000ff;
                                                              				 *0x80021ae0 =  ==  ? 1 :  *0x80021ae0 & 0x000000ff;
                                                              				E00000001180001A80(1, _t12, __ecx, _t17, _t18, _t19, _t20, _t21);
                                                              				if (E00000001180002A08() != 0) goto 0x80001297;
                                                              				goto 0x800012ab; // executed
                                                              				E00000001180006CDC(_t17); // executed
                                                              				if (0 != 0) goto 0x800012a9;
                                                              				E00000001180002A58(0);
                                                              				goto 0x80001293;
                                                              				return 1;
                                                              			}










                                                              0x18000127c
                                                              0x18000127f
                                                              0x180001285
                                                              0x180001291
                                                              0x180001295
                                                              0x180001297
                                                              0x18000129e
                                                              0x1800012a2
                                                              0x1800012a7
                                                              0x1800012b0

                                                              APIs
                                                              • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 000000018000128A
                                                                • Part of subcall function 0000000180002A08: __vcrt_initialize_locks.LIBVCRUNTIME ref: 0000000180002A0C
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: __scrt_dllmain_crt_thread_attach__vcrt_initialize_locks
                                                              • String ID:
                                                              • API String ID: 108617051-0
                                                              • Opcode ID: b3a5aff99e9bbd50fc4b4caf8482eddb7f62de2f1dfabb963a32cf9525c58297
                                                              • Instruction ID: 3927130d99c38a55cbe47f9f4b507d4a3e007974ffcd633e9ac0bb37393e6b58
                                                              • Opcode Fuzzy Hash: b3a5aff99e9bbd50fc4b4caf8482eddb7f62de2f1dfabb963a32cf9525c58297
                                                              • Instruction Fuzzy Hash: 66E01A30B0528C8EFEE7E6B525423F937501B1E3C2F40D068B892825838D0947AD5722
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: LoadString$ExitProcess
                                                              • String ID:
                                                              • API String ID: 80118013-0
                                                              • Opcode ID: 4511720a80b85894ed9872a941f45ad7e5906891a0c13688ba3e14c3fa3ec101
                                                              • Instruction ID: b62d2fb12763fda2a64a5ee64e5548852d899a580494aacca0011f8ebade0f7c
                                                              • Opcode Fuzzy Hash: 4511720a80b85894ed9872a941f45ad7e5906891a0c13688ba3e14c3fa3ec101
                                                              • Instruction Fuzzy Hash: E1D0C936625A4892E7A29B61F80578A2390B78C7D4F809111A98C42A24CF2CC2098B00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastShowWindow
                                                              • String ID:
                                                              • API String ID: 3252650109-0
                                                              • Opcode ID: 9a665b6fd1606399514c88e51871797ade4cb1dce934726ac272da09cbabfbb3
                                                              • Instruction ID: 20d447c0f35bcb8e3c3c297cfd2fae4a36a0868fd259666119818285c186e9df
                                                              • Opcode Fuzzy Hash: 9a665b6fd1606399514c88e51871797ade4cb1dce934726ac272da09cbabfbb3
                                                              • Instruction Fuzzy Hash: B522B976B00E0986FBDB9F72AC1439B22A2AB8CBD5F46C439E40689174DE7DC75D8305
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 1ffe1e744cccfe4686aba7d6a8aca853fc79a5f69e58afced9d2bc9442cc5b87
                                                              • Instruction ID: 43a781f402e08a9585d1bfd569913690a5560a40171371ec2054230cf506bc92
                                                              • Opcode Fuzzy Hash: 1ffe1e744cccfe4686aba7d6a8aca853fc79a5f69e58afced9d2bc9442cc5b87
                                                              • Instruction Fuzzy Hash: 1931FB72605B848AEBA1DF60E8507EE7365F788785F44842AEB4E47A99DF38C74CC710
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 65%
                                                              			E000000011800082EC(void* __ecx, intOrPtr __edx, long long __rbx, long long __rsi) {
                                                              				void* _t36;
                                                              				int _t38;
                                                              				signed long long _t60;
                                                              				long long _t63;
                                                              				_Unknown_base(*)()* _t82;
                                                              				void* _t86;
                                                              				void* _t87;
                                                              				void* _t89;
                                                              				signed long long _t90;
                                                              				struct _EXCEPTION_POINTERS* _t95;
                                                              
                                                              				 *((long long*)(_t89 + 0x10)) = __rbx;
                                                              				 *((long long*)(_t89 + 0x18)) = __rsi;
                                                              				_t87 = _t89 - 0x4f0;
                                                              				_t90 = _t89 - 0x5f0;
                                                              				_t60 =  *0x80021010; // 0xf101478280a5
                                                              				 *(_t87 + 0x4e0) = _t60 ^ _t90;
                                                              				if (__ecx == 0xffffffff) goto 0x8000832b;
                                                              				E00000001180001C40(_t36);
                                                              				r8d = 0x98;
                                                              				E00000001180002680();
                                                              				r8d = 0x4d0;
                                                              				E00000001180002680();
                                                              				 *((long long*)(_t90 + 0x48)) = _t90 + 0x70;
                                                              				_t63 = _t87 + 0x10;
                                                              				 *((long long*)(_t90 + 0x50)) = _t63;
                                                              				__imp__RtlCaptureContext();
                                                              				r8d = 0;
                                                              				__imp__RtlLookupFunctionEntry();
                                                              				if (_t63 == 0) goto 0x800083be;
                                                              				 *(_t90 + 0x38) =  *(_t90 + 0x38) & 0x00000000;
                                                              				 *((long long*)(_t90 + 0x30)) = _t90 + 0x58;
                                                              				 *((long long*)(_t90 + 0x28)) = _t90 + 0x60;
                                                              				 *((long long*)(_t90 + 0x20)) = _t87 + 0x10;
                                                              				__imp__RtlVirtualUnwind();
                                                              				 *((long long*)(_t87 + 0x108)) =  *((intOrPtr*)(_t87 + 0x508));
                                                              				 *((intOrPtr*)(_t90 + 0x70)) = __edx;
                                                              				 *((long long*)(_t87 + 0xa8)) = _t87 + 0x510;
                                                              				 *((long long*)(_t87 - 0x80)) =  *((intOrPtr*)(_t87 + 0x508));
                                                              				 *((intOrPtr*)(_t90 + 0x74)) = r8d;
                                                              				_t38 = IsDebuggerPresent();
                                                              				SetUnhandledExceptionFilter(_t82, _t86);
                                                              				if (UnhandledExceptionFilter(_t95) != 0) goto 0x80008420;
                                                              				if (_t38 != 0) goto 0x80008420;
                                                              				if (__ecx == 0xffffffff) goto 0x80008420;
                                                              				return E000000011800010B0(E00000001180001C40(_t40), __ecx,  *(_t87 + 0x4e0) ^ _t90);
                                                              			}













                                                              0x1800082ec
                                                              0x1800082f1
                                                              0x1800082fa
                                                              0x180008302
                                                              0x180008309
                                                              0x180008313
                                                              0x180008324
                                                              0x180008326
                                                              0x180008332
                                                              0x180008338
                                                              0x180008343
                                                              0x180008349
                                                              0x180008353
                                                              0x18000835c
                                                              0x180008360
                                                              0x180008365
                                                              0x18000837a
                                                              0x18000837d
                                                              0x180008386
                                                              0x180008388
                                                              0x18000839b
                                                              0x1800083a8
                                                              0x1800083b1
                                                              0x1800083b8
                                                              0x1800083c5
                                                              0x1800083d7
                                                              0x1800083db
                                                              0x1800083e9
                                                              0x1800083ed
                                                              0x1800083f1
                                                              0x1800083fb
                                                              0x18000840e
                                                              0x180008412
                                                              0x180008417
                                                              0x180008446

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: d0fc5085bf44c4937be082645d9f0fd030d92464e7166f1adeb9fe9a04ad5cc9
                                                              • Instruction ID: d6e40695d6015e5c843dff92317e70983bbd332ebd8c23179410134a75d63e3d
                                                              • Opcode Fuzzy Hash: d0fc5085bf44c4937be082645d9f0fd030d92464e7166f1adeb9fe9a04ad5cc9
                                                              • Instruction Fuzzy Hash: 7E315032604F8486DBA1CF25E8407DE73A4F788798F544116FA9D43B59DF38C259CB00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: G]W2$Uf$Wlw$X2D7$n
                                                              • API String ID: 0-182303197
                                                              • Opcode ID: 5ce9af85c0101b92db01bf743a5277ddb3699d4210e4094ad3775c6a215530db
                                                              • Instruction ID: c74d74da34daa252d3ac15f3510e65483800d1c5ee69fbaf6bb2c614532ecc7b
                                                              • Opcode Fuzzy Hash: 5ce9af85c0101b92db01bf743a5277ddb3699d4210e4094ad3775c6a215530db
                                                              • Instruction Fuzzy Hash: F2121770A04709EFDB58DF68C18A99EBBF1FF44304F40816DE84AAB290D775DA19CB45
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: GK$M/uB$Q|-$~~K$Bt$
                                                              • API String ID: 0-557373213
                                                              • Opcode ID: 5399f6d2f4ddd76430553fcbb3a69801bb23c4fdd32863c07da465c7968e24a8
                                                              • Instruction ID: 23d371118caf52150fd4f211dd6ca4f37721361923f8a9a5540b277e1ff59837
                                                              • Opcode Fuzzy Hash: 5399f6d2f4ddd76430553fcbb3a69801bb23c4fdd32863c07da465c7968e24a8
                                                              • Instruction Fuzzy Hash: 09E1F17550260CCBDB68DF38C0995D93BE1FF98308F611229FC6AA62A2DB74D514CB48
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .I$gBfh$i[$w|${
                                                              • API String ID: 0-448909954
                                                              • Opcode ID: fd252399347da21463b78aeaa0d34fc6630a10d5928b5024a52fe33a2729c415
                                                              • Instruction ID: 6e1d122142ca941d49a74c56c9e56fc6d88244184eb1ca681a308e50ba4f5ffc
                                                              • Opcode Fuzzy Hash: fd252399347da21463b78aeaa0d34fc6630a10d5928b5024a52fe33a2729c415
                                                              • Instruction Fuzzy Hash: FDB12770D247499FCB88DFA9D8898DDBBF1FB48304F40921DE816AB250C778A945CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: cp$vm$x$zu$Kn#
                                                              • API String ID: 0-3521309225
                                                              • Opcode ID: 854233274bfaeff89ac29a935d156dc1944753dcbd55c44e864b2476cdfcfe8d
                                                              • Instruction ID: 5833cd913f5e2804bf560c919d972cdc63d85a8c03690c411a92446cfe383073
                                                              • Opcode Fuzzy Hash: 854233274bfaeff89ac29a935d156dc1944753dcbd55c44e864b2476cdfcfe8d
                                                              • Instruction Fuzzy Hash: D6A113B0D143198FDB58CFA9D88A8EEBBF0FB48314F108219E855B7290D3789945CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #0FQ$0T$C;$lXjD$tS
                                                              • API String ID: 0-817034907
                                                              • Opcode ID: e4bf78acd7a5f6a30f384b9d32d43fdeffbe4641104b903a1cc162fefd21facd
                                                              • Instruction ID: cde3b6a27d05f6f51e0beb0642628b81417302991f7926d9ac5c73a7bdfe907c
                                                              • Opcode Fuzzy Hash: e4bf78acd7a5f6a30f384b9d32d43fdeffbe4641104b903a1cc162fefd21facd
                                                              • Instruction Fuzzy Hash: D74192B180034E8FDB44DF64D88A4CE7FF0FB68398F215619E859A6250D3B89694CFD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ,$3T$D-$Rc$l
                                                              • API String ID: 0-617906138
                                                              • Opcode ID: 3a3cf95294224deb7faeda9f3e638283c88744c906ce2ff68bf076d4943cea68
                                                              • Instruction ID: 6e37acd3fe807c1088206e5ac9a5e7eacd7d8ee036761d52eabe9f5e6423a890
                                                              • Opcode Fuzzy Hash: 3a3cf95294224deb7faeda9f3e638283c88744c906ce2ff68bf076d4943cea68
                                                              • Instruction Fuzzy Hash: 2141D5B081078E8FDB44CF64D88A4CE7BF0FB58358F104619E869A6260D3B89664CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 100%
                                                              			E00000001180001D98(long long __rbx, long long _a32) {
                                                              
                                                              				_a32 = __rbx;
                                                              			}



                                                              0x180001d98

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 435d845f9f5cdf73bfe4695b71b0048b28e79a424c4651dbd907605b843c4427
                                                              • Instruction ID: 8b5b8807919832646eb0d744692d73e0514a3f66bd27872d13ad1b0d2e18aa1e
                                                              • Opcode Fuzzy Hash: 435d845f9f5cdf73bfe4695b71b0048b28e79a424c4651dbd907605b843c4427
                                                              • Instruction Fuzzy Hash: E6113C32600F449AEB52CF61EC943D833A4F31D799F041A25FAAD477A4DF78C2A88340
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #X$ $UCV$y4.)
                                                              • API String ID: 0-917551206
                                                              • Opcode ID: 28325ea241be474c5b5558c29b1591e9c0afa6bd6a02919fad3fbb937fa4a7d1
                                                              • Instruction ID: 88f1c93bcfd0b95a9924294e2a798f61a3ced419887d8d3cd20d8d1c021a0fd4
                                                              • Opcode Fuzzy Hash: 28325ea241be474c5b5558c29b1591e9c0afa6bd6a02919fad3fbb937fa4a7d1
                                                              • Instruction Fuzzy Hash: FA12E4B1A0470C9FDB5CDFA8D08A9DDBBF2FB48348F00452AE906A7290D7B5D809CB55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #X$rq%$tL>$".
                                                              • API String ID: 0-3922733902
                                                              • Opcode ID: e7bca3236e2c6002a46b032ca93679f7d95ede6d4010d0837b1e0abab37f6438
                                                              • Instruction ID: b381aed56a2b3487b3d1362a7b1588329dc67b485b38fd31a8f659fa30646d32
                                                              • Opcode Fuzzy Hash: e7bca3236e2c6002a46b032ca93679f7d95ede6d4010d0837b1e0abab37f6438
                                                              • Instruction Fuzzy Hash: A422C1719097C88BDBF8DF24C8896DD37F0FF48344F90215A984E9A694DBB86684CF42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: g$-$HE$Vc
                                                              • API String ID: 0-2562162751
                                                              • Opcode ID: f3d5559af2bde6194e80210adddbbaf8e95cb0bc6a16661ffa1dd3a57d8e1344
                                                              • Instruction ID: 4913dab8bff4e468fd497d5b3a875c18097876ae677243b5bd87ab5dfa6649fc
                                                              • Opcode Fuzzy Hash: f3d5559af2bde6194e80210adddbbaf8e95cb0bc6a16661ffa1dd3a57d8e1344
                                                              • Instruction Fuzzy Hash: 46A1CFB150478C9FDB98CF28D8894CD3BB2FB583A8F505219FC4A97260D7B8D985CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (;$*i$he$*%
                                                              • API String ID: 0-35414758
                                                              • Opcode ID: 8b9c9bfbfb1498278ba2aeeef8e78c7341b02e7a1b6eacef6973ad54d80d413a
                                                              • Instruction ID: bda54b964f22911a3a559f32c7ea04d8336732ac69020e5b893b8e3c16b89767
                                                              • Opcode Fuzzy Hash: 8b9c9bfbfb1498278ba2aeeef8e78c7341b02e7a1b6eacef6973ad54d80d413a
                                                              • Instruction Fuzzy Hash: B7712470514348DBDF48CF28C89A5DD3BA1FB4836CF566319FC4AAA290C778D884CB89
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: */$I$Yu$(
                                                              • API String ID: 0-674225443
                                                              • Opcode ID: 2498b6af7a2ed30e90db0a3e12568d2f4136c2386795e8cd742b44945e36b51d
                                                              • Instruction ID: 6945791dd46d81d20e0b3bc131e278ffeb244cb069de3bc0ef577bbecde39665
                                                              • Opcode Fuzzy Hash: 2498b6af7a2ed30e90db0a3e12568d2f4136c2386795e8cd742b44945e36b51d
                                                              • Instruction Fuzzy Hash: 6A718DB190070ECFDB58CF68D48A5DE7FB0FB68398F204219E85596260D7B49AA5CFC4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #X$.:$PYq|$W
                                                              • API String ID: 0-626586655
                                                              • Opcode ID: 21991bcfd0f912b097b6461d75a60c549d6ff57ca2b273beb0e746897d976d77
                                                              • Instruction ID: 222ea5d3f96816e0fb7be2d0f29a34ba4982c3655a4ff2a413790cee1b1e1248
                                                              • Opcode Fuzzy Hash: 21991bcfd0f912b097b6461d75a60c549d6ff57ca2b273beb0e746897d976d77
                                                              • Instruction Fuzzy Hash: F741037061CB848FD7A8DF28D58A65BBBF1FBD9704F804A1EE589C7290DB749804CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 5`$<ml$a:$P
                                                              • API String ID: 0-330785107
                                                              • Opcode ID: cbd383124c860a9d8e400423fa4c9196148af7f7093da0234d577b407377b911
                                                              • Instruction ID: 5e00b46b738aa1fb66a53935155d98306def4b0ebfa90c3396f59a88465fcc17
                                                              • Opcode Fuzzy Hash: cbd383124c860a9d8e400423fa4c9196148af7f7093da0234d577b407377b911
                                                              • Instruction Fuzzy Hash: 454104B190074E8BDB48DF68C48A49E7FB1FB58348F10861DE8569A390E7B89664CFC5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: -+$0u$S$e!
                                                              • API String ID: 0-4217091389
                                                              • Opcode ID: 96b86808421bf99806c252c8d8da0d71d9c96e1238819cdefd32f8fbf4f8ccc7
                                                              • Instruction ID: a721886868c626c9d636235e773054575fb269445c551e0ceba45fb5ef54b569
                                                              • Opcode Fuzzy Hash: 96b86808421bf99806c252c8d8da0d71d9c96e1238819cdefd32f8fbf4f8ccc7
                                                              • Instruction Fuzzy Hash: 7841E4B090474A8FDB48DF64C89A5DE7FF0FB68388F20461DF81AA6250D37496A4CBD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: o$"B$SJ$wU
                                                              • API String ID: 0-691100934
                                                              • Opcode ID: aed5e06b6c4a71d08a3525650badbc70dff16501ab02106ea58e4e5589b648c2
                                                              • Instruction ID: d7fdbf96593657ad6ae2577f5613c994ee2e422f25c7487f47942db16ad6aa10
                                                              • Opcode Fuzzy Hash: aed5e06b6c4a71d08a3525650badbc70dff16501ab02106ea58e4e5589b648c2
                                                              • Instruction Fuzzy Hash: 4D41E2B180078ECFDB48CF68C88A5DE7BF0FB58358F104619E859A6254D3B89695CFC5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 9luJ$=2y}$=2y}$b
                                                              • API String ID: 0-1667874806
                                                              • Opcode ID: d458d9c607de17fbdbefdb2618156754051a2d24e7c6e7f69b2615133eee77d7
                                                              • Instruction ID: d2648d12f099dfec6fdcb90f3fcdd1749581e3a0f40e909ea8a5d15e69a01733
                                                              • Opcode Fuzzy Hash: d458d9c607de17fbdbefdb2618156754051a2d24e7c6e7f69b2615133eee77d7
                                                              • Instruction Fuzzy Hash: 6141D6B181038EDFDF44CF64D88A4CE7BB0FB18358F110A19E865A62A4D3B89665CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ;$O,$fdu
                                                              • API String ID: 0-1721916326
                                                              • Opcode ID: 85396711fe01e2282415cffc97d2cae76b85543eafba1fee15bed9e01615747c
                                                              • Instruction ID: 3e87e768a936a9a005b2bfe9cf1ea5487d1e30d4516b46cf32e487c05fefb0a7
                                                              • Opcode Fuzzy Hash: 85396711fe01e2282415cffc97d2cae76b85543eafba1fee15bed9e01615747c
                                                              • Instruction Fuzzy Hash: 70A11370D14718EBDF58DFA8E8C999DBBB1FB54318F00422EE806A72A0DBB49945CF45
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: u$&v$f
                                                              • API String ID: 0-1868853588
                                                              • Opcode ID: 4a0e0bcf9159e8ed5db1efbd4fd836488bb382803c7d1313d4c59486869e04d2
                                                              • Instruction ID: 69a7cf9a297102c2c189827fdf9f6584d5119addf90269e6368e6e9724bbb337
                                                              • Opcode Fuzzy Hash: 4a0e0bcf9159e8ed5db1efbd4fd836488bb382803c7d1313d4c59486869e04d2
                                                              • Instruction Fuzzy Hash: AC712471D05708ABCF1CDFA8E5D959DBBB1FB48314F10822DE416A72A0DB749945CF81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: o$j$t
                                                              • API String ID: 0-2067604139
                                                              • Opcode ID: 113b91994dddf0efa674f36996042e856a8803c02bc6c37f7aa57fbd8228378e
                                                              • Instruction ID: 187a7fcaf2c03148b8598df0213937adf801f54ac93e39e303af910f5d67796b
                                                              • Opcode Fuzzy Hash: 113b91994dddf0efa674f36996042e856a8803c02bc6c37f7aa57fbd8228378e
                                                              • Instruction Fuzzy Hash: DF61E0705087848BD368DF28C59A55FBBF1FBC6704F104A1DEA8A8B2A0D77AD944CB43
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: =$N@`Y$`Y
                                                              • API String ID: 0-2183226064
                                                              • Opcode ID: d2df9a4b86a3a0f31adfb1a7bc02e0a1df19d01470a0e79ca81506aab5c400ca
                                                              • Instruction ID: de390a53895dfdc65dc09c5bfac6056c36121590915e31e46cbe9a5d59baf411
                                                              • Opcode Fuzzy Hash: d2df9a4b86a3a0f31adfb1a7bc02e0a1df19d01470a0e79ca81506aab5c400ca
                                                              • Instruction Fuzzy Hash: 5D51D4B190074E8FDB44CF68C88A4DE7FB0FB68398F204619F856A6250D3B496A4CFD4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: P$KGRa$wy
                                                              • API String ID: 0-4077564265
                                                              • Opcode ID: d053b19ec2bcb7975f54130f0bec91227afaf154fd553d0fa3630ba3df2317cc
                                                              • Instruction ID: d1ac46db7187b336f728762834e22bee9176730e9335523c59ddf38f3e7cb20c
                                                              • Opcode Fuzzy Hash: d053b19ec2bcb7975f54130f0bec91227afaf154fd553d0fa3630ba3df2317cc
                                                              • Instruction Fuzzy Hash: 3941C0B090074E8BDF48CF68C8965DE7FB0FB68348F55461DE84AA6290D37896A4CFC4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: '0$~?$\
                                                              • API String ID: 0-629757258
                                                              • Opcode ID: 954a36b238481698c7266dd80e523f1c680ea4ba7fc80669a00137daf7e51e24
                                                              • Instruction ID: e15f7604ff65f55478748ce61f233782f920981713b0f344d517eec2e4988a98
                                                              • Opcode Fuzzy Hash: 954a36b238481698c7266dd80e523f1c680ea4ba7fc80669a00137daf7e51e24
                                                              • Instruction Fuzzy Hash: E741CFB0548B808BE718CF28C59A51ABBF1FBC5344F604A2DF6968A3A0D774D885CF42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: A7$z$~*b
                                                              • API String ID: 0-275545515
                                                              • Opcode ID: b8479da6f0f4b7c6bcd662b5c54a20f953bf565876b4d716e1e2544701f062c2
                                                              • Instruction ID: baa7780346e50c7b5fad202c1504e58fb2644f9f0b4ec5490a5d727d77cca696
                                                              • Opcode Fuzzy Hash: b8479da6f0f4b7c6bcd662b5c54a20f953bf565876b4d716e1e2544701f062c2
                                                              • Instruction Fuzzy Hash: 5B41C4B180074ECFDB48CF64C48A5DE7FB0FB64398F204619E855A6290D3B896A9CFD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: H$rTk=${,%
                                                              • API String ID: 0-3174111592
                                                              • Opcode ID: cd8ee6c86ca05777d6c328effcc2208a9f98b66aff3d67038adbddc0681d1a7c
                                                              • Instruction ID: 620b2f4724f2d9beeee2b9c93f0b532a90d1e7e959f4aa25ba6b06fe272dcb8d
                                                              • Opcode Fuzzy Hash: cd8ee6c86ca05777d6c328effcc2208a9f98b66aff3d67038adbddc0681d1a7c
                                                              • Instruction Fuzzy Hash: A3310470528785ABD798DF28C4D991EBBE1FBC4354F906A2CF982862A0C779C485CB43
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ExceptionRaise_clrfp
                                                              • String ID:
                                                              • API String ID: 15204871-0
                                                              • Opcode ID: 8a2068e512ce5aafa66155c105f3cea9dfcd9c81dc28570226bd282595299ab9
                                                              • Instruction ID: df89035e7e7b250386178c13d978bdab97caeca02fa44d79d4a04f1db2bf885c
                                                              • Opcode Fuzzy Hash: 8a2068e512ce5aafa66155c105f3cea9dfcd9c81dc28570226bd282595299ab9
                                                              • Instruction Fuzzy Hash: BCB12C77610B888BEB56CF29C8463987BA0F348B88F15C915EB59877A8CF39C955CB01
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: LinkObjectOpenSymbolic
                                                              • String ID:
                                                              • API String ID: 3706036087-0
                                                              • Opcode ID: ba3160d82893de1fb7ee1bf22b66471d9f6f3cf414538ac49248103606f94efb
                                                              • Instruction ID: f4502f775a5e45d64f420efd52fcf5a6929529857e1dcb94e78d5b08d8e8d060
                                                              • Opcode Fuzzy Hash: ba3160d82893de1fb7ee1bf22b66471d9f6f3cf414538ac49248103606f94efb
                                                              • Instruction Fuzzy Hash: 23E0C230B1896842F7EA96BAAC017AB1051A34D7C0F70D429BA02C80C0DCA9C3894704
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: D?"$8zfK
                                                              • API String ID: 0-617590365
                                                              • Opcode ID: f58a98b4df58fdce72c0e7885dd3d804ba7ef7258294e614851e5dfa350b3c1c
                                                              • Instruction ID: 90ffadf626de7aefe027df658106a4b75af3eba78983625fe1c864c1349df779
                                                              • Opcode Fuzzy Hash: f58a98b4df58fdce72c0e7885dd3d804ba7ef7258294e614851e5dfa350b3c1c
                                                              • Instruction Fuzzy Hash: B41202B550560DCBDB68DF38C48A49E3BE1FF58308F205129FC269B2A2D774E964CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #X$h}
                                                              • API String ID: 0-3021649463
                                                              • Opcode ID: b2db15c3223b800cd4780d66961112dd0400bb09218d3434ebea1e418095f42e
                                                              • Instruction ID: cc5d86961772c35e5b26d1fe02c3735fa5e7d4097dd7d784bae00ca85ddf9638
                                                              • Opcode Fuzzy Hash: b2db15c3223b800cd4780d66961112dd0400bb09218d3434ebea1e418095f42e
                                                              • Instruction Fuzzy Hash: E822A7709093888BEBF8DF24C895AD97BF1FF44704F90261ED84E9A690DB786645CF42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #X$+ <
                                                              • API String ID: 0-1007305072
                                                              • Opcode ID: 3c586b07ab88afffe82ef26e7c4153d46f18f2014baa5345a66543dbad760a18
                                                              • Instruction ID: 616dec1e66f1d1de5e7451b2be0ebb9b94bf28cca37bd0b9761a544d75dcc4a9
                                                              • Opcode Fuzzy Hash: 3c586b07ab88afffe82ef26e7c4153d46f18f2014baa5345a66543dbad760a18
                                                              • Instruction Fuzzy Hash: A00278B5900709CFDB98CF68C58A5DD3BB9FB59308F404129FC1E9A2A0D3B4E919CB56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Hc$aYG
                                                              • API String ID: 0-2147329803
                                                              • Opcode ID: df90cc9616f2b9c1c24e5989ebcf8fe6102b1266bf85ba7b7bee55ae89225232
                                                              • Instruction ID: 2efeac4e004c44270613e58ebb66abb4639adb146cbae807b0ed9b5758b64c6f
                                                              • Opcode Fuzzy Hash: df90cc9616f2b9c1c24e5989ebcf8fe6102b1266bf85ba7b7bee55ae89225232
                                                              • Instruction Fuzzy Hash: F3D1107560170DCBDB6CCF28C58A59E7BE9FF54308F504129FC1A862A4D7B8E829CB46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Ip$2/
                                                              • API String ID: 0-2558650176
                                                              • Opcode ID: e91aca82e16051f92f6dbdf3cee4f537082049766ade2dd9d76858b25ebc0c60
                                                              • Instruction ID: 11e34d991f0821b6498761244433158048903eec59aa9b15cb9c721390dcac84
                                                              • Opcode Fuzzy Hash: e91aca82e16051f92f6dbdf3cee4f537082049766ade2dd9d76858b25ebc0c60
                                                              • Instruction Fuzzy Hash: CDE1E370505B888FEBB8DF28CC99BEB7BA1FB44306F10551AD84ADE290DB745685CF41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID: h$j-`
                                                              • API String ID: 963392458-2572860821
                                                              • Opcode ID: 7cf89bdd1f68ee687de5045feafb6fc4a467e2c1ecf066370c920de17f50795b
                                                              • Instruction ID: 4b38847522d127fc1bb00c023196a1141effc0b111ad2ed0ea1e0c4c6bbf6feb
                                                              • Opcode Fuzzy Hash: 7cf89bdd1f68ee687de5045feafb6fc4a467e2c1ecf066370c920de17f50795b
                                                              • Instruction Fuzzy Hash: DCC1F271904788CFDB6CDFA8C88A59DBBB1FB48308F20421DE916AB261DBB49805CF41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #z$UP
                                                              • API String ID: 0-3609392360
                                                              • Opcode ID: 550135c457ce9de0a38fa7ba25efe375c5c92efa4962973150589f83c0e84419
                                                              • Instruction ID: 382e9117acb7527eeed12035d2293c9e612a4279c88de5acce6f1e256b227a4c
                                                              • Opcode Fuzzy Hash: 550135c457ce9de0a38fa7ba25efe375c5c92efa4962973150589f83c0e84419
                                                              • Instruction Fuzzy Hash: 95A12471904609DBDF5CCFA8E4CA49EBBB1FB64348F20411DE846A72A0DB749A95CFC1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: )bkr$z~
                                                              • API String ID: 0-4035444816
                                                              • Opcode ID: 5b38f0d840313d9f3ca574d07702ced70b63c221434e660478dd8723dd507398
                                                              • Instruction ID: 258faba6e3eb8b0d9e06483d8e05467d36b6a391f8c1d6f11864e9afbdd6cc32
                                                              • Opcode Fuzzy Hash: 5b38f0d840313d9f3ca574d07702ced70b63c221434e660478dd8723dd507398
                                                              • Instruction Fuzzy Hash: 28817F715047898FEBB8CF28CC867D937A0FB45314F648619D88ECA292DF785A8DCB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: aK>$NM
                                                              • API String ID: 0-1076587397
                                                              • Opcode ID: c3bac648abfba249b47852098d41859ba07369c2655e972e771b32b502ff7dc2
                                                              • Instruction ID: da5d41e2d11eded9a8d114fda3a0716ef8578c24a29511a9fd1e11079e84c072
                                                              • Opcode Fuzzy Hash: c3bac648abfba249b47852098d41859ba07369c2655e972e771b32b502ff7dc2
                                                              • Instruction Fuzzy Hash: 12B144B590030DCFDB98CF68C18A58D7BB8FB55348F505129FC1E9A2A0E3B5E614CB56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: GcX$cy5X
                                                              • API String ID: 0-3427037236
                                                              • Opcode ID: 31dac3876fb2c8203566e989269622a41f053c7142211a7d3c88141b18e189f4
                                                              • Instruction ID: 0267e1ddd2b807cdafb6751889a6f3cffd9a6a52354409c4c9bdb3701729200e
                                                              • Opcode Fuzzy Hash: 31dac3876fb2c8203566e989269622a41f053c7142211a7d3c88141b18e189f4
                                                              • Instruction Fuzzy Hash: 57A1B6B0548388CBEBBEDF34C89A6D93BA9FB44B04F504619E85E8E290DF745745CB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: &$U
                                                              • API String ID: 0-326847644
                                                              • Opcode ID: abfcacae90548ec85c0fd9e6913092660ec18354f469de3349c35ab14c6f872b
                                                              • Instruction ID: daf57b6f78e1c460b3c69b218a56053f519266194a0c46674b0582432329867c
                                                              • Opcode Fuzzy Hash: abfcacae90548ec85c0fd9e6913092660ec18354f469de3349c35ab14c6f872b
                                                              • Instruction Fuzzy Hash: 139169B590038E8FDF48CF68D88A5DE7BB0FB14348F104A19F866AA250D7B4D665CB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: k' {$z5
                                                              • API String ID: 0-3484172565
                                                              • Opcode ID: 0e04fcac124a95f8f36ba453d1c940f3a314ae21d4948ab7b59fa2d7b687fabd
                                                              • Instruction ID: b8ae8af72688b8f58a265ba0cd7083464b739b8d1d0c7afe49f0b82b51ef3349
                                                              • Opcode Fuzzy Hash: 0e04fcac124a95f8f36ba453d1c940f3a314ae21d4948ab7b59fa2d7b687fabd
                                                              • Instruction Fuzzy Hash: 1471F7705007498FDB58DF24C88A5DE7BA1FB58358F514329EC8AAB2A0D778D994CFC4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 6$D
                                                              • API String ID: 0-3309211938
                                                              • Opcode ID: 28cfe374c9252ae38f661a0063e52509a8c1d1e6d70719d53b6096594a4bb1b4
                                                              • Instruction ID: 4943fae4cb613e23b7f581dd3e487f9d4b3c42f04943001f169c6b3b38551740
                                                              • Opcode Fuzzy Hash: 28cfe374c9252ae38f661a0063e52509a8c1d1e6d70719d53b6096594a4bb1b4
                                                              • Instruction Fuzzy Hash: 1C5139705247899BDB98CF28DC999993BE4FB05308F90626CFD46C7291C774D886CB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $$%9
                                                              • API String ID: 0-3031553271
                                                              • Opcode ID: a2fbf9250aa57a4feebe03f3fe744e7023f0b6fc9b26e85352855d54e5bc5225
                                                              • Instruction ID: b973fe186ff4a9eb6224fd819c17bcabcddee07a6b0dcf81a060d5ce58defcbe
                                                              • Opcode Fuzzy Hash: a2fbf9250aa57a4feebe03f3fe744e7023f0b6fc9b26e85352855d54e5bc5225
                                                              • Instruction Fuzzy Hash: B7413C7061C784ABD7A8DF19C0D562BBAE1FB88754F90696EF486C7391D738C844CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #T$(Pv0
                                                              • API String ID: 0-2531358951
                                                              • Opcode ID: 75b81112f69fa21036012adbd1b3eca6c2c2cdc881b6fb35e88803ec9910d9b1
                                                              • Instruction ID: 833bb2cbc5b5f632a4e21dfab9eb859e2d57cc464020a742c613bdf528bcd6e6
                                                              • Opcode Fuzzy Hash: 75b81112f69fa21036012adbd1b3eca6c2c2cdc881b6fb35e88803ec9910d9b1
                                                              • Instruction Fuzzy Hash: BC514E7050030E8BDF58DF28C89A1DE3BA0FB6839CF211619EC4A96694D378D999CFC5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: gd$s=z
                                                              • API String ID: 0-3301279615
                                                              • Opcode ID: 9e0a1eb710f150882f220fbe0277e01504bf60581961d70543420594e9a038f4
                                                              • Instruction ID: f07ce2e9fad92d157e2a09d6c94d78838dac94750a3f8c81f1af4b815a99ef80
                                                              • Opcode Fuzzy Hash: 9e0a1eb710f150882f220fbe0277e01504bf60581961d70543420594e9a038f4
                                                              • Instruction Fuzzy Hash: 8551E2B190030A8FDB48CF68D48A5DE7FB1FB68388F204219F856A6250D37886A4CFD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: !oW!$ke&Q
                                                              • API String ID: 0-419570616
                                                              • Opcode ID: e2a8cd98534a9e183c53210f0dafbd08af185e336335754ed42f3b5ed718b376
                                                              • Instruction ID: 7f38a27729837a1220456e8f550ce8d8610a663141bb74c9e1c9dc42617e753b
                                                              • Opcode Fuzzy Hash: e2a8cd98534a9e183c53210f0dafbd08af185e336335754ed42f3b5ed718b376
                                                              • Instruction Fuzzy Hash: DB51D6B090074E8FDB48CF68C88A5DE7FB0FB68398F104619EC55A6290D7B496A5CFD0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ?j|$P
                                                              • API String ID: 0-615948335
                                                              • Opcode ID: 9620d1bc63c4dfd4b8964090179e5af9b100705a6683f45fc5812d04fd3ae6d4
                                                              • Instruction ID: 876b6112df744986d2c3d1e34c47e91635113f8a285098afa5dcf4c400d9631e
                                                              • Opcode Fuzzy Hash: 9620d1bc63c4dfd4b8964090179e5af9b100705a6683f45fc5812d04fd3ae6d4
                                                              • Instruction Fuzzy Hash: BF41D3B090034A8FDB48CF64C48A5DE7FB1FB68388F50461DE816A6390D77896A4CFD1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: j$[
                                                              • API String ID: 0-3696242357
                                                              • Opcode ID: d41960ad032d02aa43a06cacd4c3fdf514c501a5b8f19463d910750cf599ef8a
                                                              • Instruction ID: 1f04405d0a2c70209281d5ae8fad630fab733c9964c6d2b04cba5fc54a1717a9
                                                              • Opcode Fuzzy Hash: d41960ad032d02aa43a06cacd4c3fdf514c501a5b8f19463d910750cf599ef8a
                                                              • Instruction Fuzzy Hash: D241E5B090074E8BDB48DF68C48A5DE7FB1FB58398F11861DE856A6290D3B4D6A4CFC1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: %$aI
                                                              • API String ID: 0-3604358270
                                                              • Opcode ID: ea798d718599b15374f3be6d712fc75d69b65069e54809637e576d117a3edd33
                                                              • Instruction ID: aad7e541a9085e3540dabfeb0299fd1c023f66acb8a2c362917a19f21f127873
                                                              • Opcode Fuzzy Hash: ea798d718599b15374f3be6d712fc75d69b65069e54809637e576d117a3edd33
                                                              • Instruction Fuzzy Hash: 9D41C6B190038E8BCB48DF68C99A5DE7BB1FB48358F114A2DF86697350D3B49664CF84
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: + $S"
                                                              • API String ID: 0-2880694137
                                                              • Opcode ID: 0a120380ba46ade300821e018fa54fd0c93605979f7eaf18b3fcea56eb471111
                                                              • Instruction ID: bfcc48e859dd2a2878ff227c17b74cffa2adce69246f734358812623f9517f87
                                                              • Opcode Fuzzy Hash: 0a120380ba46ade300821e018fa54fd0c93605979f7eaf18b3fcea56eb471111
                                                              • Instruction Fuzzy Hash: 3F51E6B090038E8FDF88DF64C88A5DE7BB0FB58344F10461DE866A6250D3B8D665CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: =K$d%
                                                              • API String ID: 0-2790768846
                                                              • Opcode ID: 046eeb3a7e312ef4597a0ceadb2c0b4017743bcb75cc6b1a2b492f4bea5b2233
                                                              • Instruction ID: 31ed6bcef534f21fd38bef25e1ada1b6b1a991b2b6323d9fbcaf777256a2f9c4
                                                              • Opcode Fuzzy Hash: 046eeb3a7e312ef4597a0ceadb2c0b4017743bcb75cc6b1a2b492f4bea5b2233
                                                              • Instruction Fuzzy Hash: 0541E5B090074E8BDF48CF64C88A5DE7BF1FB58358F10461DE86AA6250D3B89665CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #|$`
                                                              • API String ID: 0-1687004633
                                                              • Opcode ID: 1dbd93d6a4af5ab501e4fd27d4ca136d79918f9d458c9bd4a0bbcc41cb67c6cc
                                                              • Instruction ID: d2c55ef993d2c9f407acc13cfe98f8d8ae0bc1eb9f2d875cb1ae746da56c3bb8
                                                              • Opcode Fuzzy Hash: 1dbd93d6a4af5ab501e4fd27d4ca136d79918f9d458c9bd4a0bbcc41cb67c6cc
                                                              • Instruction Fuzzy Hash: 8041D5B190078E8FDF88CF68C88A4DE7BF0FB58358F014619F856A6250D3B89665CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: c$j~;
                                                              • API String ID: 0-3832213246
                                                              • Opcode ID: 18b6bb2236c3d81442985b19945feacbaaab319f380d4d3d69fe49ad0df2425e
                                                              • Instruction ID: 0f6a0d388ae838aeb531aaa047403a8103d10a1b86897dd18a564516272ff979
                                                              • Opcode Fuzzy Hash: 18b6bb2236c3d81442985b19945feacbaaab319f380d4d3d69fe49ad0df2425e
                                                              • Instruction Fuzzy Hash: 7341A5B080078E8FDB88DF64C88A1DF7BB0FB54358F104A19EC6696250D3B49661CFD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: -h$W
                                                              • API String ID: 0-4146498651
                                                              • Opcode ID: ac1beb8efc805ec182d5897ee57bff0eb204918572bad0795e6a59dbf0da3e57
                                                              • Instruction ID: 3daef6741b05ec71c2ae787cf9fc9be7e5ad30438ff60914a162cace7a841076
                                                              • Opcode Fuzzy Hash: ac1beb8efc805ec182d5897ee57bff0eb204918572bad0795e6a59dbf0da3e57
                                                              • Instruction Fuzzy Hash: 9941C4B590038E9FDB44CFA8D88A5CE7FF0FB48358F104619F869A6250D3B49664CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .$fp
                                                              • API String ID: 0-3298127435
                                                              • Opcode ID: ddbbea76e87b75a0423c6c5dce58b2b1cb486f12ce18d3dc43adec7097cd1835
                                                              • Instruction ID: 83a03c8162202f63623eea1a1694ca8e53f68d69516385ec72ca6a59034d0d59
                                                              • Opcode Fuzzy Hash: ddbbea76e87b75a0423c6c5dce58b2b1cb486f12ce18d3dc43adec7097cd1835
                                                              • Instruction Fuzzy Hash: A641F4B190470E8BDB88CF64C48A4DE7FB0FB28398F104619E856A6290D3B89665CFC4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: "$Zs
                                                              • API String ID: 0-3922668666
                                                              • Opcode ID: 68d2441b249f9a93f4c72500e977988d29b83f362e05d91f8df6eb9a31c852ba
                                                              • Instruction ID: f1d62621bd08a38fa15a490595be93b85bae5397fb0987493b8f1264ce03d9fe
                                                              • Opcode Fuzzy Hash: 68d2441b249f9a93f4c72500e977988d29b83f362e05d91f8df6eb9a31c852ba
                                                              • Instruction Fuzzy Hash: 803192B0529380ABC388DF28D19A91EBBE1FBD5708F806A1DF8C286390D374D406CB43
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: XW$s [
                                                              • API String ID: 0-2366283936
                                                              • Opcode ID: 76c1b907ae6b42603d5a16b60f951f87ab574e6943cc66960cdc964ad17b59d9
                                                              • Instruction ID: c8620a86b0501fca327921337904d07bbca0ac58b79dbc40019122cd377fd21c
                                                              • Opcode Fuzzy Hash: 76c1b907ae6b42603d5a16b60f951f87ab574e6943cc66960cdc964ad17b59d9
                                                              • Instruction Fuzzy Hash: 623190B190478E8FDF48DF28D88949A3BE1FB48304B004A1DFC6AD7250D7B4D665CB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4V$jn(
                                                              • API String ID: 0-2529302498
                                                              • Opcode ID: 4347d8350eb776fef7c9ebb529210ab3cab55532b2ec0dd05afe6f01a2bbb923
                                                              • Instruction ID: cb5d544f3b4b9f04c9dfd671481ec3bad593690e5eb4dddf862df6e3aa1dae86
                                                              • Opcode Fuzzy Hash: 4347d8350eb776fef7c9ebb529210ab3cab55532b2ec0dd05afe6f01a2bbb923
                                                              • Instruction Fuzzy Hash: 17317EB1529381AFC398CF28C48A91ABBE0FBC9318F806A1DF8C686260D774D555CB02
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: '$%6
                                                              • API String ID: 0-1852427169
                                                              • Opcode ID: 42a3203eb3ebe9af52f3f94821d08fbcbfa30131473cda762de5c23950ca3f94
                                                              • Instruction ID: 05249663a0179330ad45d21934dcfd5c9628912d79576b4f5c22a08ed84997fc
                                                              • Opcode Fuzzy Hash: 42a3203eb3ebe9af52f3f94821d08fbcbfa30131473cda762de5c23950ca3f94
                                                              • Instruction Fuzzy Hash: CD316FB5568381ABD388DF28C48A81ABBF1FB89308F806A1DF8C6DB251D775D545CB43
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: uS$J
                                                              • API String ID: 0-437994327
                                                              • Opcode ID: a2b51c32bad19ba39d4e427c2f512c2a59b50882f014cb68f936c9e880adca61
                                                              • Instruction ID: c28aef9a7855b76c7032ac0876ce233f1cd511a41690ffd8aa136aa2b9e82e2b
                                                              • Opcode Fuzzy Hash: a2b51c32bad19ba39d4e427c2f512c2a59b50882f014cb68f936c9e880adca61
                                                              • Instruction Fuzzy Hash: EC31D8B190034E8FDB84CF64C8865DE7FB0FF28358F104619E959A6260D3B88655CFD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: +@$`.P
                                                              • API String ID: 0-1189405855
                                                              • Opcode ID: a70f442d9e9e175520b0b0d93d41500bfede9fc32031e6ea222cabd22b859c02
                                                              • Instruction ID: 39de2ea6a026fc69778914cf9e44a5f31bb4615b8119a4e03ad8497b2faa6ad6
                                                              • Opcode Fuzzy Hash: a70f442d9e9e175520b0b0d93d41500bfede9fc32031e6ea222cabd22b859c02
                                                              • Instruction Fuzzy Hash: A1316FB15187848FD348DF28C45941BBBE1BB9C758F804B1DF4CAAA260D778D645CF4A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ^$R
                                                              • API String ID: 0-3595634639
                                                              • Opcode ID: b7e08d49ea1b5b1d89cab638ecb6b58cb02da954cd334f399a60917b828591f9
                                                              • Instruction ID: 7dec6e6ff202478201587024085261afee01554c9ae7569198c8fcb843946a7e
                                                              • Opcode Fuzzy Hash: b7e08d49ea1b5b1d89cab638ecb6b58cb02da954cd334f399a60917b828591f9
                                                              • Instruction Fuzzy Hash: 112180B0528781AFC398DF28D49591FBBF1BB88744F806A1DF8C686390D779D505CB46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: t^$w
                                                              • API String ID: 0-1486493484
                                                              • Opcode ID: d9d2b37262035f156a08dae9f88ea85b7583d03cc1c0d0918aa86d9476248fb5
                                                              • Instruction ID: 0fcab25796e593e8dfb7fafe86ea51ff53beb953310655f2f877b1f2b437242d
                                                              • Opcode Fuzzy Hash: d9d2b37262035f156a08dae9f88ea85b7583d03cc1c0d0918aa86d9476248fb5
                                                              • Instruction Fuzzy Hash: B1219DB090078E8FDB48DF68D8491DE7BB0FB18308F014A59F82996290D3B89665CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #
                                                              • API String ID: 0-606707520
                                                              • Opcode ID: 99547394c1cfeee33f3fbc263d3122085f4524b50faca7c5dbf1af4b9be79401
                                                              • Instruction ID: c3f400318aacbb370837e0cbe5d5d41f2ad1dd2e6d0c0f6a4f18f054f3464e4f
                                                              • Opcode Fuzzy Hash: 99547394c1cfeee33f3fbc263d3122085f4524b50faca7c5dbf1af4b9be79401
                                                              • Instruction Fuzzy Hash: 5B223770D14709EFDB58DFA8C49A49EBBF1FF44348F00816DE84AAB290D7749A19CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 100%
                                                              			E00000001180008D28(long long __rbx, void* __rcx, void* __rdx, long long __rsi, signed int __r8, void* __r9) {
                                                              				signed long long _t25;
                                                              				void* _t27;
                                                              				void* _t30;
                                                              
                                                              				 *((long long*)(_t30 + 8)) = __rbx;
                                                              				 *(_t30 + 0x10) = _t25;
                                                              				 *((long long*)(_t30 + 0x18)) = __rsi;
                                                              				_t27 = (_t25 | 0xffffffff) + 1;
                                                              				if ( *((intOrPtr*)(__rcx + _t27)) != dil) goto 0x80008d56;
                                                              				if (_t27 + __rdx -  !__r8 <= 0) goto 0x80008d92;
                                                              				return __rdx + 0xb;
                                                              			}






                                                              0x180008d28
                                                              0x180008d2d
                                                              0x180008d32
                                                              0x180008d56
                                                              0x180008d5d
                                                              0x180008d70
                                                              0x180008d91

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9c9a505e11390fee30cde8d58ba8d3236255a76ec469928530f6db279ba29baa
                                                              • Instruction ID: 1f7af7de608e037a3e69fafdab2b7a4d19b0596ea53e23cf5e8b59c7fdfa90c1
                                                              • Opcode Fuzzy Hash: 9c9a505e11390fee30cde8d58ba8d3236255a76ec469928530f6db279ba29baa
                                                              • Instruction Fuzzy Hash: D151C432700B9489FBA1DB72A8447DE7BA1B7587D4F148225FE9827B99DF38C605D700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ef
                                                              • API String ID: 0-3522424648
                                                              • Opcode ID: 63cf04038136136116a979567ba4b26417661d5f843165bc7989bb71bb8234a9
                                                              • Instruction ID: 1d7361975761f0b602ed412871a535598d4e2d29e520c142b57fdbc98d9bb176
                                                              • Opcode Fuzzy Hash: 63cf04038136136116a979567ba4b26417661d5f843165bc7989bb71bb8234a9
                                                              • Instruction Fuzzy Hash: CD021870A04709EFDB58DF68C08959EBBF2FB44308F00816DE84AAB364D775DA59CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: x]!-
                                                              • API String ID: 0-585868058
                                                              • Opcode ID: cf2a29744dbdbd02a151a4b044d1109f6beb7998a165a5b3606498e8daacfd79
                                                              • Instruction ID: 3563cc68909978d0e5924a7b684af064ea2c1ba000bef1d7d3a545c8acb8ae8c
                                                              • Opcode Fuzzy Hash: cf2a29744dbdbd02a151a4b044d1109f6beb7998a165a5b3606498e8daacfd79
                                                              • Instruction Fuzzy Hash: E4D199B1A0060DCFDBA8CF78C44A5DD7BF1FB48308F606129E826AA2B2D7749904CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: }^O
                                                              • API String ID: 0-3039680174
                                                              • Opcode ID: 2737519d22680c9269c125336f90b0d45ca51200b7d26ea2addf6a8d31d5b6e5
                                                              • Instruction ID: ab2cbb543467d167ea0b997b0fd3668b6ee561b3cb2fe7714e26dcb650ae5227
                                                              • Opcode Fuzzy Hash: 2737519d22680c9269c125336f90b0d45ca51200b7d26ea2addf6a8d31d5b6e5
                                                              • Instruction Fuzzy Hash: F4A17BB2502749CFDB98DF28C69A59D3BE1FF55308F004129FC1E9A2A0D3B4E925CB49
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: RH
                                                              • API String ID: 0-2975065227
                                                              • Opcode ID: da44171f9c80a2056ccb259cc2b9eac6e02ade2ac8d9ef905a94791c40a4a894
                                                              • Instruction ID: 3ed25615c2a8c9ca4e3da1b00f2098fcb17990ba3bd5a25f54e87148b1d096d2
                                                              • Opcode Fuzzy Hash: da44171f9c80a2056ccb259cc2b9eac6e02ade2ac8d9ef905a94791c40a4a894
                                                              • Instruction Fuzzy Hash: 935115711187448FC7B8DF18D4C66AAB7E1FB84710FA0991DE8CEC7251DE74A88A8B46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Y
                                                              • API String ID: 0-579211002
                                                              • Opcode ID: c7ef7c05ef0c3c9f2aed6826f015ad160cfcc6abce9b29eb71b79f5d508516d5
                                                              • Instruction ID: ba0b5dc142276362022db2ec7c2627ba7792bd7c726e641438638f3027d27537
                                                              • Opcode Fuzzy Hash: c7ef7c05ef0c3c9f2aed6826f015ad160cfcc6abce9b29eb71b79f5d508516d5
                                                              • Instruction Fuzzy Hash: CC51F4716107898BDB98CF28C88A4DD7BA1FB4835CF025318ED8EA62A1D77CD845CB49
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: vOs
                                                              • API String ID: 0-1852020951
                                                              • Opcode ID: 0a3c35978ef4d06ef910e88490b5bce2e9beff051be12035b9eadbcefa2f22bf
                                                              • Instruction ID: 71f22bc665d9d41b756676bbd0b498a9b2b12e6d8052bc4cd7a69e7596866a5e
                                                              • Opcode Fuzzy Hash: 0a3c35978ef4d06ef910e88490b5bce2e9beff051be12035b9eadbcefa2f22bf
                                                              • Instruction Fuzzy Hash: AD618DB190030E8FDB49CF68D48A5CE7FB0FB64398F204519E845A6260D7B996A8CFD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: *)
                                                              • API String ID: 0-1811957435
                                                              • Opcode ID: c39f41b8af2b9280dd7c00c4ba0ddd05394017a856c7f82ca50d576e38ac2643
                                                              • Instruction ID: d6faedc5d029d7df981e09eb73b7ab6f1fb67a7e80b3c356f9cbf3cb9aa14cee
                                                              • Opcode Fuzzy Hash: c39f41b8af2b9280dd7c00c4ba0ddd05394017a856c7f82ca50d576e38ac2643
                                                              • Instruction Fuzzy Hash: 7731733061CB888FC728DF29D09556AB7E0FB99305F504A6EE58AC7365DB70D905CB82
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: t
                                                              • API String ID: 0-1935021737
                                                              • Opcode ID: 783391770682b9c9d34a01018b97ccb4612aed757a5715f7015a6466eeb6abdd
                                                              • Instruction ID: d8a7df07bf129dfe1112d093f7c79317a685567e3e9c136f8a0a0ea83ec3df8f
                                                              • Opcode Fuzzy Hash: 783391770682b9c9d34a01018b97ccb4612aed757a5715f7015a6466eeb6abdd
                                                              • Instruction Fuzzy Hash: 3731C23021CB448FE768DF2CD48516ABBE1FB96345F104A5DE5CAC7266DB30D805CB82
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: __
                                                              • API String ID: 0-2267946753
                                                              • Opcode ID: 8f9b035c25ddab069e89f1d5b32d9e06551c62a3022c943f576078da68d92037
                                                              • Instruction ID: 7d86e153d36ce8c1111dbcc3826572abeefb75d58ca262c1344be646f6e41573
                                                              • Opcode Fuzzy Hash: 8f9b035c25ddab069e89f1d5b32d9e06551c62a3022c943f576078da68d92037
                                                              • Instruction Fuzzy Hash: F441E070608B848BE768DF29C19941ABBF2FBC9304F500A2DF69A873A0C775D845CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: GSn
                                                              • API String ID: 0-1733515909
                                                              • Opcode ID: 120b4183c770ef369911dc760361451600c2e99f203226371e5481c8821bf4d7
                                                              • Instruction ID: e2f3006fa8b57a0a15ce721359cf9d1e49ece6f395c48e234ac3684f14cae031
                                                              • Opcode Fuzzy Hash: 120b4183c770ef369911dc760361451600c2e99f203226371e5481c8821bf4d7
                                                              • Instruction Fuzzy Hash: 3B51D8B090038E8FDF48DF64C84A5DE7BB1FB58358F10461DEC66A6290D3B89664CF84
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8=
                                                              • API String ID: 0-237953557
                                                              • Opcode ID: bb623fe5bad30cc0ccc512b27898bb82e9ca0e52d8794c79c7b053a60b518db3
                                                              • Instruction ID: b454008f05a9fee2adcad3f7618a5b2db9a57a90b6337ca260f0f90ad011d31b
                                                              • Opcode Fuzzy Hash: bb623fe5bad30cc0ccc512b27898bb82e9ca0e52d8794c79c7b053a60b518db3
                                                              • Instruction Fuzzy Hash: 6C315C30208B458BDB5CDF2CC49922ABBE1FBD9301F444A2DE58AD7365DB34D845CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: K
                                                              • API String ID: 0-425913083
                                                              • Opcode ID: 2b1ae9da1385bdbe4b8d4d873491c8ef025a73cbd56fa24a9a5b2ec22b63fa4f
                                                              • Instruction ID: 2fed8ac126100d40c07b97cdf7185b5902301a54d0a5a1b07a930063f5186266
                                                              • Opcode Fuzzy Hash: 2b1ae9da1385bdbe4b8d4d873491c8ef025a73cbd56fa24a9a5b2ec22b63fa4f
                                                              • Instruction Fuzzy Hash: 2041F7B180438ECFDB48CF68D8864DE7BB0FB58344F114A19E866A6250D3B8D665CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: t"
                                                              • API String ID: 0-2131657386
                                                              • Opcode ID: a3a222a6e056c70518c09b2f7e5539db3b60aaf61629909d00af61b4973bd0e8
                                                              • Instruction ID: 9afd91dbfdb460895f260be45e090592cfefd851ddef2b1300390e2b27be5b81
                                                              • Opcode Fuzzy Hash: a3a222a6e056c70518c09b2f7e5539db3b60aaf61629909d00af61b4973bd0e8
                                                              • Instruction Fuzzy Hash: F741E8B180070D8BDF48DF64C48A0DE7FB1FB483A8F65521DE81AB6290D3B89585CF99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: gLv
                                                              • API String ID: 0-1669999040
                                                              • Opcode ID: d372408e4ccfa21733394c795309bb98bbbf8ce06b144d4f85a8e8de8872e02b
                                                              • Instruction ID: 4ccffbc56e7540b0eed2d838a359d1d8f67b2df824067188dfc1ddd5c96ef40d
                                                              • Opcode Fuzzy Hash: d372408e4ccfa21733394c795309bb98bbbf8ce06b144d4f85a8e8de8872e02b
                                                              • Instruction Fuzzy Hash: 5E41A2B190078E8FDF84CF64C88A4DE7BB0FB18358F104619E866A6290D3B89665CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 2|
                                                              • API String ID: 0-4112153497
                                                              • Opcode ID: c8d3a13c8ccf64a8a58613b82b71848b75fef30a95d8cbfed718dfac3d203234
                                                              • Instruction ID: 608cad47890a71f08ca73b00549bef7b264d56ff1f2a27e9bf6db9cbe5c4c87d
                                                              • Opcode Fuzzy Hash: c8d3a13c8ccf64a8a58613b82b71848b75fef30a95d8cbfed718dfac3d203234
                                                              • Instruction Fuzzy Hash: 0131E2715083808FD768DF28C58A64BBBF1FBC6704F50891DE6CA8A260DB76D849CB03
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: v)v
                                                              • API String ID: 0-2248367734
                                                              • Opcode ID: 2bcb51d8d69df24c6edafa72637552a2373937b3983906909be42b2c69647502
                                                              • Instruction ID: 0030cdc40f359cc4b5ee47386aa84db0471dac2f66976155e7dd0403152a0c44
                                                              • Opcode Fuzzy Hash: 2bcb51d8d69df24c6edafa72637552a2373937b3983906909be42b2c69647502
                                                              • Instruction Fuzzy Hash: 2531FFB0D107189BDF88DFB8D98A4DDBBF0BB48308F50822DD816B6290D7785A45CF68
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: b
                                                              • API String ID: 0-1908338681
                                                              • Opcode ID: dddb38d3eca3b718f76d068eb3649ef697cdbcc6fe538854f7f679c62e5ae1f4
                                                              • Instruction ID: 17bdd88a76ea742b17f3307574b3be47e3e99a9a8e87152f7e628db9e49eb398
                                                              • Opcode Fuzzy Hash: dddb38d3eca3b718f76d068eb3649ef697cdbcc6fe538854f7f679c62e5ae1f4
                                                              • Instruction Fuzzy Hash: 09318BB55187808BD748DF28C08651ABBE1BBCC308F404B1DF8CAEB2A1D778D645CB4A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Y
                                                              • API String ID: 0-579211002
                                                              • Opcode ID: ecd3080a44302933cb34d055b18508fc771149b61013eb4241d4c9c3597933d5
                                                              • Instruction ID: 3905b0f92365bb91672009248d65bd91db3d35b841bf4746a7ab911bc2e22770
                                                              • Opcode Fuzzy Hash: ecd3080a44302933cb34d055b18508fc771149b61013eb4241d4c9c3597933d5
                                                              • Instruction Fuzzy Hash: A33199B0628781AFD78CDF28D49692EBBE1BBD9314F816A1DF9868B350D774D404CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0}
                                                              • API String ID: 0-2955618701
                                                              • Opcode ID: 3bc7749b2bfb2771dde145a478a06cddc01c68d1a6300aeac6f15df74fb2e7de
                                                              • Instruction ID: 3e7e0eca6b7df2cf9e22f590a0720919f810bbceeb8c715e312b2ca61f84fb9a
                                                              • Opcode Fuzzy Hash: 3bc7749b2bfb2771dde145a478a06cddc01c68d1a6300aeac6f15df74fb2e7de
                                                              • Instruction Fuzzy Hash: 95319DB052C380AFD388DF28D48591BBBE1BB88354F816A1DF8869A3A0D374D414CB47
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: S}
                                                              • API String ID: 0-4277866985
                                                              • Opcode ID: 4c14e8efe554566b3b6f64fbbe1a0bfeeafcc62cba18a000d9c8f8486cba644e
                                                              • Instruction ID: 6eca092c98c3adfaed0121b155035ca3d2c3a6a6fc12d10904b790ccf03c6d1f
                                                              • Opcode Fuzzy Hash: 4c14e8efe554566b3b6f64fbbe1a0bfeeafcc62cba18a000d9c8f8486cba644e
                                                              • Instruction Fuzzy Hash: D4317EB0528781AFD398DF28D49A81BBBF1FB88304F806E2DF88687294D775D445CB02
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 6N
                                                              • API String ID: 0-1503784733
                                                              • Opcode ID: 4950689d9a431a30668e4ae59cbf44894261a06e5f6f244c2bb118cbde227f48
                                                              • Instruction ID: f4a86dc4653c28cccd562090cb365a0bf87d83b70404bf80af20f8f7627260ee
                                                              • Opcode Fuzzy Hash: 4950689d9a431a30668e4ae59cbf44894261a06e5f6f244c2bb118cbde227f48
                                                              • Instruction Fuzzy Hash: 33316CB19087849BD349DF28D44941ABBE1BB9C70CF404B1DF4CAAB394D778DA05CB4A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: H-
                                                              • API String ID: 0-1037293833
                                                              • Opcode ID: de858980b3a6efa0554d811c46929b7bc76dc3a2dfb78603baf62d4ba3c8ea7f
                                                              • Instruction ID: b1e2574861916e143dbd51d3dbaf767713271f180177b5759803beb599a6fa44
                                                              • Opcode Fuzzy Hash: de858980b3a6efa0554d811c46929b7bc76dc3a2dfb78603baf62d4ba3c8ea7f
                                                              • Instruction Fuzzy Hash: 53215D705083848BD348EF28C45651ABBE1BB8D348F404B1DF9CAAB360D778D654CB4A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: u*AR
                                                              • API String ID: 0-611844632
                                                              • Opcode ID: 336e368621e526daf09679cb3dd942b8565b5edbd5c0d4c2a93cf0215bbbb5a4
                                                              • Instruction ID: 3bc00768d5a422eeaaf99635b3aa758fdae31e1bce01374c8fc39a0297de5fdb
                                                              • Opcode Fuzzy Hash: 336e368621e526daf09679cb3dd942b8565b5edbd5c0d4c2a93cf0215bbbb5a4
                                                              • Instruction Fuzzy Hash: 203189B050078E8FDB88CF68D85A19F7BA0FB08748F014A19FC2AD6664C7B4D664CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: g*`
                                                              • API String ID: 0-1142845859
                                                              • Opcode ID: 9cd48bc6e0482359d29cb13c7700713d9967f760f5c3549705931a0667eb5f41
                                                              • Instruction ID: b8aa69d2f49c20b5acb1a00704d8964895f6476ef3bcf62c7f5396d2bf36bea0
                                                              • Opcode Fuzzy Hash: 9cd48bc6e0482359d29cb13c7700713d9967f760f5c3549705931a0667eb5f41
                                                              • Instruction Fuzzy Hash: 37217DB4628781AFD388DF28C59A91ABBE1FB89354F806A1DF88687260D774D441CB02
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: n*=
                                                              • API String ID: 0-1578461029
                                                              • Opcode ID: 6c7163423625a1dfea4e6488f6549c3ec9800c1a3608f349b66670a568836fcf
                                                              • Instruction ID: 5a6e668aa24801d1d9c6f28fa235fe069d2b7f3b57532802ece4870b677a6bb4
                                                              • Opcode Fuzzy Hash: 6c7163423625a1dfea4e6488f6549c3ec9800c1a3608f349b66670a568836fcf
                                                              • Instruction Fuzzy Hash: 3F2146B55087848BD359DF28C58A41ABBE0FB8C348F404B6DF4CAA7261D778D605CF0A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 5$
                                                              • API String ID: 0-3756733592
                                                              • Opcode ID: c6d1b2b01fc7d7aa2c8c76f25d08217fc2c1001ea0874a00b475e29af119845e
                                                              • Instruction ID: e4429aaa6470e4800d38dcddd4cd9cbb61e65e1b626c8151716cae59427da810
                                                              • Opcode Fuzzy Hash: c6d1b2b01fc7d7aa2c8c76f25d08217fc2c1001ea0874a00b475e29af119845e
                                                              • Instruction Fuzzy Hash: 4C2127B46087848BD788DF28C05951BBBE0BB8C318F511B1DF4CAA6265D778D645CB4B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 100%
                                                              			E0000000118000A878(long long __rax) {
                                                              				signed int _t3;
                                                              
                                                              				_t3 = GetProcessHeap();
                                                              				 *0x800227e8 = __rax;
                                                              				return _t3 & 0xffffff00 | __rax != 0x00000000;
                                                              			}




                                                              0x18000a87c
                                                              0x18000a885
                                                              0x18000a893

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: 91d3bf356e17fdc5d0dc73f5f53c12d610db6437279b1ba55c7f6661858add76
                                                              • Instruction ID: b81358a64b4d4ed809fa94cc5bd0f3738e6ada5bf37cc3cf3ffb04c5a8196abe
                                                              • Opcode Fuzzy Hash: 91d3bf356e17fdc5d0dc73f5f53c12d610db6437279b1ba55c7f6661858add76
                                                              • Instruction Fuzzy Hash: 44B09230E07A08C2EA8BAB516C8234423A8AB4C740FAA9058900C81330DE2C02ED5710
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c1c64cfeeb38086a2dca9a5dc5c7c54d87ec123621af3d0d182b563ac43c41a0
                                                              • Instruction ID: 8773eabb466d38e2161bf0cdb643e87445f61d46d2788509a7c46a8898131055
                                                              • Opcode Fuzzy Hash: c1c64cfeeb38086a2dca9a5dc5c7c54d87ec123621af3d0d182b563ac43c41a0
                                                              • Instruction Fuzzy Hash: BDE1F470E0460ACFDF58DFA8C4AA9AEBBB7FB44348F004169D806E72A0D7749615CBD5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f0d7556263b4ac9ce94f5939d6b647cebe0e0421b16219684ecf3aea226e168d
                                                              • Instruction ID: 23f58cb715e48e67091b49dc376df7d19fde28930646ceed01248b9b28e0b81c
                                                              • Opcode Fuzzy Hash: f0d7556263b4ac9ce94f5939d6b647cebe0e0421b16219684ecf3aea226e168d
                                                              • Instruction Fuzzy Hash: C4C1CEB9903609CFDF68CF38C49A59D3BF1EF64308F204119EC269A2A6D774D529CB48
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6356c1b205dd3ea51b6168dff230cd1b04c92b5b79d4cfc048092e65768328f0
                                                              • Instruction ID: 10065b3c9b5abf1c1aa56be3a03371dbffb723b62293697206dddefe893c549c
                                                              • Opcode Fuzzy Hash: 6356c1b205dd3ea51b6168dff230cd1b04c92b5b79d4cfc048092e65768328f0
                                                              • Instruction Fuzzy Hash: 36B10770E14B489FDFA8DFA8D48A9DEBBF2FB44348F004519D846A7290D7B8541BCB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05221105fcf4a0dfa1600c7ecd9a36b5eab2b73dee02fe6529467e68ba200bce
                                                              • Instruction ID: d84a0727c053a9bf370c569fdea4fef60fc5f2c94c412ebf2c23b39910c74547
                                                              • Opcode Fuzzy Hash: 05221105fcf4a0dfa1600c7ecd9a36b5eab2b73dee02fe6529467e68ba200bce
                                                              • Instruction Fuzzy Hash: 2FB1F8706087C88FDBBECF24C8992DB7BA9FB45708F504219E9CA8E294DB745745CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8a1468b82f3cc8c6cef3d943e654abe810b4fd3ed5837763d1554f5f0f2f8fb4
                                                              • Instruction ID: 8c078a83eb31d054714e39721b596a00254322f697a6ac45ed2b33088b11b8de
                                                              • Opcode Fuzzy Hash: 8a1468b82f3cc8c6cef3d943e654abe810b4fd3ed5837763d1554f5f0f2f8fb4
                                                              • Instruction Fuzzy Hash: 7B813A70D48709EFCB58DFA8C49599EBBF1FB44344F00856EE849EB290DB749A09CB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a0216f555e37351bb33d44e999a90ae45b4d35870442341544a959e5100640a4
                                                              • Instruction ID: 6ebbf33d9f857130a9839f6f741052980282a453dc9df50fb9f6674f160c4038
                                                              • Opcode Fuzzy Hash: a0216f555e37351bb33d44e999a90ae45b4d35870442341544a959e5100640a4
                                                              • Instruction Fuzzy Hash: 9B8116B051074D9BDF88CF28C8C99DD7BB1FB483A8FA56218FC0AA6254D778D485CB84
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7b26294f0f9f3284694c45c8b9595d0348109ce62e475cb7d6409abe9a76976a
                                                              • Instruction ID: c7abd267521143327394ea6f23782aa2b4ae0493936d54ab9876472fa549e931
                                                              • Opcode Fuzzy Hash: 7b26294f0f9f3284694c45c8b9595d0348109ce62e475cb7d6409abe9a76976a
                                                              • Instruction Fuzzy Hash: 3C61207061464C8BDF28DF78D4A62AD3BE1FB44308F20613DE8668B2A2D774E506CB54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 06da107516d47c143558e8aa98c820ad7c0c85d3c2a152159cfcced41356a87b
                                                              • Instruction ID: 757b24094018afa1d4708172cf038a90afa9ee53adc47153a5143efa1b6a0ebc
                                                              • Opcode Fuzzy Hash: 06da107516d47c143558e8aa98c820ad7c0c85d3c2a152159cfcced41356a87b
                                                              • Instruction Fuzzy Hash: B7710770508789CBDBF9CF24C8896DE7BE4FB88704F10461DE9998B2A0DB749685CF41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 24e3c0c76af823433cf272c9c4a9b61f0c82801c6157a6d7b247b40a6cf50061
                                                              • Instruction ID: 322fdb5d9cbd24f261f2202f975b2bd3e56ab6ee9c72a1ae6d0c4d2aba79015f
                                                              • Opcode Fuzzy Hash: 24e3c0c76af823433cf272c9c4a9b61f0c82801c6157a6d7b247b40a6cf50061
                                                              • Instruction Fuzzy Hash: F8411561F66BD947FF43DA7A5812BB00A00AFA77C0E41E312FD0B77B52EB28455A8200
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ab1c614082465e9adf873fcd8bb0e59269149d5aae34c8c546b648bb5ab83c2f
                                                              • Instruction ID: 79dabacaeb287bf55cf765f2a5ed21f3379e8999bcfa5cf4c8625b5a0fcf87c0
                                                              • Opcode Fuzzy Hash: ab1c614082465e9adf873fcd8bb0e59269149d5aae34c8c546b648bb5ab83c2f
                                                              • Instruction Fuzzy Hash: AF51E670518788CBDBBADF38C8992D97BB1FB58304F90861DD84E8E290DB785749CB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 56%
                                                              			E00000001180006818(signed int __edx, void* __edi, void* __esp, long long __rbx, signed long long*** __rcx, long long __rsi) {
                                                              				void* _t24;
                                                              				int _t26;
                                                              				signed int _t51;
                                                              				void* _t52;
                                                              				signed long long _t66;
                                                              				signed long long _t74;
                                                              				signed long long _t76;
                                                              				signed long long _t77;
                                                              				signed int* _t90;
                                                              				signed long long _t95;
                                                              				signed long long _t96;
                                                              				signed long long _t98;
                                                              				signed long long _t104;
                                                              				long long _t115;
                                                              				void* _t117;
                                                              				void* _t120;
                                                              				signed long long* _t123;
                                                              				signed long long _t124;
                                                              				signed long long _t126;
                                                              				signed long long _t129;
                                                              				signed long long*** _t132;
                                                              
                                                              				_t52 = __edi;
                                                              				_t51 = __edx;
                                                              				 *((long long*)(_t117 + 8)) = __rbx;
                                                              				 *((long long*)(_t117 + 0x10)) = _t115;
                                                              				 *((long long*)(_t117 + 0x18)) = __rsi;
                                                              				_t66 =  *((intOrPtr*)(__rcx));
                                                              				_t132 = __rcx;
                                                              				_t90 =  *_t66;
                                                              				if (_t90 == 0) goto 0x800069ac;
                                                              				_t124 =  *0x80021010; // 0xf101478280a5
                                                              				_t111 = _t124 ^  *_t90;
                                                              				asm("dec eax");
                                                              				_t74 = _t124 ^ _t90[4];
                                                              				asm("dec ecx");
                                                              				asm("dec eax");
                                                              				if ((_t124 ^ _t90[2]) != _t74) goto 0x8000691e;
                                                              				_t76 = _t74 - (_t124 ^  *_t90) >> 3;
                                                              				_t101 =  >  ? _t66 : _t76;
                                                              				_t6 = _t115 + 0x20; // 0x20
                                                              				_t102 = ( >  ? _t66 : _t76) + _t76;
                                                              				_t103 =  ==  ? _t66 : ( >  ? _t66 : _t76) + _t76;
                                                              				if (( ==  ? _t66 : ( >  ? _t66 : _t76) + _t76) - _t76 < 0) goto 0x800068ba;
                                                              				_t7 = _t115 + 8; // 0x8
                                                              				r8d = _t7;
                                                              				E0000000118000A344(_t6, _t76, _t111,  ==  ? _t66 : ( >  ? _t66 : _t76) + _t76, _t111, _t115, _t120);
                                                              				_t24 = E0000000118000878C(_t66, _t111);
                                                              				if (_t66 != 0) goto 0x800068e2;
                                                              				_t104 = _t76 + 4;
                                                              				r8d = 8;
                                                              				E0000000118000A344(_t24, _t76, _t111, _t104, _t111, _t115, _t120);
                                                              				_t129 = _t66;
                                                              				_t26 = E0000000118000878C(_t66, _t111);
                                                              				if (_t129 == 0) goto 0x800069ac;
                                                              				_t123 = _t129 + _t76 * 8;
                                                              				_t77 = _t129 + _t104 * 8;
                                                              				_t87 =  >  ? _t115 : _t77 - _t123 + 7 >> 3;
                                                              				_t64 =  >  ? _t115 : _t77 - _t123 + 7 >> 3;
                                                              				if (( >  ? _t115 : _t77 - _t123 + 7 >> 3) == 0) goto 0x8000691e;
                                                              				memset(_t52, _t26, 0 << 0);
                                                              				_t126 =  *0x80021010; // 0xf101478280a5
                                                              				r8d = 0x40;
                                                              				asm("dec eax");
                                                              				 *_t123 =  *(_t132[1]) ^ _t126;
                                                              				_t95 =  *0x80021010; // 0xf101478280a5
                                                              				asm("dec eax");
                                                              				 *( *( *_t132)) = _t129 ^ _t95;
                                                              				_t96 =  *0x80021010; // 0xf101478280a5
                                                              				asm("dec eax");
                                                              				( *( *_t132))[1] =  &(_t123[1]) ^ _t96;
                                                              				_t98 =  *0x80021010; // 0xf101478280a5
                                                              				r8d = r8d - (_t51 & 0x0000003f);
                                                              				asm("dec eax");
                                                              				( *( *_t132))[2] = _t77 ^ _t98;
                                                              				goto 0x800069af;
                                                              				return 0xffffffff;
                                                              			}
























                                                              0x180006818
                                                              0x180006818
                                                              0x180006818
                                                              0x18000681d
                                                              0x180006822
                                                              0x180006830
                                                              0x180006835
                                                              0x180006838
                                                              0x18000683e
                                                              0x180006844
                                                              0x180006851
                                                              0x18000685a
                                                              0x180006864
                                                              0x180006868
                                                              0x18000686b
                                                              0x180006871
                                                              0x18000687f
                                                              0x180006889
                                                              0x18000688d
                                                              0x180006890
                                                              0x180006893
                                                              0x18000689a
                                                              0x18000689c
                                                              0x18000689c
                                                              0x1800068a6
                                                              0x1800068b0
                                                              0x1800068b8
                                                              0x1800068ba
                                                              0x1800068be
                                                              0x1800068ca
                                                              0x1800068d1
                                                              0x1800068d4
                                                              0x1800068dc
                                                              0x1800068e9
                                                              0x1800068ed
                                                              0x180006905
                                                              0x180006909
                                                              0x18000690c
                                                              0x180006914
                                                              0x180006917
                                                              0x18000691e
                                                              0x18000693d
                                                              0x180006943
                                                              0x180006946
                                                              0x180006959
                                                              0x180006962
                                                              0x180006968
                                                              0x180006979
                                                              0x180006982
                                                              0x180006986
                                                              0x180006992
                                                              0x18000699b
                                                              0x1800069a6
                                                              0x1800069aa
                                                              0x1800069c7

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 66125d16ff0b32e256dde8720e794326bf559e2f75bb0b9fe279f413c53e15a7
                                                              • Instruction ID: cb99d1167c8630c4161f8148837d3d56db0acdce36f97f7f4c16ea76a7bcc33d
                                                              • Opcode Fuzzy Hash: 66125d16ff0b32e256dde8720e794326bf559e2f75bb0b9fe279f413c53e15a7
                                                              • Instruction Fuzzy Hash: BF41C272310A5886EF85CF6AD95479973A2B74CFD0F19D422EE4D97B68DE3CC2458300
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7c06dbbd4d7f5d8b5a7dc781beb13b4593c6bbd5bd7959e7c7b22318daacb787
                                                              • Instruction ID: 1768a06fcdceadd9971c820c0a3bf40d38ff8a366fb6821e4e5f8ff9f9785adf
                                                              • Opcode Fuzzy Hash: 7c06dbbd4d7f5d8b5a7dc781beb13b4593c6bbd5bd7959e7c7b22318daacb787
                                                              • Instruction Fuzzy Hash: ED5129709047499BDF48CF69C8895DEBBF1FB48318F11835CE88AA72A0D7B89A44CF45
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ef86ec4cbab15db66684acca6e4eefc0d9a17a46b067acd768dfc4f73c7d9e5d
                                                              • Instruction ID: fc10cfbc90e4569f3d2a33d35a67df5d0e2e9ba6fa1ca8f795555cbbcb448d09
                                                              • Opcode Fuzzy Hash: ef86ec4cbab15db66684acca6e4eefc0d9a17a46b067acd768dfc4f73c7d9e5d
                                                              • Instruction Fuzzy Hash: 3C51B2B090474E8FDB48CF68D49A5DE7FB0FB68398F204619E81596290D7B4D6A5CFC0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c42ee451b46e72c4fc1e7808b655d0298a624ad59252fa9ca8600e6c0870c205
                                                              • Instruction ID: f897de9748848705cabb03a803129e9ee402035cf435d5b82a32c16c7be7080b
                                                              • Opcode Fuzzy Hash: c42ee451b46e72c4fc1e7808b655d0298a624ad59252fa9ca8600e6c0870c205
                                                              • Instruction Fuzzy Hash: 7B51A4B090438E8FDB88CF68D88A5CE7BF0FB58358F105619E865A6250D3B8D664CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1190db60a81a9605ea1e1068c6cf6b0ac0731fea71818b2d4916113a12896c76
                                                              • Instruction ID: 94d4e7a141561695504c80503900f808a3bb26c71e382dcb3354acc1d318a87b
                                                              • Opcode Fuzzy Hash: 1190db60a81a9605ea1e1068c6cf6b0ac0731fea71818b2d4916113a12896c76
                                                              • Instruction Fuzzy Hash: 8551ADB490438E8FDB48CF68C88A5DF7BB1FB58348F004A19EC65A6250D3B8D665CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4555d26f65456cde840fc2f4c666a8d56836cf0868c008055827d07d980c0c85
                                                              • Instruction ID: f1330e5aed04dc1a33c203903c042a42e66e327ce52fa2a6fa1416b10b3ba71e
                                                              • Opcode Fuzzy Hash: 4555d26f65456cde840fc2f4c666a8d56836cf0868c008055827d07d980c0c85
                                                              • Instruction Fuzzy Hash: AD41C3B090074E8FDB48DF64C48A5DE7FB0FB68388F104619E85AA6250D378D6A4CFC5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c2ca811980bf69d3a725c6de3b3fc4f76b8583c10f578fbad8bf36fe51f88080
                                                              • Instruction ID: ffc56fd7168c6e695a14d31422796184757635042a1164aedc04677320af0710
                                                              • Opcode Fuzzy Hash: c2ca811980bf69d3a725c6de3b3fc4f76b8583c10f578fbad8bf36fe51f88080
                                                              • Instruction Fuzzy Hash: 9B3175B052D781ABD38CDF28D59991ABBE1FB89304F806A2DF98687350D774D445CB07
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 830eef0a3232ecb80f2826221d342755302fd87f2307e2f844fd0bd61878f91c
                                                              • Instruction ID: efbb35fdfc96545695bc25e3bd00db16034c98cb8ef7f57b9f660a286bfd5c46
                                                              • Opcode Fuzzy Hash: 830eef0a3232ecb80f2826221d342755302fd87f2307e2f844fd0bd61878f91c
                                                              • Instruction Fuzzy Hash: 5F315AB450C7848BD348DF28C54A51ABBE1BB8D309F404B5DF8CAAA360D778D615CB4B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2f0004951027548f87f8e7a2444adc3bba6861f54e8d6066d46ca53370045021
                                                              • Instruction ID: 623f27fec58fef4aaa379f7fbafc113b066f1698bb351901cc59bf5a19c6bb77
                                                              • Opcode Fuzzy Hash: 2f0004951027548f87f8e7a2444adc3bba6861f54e8d6066d46ca53370045021
                                                              • Instruction Fuzzy Hash: 1B218E70629380AFD388DF28D48981ABBF0BB89344F806A2DF8C68B360D775D445CB03
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319594851.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2301000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3eb31fd98d478cbf7892b0886e03ca27d91577c01988fac24f665ec931eb86f0
                                                              • Instruction ID: 199196ca8ace7e8d42d391659d5c3f2c80ec6c3440db0b61eb753a63f83db2a3
                                                              • Opcode Fuzzy Hash: 3eb31fd98d478cbf7892b0886e03ca27d91577c01988fac24f665ec931eb86f0
                                                              • Instruction Fuzzy Hash: 622146B45187858BD349DF28D49941ABBE0FB8C31CF805B2DF4CAAA264D378D645CB0A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 86%
                                                              			E000000011800070A0(intOrPtr __ebx, intOrPtr __edx, signed int __rax, signed int __rdx, void* __r8, signed long long _a8) {
                                                              				intOrPtr _v12;
                                                              				intOrPtr _v16;
                                                              				intOrPtr _v20;
                                                              				void* _t25;
                                                              
                                                              				_t25 = __r8;
                                                              				r8d = 0;
                                                              				 *0x800223a8 = r8d;
                                                              				_t1 = _t25 + 1; // 0x1
                                                              				r9d = _t1;
                                                              				asm("cpuid");
                                                              				_v16 = r9d;
                                                              				_v16 = 0;
                                                              				_v20 = __ebx;
                                                              				_v12 = __edx;
                                                              				if (0 != 0x18001000) goto 0x80007101;
                                                              				asm("xgetbv");
                                                              				_a8 = __rdx << 0x00000020 | __rax;
                                                              				r8d =  *0x800223a8; // 0x1
                                                              				r8d =  ==  ? r9d : r8d;
                                                              				 *0x800223a8 = r8d;
                                                              				 *0x800223ac = r8d;
                                                              				return 0;
                                                              			}







                                                              0x1800070a0
                                                              0x1800070a6
                                                              0x1800070ab
                                                              0x1800070b2
                                                              0x1800070b2
                                                              0x1800070b9
                                                              0x1800070bb
                                                              0x1800070c3
                                                              0x1800070c9
                                                              0x1800070cd
                                                              0x1800070d3
                                                              0x1800070d7
                                                              0x1800070e1
                                                              0x1800070eb
                                                              0x1800070f6
                                                              0x1800070fa
                                                              0x180007101
                                                              0x18000710f

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c9ee34aa5c89bc7d17368121c5bc84d136a52ab8ed5c42389172ea663d2f6f8f
                                                              • Instruction ID: 0b5ba2cec2f3816840067680c3456701fe7a71aa0eb5ae5909cae72e813b022f
                                                              • Opcode Fuzzy Hash: c9ee34aa5c89bc7d17368121c5bc84d136a52ab8ed5c42389172ea663d2f6f8f
                                                              • Instruction Fuzzy Hash: B2F062717142989EDBEACF6CA84275A77D0E30C3C0F90C029E6D983B04D63C82A48F44
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: GestureInfo$CloseHandle
                                                              • String ID: 8
                                                              • API String ID: 372500805-4194326291
                                                              • Opcode ID: fdc52a30d4232624ee8151016c0fb58607a1878d599af251dc45c002f5d40a09
                                                              • Instruction ID: 9b1c06a3f3b833ac3e132f42adadd70dae9d03e82ad46587f4b990887cf4d8b3
                                                              • Opcode Fuzzy Hash: fdc52a30d4232624ee8151016c0fb58607a1878d599af251dc45c002f5d40a09
                                                              • Instruction Fuzzy Hash: B8D1DD76608F888AD765CB29E45439EB7A0F7C9BD0F508116EACE83768DF78C545CB01
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: PaintProcWindow$BeginMessagePostQuit
                                                              • String ID: i
                                                              • API String ID: 3181456275-3865851505
                                                              • Opcode ID: fcb843795d6400421a4bb60a8f9f2442e166c0b7f90a62d720e089610d409317
                                                              • Instruction ID: 3856721ac4770c8f636c1cd384f04675dc9eeb63fc6bf43fe2054305ebc0c00e
                                                              • Opcode Fuzzy Hash: fcb843795d6400421a4bb60a8f9f2442e166c0b7f90a62d720e089610d409317
                                                              • Instruction Fuzzy Hash: FA51ED32518AC8C6E7B2DB55E4543DEB360F788784F609516F6CA52A98CFBCC548DF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Object$LineMoveSelect$CreateDeletePolyline
                                                              • String ID:
                                                              • API String ID: 1917832262-0
                                                              • Opcode ID: 6075ceb34f4407423de1dccbff4bd8bdfe60344340a25c122dca44a040083570
                                                              • Instruction ID: 377a05cc6cc4517dbb54ffd3f6057de865f15df1cc6264ad20f86e3ae03f80f6
                                                              • Opcode Fuzzy Hash: 6075ceb34f4407423de1dccbff4bd8bdfe60344340a25c122dca44a040083570
                                                              • Instruction Fuzzy Hash: CDB12276604B848AD766CB38E05135AF7A5F7C9784F108216EACE53B69DF3CD5498F00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 66%
                                                              			E00000001180003328(intOrPtr __ecx, void* __edx, void* __esi, intOrPtr* __rcx, long long __rdx, long long __r8, long long __r9, void* __r10) {
                                                              				void* __rbx;
                                                              				void* __rdi;
                                                              				void* __rsi;
                                                              				void* __rbp;
                                                              				signed int* _t128;
                                                              				void* _t145;
                                                              				intOrPtr _t146;
                                                              				intOrPtr _t154;
                                                              				void* _t173;
                                                              				intOrPtr _t176;
                                                              				signed int _t177;
                                                              				signed int _t178;
                                                              				void* _t209;
                                                              				signed long long _t219;
                                                              				signed long long _t220;
                                                              				signed long long _t226;
                                                              				long long _t228;
                                                              				signed int _t235;
                                                              				intOrPtr* _t236;
                                                              				intOrPtr* _t237;
                                                              				signed long long _t246;
                                                              				long long _t267;
                                                              				signed int* _t280;
                                                              				long long _t281;
                                                              				void* _t282;
                                                              				void* _t283;
                                                              				signed long long _t284;
                                                              				long long _t296;
                                                              				signed int _t307;
                                                              				unsigned long long _t313;
                                                              
                                                              				_t180 = __esi;
                                                              				_t282 = _t283 - 0x28;
                                                              				_t284 = _t283 - 0x128;
                                                              				_t219 =  *0x80021010; // 0xf101478280a5
                                                              				_t220 = _t219 ^ _t284;
                                                              				 *(_t282 + 0x10) = _t220;
                                                              				_t280 =  *((intOrPtr*)(_t282 + 0x90));
                                                              				_t307 =  *((intOrPtr*)(_t282 + 0xa8));
                                                              				 *((long long*)(_t284 + 0x68)) = __r8;
                                                              				_t236 = __rcx;
                                                              				 *((long long*)(_t284 + 0x78)) = __rdx;
                                                              				 *(_t282 - 0x68) = _t307;
                                                              				 *((char*)(_t284 + 0x60)) = 0;
                                                              				_t281 = __r9;
                                                              				_t128 = E0000000118000427C(__ecx, __esi, __rcx, __rdx, __r9, __r9, _t282, _t280, __r9);
                                                              				r14d = _t128;
                                                              				if (_t128 - 0xffffffff < 0) goto 0x800037f7;
                                                              				if (_t128 - _t280[1] >= 0) goto 0x800037f7;
                                                              				if ( *_t236 != 0xe06d7363) goto 0x80003474;
                                                              				if ( *((intOrPtr*)(_t236 + 0x18)) != 4) goto 0x80003474;
                                                              				if ( *((intOrPtr*)(_t236 + 0x20)) - 0x19930520 - 2 > 0) goto 0x80003474;
                                                              				if ( *((long long*)(_t236 + 0x30)) != 0) goto 0x80003474;
                                                              				E00000001180002D40(_t220);
                                                              				if ( *((long long*)(_t220 + 0x20)) == 0) goto 0x80003790;
                                                              				E00000001180002D40(_t220);
                                                              				_t237 =  *((intOrPtr*)(_t220 + 0x20));
                                                              				E00000001180002D40(_t220);
                                                              				 *((char*)(_t284 + 0x60)) = 1;
                                                              				 *((long long*)(_t284 + 0x68)) =  *((intOrPtr*)(_t220 + 0x28));
                                                              				E00000001180002448(_t220,  *((intOrPtr*)(_t237 + 0x38)));
                                                              				if ( *_t237 != 0xe06d7363) goto 0x8000342c;
                                                              				if ( *((intOrPtr*)(_t237 + 0x18)) != 4) goto 0x8000342c;
                                                              				if ( *((intOrPtr*)(_t237 + 0x20)) - 0x19930520 - 2 > 0) goto 0x8000342c;
                                                              				if ( *((long long*)(_t237 + 0x30)) == 0) goto 0x800037f7;
                                                              				E00000001180002D40(_t220);
                                                              				if ( *(_t220 + 0x38) == 0) goto 0x80003474;
                                                              				E00000001180002D40(_t220);
                                                              				E00000001180002D40(_t220);
                                                              				 *(_t220 + 0x38) =  *(_t220 + 0x38) & 0x00000000;
                                                              				if (E00000001180004314(_t220, _t237, _t237,  *(_t220 + 0x38), __r9) != 0) goto 0x8000346f;
                                                              				if (E00000001180004404(_t220, _t237,  *(_t220 + 0x38), __r9, _t282) == 0) goto 0x800037d4;
                                                              				goto 0x800037b0;
                                                              				 *((long long*)(_t282 - 0x40)) =  *((intOrPtr*)(__r9 + 8));
                                                              				 *(_t282 - 0x48) = _t280;
                                                              				if ( *_t237 != 0xe06d7363) goto 0x80003747;
                                                              				if ( *((intOrPtr*)(_t237 + 0x18)) != 4) goto 0x80003747;
                                                              				if ( *((intOrPtr*)(_t237 + 0x20)) - 0x19930520 - 2 > 0) goto 0x80003747;
                                                              				r15d = 0;
                                                              				if (_t280[3] - r15d <= 0) goto 0x80003678;
                                                              				 *(_t284 + 0x28) =  *(_t282 + 0xa0);
                                                              				 *(_t284 + 0x20) = _t280;
                                                              				r8d = r14d;
                                                              				_t145 = E00000001180002134(_t237, _t282 - 0x28, _t282 - 0x48, __r9, _t282, _t280, __r9, __r10);
                                                              				asm("movups xmm0, [ebp-0x28]");
                                                              				asm("movdqu [ebp-0x38], xmm0");
                                                              				asm("psrldq xmm0, 0x8");
                                                              				asm("movd eax, xmm0");
                                                              				if (_t145 -  *((intOrPtr*)(_t282 - 0x10)) >= 0) goto 0x80003678;
                                                              				_t296 =  *((intOrPtr*)(_t282 - 0x28));
                                                              				r13d =  *((intOrPtr*)(_t282 - 0x30));
                                                              				 *((long long*)(_t282 - 0x80)) = _t296;
                                                              				_t146 = r13d;
                                                              				asm("inc ecx");
                                                              				 *((intOrPtr*)(_t282 - 0x50)) = __ecx;
                                                              				asm("movd eax, xmm0");
                                                              				asm("movups [ebp-0x60], xmm0");
                                                              				if (_t146 - r14d > 0) goto 0x8000366b;
                                                              				_t226 =  *(_t282 - 0x60) >> 0x20;
                                                              				if (r14d - _t146 > 0) goto 0x8000366b;
                                                              				r12d = r15d;
                                                              				_t267 =  *((intOrPtr*)( *((intOrPtr*)( *( *(_t282 - 0x38)) + 0x10)) + ( *( *(_t282 - 0x38)) +  *( *(_t282 - 0x38)) * 4) * 4 +  *((intOrPtr*)(_t296 + 8)) + 0x10)) +  *((intOrPtr*)(__r9 + 8));
                                                              				_t313 =  *(_t282 - 0x58) >> 0x20;
                                                              				 *((long long*)(_t282 - 0x70)) = _t267;
                                                              				if (r15d == 0) goto 0x80003658;
                                                              				_t246 = _t226 + _t226 * 4;
                                                              				asm("movups xmm0, [edx+ecx*4]");
                                                              				asm("movups [ebp-0x8], xmm0");
                                                              				_t59 = _t246 * 4; // 0x48ccccc35f40c483
                                                              				 *((intOrPtr*)(_t282 + 8)) =  *((intOrPtr*)(_t267 + _t59 + 0x10));
                                                              				E0000000118000241C(_t226);
                                                              				_t228 = _t226 + 4 +  *((intOrPtr*)( *((intOrPtr*)(_t237 + 0x30)) + 0xc));
                                                              				 *((long long*)(_t284 + 0x70)) = _t228;
                                                              				E0000000118000241C(_t228);
                                                              				_t176 =  *((intOrPtr*)(_t228 +  *((intOrPtr*)( *((intOrPtr*)(_t237 + 0x30)) + 0xc))));
                                                              				 *((intOrPtr*)(_t284 + 0x64)) = _t176;
                                                              				if (_t176 <= 0) goto 0x800035e8;
                                                              				E0000000118000241C(_t228);
                                                              				 *((long long*)(_t282 - 0x78)) = _t228 +  *((intOrPtr*)( *((intOrPtr*)(_t284 + 0x70))));
                                                              				if (E00000001180003A1C(_t180, _t237, _t282 - 8, _t228 +  *((intOrPtr*)( *((intOrPtr*)(_t284 + 0x70)))), _t280, __r9,  *((intOrPtr*)(_t237 + 0x30))) != 0) goto 0x800035f9;
                                                              				 *((long long*)(_t284 + 0x70)) =  *((long long*)(_t284 + 0x70)) + 4;
                                                              				_t154 =  *((intOrPtr*)(_t284 + 0x64)) - 1;
                                                              				 *((intOrPtr*)(_t284 + 0x64)) = _t154;
                                                              				if (_t154 > 0) goto 0x800035ac;
                                                              				r12d = r12d + 1;
                                                              				if (r12d == r15d) goto 0x8000365f;
                                                              				goto 0x80003565;
                                                              				 *((char*)(_t284 + 0x58)) =  *((intOrPtr*)(_t282 + 0x98));
                                                              				 *(_t284 + 0x50) =  *((intOrPtr*)(_t284 + 0x60));
                                                              				 *((long long*)(_t284 + 0x48)) =  *(_t282 - 0x68);
                                                              				 *(_t284 + 0x40) =  *(_t282 + 0xa0);
                                                              				 *(_t284 + 0x38) = _t282 - 0x60;
                                                              				 *(_t284 + 0x30) =  *((intOrPtr*)(_t282 - 0x78));
                                                              				 *(_t284 + 0x28) = _t282 - 8;
                                                              				 *(_t284 + 0x20) = _t280;
                                                              				E00000001180003254(_t180, _t237, _t237,  *((intOrPtr*)(_t284 + 0x78)),  *((intOrPtr*)(_t284 + 0x68)), _t281);
                                                              				goto 0x80003664;
                                                              				goto 0x80003668;
                                                              				r15d = 0;
                                                              				r13d = r13d + 1;
                                                              				if (r13d -  *((intOrPtr*)(_t282 - 0x10)) < 0) goto 0x800034fd;
                                                              				if (( *_t280 & 0x1fffffff) - 0x19930521 < 0) goto 0x80003784;
                                                              				_t209 = _t280[8] - r15d;
                                                              				if (_t209 == 0) goto 0x8000369e;
                                                              				E00000001180002408(_t282 - 8);
                                                              				if (_t209 != 0) goto 0x800036bf;
                                                              				if ((_t280[9] >> 0x00000002 & 0x00000001) == 0) goto 0x80003784;
                                                              				if (E00000001180001FD8(_t280[9] >> 0x00000002 & 0x00000001, _t282 - 8 + _t280[8], _t281, _t280) != 0) goto 0x80003784;
                                                              				if ((_t280[9] >> 0x00000002 & 0x00000001) != 0) goto 0x800037da;
                                                              				if (_t280[8] == r15d) goto 0x800036e4;
                                                              				E00000001180002408(_t282 - 8 + _t280[8]);
                                                              				_t235 = _t280[8];
                                                              				goto 0x800036e7;
                                                              				if (E00000001180004314(_t235, _t237, _t237, _t313, _t281) != 0) goto 0x80003784;
                                                              				E00000001180002068(_t237,  *((intOrPtr*)(_t284 + 0x78)), _t281, _t282, _t280, _t282 - 0x78);
                                                              				_t177 =  *((intOrPtr*)(_t282 + 0x98));
                                                              				 *(_t284 + 0x50) = _t177;
                                                              				_t178 = _t177 | 0xffffffff;
                                                              				 *((long long*)(_t284 + 0x48)) = _t281;
                                                              				 *(_t284 + 0x40) = _t313;
                                                              				 *(_t284 + 0x38) = _t178;
                                                              				 *(_t284 + 0x30) = _t178;
                                                              				 *(_t284 + 0x28) = _t280;
                                                              				 *(_t284 + 0x20) = _t313;
                                                              				E00000001180002274( *((intOrPtr*)(_t284 + 0x78)), _t237,  *((intOrPtr*)(_t284 + 0x68)), _t235);
                                                              				goto 0x80003784;
                                                              				if (_t280[3] <= 0) goto 0x80003784;
                                                              				if ( *((char*)(_t282 + 0x98)) != 0) goto 0x800037f7;
                                                              				 *(_t284 + 0x38) = _t307;
                                                              				 *(_t284 + 0x30) =  *(_t282 + 0xa0);
                                                              				 *(_t284 + 0x28) = r14d;
                                                              				 *(_t284 + 0x20) = _t280;
                                                              				E00000001180003800(_t237, _t237,  *((intOrPtr*)(_t284 + 0x78)), _t313, _t281);
                                                              				_t173 = E00000001180002D40(_t235);
                                                              				if ( *((long long*)(_t235 + 0x38)) != 0) goto 0x800037f7;
                                                              				return E000000011800010B0(_t173, _t178,  *(_t282 + 0x10) ^ _t284);
                                                              			}

































                                                              0x180003328
                                                              0x180003335
                                                              0x18000333a
                                                              0x180003341
                                                              0x180003348
                                                              0x18000334b
                                                              0x18000334f
                                                              0x180003359
                                                              0x180003363
                                                              0x180003368
                                                              0x18000336b
                                                              0x180003376
                                                              0x18000337d
                                                              0x180003382
                                                              0x180003385
                                                              0x18000338a
                                                              0x180003390
                                                              0x180003399
                                                              0x1800033a5
                                                              0x1800033af
                                                              0x1800033c0
                                                              0x1800033cb
                                                              0x1800033d1
                                                              0x1800033db
                                                              0x1800033e1
                                                              0x1800033e6
                                                              0x1800033ea
                                                              0x1800033f3
                                                              0x1800033fc
                                                              0x180003401
                                                              0x18000340c
                                                              0x180003412
                                                              0x18000341f
                                                              0x180003426
                                                              0x18000342c
                                                              0x180003436
                                                              0x180003438
                                                              0x180003441
                                                              0x18000344c
                                                              0x180003458
                                                              0x180003464
                                                              0x18000346a
                                                              0x180003478
                                                              0x18000347c
                                                              0x180003486
                                                              0x180003490
                                                              0x1800034a1
                                                              0x1800034a7
                                                              0x1800034ae
                                                              0x1800034be
                                                              0x1800034c9
                                                              0x1800034ce
                                                              0x1800034d1
                                                              0x1800034d6
                                                              0x1800034da
                                                              0x1800034df
                                                              0x1800034e4
                                                              0x1800034eb
                                                              0x1800034f1
                                                              0x1800034f5
                                                              0x1800034f9
                                                              0x180003508
                                                              0x180003517
                                                              0x180003521
                                                              0x180003524
                                                              0x180003528
                                                              0x18000352f
                                                              0x180003539
                                                              0x180003540
                                                              0x180003546
                                                              0x18000354c
                                                              0x180003554
                                                              0x180003558
                                                              0x18000355f
                                                              0x180003568
                                                              0x18000356c
                                                              0x180003570
                                                              0x180003574
                                                              0x180003578
                                                              0x18000357b
                                                              0x18000358c
                                                              0x18000358f
                                                              0x180003594
                                                              0x1800035a1
                                                              0x1800035a4
                                                              0x1800035aa
                                                              0x1800035ac
                                                              0x1800035c7
                                                              0x1800035d2
                                                              0x1800035d8
                                                              0x1800035de
                                                              0x1800035e0
                                                              0x1800035e6
                                                              0x1800035e8
                                                              0x1800035ee
                                                              0x1800035f4
                                                              0x180003612
                                                              0x18000361a
                                                              0x180003622
                                                              0x18000362d
                                                              0x180003635
                                                              0x18000363e
                                                              0x180003647
                                                              0x18000364c
                                                              0x180003651
                                                              0x180003656
                                                              0x18000365d
                                                              0x180003668
                                                              0x18000366b
                                                              0x180003672
                                                              0x180003684
                                                              0x18000368a
                                                              0x18000368e
                                                              0x180003690
                                                              0x18000369c
                                                              0x1800036a6
                                                              0x1800036b9
                                                              0x1800036c7
                                                              0x1800036d1
                                                              0x1800036d3
                                                              0x1800036db
                                                              0x1800036e2
                                                              0x1800036f1
                                                              0x180003704
                                                              0x180003709
                                                              0x18000371a
                                                              0x18000371e
                                                              0x180003721
                                                              0x180003726
                                                              0x18000372b
                                                              0x18000372f
                                                              0x180003736
                                                              0x18000373b
                                                              0x180003740
                                                              0x180003745
                                                              0x18000374b
                                                              0x180003754
                                                              0x180003763
                                                              0x18000376b
                                                              0x180003772
                                                              0x18000377a
                                                              0x18000377f
                                                              0x180003784
                                                              0x18000378e
                                                              0x1800037af

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: b6b7f02adf660401896063c6a860fb7c8eea0d446ae07e01c980b744b2235902
                                                              • Instruction ID: 68369fba8b053f101f7a0a57f2a328d7db6ec17b1fffbc4fe0a5b608d0144455
                                                              • Opcode Fuzzy Hash: b6b7f02adf660401896063c6a860fb7c8eea0d446ae07e01c980b744b2235902
                                                              • Instruction Fuzzy Hash: C0E1B272604B888AEBA6DF66D4423DD77A4F749BC8F008116FE8957B96CF34D698C700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 77%
                                                              			E0000000118000A3DC(void* __ecx, long long __rbx, void* __rdx, signed int __rsi, void* __r8, void* __r9) {
                                                              				void* _t35;
                                                              				signed long long _t56;
                                                              				intOrPtr _t60;
                                                              				void* _t71;
                                                              				signed long long _t72;
                                                              				long long _t78;
                                                              				void* _t82;
                                                              				signed long long _t88;
                                                              				signed long long _t89;
                                                              				signed long long _t90;
                                                              				WCHAR* _t91;
                                                              				long _t94;
                                                              				void* _t97;
                                                              				WCHAR* _t102;
                                                              
                                                              				 *((long long*)(_t82 + 8)) = __rbx;
                                                              				 *((long long*)(_t82 + 0x10)) = _t78;
                                                              				 *((long long*)(_t82 + 0x18)) = __rsi;
                                                              				r15d = __ecx;
                                                              				_t72 = _t71 | 0xffffffff;
                                                              				_t89 =  *0x80021010; // 0xf101478280a5
                                                              				_t88 =  *(0x180000000 + 0x226f0 + _t102 * 8) ^ _t89;
                                                              				asm("dec ecx");
                                                              				if (_t88 == _t72) goto 0x8000a51f;
                                                              				if (_t88 == 0) goto 0x8000a441;
                                                              				_t56 = _t88;
                                                              				goto 0x8000a521;
                                                              				if (__r8 == __r9) goto 0x8000a504;
                                                              				_t60 =  *((intOrPtr*)(0x180000000 + 0x22640 + __rsi * 8));
                                                              				if (_t60 == 0) goto 0x8000a469;
                                                              				if (_t60 != _t72) goto 0x8000a55e;
                                                              				goto 0x8000a4f0;
                                                              				r8d = 0x800;
                                                              				LoadLibraryExW(_t102, _t97, _t94);
                                                              				if (_t56 != 0) goto 0x8000a53e;
                                                              				if (GetLastError() != 0x57) goto 0x8000a4de;
                                                              				_t14 = _t56 - 0x50; // -80
                                                              				_t35 = _t14;
                                                              				r8d = _t35;
                                                              				if (E00000001180007070(__r8) == 0) goto 0x8000a4de;
                                                              				r8d = _t35;
                                                              				if (E00000001180007070(__r8) == 0) goto 0x8000a4de;
                                                              				r8d = 0;
                                                              				LoadLibraryExW(_t91, _t71);
                                                              				if (_t56 != 0) goto 0x8000a53e;
                                                              				 *((intOrPtr*)(0x180000000 + 0x22640 + __rsi * 8)) = _t72;
                                                              				if (__r8 + 4 != __r9) goto 0x8000a44a;
                                                              				_t90 =  *0x80021010; // 0xf101478280a5
                                                              				asm("dec eax");
                                                              				 *(0x180000000 + 0x226f0 + _t102 * 8) = _t72 ^ _t90;
                                                              				return 0;
                                                              			}

















                                                              0x18000a3dc
                                                              0x18000a3e1
                                                              0x18000a3e6
                                                              0x18000a3f8
                                                              0x18000a402
                                                              0x18000a418
                                                              0x18000a41f
                                                              0x18000a428
                                                              0x18000a42e
                                                              0x18000a437
                                                              0x18000a439
                                                              0x18000a43c
                                                              0x18000a444
                                                              0x18000a44d
                                                              0x18000a459
                                                              0x18000a45e
                                                              0x18000a464
                                                              0x18000a476
                                                              0x18000a47c
                                                              0x18000a488
                                                              0x18000a497
                                                              0x18000a499
                                                              0x18000a499
                                                              0x18000a49f
                                                              0x18000a4b0
                                                              0x18000a4b2
                                                              0x18000a4c6
                                                              0x18000a4c8
                                                              0x18000a4d0
                                                              0x18000a4dc
                                                              0x18000a4e8
                                                              0x18000a4f7
                                                              0x18000a4fd
                                                              0x18000a511
                                                              0x18000a517
                                                              0x18000a53d

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 4973cf4a17c5a6c0ea837db478b6f4f53bca8011a61d94df8f11c1c7fa6ad517
                                                              • Instruction ID: 4cb29e05f73c92bcfdeebd25cdbb701ff5eb44b215489781f60aaecc25d2491e
                                                              • Opcode Fuzzy Hash: 4973cf4a17c5a6c0ea837db478b6f4f53bca8011a61d94df8f11c1c7fa6ad517
                                                              • Instruction Fuzzy Hash: ED41D032715A0856FBA7CB16AC047D53391B78EBE0F09C225BD1D47798EE38C64D8300
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 50%
                                                              			E000000011800045BC(void* __ecx, long long __rbx, void* __rdx, signed int __rsi, void* __r8, void* __r9) {
                                                              				intOrPtr _t61;
                                                              				intOrPtr _t65;
                                                              				intOrPtr _t67;
                                                              				intOrPtr _t68;
                                                              				struct HINSTANCE__* _t81;
                                                              				long long _t85;
                                                              				void* _t89;
                                                              				struct HINSTANCE__* _t94;
                                                              				long _t97;
                                                              				void* _t100;
                                                              				signed long long _t101;
                                                              				WCHAR* _t104;
                                                              
                                                              				 *((long long*)(_t89 + 8)) = __rbx;
                                                              				 *((long long*)(_t89 + 0x10)) = _t85;
                                                              				 *((long long*)(_t89 + 0x18)) = __rsi;
                                                              				_t101 = _t100 | 0xffffffff;
                                                              				_t61 =  *((intOrPtr*)(0x180000000 + 0x22208 + _t81 * 8));
                                                              				if (_t61 == _t101) goto 0x800046eb;
                                                              				if (_t61 != 0) goto 0x800046ed;
                                                              				if (__r8 == __r9) goto 0x800046e3;
                                                              				_t67 =  *((intOrPtr*)(0x180000000 + 0x221f0 + __rsi * 8));
                                                              				if (_t67 == 0) goto 0x8000462e;
                                                              				if (_t67 != _t101) goto 0x800046c5;
                                                              				goto 0x80004699;
                                                              				r8d = 0x800;
                                                              				LoadLibraryExW(_t104, _t100, _t97);
                                                              				_t68 = _t61;
                                                              				if (_t61 != 0) goto 0x800046a5;
                                                              				if (GetLastError() != 0x57) goto 0x80004687;
                                                              				_t14 = _t68 + 7; // 0x7
                                                              				r8d = _t14;
                                                              				if (E00000001180007070(__r8) == 0) goto 0x80004687;
                                                              				r8d = 0;
                                                              				LoadLibraryExW(??, ??, ??);
                                                              				if (_t61 != 0) goto 0x800046a5;
                                                              				 *((intOrPtr*)(0x180000000 + 0x221f0 + __rsi * 8)) = _t101;
                                                              				goto 0x8000460c;
                                                              				_t21 = 0x180000000 + 0x221f0 + __rsi * 8;
                                                              				_t65 =  *_t21;
                                                              				 *_t21 = _t61;
                                                              				if (_t65 == 0) goto 0x800046c5;
                                                              				FreeLibrary(_t94);
                                                              				GetProcAddress(_t81);
                                                              				if (_t65 == 0) goto 0x800046e3;
                                                              				 *((intOrPtr*)(0x180000000 + 0x22208 + _t81 * 8)) = _t65;
                                                              				goto 0x800046ed;
                                                              				 *((intOrPtr*)(0x180000000 + 0x22208 + _t81 * 8)) = _t101;
                                                              				return 0;
                                                              			}















                                                              0x1800045bc
                                                              0x1800045c1
                                                              0x1800045c6
                                                              0x1800045e1
                                                              0x1800045ee
                                                              0x1800045fa
                                                              0x180004603
                                                              0x18000460c
                                                              0x180004615
                                                              0x180004621
                                                              0x180004626
                                                              0x18000462c
                                                              0x18000463b
                                                              0x180004641
                                                              0x180004647
                                                              0x18000464d
                                                              0x180004658
                                                              0x18000465a
                                                              0x18000465a
                                                              0x18000466f
                                                              0x180004671
                                                              0x180004679
                                                              0x180004685
                                                              0x180004691
                                                              0x1800046a0
                                                              0x1800046af
                                                              0x1800046af
                                                              0x1800046af
                                                              0x1800046ba
                                                              0x1800046bf
                                                              0x1800046cb
                                                              0x1800046d4
                                                              0x1800046d9
                                                              0x1800046e1
                                                              0x1800046e3
                                                              0x180004709

                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 0000000180004641
                                                              • GetLastError.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 000000018000464F
                                                              • LoadLibraryExW.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 0000000180004679
                                                              • FreeLibrary.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 00000001800046BF
                                                              • GetProcAddress.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 00000001800046CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: d92b391dc074c551f2fff15d3caa28434169fc5b46989934520673f65e9ea010
                                                              • Instruction ID: a281eee05f5572a15ea3fe0403c4f12dabc44bbec878773a6143b276462e3048
                                                              • Opcode Fuzzy Hash: d92b391dc074c551f2fff15d3caa28434169fc5b46989934520673f65e9ea010
                                                              • Instruction Fuzzy Hash: 9F31F276302B48A1EE93DB02A8007D533E4B70DBE4F598625BE2D0B3A0EF39C24C8705
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 5bc48b536716d6500d6b4fd732b8b14869dbb673373b5a9a242e628548633fb8
                                                              • Instruction ID: c3c6b15d1e2a8e36adeeaa1ee2c0ab8803bf36c1bad1bc725f34006b2089cb00
                                                              • Opcode Fuzzy Hash: 5bc48b536716d6500d6b4fd732b8b14869dbb673373b5a9a242e628548633fb8
                                                              • Instruction Fuzzy Hash: A5214F3470668C42FAE7E73195553ED72926B6C7F0F58C624B83A07BDBDE6C8A494700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: 5f84935fb18113dc5388fb9af56135c4a8d61c8a22428d4b494f05fe971ce8aa
                                                              • Instruction ID: 0de398e34c1669cec19602a54f8a011ae7faefe96049ea3591aa14d2bab58b4a
                                                              • Opcode Fuzzy Hash: 5f84935fb18113dc5388fb9af56135c4a8d61c8a22428d4b494f05fe971ce8aa
                                                              • Instruction Fuzzy Hash: 7F115B31610F4886E7939B52F85439A73A0F79CBE4F048225FA5E87BA4CF78CA488740
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: LoadMessage$StringTranslate$AcceleratorClassCreateCursorDispatchRegisterWindow
                                                              • String ID:
                                                              • API String ID: 1967609040-0
                                                              • Opcode ID: 75c1782b7f7e477433b17d4cbabed80ab7ba6ec157a4fc5f42b14144684d98ab
                                                              • Instruction ID: 677205889e0bc738131920ca4d71d6e0d0c6d5bcb4ac294ec7d30bf60c9b59c6
                                                              • Opcode Fuzzy Hash: 75c1782b7f7e477433b17d4cbabed80ab7ba6ec157a4fc5f42b14144684d98ab
                                                              • Instruction Fuzzy Hash: 8611B932614E89D2E7A2DB61F8517DA7361F7D8784F508121FA8947A79DF3CC7198B00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 63%
                                                              			E00000001180003B5C(void* __esi, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, void* _a24, void* _a32, signed int* _a40, char _a48, signed int _a56, signed int _a64) {
                                                              				signed int _v32;
                                                              				long long _v40;
                                                              				char _v48;
                                                              				signed int* _v56;
                                                              				void* _t55;
                                                              				intOrPtr _t60;
                                                              				signed int _t101;
                                                              				void* _t109;
                                                              				intOrPtr _t111;
                                                              				signed int* _t115;
                                                              				intOrPtr* _t136;
                                                              				void* _t139;
                                                              				void* _t142;
                                                              				void* _t144;
                                                              				void* _t158;
                                                              				void* _t159;
                                                              
                                                              				_t109 = _t144;
                                                              				 *((long long*)(_t109 + 8)) = __rbx;
                                                              				 *((long long*)(_t109 + 0x10)) = __rbp;
                                                              				 *((long long*)(_t109 + 0x18)) = __rsi;
                                                              				 *((long long*)(_t109 + 0x20)) = __rdi;
                                                              				_t136 = __rcx;
                                                              				_t139 = __r9;
                                                              				_t159 = __r8;
                                                              				_t142 = __rdx;
                                                              				E00000001180004584(_t55, __r8);
                                                              				E00000001180002D40(_t109);
                                                              				_t115 = _a40;
                                                              				if ( *((intOrPtr*)(_t109 + 0x40)) != 0) goto 0x80003bde;
                                                              				if ( *__rcx == 0xe06d7363) goto 0x80003bde;
                                                              				if ( *__rcx != 0x80000029) goto 0x80003bc2;
                                                              				if ( *((intOrPtr*)(__rcx + 0x18)) != 0xf) goto 0x80003bc6;
                                                              				if ( *((long long*)(__rcx + 0x60)) == 0x19930520) goto 0x80003bde;
                                                              				if ( *__rcx == 0x80000026) goto 0x80003bde;
                                                              				if (( *_t115 & 0x1fffffff) - 0x19930522 < 0) goto 0x80003bde;
                                                              				if ((_t115[9] & 0x00000001) != 0) goto 0x80003d6d;
                                                              				if (( *(__rcx + 4) & 0x00000066) == 0) goto 0x80003c76;
                                                              				if (_t115[1] == 0) goto 0x80003d6d;
                                                              				if (_a48 != 0) goto 0x80003d6d;
                                                              				if (( *(__rcx + 4) & 0x00000020) == 0) goto 0x80003c63;
                                                              				if ( *__rcx != 0x80000026) goto 0x80003c41;
                                                              				_t60 = E00000001180002F2C(_t115, __r9,  *((intOrPtr*)(__r9 + 0x20)), __r9);
                                                              				if (_t60 - 0xffffffff < 0) goto 0x80003d8d;
                                                              				if (_t60 - _t115[1] >= 0) goto 0x80003d8d;
                                                              				r9d = _t60;
                                                              				E000000011800040F0(_t109, _t142, __r9, _t115);
                                                              				goto 0x80003d6d;
                                                              				if ( *_t136 != 0x80000029) goto 0x80003c63;
                                                              				r9d =  *((intOrPtr*)(_t136 + 0x38));
                                                              				if (r9d - 0xffffffff < 0) goto 0x80003d8d;
                                                              				if (r9d - _t115[1] >= 0) goto 0x80003d8d;
                                                              				goto 0x80003c31;
                                                              				E00000001180002004(r9d - _t115[1], _t109, _t115, __r9, __r9, _t115);
                                                              				goto 0x80003d6d;
                                                              				if (_t115[3] != 0) goto 0x80003cbe;
                                                              				if (( *_t115 & 0x1fffffff) - 0x19930521 < 0) goto 0x80003c9e;
                                                              				_t101 = _t115[8];
                                                              				if (_t101 == 0) goto 0x80003c9e;
                                                              				E00000001180002408(_t109);
                                                              				if (_t101 != 0) goto 0x80003cbe;
                                                              				if (( *_t115 & 0x1fffffff) - 0x19930522 < 0) goto 0x80003d6d;
                                                              				if ((_t115[9] >> 0x00000002 & 0x00000001) == 0) goto 0x80003d6d;
                                                              				if ( *_t136 != 0xe06d7363) goto 0x80003d34;
                                                              				if ( *((intOrPtr*)(_t136 + 0x18)) - 3 < 0) goto 0x80003d34;
                                                              				if ( *((intOrPtr*)(_t136 + 0x20)) - 0x19930522 <= 0) goto 0x80003d34;
                                                              				_t111 =  *((intOrPtr*)(_t136 + 0x30));
                                                              				if ( *((intOrPtr*)(_t111 + 8)) == 0) goto 0x80003d34;
                                                              				E0000000118000241C(_t111);
                                                              				if (_t111 +  *((intOrPtr*)( *((intOrPtr*)(_t136 + 0x30)) + 8)) == 0) goto 0x80003d34;
                                                              				_v32 = _a64 & 0x000000ff;
                                                              				_v40 = _a56;
                                                              				_v48 = _a48;
                                                              				_v56 = _t115;
                                                              				 *0x80016370(_t158);
                                                              				goto 0x80003d72;
                                                              				_v32 = _a56;
                                                              				_v40 = _a48;
                                                              				_v48 = _a64;
                                                              				_v56 = _t115;
                                                              				E00000001180003328(_a64 & 0x000000ff, 0x80000026, __esi, _t136, _t142, _t159, _t139, _t111 +  *((intOrPtr*)( *((intOrPtr*)(_t136 + 0x30)) + 8)));
                                                              				return 1;
                                                              			}



















                                                              0x180003b5c
                                                              0x180003b5f
                                                              0x180003b63
                                                              0x180003b67
                                                              0x180003b6b
                                                              0x180003b75
                                                              0x180003b78
                                                              0x180003b7e
                                                              0x180003b81
                                                              0x180003b84
                                                              0x180003b89
                                                              0x180003b8e
                                                              0x180003ba4
                                                              0x180003bac
                                                              0x180003bb0
                                                              0x180003bb6
                                                              0x180003bc0
                                                              0x180003bc4
                                                              0x180003bd2
                                                              0x180003bd8
                                                              0x180003be2
                                                              0x180003bec
                                                              0x180003bfa
                                                              0x180003c04
                                                              0x180003c08
                                                              0x180003c14
                                                              0x180003c1c
                                                              0x180003c25
                                                              0x180003c2b
                                                              0x180003c37
                                                              0x180003c3c
                                                              0x180003c43
                                                              0x180003c45
                                                              0x180003c4d
                                                              0x180003c57
                                                              0x180003c61
                                                              0x180003c6c
                                                              0x180003c71
                                                              0x180003c7a
                                                              0x180003c88
                                                              0x180003c8a
                                                              0x180003c8e
                                                              0x180003c90
                                                              0x180003c9c
                                                              0x180003caa
                                                              0x180003cb8
                                                              0x180003cc4
                                                              0x180003cca
                                                              0x180003cd3
                                                              0x180003cd5
                                                              0x180003cdd
                                                              0x180003cdf
                                                              0x180003cf2
                                                              0x180003d09
                                                              0x180003d18
                                                              0x180003d20
                                                              0x180003d27
                                                              0x180003d2c
                                                              0x180003d32
                                                              0x180003d3f
                                                              0x180003d51
                                                              0x180003d5f
                                                              0x180003d63
                                                              0x180003d68
                                                              0x180003d8c

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record__std_exception_copy
                                                              • String ID: csm$csm
                                                              • API String ID: 851805269-3733052814
                                                              • Opcode ID: ae528b8b242bffcc2854918ec9a27d0bb976d941c4d1a74ac96dd6768b11b5c3
                                                              • Instruction ID: ef6ae88387dfa06c815bde898961dd69fb07e80911919095ce8a45e838d8869a
                                                              • Opcode Fuzzy Hash: ae528b8b242bffcc2854918ec9a27d0bb976d941c4d1a74ac96dd6768b11b5c3
                                                              • Instruction Fuzzy Hash: C5617F3220078886EBB6CF26E44539877A9F758BD4F18C116EB9847BD5CF38D699C701
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 30%
                                                              			E00000001180002A84(void* __rax, long long __rbx, long long __rcx, void* __rdx, long long __rsi, long long __r8, intOrPtr* __r9) {
                                                              				void* _t76;
                                                              				void* _t83;
                                                              				void* _t84;
                                                              				intOrPtr _t101;
                                                              				intOrPtr _t103;
                                                              				void* _t113;
                                                              				void* _t118;
                                                              				void* _t130;
                                                              				long long _t133;
                                                              				intOrPtr* _t135;
                                                              				signed long long _t144;
                                                              				void* _t150;
                                                              				signed long long _t154;
                                                              				void* _t156;
                                                              				long long _t158;
                                                              				intOrPtr* _t159;
                                                              				void* _t161;
                                                              				void* _t162;
                                                              				signed long long _t166;
                                                              				void* _t170;
                                                              				intOrPtr _t171;
                                                              				void* _t173;
                                                              				void* _t174;
                                                              				void* _t176;
                                                              				void* _t178;
                                                              				void* _t180;
                                                              				intOrPtr* _t181;
                                                              
                                                              				_t130 = __rax;
                                                              				 *((long long*)(_t161 + 8)) = __rbx;
                                                              				 *((long long*)(_t161 + 0x10)) = _t158;
                                                              				 *((long long*)(_t161 + 0x18)) = __rsi;
                                                              				_t162 = _t161 - 0x40;
                                                              				_t159 = __rcx;
                                                              				_t181 = __r9;
                                                              				_t174 = __rdx;
                                                              				E00000001180004584(_t76, __r8);
                                                              				_t171 =  *((intOrPtr*)(__r9 + 8));
                                                              				_t135 =  *((intOrPtr*)(__r9 + 0x38));
                                                              				_t178 =  *__r9 - _t171;
                                                              				_t103 =  *((intOrPtr*)(__r9 + 0x48));
                                                              				if (( *(__rcx + 4) & 0x00000066) != 0) goto 0x80002bac;
                                                              				 *((long long*)(_t162 + 0x30)) = __rcx;
                                                              				 *((long long*)(_t162 + 0x38)) = __r8;
                                                              				if (_t103 -  *_t135 >= 0) goto 0x80002c58;
                                                              				_t154 = __r8 + __r8;
                                                              				if (_t178 - _t130 < 0) goto 0x80002b9e;
                                                              				if (_t178 - _t130 >= 0) goto 0x80002b9e;
                                                              				if ( *((intOrPtr*)(_t135 + 0x10 + _t154 * 8)) == 0) goto 0x80002b9e;
                                                              				if ( *((intOrPtr*)(_t135 + 0xc + _t154 * 8)) == 1) goto 0x80002b2a;
                                                              				_t113 =  *((long long*)(_t130 + _t171))(_t180, _t176, _t173, _t170, _t150);
                                                              				if (_t113 < 0) goto 0x80002ba5;
                                                              				if (_t113 <= 0) goto 0x80002b9e;
                                                              				if ( *((intOrPtr*)(__rcx)) != 0xe06d7363) goto 0x80002b5b;
                                                              				if ( *0x800164f8 == 0) goto 0x80002b5b;
                                                              				if (E0000000118000F7F0(_t130 + _t171, _t135, 0x800164f8) == 0) goto 0x80002b5b;
                                                              				_t83 =  *0x800164f8();
                                                              				r8d = 1;
                                                              				_t84 = E00000001180004550(_t83, _t159 + _t171, _t174);
                                                              				_t101 =  *((intOrPtr*)(_t135 + 0x10 + _t154 * 8));
                                                              				r9d =  *_t159;
                                                              				 *((long long*)(_t162 + 0x28)) =  *((intOrPtr*)(_t181 + 0x40));
                                                              				_t133 =  *((intOrPtr*)(_t181 + 0x28));
                                                              				 *((long long*)(_t162 + 0x20)) = _t133;
                                                              				__imp__RtlUnwindEx();
                                                              				E00000001180004580(_t84);
                                                              				goto 0x80002ada;
                                                              				goto 0x80002c5d;
                                                              				_t156 =  *((intOrPtr*)(_t181 + 0x20)) - _t171;
                                                              				goto 0x80002c4e;
                                                              				_t144 = _t174 + _t174;
                                                              				if (_t178 - _t133 < 0) goto 0x80002c4c;
                                                              				_t118 = _t178 - _t133;
                                                              				if (_t118 >= 0) goto 0x80002c4c;
                                                              				r10d =  *(_t159 + 4);
                                                              				r10d = r10d & 0x00000020;
                                                              				if (_t118 == 0) goto 0x80002c21;
                                                              				r9d = 0;
                                                              				if (_t101 == 0) goto 0x80002c1c;
                                                              				r8d = r9d;
                                                              				_t166 = _t159 + _t159;
                                                              				if (_t156 - _t133 < 0) goto 0x80002c14;
                                                              				if (_t156 - _t133 >= 0) goto 0x80002c14;
                                                              				if ( *((intOrPtr*)(_t135 + 0x10 + _t166 * 8)) !=  *((intOrPtr*)(_t135 + 0x10 + _t144 * 8))) goto 0x80002c14;
                                                              				if ( *((intOrPtr*)(_t135 + 0xc + _t166 * 8)) ==  *((intOrPtr*)(_t135 + 0xc + _t144 * 8))) goto 0x80002c1c;
                                                              				r9d = r9d + 1;
                                                              				if (r9d - _t101 < 0) goto 0x80002be4;
                                                              				if (r9d != _t101) goto 0x80002c58;
                                                              				if ( *((intOrPtr*)(_t135 + 0x10 + _t144 * 8)) == 0) goto 0x80002c35;
                                                              				if (_t156 != _t133) goto 0x80002c4c;
                                                              				if (r10d != 0) goto 0x80002c58;
                                                              				goto 0x80002c4c;
                                                              				 *((intOrPtr*)(_t181 + 0x48)) = _t150 + 1;
                                                              				r8d =  *((intOrPtr*)(_t135 + 0xc + _t144 * 8));
                                                              				 *((long long*)(_t166 + _t171))();
                                                              				if (_t103 + 2 -  *_t135 < 0) goto 0x80002bb8;
                                                              				return 1;
                                                              			}






























                                                              0x180002a84
                                                              0x180002a84
                                                              0x180002a89
                                                              0x180002a8e
                                                              0x180002a9c
                                                              0x180002aa0
                                                              0x180002aa3
                                                              0x180002aac
                                                              0x180002aaf
                                                              0x180002ab4
                                                              0x180002abb
                                                              0x180002abf
                                                              0x180002ac6
                                                              0x180002aca
                                                              0x180002ad0
                                                              0x180002ad5
                                                              0x180002adc
                                                              0x180002ae4
                                                              0x180002aee
                                                              0x180002afb
                                                              0x180002b06
                                                              0x180002b11
                                                              0x180002b24
                                                              0x180002b26
                                                              0x180002b28
                                                              0x180002b31
                                                              0x180002b3b
                                                              0x180002b4b
                                                              0x180002b55
                                                              0x180002b5f
                                                              0x180002b6b
                                                              0x180002b77
                                                              0x180002b7e
                                                              0x180002b85
                                                              0x180002b8a
                                                              0x180002b8e
                                                              0x180002b93
                                                              0x180002b99
                                                              0x180002ba0
                                                              0x180002ba7
                                                              0x180002bb0
                                                              0x180002bb3
                                                              0x180002bba
                                                              0x180002bc4
                                                              0x180002bce
                                                              0x180002bd1
                                                              0x180002bd3
                                                              0x180002bd7
                                                              0x180002bdb
                                                              0x180002bdd
                                                              0x180002be2
                                                              0x180002be4
                                                              0x180002be7
                                                              0x180002bf2
                                                              0x180002bfc
                                                              0x180002c07
                                                              0x180002c12
                                                              0x180002c14
                                                              0x180002c1a
                                                              0x180002c1f
                                                              0x180002c27
                                                              0x180002c2c
                                                              0x180002c31
                                                              0x180002c33
                                                              0x180002c3b
                                                              0x180002c3f
                                                              0x180002c49
                                                              0x180002c52
                                                              0x180002c7a

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 070144b75550352a73c6d3aac74e800b407a2bb3a1770ad1b71378010d6fc6ef
                                                              • Instruction ID: 7da8602e18cf7747c8af8830ce248ccf40cfdad7849785c1bee6e388392e864c
                                                              • Opcode Fuzzy Hash: 070144b75550352a73c6d3aac74e800b407a2bb3a1770ad1b71378010d6fc6ef
                                                              • Instruction Fuzzy Hash: D551BD32601A588AEBAADF15E844B9D37A5F348BC8F51C121FE1A47789DF74DA89C700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 3542164dc526b5714268e5d0b360aad3ca74f158add73c29f1e3478b68115295
                                                              • Instruction ID: 6c3fae355f4def66f2243ece08b04bf3b1533bf3e7ed4235295a513a2b2c2168
                                                              • Opcode Fuzzy Hash: 3542164dc526b5714268e5d0b360aad3ca74f158add73c29f1e3478b68115295
                                                              • Instruction Fuzzy Hash: 62F06D75714E0891FB92CB24E8443EA6371EB8DBE1F588215FA6A462F6CF2CC24CC300
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 85%
                                                              			E000000011800077FC(signed int __ecx, long long __rbx, void* __rdx, long long __rsi, long long _a8, long long _a16) {
                                                              				signed int _t27;
                                                              				signed int _t28;
                                                              				signed int _t29;
                                                              				signed int _t30;
                                                              				signed int _t31;
                                                              				signed int _t42;
                                                              				signed int _t43;
                                                              				signed int _t44;
                                                              				signed int _t46;
                                                              				void* _t51;
                                                              
                                                              				_a8 = __rbx;
                                                              				_a16 = __rsi;
                                                              				_t27 = __ecx & 0x0000001f;
                                                              				if ((__ecx & 0x00000008) == 0) goto 0x8000782e;
                                                              				if (sil >= 0) goto 0x8000782e;
                                                              				E0000000118000BC4C(_t27, _t51);
                                                              				_t28 = _t27 & 0xfffffff7;
                                                              				goto 0x80007885;
                                                              				_t42 = 0x00000004 & dil;
                                                              				if (_t42 == 0) goto 0x80007849;
                                                              				asm("dec eax");
                                                              				if (_t42 >= 0) goto 0x80007849;
                                                              				E0000000118000BC4C(_t28, _t51);
                                                              				_t29 = _t28 & 0xfffffffb;
                                                              				goto 0x80007885;
                                                              				_t43 = dil & 0x00000001;
                                                              				if (_t43 == 0) goto 0x80007865;
                                                              				asm("dec eax");
                                                              				if (_t43 >= 0) goto 0x80007865;
                                                              				E0000000118000BC4C(_t29, _t51);
                                                              				_t30 = _t29 & 0xfffffffe;
                                                              				goto 0x80007885;
                                                              				_t44 = dil & 0x00000002;
                                                              				if (_t44 == 0) goto 0x80007885;
                                                              				asm("dec eax");
                                                              				if (_t44 >= 0) goto 0x80007885;
                                                              				if ((dil & 0x00000010) == 0) goto 0x80007882;
                                                              				E0000000118000BC4C(_t30, _t51);
                                                              				_t31 = _t30 & 0xfffffffd;
                                                              				_t46 = dil & 0x00000010;
                                                              				if (_t46 == 0) goto 0x8000789f;
                                                              				asm("dec eax");
                                                              				if (_t46 >= 0) goto 0x8000789f;
                                                              				E0000000118000BC4C(_t31, _t51);
                                                              				return 0 | (_t31 & 0xffffffef) == 0x00000000;
                                                              			}













                                                              0x1800077fc
                                                              0x180007801
                                                              0x180007810
                                                              0x180007818
                                                              0x18000781d
                                                              0x180007824
                                                              0x180007829
                                                              0x18000782c
                                                              0x180007833
                                                              0x180007836
                                                              0x180007838
                                                              0x18000783d
                                                              0x18000783f
                                                              0x180007844
                                                              0x180007847
                                                              0x180007849
                                                              0x18000784d
                                                              0x18000784f
                                                              0x180007854
                                                              0x18000785b
                                                              0x180007860
                                                              0x180007863
                                                              0x180007865
                                                              0x180007869
                                                              0x18000786b
                                                              0x180007870
                                                              0x180007876
                                                              0x18000787d
                                                              0x180007882
                                                              0x180007885
                                                              0x180007889
                                                              0x18000788b
                                                              0x180007890
                                                              0x180007897
                                                              0x1800078b5

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 2487fe653e5be7bd8020c0b0ea1e85e42b79556fc3c932490e66e5a61226e724
                                                              • Instruction ID: 766be9376166aa195c434f29f3971196c8b67f74f947fd55b9f7e9fcb960d4ba
                                                              • Opcode Fuzzy Hash: 2487fe653e5be7bd8020c0b0ea1e85e42b79556fc3c932490e66e5a61226e724
                                                              • Instruction Fuzzy Hash: 3D117736F90A0941F7EE9128D45A3E63141AB6C3F4F59C624B66E462E7CF2C4B59C305
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 0000000180008017
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 0000000180008036
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 000000018000805E
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 000000018000806F
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 0000000180008080
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: af6c01d4090da002bcf5badd4e251df8289266538696eb3987054211fa53e7a9
                                                              • Instruction ID: be0361fe5fc774fdb93e2323036551c88fb1abd5f2001d1ea80391924f68e359
                                                              • Opcode Fuzzy Hash: af6c01d4090da002bcf5badd4e251df8289266538696eb3987054211fa53e7a9
                                                              • Instruction Fuzzy Hash: 80115B7070924881FADBD32569553E932927F8C7F0F18C324B8B9067DADE69C64D5701
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 76d43fe1cfe6227db90b925fa931167f251cb93e2f14ae53a5f4ee5aa2bf7010
                                                              • Instruction ID: 1e63756919ea820504c2c280bc0c9b8fbb4cbfe5ca1be2f3c00cf3ab00ed04ff
                                                              • Opcode Fuzzy Hash: 76d43fe1cfe6227db90b925fa931167f251cb93e2f14ae53a5f4ee5aa2bf7010
                                                              • Instruction Fuzzy Hash: F111397070624D41FAEBE22594527F932826B6D3F0F58CB24B93A0A2C7DE2C9A4D4310
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 68%
                                                              			E00000001180003800(long long __rbx, intOrPtr* __rcx, long long __rdx, long long __r8, void* __r9) {
                                                              				void* _t19;
                                                              				void* _t27;
                                                              				void* _t36;
                                                              				void* _t39;
                                                              				void* _t42;
                                                              				void* _t43;
                                                              				void* _t45;
                                                              				void* _t46;
                                                              				void* _t52;
                                                              				void* _t54;
                                                              				void* _t56;
                                                              				void* _t59;
                                                              
                                                              				_t27 = _t45;
                                                              				 *((long long*)(_t27 + 0x20)) = __rbx;
                                                              				 *((long long*)(_t27 + 0x18)) = __r8;
                                                              				 *((long long*)(_t27 + 0x10)) = __rdx;
                                                              				_t43 = _t27 - 0x3f;
                                                              				_t46 = _t45 - 0xc0;
                                                              				if ( *__rcx == 0x80000003) goto 0x800038a4;
                                                              				E00000001180002D40(_t27);
                                                              				r12d =  *((intOrPtr*)(_t43 + 0x6f));
                                                              				if ( *((long long*)(_t27 + 0x10)) == 0) goto 0x800038bf;
                                                              				__imp__EncodePointer(_t59, _t56, _t54, _t52, _t36, _t39, _t42);
                                                              				E00000001180002D40(_t27);
                                                              				if ( *((intOrPtr*)(_t27 + 0x10)) == _t27) goto 0x800038bf;
                                                              				if ( *__rcx == 0xe0434f4d) goto 0x800038bf;
                                                              				r13d =  *((intOrPtr*)(_t43 + 0x77));
                                                              				if ( *__rcx == 0xe0434352) goto 0x800038c3;
                                                              				 *((intOrPtr*)(_t46 + 0x38)) = r12d;
                                                              				 *((long long*)(_t46 + 0x30)) =  *((intOrPtr*)(_t43 + 0x7f));
                                                              				 *((intOrPtr*)(_t46 + 0x28)) = r13d;
                                                              				 *((long long*)(_t46 + 0x20)) =  *((intOrPtr*)(_t43 + 0x67));
                                                              				_t19 = E00000001180001F20(__rcx,  *((intOrPtr*)(_t43 + 0x4f)), __r8, __r9);
                                                              				if (_t19 == 0) goto 0x800038c3;
                                                              				return _t19;
                                                              			}















                                                              0x180003800
                                                              0x180003803
                                                              0x180003807
                                                              0x18000380b
                                                              0x18000381a
                                                              0x18000381e
                                                              0x180003834
                                                              0x180003836
                                                              0x18000383b
                                                              0x180003848
                                                              0x18000384c
                                                              0x180003855
                                                              0x18000385e
                                                              0x180003867
                                                              0x180003870
                                                              0x180003874
                                                              0x180003884
                                                              0x18000388c
                                                              0x180003891
                                                              0x180003896
                                                              0x18000389b
                                                              0x1800038a2
                                                              0x1800038be

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: 850d6d426b32ca2bcc659c65f0611ee9095a757703c065d3c36d87525356093f
                                                              • Instruction ID: 9ead3bcba03cb9e88f6155f8408b2a39bbeb34ce68d687e28d60bbf843815124
                                                              • Opcode Fuzzy Hash: 850d6d426b32ca2bcc659c65f0611ee9095a757703c065d3c36d87525356093f
                                                              • Instruction Fuzzy Hash: 74613A36A04B888AEB62CF66D4413DD77A4F748B88F148216EF4917B99CF78D299C700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 32%
                                                              			E0000000118000D5B8(void* __eax, signed int __edx, void* __esi, void* __ebp, long long __rbx, intOrPtr* __rcx, long long __r8) {
                                                              				void* __rdi;
                                                              				void* __rsi;
                                                              				void* __rbp;
                                                              				intOrPtr _t183;
                                                              				signed int _t187;
                                                              				signed int _t194;
                                                              				signed int _t199;
                                                              				intOrPtr _t208;
                                                              				void* _t210;
                                                              				signed char _t211;
                                                              				void* _t261;
                                                              				signed long long _t262;
                                                              				long long _t267;
                                                              				long long _t269;
                                                              				void* _t270;
                                                              				long long _t272;
                                                              				intOrPtr* _t278;
                                                              				intOrPtr* _t285;
                                                              				long long _t287;
                                                              				long long _t313;
                                                              				void* _t321;
                                                              				long long _t322;
                                                              				void* _t323;
                                                              				long long _t324;
                                                              				long long _t326;
                                                              				signed char* _t327;
                                                              				signed char* _t328;
                                                              				signed char* _t329;
                                                              				void* _t330;
                                                              				void* _t331;
                                                              				void* _t332;
                                                              				signed long long _t333;
                                                              				intOrPtr _t336;
                                                              				intOrPtr _t339;
                                                              				void* _t341;
                                                              				signed long long _t343;
                                                              				signed long long _t345;
                                                              				long long _t354;
                                                              				void* _t358;
                                                              				long long _t359;
                                                              				signed long long _t362;
                                                              				char _t363;
                                                              				signed long long _t364;
                                                              				void* _t367;
                                                              				signed char* _t368;
                                                              				signed long long _t370;
                                                              
                                                              				_t261 = _t332;
                                                              				_t331 = _t261 - 0x57;
                                                              				_t333 = _t332 - 0xd0;
                                                              				 *((long long*)(_t331 - 9)) = 0xfffffffe;
                                                              				 *((long long*)(_t261 + 8)) = __rbx;
                                                              				_t262 =  *0x80021010; // 0xf101478280a5
                                                              				 *(_t331 + 0x17) = _t262 ^ _t333;
                                                              				 *((long long*)(_t331 - 0x41)) = __r8;
                                                              				_t278 = __rcx;
                                                              				 *((long long*)(_t331 - 0x59)) =  *((intOrPtr*)(_t331 + 0x7f));
                                                              				_t362 = __edx >> 6;
                                                              				 *(_t331 - 0x39) = _t362;
                                                              				_t370 = __edx + __edx * 8;
                                                              				_t267 =  *((intOrPtr*)( *((intOrPtr*)(0x180000000 + 0x227f0 + _t362 * 8)) + 0x28 + _t370 * 8));
                                                              				 *((long long*)(_t331 - 0x19)) = _t267;
                                                              				r12d = r9d;
                                                              				_t359 = _t358 + __r8;
                                                              				 *((long long*)(_t331 - 0x61)) = _t359;
                                                              				 *((intOrPtr*)(_t331 - 0x49)) = GetConsoleOutputCP();
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)(_t331 - 0x59)) + 0x28)) != dil) goto 0x8000d658;
                                                              				0x80006f60();
                                                              				_t208 =  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t331 - 0x59)) + 0x18)) + 0xc));
                                                              				 *((intOrPtr*)(_t331 - 0x45)) = _t208;
                                                              				 *((long long*)(__rcx)) = _t267;
                                                              				 *((intOrPtr*)(__rcx + 8)) = 0;
                                                              				if ( *((intOrPtr*)(_t331 - 0x41)) - _t359 >= 0) goto 0x8000da03;
                                                              				_t343 = __edx >> 6;
                                                              				 *(_t331 - 0x11) = _t343;
                                                              				 *((char*)(_t331 - 0x71)) =  *((intOrPtr*)(__r8));
                                                              				 *((intOrPtr*)(_t331 - 0x6d)) = 0;
                                                              				r12d = 1;
                                                              				if (_t208 != 0xfde9) goto 0x8000d81d;
                                                              				_t285 = 0x3e + _t370 * 8 +  *((intOrPtr*)(0x180000000 + 0x227f0 + _t343 * 8));
                                                              				if ( *_t285 == dil) goto 0x8000d6ca;
                                                              				_t367 = _t324 + 1;
                                                              				if (_t367 - 5 < 0) goto 0x8000d6b7;
                                                              				if (_t367 <= 0) goto 0x8000d7b3;
                                                              				r12d =  *((char*)(_t285 + 0x1800218d1));
                                                              				r12d = r12d + 1;
                                                              				_t183 = r12d - 1;
                                                              				 *((intOrPtr*)(_t331 - 0x51)) = _t183;
                                                              				_t336 = _t183;
                                                              				if (_t336 -  *((intOrPtr*)(_t331 - 0x61)) - __r8 > 0) goto 0x8000d980;
                                                              				_t287 = _t324;
                                                              				 *((char*)(_t331 + _t287 - 1)) =  *((intOrPtr*)(0x3e + _t370 * 8 +  *((intOrPtr*)(0x180000000 + 0x227f0 + _t343 * 8))));
                                                              				if (_t287 + 1 - _t367 < 0) goto 0x8000d71b;
                                                              				if (_t336 <= 0) goto 0x8000d74b;
                                                              				0x80004b30();
                                                              				_t354 =  *((intOrPtr*)(_t331 - 0x59));
                                                              				_t313 = _t324;
                                                              				 *((intOrPtr*)( *((intOrPtr*)(0x180000000 + 0x227f0 + _t362 * 8)) + _t313 + 0x3e + _t370 * 8)) = dil;
                                                              				if (_t313 + 1 - _t367 < 0) goto 0x8000d74e;
                                                              				 *((long long*)(_t331 - 0x31)) = _t324;
                                                              				_t269 = _t331 - 1;
                                                              				 *((long long*)(_t331 - 0x29)) = _t269;
                                                              				_t187 = (0 | r12d == 0x00000004) + 1;
                                                              				r12d = _t187;
                                                              				r8d = _t187;
                                                              				 *((long long*)(_t333 + 0x20)) = _t354;
                                                              				E0000000118000E384(_t269, __rcx, _t331 - 0x6d, _t331 - 0x29, _t336, _t331 - 0x31);
                                                              				if (_t269 == 0xffffffff) goto 0x8000da03;
                                                              				_t326 = __r8 +  *((intOrPtr*)(_t331 - 0x51)) - 1;
                                                              				goto 0x8000d8ae;
                                                              				_t363 =  *((char*)(_t269 + 0x1800218d0));
                                                              				_t210 = _t363 + 1;
                                                              				_t270 = _t210;
                                                              				if (_t270 -  *((intOrPtr*)(_t331 - 0x61)) - _t326 > 0) goto 0x8000d9ae;
                                                              				 *((long long*)(_t331 - 0x51)) = _t324;
                                                              				 *((long long*)(_t331 - 0x21)) = _t326;
                                                              				_t194 = (0 | _t210 == 0x00000004) + 1;
                                                              				r14d = _t194;
                                                              				r8d = _t194;
                                                              				 *((long long*)(_t333 + 0x20)) = _t354;
                                                              				_t345 = _t331 - 0x51;
                                                              				E0000000118000E384(_t270, _t278, _t331 - 0x6d, _t331 - 0x21,  *((intOrPtr*)(_t331 - 0x61)) - _t326, _t345);
                                                              				if (_t270 == 0xffffffff) goto 0x8000da03;
                                                              				_t327 = _t326 + _t363;
                                                              				r12d = r14d;
                                                              				_t364 =  *(_t331 - 0x39);
                                                              				goto 0x8000d8ae;
                                                              				_t339 =  *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8));
                                                              				_t211 =  *(_t339 + 0x3d + _t370 * 8);
                                                              				if ((_t211 & 0x00000004) == 0) goto 0x8000d850;
                                                              				 *((char*)(_t331 + 7)) =  *((intOrPtr*)(_t339 + 0x3e + _t370 * 8));
                                                              				 *((char*)(_t331 + 8)) =  *_t327;
                                                              				 *(_t339 + 0x3d + _t370 * 8) = _t211 & 0x000000fb;
                                                              				r8d = 2;
                                                              				goto 0x8000d899;
                                                              				r9d =  *_t327 & 0x000000ff;
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t354 + 0x18)))) + _t345 * 2)) >= 0) goto 0x8000d893;
                                                              				_t368 =  &(_t327[1]);
                                                              				if (_t368 -  *((intOrPtr*)(_t331 - 0x61)) >= 0) goto 0x8000d9e0;
                                                              				r8d = 2;
                                                              				if (E0000000118000B5FC(_t211 & 0x000000fb, __ebp, _t278, _t331 - 0x6d, _t327, _t324, _t327, _t331, _t339, _t354) == 0xffffffff) goto 0x8000da03;
                                                              				_t328 = _t368;
                                                              				goto 0x8000d8ae;
                                                              				_t199 = E0000000118000B5FC(_t211 & 0x000000fb, __ebp, _t278, _t331 - 0x6d, _t328, _t324, _t328, _t331, _t359, _t354);
                                                              				if (_t199 == 0xffffffff) goto 0x8000da03;
                                                              				_t329 =  &(_t328[1]);
                                                              				 *((long long*)(_t333 + 0x38)) = _t324;
                                                              				 *((long long*)(_t333 + 0x30)) = _t324;
                                                              				 *((intOrPtr*)(_t333 + 0x28)) = 5;
                                                              				_t272 = _t331 + 0xf;
                                                              				 *((long long*)(_t333 + 0x20)) = _t272;
                                                              				r9d = r12d;
                                                              				_t341 = _t331 - 0x6d;
                                                              				E0000000118000A154();
                                                              				r14d = _t199;
                                                              				if (_t199 == 0) goto 0x8000da03;
                                                              				 *((long long*)(_t333 + 0x20)) = _t324;
                                                              				r8d = _t199;
                                                              				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x8000d9fb;
                                                              				 *((intOrPtr*)(_t278 + 4)) = __esi -  *((intOrPtr*)(_t331 - 0x41)) +  *((intOrPtr*)(_t278 + 8));
                                                              				if ( *((intOrPtr*)(_t331 - 0x69)) - r14d < 0) goto 0x8000da03;
                                                              				if ( *((char*)(_t331 - 0x71)) != 0xa) goto 0x8000d966;
                                                              				 *((short*)(_t331 - 0x71)) = 0xd;
                                                              				 *((long long*)(_t333 + 0x20)) = _t324;
                                                              				_t130 = _t272 - 0xc; // 0x1
                                                              				r8d = _t130;
                                                              				_t321 = _t331 - 0x71;
                                                              				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x8000d9fb;
                                                              				if ( *((intOrPtr*)(_t331 - 0x69)) - 1 < 0) goto 0x8000da03;
                                                              				 *((intOrPtr*)(_t278 + 8)) =  *((intOrPtr*)(_t278 + 8)) + 1;
                                                              				 *((intOrPtr*)(_t278 + 4)) =  *((intOrPtr*)(_t278 + 4)) + 1;
                                                              				if (_t329 -  *((intOrPtr*)(_t331 - 0x61)) >= 0) goto 0x8000da03;
                                                              				goto 0x8000d681;
                                                              				if (_t321 <= 0) goto 0x8000d9a9;
                                                              				_t330 = _t329 - _t368;
                                                              				 *((char*)( *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8)) + _t368 + 0x3e + _t370 * 8)) =  *((intOrPtr*)(_t330 + _t368));
                                                              				if (1 - _t321 < 0) goto 0x8000d988;
                                                              				 *((intOrPtr*)(_t278 + 4)) =  *((intOrPtr*)(_t278 + 4)) +  *((intOrPtr*)(_t278 + 4));
                                                              				goto 0x8000da03;
                                                              				if (_t341 <= 0) goto 0x8000d9da;
                                                              				_t322 = _t324;
                                                              				 *((char*)( *((intOrPtr*)(0x180000000 + 0x227f0 +  *(_t331 - 0x39) * 8)) + _t322 + 0x3e + _t370 * 8)) =  *((intOrPtr*)(_t322 + _t330));
                                                              				_t323 = _t322 + 1;
                                                              				if (2 - _t341 < 0) goto 0x8000d9ba;
                                                              				 *((intOrPtr*)(_t278 + 4)) =  *((intOrPtr*)(_t278 + 4)) + r8d;
                                                              				goto 0x8000da03;
                                                              				 *((intOrPtr*)(_t341 + 0x3e + _t370 * 8)) = r9b;
                                                              				 *( *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8)) + 0x3d + _t370 * 8) =  *( *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8)) + 0x3d + _t370 * 8) | 0x00000004;
                                                              				_t173 = _t323 + 1; // 0x1
                                                              				 *((intOrPtr*)(_t278 + 4)) = _t173;
                                                              				goto 0x8000da03;
                                                              				 *_t278 = GetLastError();
                                                              				return E000000011800010B0(_t206,  *((intOrPtr*)(_t331 - 0x45)),  *(_t331 + 0x17) ^ _t333);
                                                              			}

















































                                                              0x18000d5b8
                                                              0x18000d5c6
                                                              0x18000d5ca
                                                              0x18000d5d1
                                                              0x18000d5d9
                                                              0x18000d5dd
                                                              0x18000d5e7
                                                              0x18000d5ee
                                                              0x18000d5f5
                                                              0x18000d5fc
                                                              0x18000d606
                                                              0x18000d60a
                                                              0x18000d618
                                                              0x18000d624
                                                              0x18000d629
                                                              0x18000d62d
                                                              0x18000d630
                                                              0x18000d633
                                                              0x18000d63d
                                                              0x18000d64a
                                                              0x18000d64f
                                                              0x18000d65c
                                                              0x18000d65f
                                                              0x18000d664
                                                              0x18000d667
                                                              0x18000d66e
                                                              0x18000d677
                                                              0x18000d67b
                                                              0x18000d683
                                                              0x18000d686
                                                              0x18000d689
                                                              0x18000d69c
                                                              0x18000d6af
                                                              0x18000d6ba
                                                              0x18000d6be
                                                              0x18000d6c8
                                                              0x18000d6cd
                                                              0x18000d6e1
                                                              0x18000d6ea
                                                              0x18000d6f0
                                                              0x18000d6f2
                                                              0x18000d6fc
                                                              0x18000d702
                                                              0x18000d708
                                                              0x18000d71d
                                                              0x18000d72a
                                                              0x18000d72f
                                                              0x18000d73b
                                                              0x18000d740
                                                              0x18000d74b
                                                              0x18000d759
                                                              0x18000d764
                                                              0x18000d766
                                                              0x18000d76a
                                                              0x18000d76e
                                                              0x18000d77b
                                                              0x18000d77d
                                                              0x18000d780
                                                              0x18000d783
                                                              0x18000d794
                                                              0x18000d79d
                                                              0x18000d7ab
                                                              0x18000d7ae
                                                              0x18000d7b6
                                                              0x18000d7bf
                                                              0x18000d7ca
                                                              0x18000d7d0
                                                              0x18000d7d6
                                                              0x18000d7da
                                                              0x18000d7e6
                                                              0x18000d7e8
                                                              0x18000d7eb
                                                              0x18000d7ee
                                                              0x18000d7f3
                                                              0x18000d7ff
                                                              0x18000d808
                                                              0x18000d80e
                                                              0x18000d811
                                                              0x18000d814
                                                              0x18000d818
                                                              0x18000d81d
                                                              0x18000d825
                                                              0x18000d82d
                                                              0x18000d834
                                                              0x18000d839
                                                              0x18000d83f
                                                              0x18000d844
                                                              0x18000d84e
                                                              0x18000d850
                                                              0x18000d860
                                                              0x18000d862
                                                              0x18000d86a
                                                              0x18000d873
                                                              0x18000d888
                                                              0x18000d88e
                                                              0x18000d891
                                                              0x18000d8a0
                                                              0x18000d8a8
                                                              0x18000d8ae
                                                              0x18000d8b1
                                                              0x18000d8b6
                                                              0x18000d8bb
                                                              0x18000d8c3
                                                              0x18000d8c7
                                                              0x18000d8cc
                                                              0x18000d8cf
                                                              0x18000d8d8
                                                              0x18000d8dd
                                                              0x18000d8e2
                                                              0x18000d8e8
                                                              0x18000d8f1
                                                              0x18000d907
                                                              0x18000d915
                                                              0x18000d91c
                                                              0x18000d926
                                                              0x18000d92d
                                                              0x18000d931
                                                              0x18000d93a
                                                              0x18000d93a
                                                              0x18000d93e
                                                              0x18000d94d
                                                              0x18000d957
                                                              0x18000d95d
                                                              0x18000d960
                                                              0x18000d96a
                                                              0x18000d97b
                                                              0x18000d983
                                                              0x18000d985
                                                              0x18000d997
                                                              0x18000d9a7
                                                              0x18000d9a9
                                                              0x18000d9ac
                                                              0x18000d9b1
                                                              0x18000d9b3
                                                              0x18000d9c8
                                                              0x18000d9cf
                                                              0x18000d9d8
                                                              0x18000d9da
                                                              0x18000d9de
                                                              0x18000d9e0
                                                              0x18000d9ed
                                                              0x18000d9f3
                                                              0x18000d9f6
                                                              0x18000d9f9
                                                              0x18000da01
                                                              0x18000da2c

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 6feae5b9fbf0fd58da801fa267745876ae53b7eaab871f0ae10c7fb0fe539764
                                                              • Instruction ID: d53985ea959d49848d9070d6669198272c686acab0006873b77d48ca537a322a
                                                              • Opcode Fuzzy Hash: 6feae5b9fbf0fd58da801fa267745876ae53b7eaab871f0ae10c7fb0fe539764
                                                              • Instruction Fuzzy Hash: 1CD1E332B18A8889E752CFA9D4403EC3BB1F3597D8F148216EE5D97B99DE34C60AC750
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 28%
                                                              			E0000000118000DEE0(void* __ebx, signed int __ecx, void* __esi, void* __ebp, void* __rax, void* __rcx, signed short* __rdx, void* __r8, signed int __r9, void* __r10) {
                                                              				signed long long _v88;
                                                              				void* _v96;
                                                              				void* _v108;
                                                              				signed int _v112;
                                                              				intOrPtr _v120;
                                                              				signed int _v124;
                                                              				long _v128;
                                                              				signed int _v136;
                                                              				long long _v144;
                                                              				signed int _v152;
                                                              				void* __rbx;
                                                              				void* __rsi;
                                                              				void* __rbp;
                                                              				signed short _t99;
                                                              				void* _t107;
                                                              				long _t116;
                                                              				signed int _t117;
                                                              				void* _t122;
                                                              				signed short _t127;
                                                              				signed int _t130;
                                                              				signed short _t133;
                                                              				signed short _t159;
                                                              				signed short _t167;
                                                              				signed long long _t180;
                                                              				signed int _t184;
                                                              				signed short* _t197;
                                                              				signed int _t204;
                                                              				signed int _t205;
                                                              				signed short* _t206;
                                                              				void* _t208;
                                                              				signed long long _t220;
                                                              				void* _t221;
                                                              				signed long long _t222;
                                                              				signed long long _t223;
                                                              				void* _t224;
                                                              				signed short* _t226;
                                                              
                                                              				_t197 = __rdx;
                                                              				_t122 = __ebx;
                                                              				r14d = r8d;
                                                              				_t184 = __r9;
                                                              				_t206 = __rdx;
                                                              				if (r8d == 0) goto 0x8000e1d3;
                                                              				if (__rdx != 0) goto 0x8000df47;
                                                              				 *((char*)(__r9 + 0x38)) = 1;
                                                              				r8d = 0;
                                                              				 *((intOrPtr*)(__r9 + 0x34)) = 0;
                                                              				 *((char*)(__r9 + 0x30)) = 1;
                                                              				 *((intOrPtr*)(__r9 + 0x2c)) = 0x16;
                                                              				r9d = 0;
                                                              				_v144 = __r9;
                                                              				_v152 = _t205;
                                                              				E000000011800084EC(__rax, __r9, __rcx, __rdx, __rdx, _t208, __r8);
                                                              				goto 0x8000e1d5;
                                                              				_t220 = __ecx >> 6;
                                                              				_v88 = _t220;
                                                              				_t223 = __ecx + __ecx * 8;
                                                              				_t99 =  *((intOrPtr*)(0x800227f0 + 0x39 + _t223 * 8));
                                                              				_v136 = _t99;
                                                              				if (_t99 - 1 - 1 > 0) goto 0x8000df7e;
                                                              				if (( !r14d & 0x00000001) == 0) goto 0x8000df10;
                                                              				if (( *( *((intOrPtr*)(0x800227f0 + _t220 * 8)) + 0x38 + _t223 * 8) & 0x00000020) == 0) goto 0x8000df94;
                                                              				_t23 = _t197 + 2; // 0x2
                                                              				r8d = _t23;
                                                              				E0000000118000E958(r15d);
                                                              				_v112 = _t205;
                                                              				if (E0000000118000E2E0(r15d, __ecx) == 0) goto 0x8000e0c3;
                                                              				if ( *( *((intOrPtr*)(0x800227f0 + _t220 * 8)) + 0x38 + _t223 * 8) - dil >= 0) goto 0x8000e0c3;
                                                              				if ( *((intOrPtr*)(__r9 + 0x28)) != dil) goto 0x8000dfd3;
                                                              				0x80006f60();
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)(__r9 + 0x18)) + 0x138)) != _t205) goto 0x8000dfef;
                                                              				_t180 =  *((intOrPtr*)(0x800227f0 + _t220 * 8));
                                                              				if ( *((intOrPtr*)(_t180 + 0x39 + _t223 * 8)) == dil) goto 0x8000e0c3;
                                                              				if (GetConsoleMode(??, ??) == 0) goto 0x8000e0bc;
                                                              				_t127 = _v136;
                                                              				_t159 = _t127;
                                                              				if (_t159 == 0) goto 0x8000e099;
                                                              				if (_t159 == 0) goto 0x8000e024;
                                                              				if (_t127 - 1 != 1) goto 0x8000e15d;
                                                              				_t221 = _t206 + _t224;
                                                              				_v128 = _t205;
                                                              				_t226 = _t206;
                                                              				if (_t206 - _t221 >= 0) goto 0x8000e090;
                                                              				r14d = _v124;
                                                              				_v136 =  *_t226 & 0x0000ffff;
                                                              				_t107 = E0000000118000E960( *_t226 & 0xffff);
                                                              				_t130 = _v136 & 0x0000ffff;
                                                              				if (_t107 != _t130) goto 0x8000e087;
                                                              				r14d = r14d + 2;
                                                              				_v124 = r14d;
                                                              				if (_t130 != 0xa) goto 0x8000e07c;
                                                              				if (E0000000118000E960(0xd) != 0xd) goto 0x8000e087;
                                                              				r14d = r14d + 1;
                                                              				_v124 = r14d;
                                                              				if ( &(_t226[1]) - _t221 >= 0) goto 0x8000e090;
                                                              				goto 0x8000e038;
                                                              				_v128 = GetLastError();
                                                              				_t222 = _v88;
                                                              				goto 0x8000e153;
                                                              				r9d = r14d;
                                                              				_v152 = __r9;
                                                              				E0000000118000D5B8(_t109, r15d, __esi, __ebp, __r9,  &_v128, _t206);
                                                              				asm("movsd xmm0, [eax]");
                                                              				goto 0x8000e158;
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)(0x800227f0 + _t222 * 8)) + 0x38 + _t223 * 8)) - dil >= 0) goto 0x8000e120;
                                                              				_t133 = _v136;
                                                              				_t167 = _t133;
                                                              				if (_t167 == 0) goto 0x8000e10c;
                                                              				if (_t167 == 0) goto 0x8000e0f8;
                                                              				if (_t133 - 1 != 1) goto 0x8000e164;
                                                              				r9d = r14d;
                                                              				E0000000118000DB34(_t122, r15d, _t180, _t184,  &_v128, _t208, _t206);
                                                              				goto 0x8000e0b0;
                                                              				r9d = r14d;
                                                              				E0000000118000DC50(r15d,  *((intOrPtr*)(_t180 + 8)), _t180, _t184,  &_v128, _t208, _t206);
                                                              				goto 0x8000e0b0;
                                                              				r9d = r14d;
                                                              				E0000000118000DA30(_t122, r15d, _t180, _t184,  &_v128, _t208, _t206);
                                                              				goto 0x8000e0b0;
                                                              				r8d = r14d;
                                                              				_v152 = _v152 & _t180;
                                                              				_v128 = _t180;
                                                              				_v120 = 0;
                                                              				if (WriteFile(??, ??, ??, ??, ??) != 0) goto 0x8000e150;
                                                              				_t116 = GetLastError();
                                                              				_v128 = _t116;
                                                              				asm("movsd xmm0, [ebp-0x40]");
                                                              				asm("movsd [ebp-0x30], xmm0");
                                                              				if (_t116 != 0) goto 0x8000e1cc;
                                                              				_t117 = _v112;
                                                              				if (_t117 == 0) goto 0x8000e1a3;
                                                              				if (_t117 != 5) goto 0x8000e193;
                                                              				 *((char*)(_t184 + 0x30)) = 1;
                                                              				 *((intOrPtr*)(_t184 + 0x2c)) = 9;
                                                              				 *((char*)(_t184 + 0x38)) = 1;
                                                              				 *(_t184 + 0x34) = _t117;
                                                              				goto 0x8000df3f;
                                                              				_t204 = _t184;
                                                              				E000000011800086B0(_v112, _t204);
                                                              				goto 0x8000df3f;
                                                              				if (( *( *((intOrPtr*)(_t204 + _t222 * 8)) + 0x38 + _t223 * 8) & 0x00000040) == 0) goto 0x8000e1b4;
                                                              				if ( *_t206 == 0x1a) goto 0x8000e1d3;
                                                              				 *(_t184 + 0x34) =  *(_t184 + 0x34) & 0x00000000;
                                                              				 *((char*)(_t184 + 0x30)) = 1;
                                                              				 *((intOrPtr*)(_t184 + 0x2c)) = 0x1c;
                                                              				 *((char*)(_t184 + 0x38)) = 1;
                                                              				goto 0x8000df3f;
                                                              				goto 0x8000e1d5;
                                                              				return 0;
                                                              			}







































                                                              0x18000dee0
                                                              0x18000dee0
                                                              0x18000def6
                                                              0x18000defc
                                                              0x18000deff
                                                              0x18000df05
                                                              0x18000df0e
                                                              0x18000df10
                                                              0x18000df15
                                                              0x18000df18
                                                              0x18000df1e
                                                              0x18000df25
                                                              0x18000df2d
                                                              0x18000df30
                                                              0x18000df35
                                                              0x18000df3a
                                                              0x18000df42
                                                              0x18000df57
                                                              0x18000df5b
                                                              0x18000df5f
                                                              0x18000df67
                                                              0x18000df6c
                                                              0x18000df73
                                                              0x18000df7c
                                                              0x18000df84
                                                              0x18000df8b
                                                              0x18000df8b
                                                              0x18000df8f
                                                              0x18000df97
                                                              0x18000dfa9
                                                              0x18000dfb8
                                                              0x18000dfc2
                                                              0x18000dfc7
                                                              0x18000dfde
                                                              0x18000dfe0
                                                              0x18000dfe9
                                                              0x18000e004
                                                              0x18000e00a
                                                              0x18000e00e
                                                              0x18000e010
                                                              0x18000e019
                                                              0x18000e01e
                                                              0x18000e024
                                                              0x18000e028
                                                              0x18000e02c
                                                              0x18000e032
                                                              0x18000e034
                                                              0x18000e03f
                                                              0x18000e043
                                                              0x18000e048
                                                              0x18000e04f
                                                              0x18000e051
                                                              0x18000e055
                                                              0x18000e05d
                                                              0x18000e071
                                                              0x18000e073
                                                              0x18000e076
                                                              0x18000e083
                                                              0x18000e085
                                                              0x18000e08d
                                                              0x18000e090
                                                              0x18000e094
                                                              0x18000e099
                                                              0x18000e09c
                                                              0x18000e0ab
                                                              0x18000e0b0
                                                              0x18000e0b7
                                                              0x18000e0cc
                                                              0x18000e0ce
                                                              0x18000e0d2
                                                              0x18000e0d4
                                                              0x18000e0d9
                                                              0x18000e0de
                                                              0x18000e0e4
                                                              0x18000e0f1
                                                              0x18000e0f6
                                                              0x18000e0f8
                                                              0x18000e105
                                                              0x18000e10a
                                                              0x18000e10c
                                                              0x18000e119
                                                              0x18000e11e
                                                              0x18000e12b
                                                              0x18000e12e
                                                              0x18000e136
                                                              0x18000e13a
                                                              0x18000e145
                                                              0x18000e147
                                                              0x18000e14d
                                                              0x18000e153
                                                              0x18000e158
                                                              0x18000e16e
                                                              0x18000e170
                                                              0x18000e175
                                                              0x18000e17a
                                                              0x18000e17c
                                                              0x18000e180
                                                              0x18000e187
                                                              0x18000e18b
                                                              0x18000e18e
                                                              0x18000e196
                                                              0x18000e199
                                                              0x18000e19e
                                                              0x18000e1ad
                                                              0x18000e1b2
                                                              0x18000e1b4
                                                              0x18000e1b8
                                                              0x18000e1bc
                                                              0x18000e1c3
                                                              0x18000e1c7
                                                              0x18000e1d1
                                                              0x18000e1e5

                                                              APIs
                                                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000000018000DECB), ref: 000000018000DFFC
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000000018000DECB), ref: 000000018000E087
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: 0675eeeead42596f3d7dd2e4aa0abe962e21f79f71d61d7b844ad93efeec3d3b
                                                              • Instruction ID: 0d257abc0b638f0f040665fb3b769d735b9bc0d803a768daaeded027fae08968
                                                              • Opcode Fuzzy Hash: 0675eeeead42596f3d7dd2e4aa0abe962e21f79f71d61d7b844ad93efeec3d3b
                                                              • Instruction Fuzzy Hash: 7291B13261469885F7A2CF6598403ED3BA0F749BC8F14C11AFE4A67A95DF74C68AC710
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 29%
                                                              			E0000000118000DC50(signed int __edx, void* __edi, void* __rax, signed long long __rbx, intOrPtr* __rcx, long long __rbp, signed short* __r8, signed long long _a8, signed long long _a16, long long _a24, char _a40, char _a1744, char _a1752, signed int _a5176, void* _a5192) {
                                                              				intOrPtr _v0;
                                                              				signed long long _v8;
                                                              				signed int _t41;
                                                              				signed long long _t62;
                                                              				short* _t67;
                                                              				signed int* _t68;
                                                              				void* _t91;
                                                              				void* _t97;
                                                              				void* _t99;
                                                              				void* _t102;
                                                              				void* _t103;
                                                              
                                                              				_a8 = __rbx;
                                                              				_a24 = __rbp;
                                                              				E0000000118000F880(0x1470, __rax, _t97, _t99);
                                                              				_t62 =  *0x80021010; // 0xf101478280a5
                                                              				_a5176 = _t62 ^ _t91 - __rax;
                                                              				r14d = r9d;
                                                              				r10d = r10d & 0x0000003f;
                                                              				_t103 = _t102 + __r8;
                                                              				 *((long long*)(__rcx)) =  *((intOrPtr*)(0x800227f0 + (__edx >> 6) * 8));
                                                              				 *((intOrPtr*)(__rcx + 8)) = 0;
                                                              				if (__r8 - _t103 >= 0) goto 0x8000dd91;
                                                              				_t67 =  &_a40;
                                                              				if (__r8 - _t103 >= 0) goto 0x8000dcfa;
                                                              				_t41 =  *__r8 & 0x0000ffff;
                                                              				if (_t41 != 0xa) goto 0x8000dce6;
                                                              				 *_t67 = 0xd;
                                                              				_t68 = _t67 + 2;
                                                              				 *_t68 = _t41;
                                                              				if ( &(_t68[0]) -  &_a1744 < 0) goto 0x8000dcc8;
                                                              				_a16 = _a16 & 0x00000000;
                                                              				_a8 = _a8 & 0x00000000;
                                                              				_v0 = 0xd55;
                                                              				_v8 =  &_a1752;
                                                              				r9d = 0;
                                                              				E0000000118000A154();
                                                              				if (0 == 0) goto 0x8000dd89;
                                                              				if (0 == 0) goto 0x8000dd79;
                                                              				_v8 = _v8 & 0x00000000;
                                                              				r8d = 0;
                                                              				r8d = r8d;
                                                              				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x8000dd89;
                                                              				if (0 + _a24 < 0) goto 0x8000dd46;
                                                              				 *((intOrPtr*)(__rcx + 4)) = __edi - r15d;
                                                              				goto 0x8000dcbd;
                                                              				 *((intOrPtr*)(__rcx)) = GetLastError();
                                                              				return E000000011800010B0(_t39, 0, _a5176 ^ _t91 - __rax);
                                                              			}














                                                              0x18000dc50
                                                              0x18000dc55
                                                              0x18000dc67
                                                              0x18000dc6f
                                                              0x18000dc79
                                                              0x18000dc8a
                                                              0x18000dc98
                                                              0x18000dc9c
                                                              0x18000dcb4
                                                              0x18000dcba
                                                              0x18000dcbd
                                                              0x18000dcc3
                                                              0x18000dccb
                                                              0x18000dccd
                                                              0x18000dcd8
                                                              0x18000dcdf
                                                              0x18000dce2
                                                              0x18000dce6
                                                              0x18000dcf8
                                                              0x18000dcfa
                                                              0x18000dd05
                                                              0x18000dd13
                                                              0x18000dd26
                                                              0x18000dd2b
                                                              0x18000dd35
                                                              0x18000dd3e
                                                              0x18000dd44
                                                              0x18000dd46
                                                              0x18000dd5b
                                                              0x18000dd64
                                                              0x18000dd6f
                                                              0x18000dd77
                                                              0x18000dd7e
                                                              0x18000dd84
                                                              0x18000dd8f
                                                              0x18000ddbf

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: bcf7ee1ea3ec2a9cc3b1d78a5d2c7ec9e62fd3dc134ebc80f67064554232c18b
                                                              • Instruction ID: c34ad0e7ff2d66e96fda8e7ac49a4eca9b2c2d7f4ff30b46897494357c1f583c
                                                              • Opcode Fuzzy Hash: bcf7ee1ea3ec2a9cc3b1d78a5d2c7ec9e62fd3dc134ebc80f67064554232c18b
                                                              • Instruction Fuzzy Hash: E441A472614A8886EBA2CF25E4447EA7761F79C7D4F408022EE4E87758DF7CC645C750
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 43dc2e1a8b3bf6a6ca3c7988f27fb1d1dbaf565cf4dd9104b15b21490a7c12b7
                                                              • Instruction ID: 9822ff17b0ce5fbc637df8732c669b6e85e1acb8a855211156653d926a5084e0
                                                              • Opcode Fuzzy Hash: 43dc2e1a8b3bf6a6ca3c7988f27fb1d1dbaf565cf4dd9104b15b21490a7c12b7
                                                              • Instruction Fuzzy Hash: 8D114C72614B4482EBA28F25F440399B7A0F788BD4F188220EE8C0B769DF38CA55CB04
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.319717746.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000003.00000002.319713866.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319736921.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319749796.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000003.00000002.319754228.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_180000000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: ClassCursorLoadRegister
                                                              • String ID: P
                                                              • API String ID: 1693014935-3110715001
                                                              • Opcode ID: 24b0b9f3c1b09ae8b28d8b77cab2a0cc8b6b471604828e0fcca638cf8f3030e2
                                                              • Instruction ID: c953b54a92ac3cc4e92e902e3110dd604cc2aeb839ef1ea803bcd24b7a7bdda6
                                                              • Opcode Fuzzy Hash: 24b0b9f3c1b09ae8b28d8b77cab2a0cc8b6b471604828e0fcca638cf8f3030e2
                                                              • Instruction Fuzzy Hash: 8501B232519F8486E7A18F00F89834BB7B4F388788F604119E6CD42B68DFBDC258CB40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:8.8%
                                                              Dynamic/Decrypted Code Coverage:7.6%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:330
                                                              Total number of Limit Nodes:8
                                                              execution_graph 8532 24067ed80cc 8533 24067ed80f3 8532->8533 8534 24067ed82ba 8533->8534 8536 24067eee9e8 8533->8536 8539 24067ed8bc8 8536->8539 8538 24067eeeab4 8538->8533 8540 24067ed8c02 8539->8540 8541 24067ed8eb8 8540->8541 8542 24067ed8d6f Process32FirstW 8540->8542 8541->8538 8542->8540 8543 180001184 8550 180002a30 8543->8550 8546 180001191 8559 180002d5c 8550->8559 8553 180006cf0 8584 180007f30 GetLastError 8553->8584 8555 18000119a 8555->8546 8556 180002a44 8555->8556 8645 180002cf0 8556->8645 8558 180002a4f 8558->8546 8560 18000118d 8559->8560 8561 180002d7b GetLastError 8559->8561 8560->8546 8560->8553 8571 18000479c 8561->8571 8575 1800045bc 8571->8575 8576 1800046d6 TlsGetValue 8575->8576 8581 180004600 __vcrt_InitializeCriticalSectionEx 8575->8581 8577 18000462e LoadLibraryExW 8578 1800046a5 8577->8578 8579 18000464f GetLastError 8577->8579 8580 1800046c5 GetProcAddress 8578->8580 8582 1800046bc FreeLibrary 8578->8582 8579->8581 8580->8576 8581->8576 8581->8577 8581->8580 8583 180004671 LoadLibraryExW 8581->8583 8582->8580 8583->8578 8583->8581 8585 180007f71 FlsSetValue 8584->8585 8586 180007f54 8584->8586 8587 180007f83 8585->8587 8599 180007f61 SetLastError 8585->8599 8586->8585 8586->8599 8601 180008714 8587->8601 8591 180007fb0 FlsSetValue 8594 180007fbc FlsSetValue 8591->8594 8595 180007fce 8591->8595 8592 180007fa0 FlsSetValue 8593 180007fa9 8592->8593 8608 18000878c 8593->8608 8594->8593 8614 180007b24 8595->8614 8599->8555 8606 180008725 __free_lconv_num 8601->8606 8602 180008776 8622 1800086f4 8602->8622 8603 18000875a RtlAllocateHeap 8604 180007f92 8603->8604 8603->8606 8604->8591 8604->8592 8606->8602 8606->8603 8619 18000abf8 8606->8619 8609 180008791 HeapFree 8608->8609 8613 1800087c0 8608->8613 8610 1800087ac GetLastError 8609->8610 8609->8613 8611 1800087b9 __free_lconv_num 8610->8611 8612 1800086f4 __free_lconv_num 9 API calls 8611->8612 8612->8613 8613->8599 8631 1800079fc 8614->8631 8625 18000ac38 8619->8625 8623 180007f30 __free_lconv_num 11 API calls 8622->8623 8624 1800086fd 8623->8624 8624->8604 8630 180008160 EnterCriticalSection 8625->8630 8643 180008160 EnterCriticalSection 8631->8643 8646 180002d04 8645->8646 8650 180002d1e __std_exception_copy 8645->8650 8647 180002d0e 8646->8647 8648 18000479c __vcrt_freeptd 6 API calls 8646->8648 8651 1800047e4 8647->8651 8648->8647 8650->8558 8652 1800045bc __vcrt_InitializeCriticalSectionEx 5 API calls 8651->8652 8653 180004812 8652->8653 8654 180004824 TlsSetValue 8653->8654 8655 18000481c 8653->8655 8654->8655 8655->8650 8682 180006554 8683 180006569 8682->8683 8684 18000656d 8682->8684 8697 180009cd8 8684->8697 8689 18000658b 8723 1800065c8 8689->8723 8690 18000657f 8691 18000878c __free_lconv_num 11 API calls 8690->8691 8691->8683 8694 18000878c __free_lconv_num 11 API calls 8695 1800065b2 8694->8695 8696 18000878c __free_lconv_num 11 API calls 8695->8696 8696->8683 8698 180006572 8697->8698 8699 180009ce5 8697->8699 8703 18000a234 GetEnvironmentStringsW 8698->8703 8742 180007e8c 8699->8742 8704 180006577 8703->8704 8705 18000a264 8703->8705 8704->8689 8704->8690 8706 18000a154 WideCharToMultiByte 8705->8706 8707 18000a2b5 8706->8707 8708 18000a2bc FreeEnvironmentStringsW 8707->8708 8709 18000b4c4 shared_ptr 12 API calls 8707->8709 8708->8704 8710 18000a2cf 8709->8710 8711 18000a2d7 8710->8711 8712 18000a2e0 8710->8712 8713 18000878c __free_lconv_num 11 API calls 8711->8713 8714 18000a154 WideCharToMultiByte 8712->8714 8715 18000a2de 8713->8715 8716 18000a303 8714->8716 8715->8708 8717 18000a311 8716->8717 8718 18000a307 8716->8718 8720 18000878c __free_lconv_num 11 API calls 8717->8720 8719 18000878c __free_lconv_num 11 API calls 8718->8719 8721 18000a30f FreeEnvironmentStringsW 8719->8721 8720->8721 8721->8704 8724 1800065ed 8723->8724 8725 180008714 __free_lconv_num 11 API calls 8724->8725 8737 180006623 8725->8737 8726 18000662b 8727 18000878c __free_lconv_num 11 API calls 8726->8727 8728 180006593 8727->8728 8728->8694 8729 18000669e 8730 18000878c __free_lconv_num 11 API calls 8729->8730 8730->8728 8731 180008714 __free_lconv_num 11 API calls 8731->8737 8732 18000668d 9131 1800066d8 8732->9131 8736 1800066c3 8739 1800085d8 _invalid_parameter_noinfo 17 API calls 8736->8739 8737->8726 8737->8729 8737->8731 8737->8732 8737->8736 8740 18000878c __free_lconv_num 11 API calls 8737->8740 9122 180006e88 8737->9122 8738 18000878c __free_lconv_num 11 API calls 8738->8726 8741 1800066d6 8739->8741 8740->8737 8743 180007eb8 FlsSetValue 8742->8743 8744 180007e9d FlsGetValue 8742->8744 8746 180007eaa 8743->8746 8747 180007ec5 8743->8747 8745 180007eb2 8744->8745 8744->8746 8745->8743 8750 180007eb0 8746->8750 8785 180006e28 8746->8785 8749 180008714 __free_lconv_num 11 API calls 8747->8749 8752 180007ed4 8749->8752 8762 1800099b0 8750->8762 8753 180007ef2 FlsSetValue 8752->8753 8754 180007ee2 FlsSetValue 8752->8754 8756 180007efe FlsSetValue 8753->8756 8757 180007f10 8753->8757 8755 180007eeb 8754->8755 8758 18000878c __free_lconv_num 11 API calls 8755->8758 8756->8755 8759 180007b24 __free_lconv_num 11 API calls 8757->8759 8758->8746 8760 180007f18 8759->8760 8761 18000878c __free_lconv_num 11 API calls 8760->8761 8761->8750 8963 180009c20 8762->8963 8764 1800099e5 8978 1800096b0 8764->8978 8767 180009a02 8767->8698 8770 180009a1b 8771 18000878c __free_lconv_num 11 API calls 8770->8771 8771->8767 8772 180009a2a 8772->8772 8992 180009d54 8772->8992 8775 180009b26 8776 1800086f4 __free_lconv_num 11 API calls 8775->8776 8777 180009b2b 8776->8777 8779 18000878c __free_lconv_num 11 API calls 8777->8779 8778 180009b81 8781 180009be8 8778->8781 9003 1800094e0 8778->9003 8779->8767 8780 180009b40 8780->8778 8783 18000878c __free_lconv_num 11 API calls 8780->8783 8782 18000878c __free_lconv_num 11 API calls 8781->8782 8782->8767 8783->8778 8794 18000acb8 8785->8794 8828 18000ac70 8794->8828 8833 180008160 EnterCriticalSection 8828->8833 8964 180009c43 8963->8964 8965 180009c4d 8964->8965 9018 180008160 EnterCriticalSection 8964->9018 8967 180009cbf 8965->8967 8970 180006e28 __CxxCallCatchBlock 47 API calls 8965->8970 8967->8764 8971 180009cd7 8970->8971 8974 180007e8c 52 API calls 8971->8974 8977 180009d2a 8971->8977 8975 180009d14 8974->8975 8976 1800099b0 67 API calls 8975->8976 8976->8977 8977->8764 9019 1800091fc 8978->9019 8981 1800096e2 8983 1800096e7 GetACP 8981->8983 8984 1800096f7 8981->8984 8982 1800096d0 GetOEMCP 8982->8984 8983->8984 8984->8767 8985 18000b4c4 8984->8985 8986 18000b50f 8985->8986 8991 18000b4d3 __free_lconv_num 8985->8991 8988 1800086f4 __free_lconv_num 11 API calls 8986->8988 8987 18000b4f6 RtlAllocateHeap 8989 180009a13 8987->8989 8987->8991 8988->8989 8989->8770 8989->8772 8990 18000abf8 __free_lconv_num 2 API calls 8990->8991 8991->8986 8991->8987 8991->8990 8993 1800096b0 49 API calls 8992->8993 8994 180009d81 8993->8994 8995 180009ed7 8994->8995 8996 180009dbe IsValidCodePage 8994->8996 9002 180009dd8 __CxxCallCatchBlock 8994->9002 8997 1800010b0 _log10_special 8 API calls 8995->8997 8996->8995 8998 180009dcf 8996->8998 8999 180009b1d 8997->8999 9000 180009dfe GetCPInfo 8998->9000 8998->9002 8999->8775 8999->8780 9000->8995 9000->9002 9035 1800097c8 9002->9035 9121 180008160 EnterCriticalSection 9003->9121 9020 18000921b 9019->9020 9021 180009220 9019->9021 9020->8981 9020->8982 9021->9020 9022 180007db8 __CxxCallCatchBlock 47 API calls 9021->9022 9023 18000923b 9022->9023 9027 18000b524 9023->9027 9028 18000b539 9027->9028 9029 18000925e 9027->9029 9028->9029 9030 18000bfb4 _invalid_parameter_noinfo 47 API calls 9028->9030 9031 18000b590 9029->9031 9030->9029 9032 18000b5a5 9031->9032 9033 18000b5b8 9031->9033 9032->9033 9034 180009d38 _invalid_parameter_noinfo 47 API calls 9032->9034 9033->9020 9034->9033 9036 180009805 GetCPInfo 9035->9036 9045 1800098fb 9035->9045 9042 180009818 9036->9042 9036->9045 9037 1800010b0 _log10_special 8 API calls 9039 18000999a 9037->9039 9039->8995 9046 18000caa4 9042->9046 9045->9037 9047 1800091fc 47 API calls 9046->9047 9048 18000cae6 9047->9048 9066 18000a0c4 9048->9066 9067 18000a0cd MultiByteToWideChar 9066->9067 9123 180006e95 9122->9123 9125 180006e9f 9122->9125 9123->9125 9129 180006eba 9123->9129 9124 1800086f4 __free_lconv_num 11 API calls 9126 180006ea6 9124->9126 9125->9124 9127 1800085b8 _invalid_parameter_noinfo 47 API calls 9126->9127 9128 180006eb2 9127->9128 9128->8737 9129->9128 9130 1800086f4 __free_lconv_num 11 API calls 9129->9130 9130->9126 9132 1800066dd 9131->9132 9136 180006695 9131->9136 9133 180006706 9132->9133 9134 18000878c __free_lconv_num 11 API calls 9132->9134 9135 18000878c __free_lconv_num 11 API calls 9133->9135 9134->9132 9135->9136 9136->8738 9137 180001138 9138 180001141 __scrt_release_startup_lock 9137->9138 9140 180001145 9138->9140 9141 1800063cc 9138->9141 9142 1800063ec 9141->9142 9152 180006403 9141->9152 9143 1800063f4 9142->9143 9144 18000640a 9142->9144 9146 1800086f4 __free_lconv_num 11 API calls 9143->9146 9145 180009cd8 67 API calls 9144->9145 9147 18000640f 9145->9147 9148 1800063f9 9146->9148 9173 1800093bc GetModuleFileNameW 9147->9173 9150 1800085b8 _invalid_parameter_noinfo 47 API calls 9148->9150 9150->9152 9152->9140 9157 180006481 9160 1800086f4 __free_lconv_num 11 API calls 9157->9160 9158 180006499 9159 1800061a4 47 API calls 9158->9159 9166 1800064b5 9159->9166 9161 180006486 9160->9161 9163 18000878c __free_lconv_num 11 API calls 9161->9163 9162 1800064bb 9165 18000878c __free_lconv_num 11 API calls 9162->9165 9164 180006494 9163->9164 9164->9152 9165->9152 9166->9162 9167 1800064e7 9166->9167 9168 180006500 9166->9168 9169 18000878c __free_lconv_num 11 API calls 9167->9169 9170 18000878c __free_lconv_num 11 API calls 9168->9170 9171 1800064f0 9169->9171 9170->9162 9172 18000878c __free_lconv_num 11 API calls 9171->9172 9172->9164 9174 180009401 GetLastError 9173->9174 9175 180009415 9173->9175 9197 180008668 9174->9197 9177 1800091fc 47 API calls 9175->9177 9179 180009443 9177->9179 9178 18000940e 9181 1800010b0 _log10_special 8 API calls 9178->9181 9182 180009454 9179->9182 9202 18000a5f0 9179->9202 9184 180006426 9181->9184 9205 1800092a0 9182->9205 9185 1800061a4 9184->9185 9187 1800061e2 9185->9187 9189 18000624e 9187->9189 9219 18000a088 9187->9219 9188 18000633f 9191 18000636c 9188->9191 9189->9188 9190 18000a088 47 API calls 9189->9190 9190->9189 9192 1800063bc 9191->9192 9193 180006384 9191->9193 9192->9157 9192->9158 9193->9192 9194 180008714 __free_lconv_num 11 API calls 9193->9194 9195 1800063b2 9194->9195 9196 18000878c __free_lconv_num 11 API calls 9195->9196 9196->9192 9198 180007f30 __free_lconv_num 11 API calls 9197->9198 9199 180008675 __free_lconv_num 9198->9199 9200 180007f30 __free_lconv_num 11 API calls 9199->9200 9201 180008697 9200->9201 9201->9178 9203 18000a3dc 5 API calls 9202->9203 9204 18000a610 9203->9204 9204->9182 9206 1800092df 9205->9206 9208 1800092c4 9205->9208 9207 1800092e4 9206->9207 9209 18000a154 WideCharToMultiByte 9206->9209 9207->9208 9211 1800086f4 __free_lconv_num 11 API calls 9207->9211 9208->9178 9210 18000933b 9209->9210 9210->9207 9212 180009342 GetLastError 9210->9212 9213 18000936d 9210->9213 9211->9208 9214 180008668 11 API calls 9212->9214 9215 18000a154 WideCharToMultiByte 9213->9215 9216 18000934f 9214->9216 9218 180009394 9215->9218 9217 1800086f4 __free_lconv_num 11 API calls 9216->9217 9217->9208 9218->9208 9218->9212 9220 18000a014 9219->9220 9221 1800091fc 47 API calls 9220->9221 9222 18000a038 9221->9222 9222->9187 8656 24067e90000 8659 24067e9015a 8656->8659 8657 24067e9033f GetNativeSystemInfo 8658 24067e90377 VirtualAlloc 8657->8658 8661 24067e908eb 8657->8661 8660 24067e90395 VirtualAlloc 8658->8660 8665 24067e903aa 8658->8665 8659->8657 8659->8661 8660->8665 8662 24067e90873 8662->8661 8663 24067e908c6 RtlAddFunctionTable 8662->8663 8663->8661 8664 24067e9084b VirtualProtect 8664->8665 8665->8662 8665->8664 9223 24067ed4214 9224 24067ed4256 9223->9224 9227 24067ee3988 9224->9227 9226 24067ed44c6 9228 24067ee3a29 9227->9228 9229 24067ee3acc CreateProcessW 9228->9229 9229->9226 8666 180010a8e ExitProcess 8669 180014c90 LoadStringW LoadStringW 8666->8669 8678 1800109d0 LoadCursorW RegisterClassExW 8669->8678 8671 180014cec 8679 180010910 CreateWindowExW 8671->8679 8673 180014d02 GetMessageW 8674 180010ab3 8673->8674 8675 180014d19 TranslateAcceleratorW 8673->8675 8676 180014cfa 8675->8676 8677 180014d2f TranslateMessage DispatchMessageW 8675->8677 8676->8673 8676->8674 8677->8676 8678->8671 8680 1800109a1 ShowWindow UpdateWindow 8679->8680 8681 18001099d 8679->8681 8680->8681 8681->8676

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 24067e90000-24067e9029a call 24067e9091c * 2 13 24067e902a0-24067e902a4 0->13 14 24067e90905 0->14 13->14 16 24067e902aa-24067e902ae 13->16 15 24067e90907-24067e9091a 14->15 16->14 17 24067e902b4-24067e902b8 16->17 17->14 18 24067e902be-24067e902c5 17->18 18->14 19 24067e902cb-24067e902dc 18->19 19->14 20 24067e902e2-24067e902eb 19->20 20->14 21 24067e902f1-24067e902fc 20->21 21->14 22 24067e90302-24067e90312 21->22 23 24067e9033f-24067e90371 GetNativeSystemInfo 22->23 24 24067e90314-24067e9031a 22->24 23->14 26 24067e90377-24067e90393 VirtualAlloc 23->26 25 24067e9031c-24067e90324 24->25 27 24067e9032c-24067e9032d 25->27 28 24067e90326-24067e9032a 25->28 29 24067e903aa-24067e903ae 26->29 30 24067e90395-24067e903a8 VirtualAlloc 26->30 31 24067e9032f-24067e9033d 27->31 28->31 32 24067e903dc-24067e903e3 29->32 33 24067e903b0-24067e903c2 29->33 30->29 31->23 31->25 35 24067e903fb-24067e90417 32->35 36 24067e903e5-24067e903f9 32->36 34 24067e903d4-24067e903d8 33->34 39 24067e903da 34->39 40 24067e903c4-24067e903d1 34->40 37 24067e90419-24067e9041a 35->37 38 24067e90458-24067e90465 35->38 36->35 36->36 41 24067e9041c-24067e90422 37->41 42 24067e9046b-24067e90472 38->42 43 24067e90537-24067e90542 38->43 39->35 40->34 44 24067e90448-24067e90456 41->44 45 24067e90424-24067e90446 41->45 42->43 48 24067e90478-24067e90485 42->48 46 24067e90548-24067e90559 43->46 47 24067e906e6-24067e906ed 43->47 44->38 44->41 45->44 45->45 49 24067e90562-24067e90565 46->49 51 24067e907ac-24067e907c3 47->51 52 24067e906f3-24067e90707 47->52 48->43 50 24067e9048b-24067e9048f 48->50 53 24067e9055b-24067e9055f 49->53 54 24067e90567-24067e90574 49->54 55 24067e9051b-24067e90525 50->55 58 24067e907c9-24067e907cd 51->58 59 24067e9087a-24067e9088d 51->59 56 24067e907a9-24067e907aa 52->56 57 24067e9070d 52->57 53->49 62 24067e9057a-24067e9057d 54->62 63 24067e9060d-24067e90619 54->63 60 24067e9052b-24067e90531 55->60 61 24067e90494-24067e904a8 55->61 56->51 64 24067e90712-24067e90736 57->64 65 24067e907d0-24067e907d3 58->65 81 24067e9088f-24067e9089a 59->81 82 24067e908b3-24067e908ba 59->82 60->43 60->50 68 24067e904aa-24067e904cd 61->68 69 24067e904cf-24067e904d3 61->69 62->63 70 24067e90583-24067e9059b 62->70 66 24067e9061f 63->66 67 24067e906e2-24067e906e3 63->67 95 24067e90738-24067e9073e 64->95 96 24067e90796-24067e9079f 64->96 72 24067e907d9-24067e907e9 65->72 73 24067e9085f-24067e9086d 65->73 74 24067e90625-24067e90648 66->74 67->47 76 24067e90518-24067e90519 68->76 77 24067e904e3-24067e904e7 69->77 78 24067e904d5-24067e904e1 69->78 70->63 79 24067e9059d-24067e9059e 70->79 83 24067e907eb-24067e907ed 72->83 84 24067e9080d-24067e9080f 72->84 73->65 75 24067e90873-24067e90874 73->75 110 24067e9064a-24067e9064b 74->110 111 24067e906b2-24067e906b7 74->111 75->59 76->55 93 24067e904e9-24067e904fc 77->93 94 24067e904fe-24067e90502 77->94 91 24067e90511-24067e90515 78->91 92 24067e905a0-24067e90605 79->92 97 24067e908ab-24067e908b1 81->97 87 24067e908eb-24067e90903 82->87 88 24067e908bc-24067e908c4 82->88 85 24067e907fb-24067e9080b 83->85 86 24067e907ef-24067e907f9 83->86 89 24067e90811-24067e90820 84->89 90 24067e90822-24067e9082b 84->90 99 24067e9082e-24067e9083d 85->99 86->99 87->15 88->87 105 24067e908c6-24067e908e9 RtlAddFunctionTable 88->105 89->99 90->99 91->76 92->92 100 24067e90607 92->100 93->91 94->76 98 24067e90504-24067e9050e 94->98 101 24067e90748-24067e90754 95->101 102 24067e90740-24067e90746 95->102 96->64 106 24067e907a5-24067e907a6 96->106 97->82 103 24067e9089c-24067e908a8 97->103 98->91 112 24067e9084b-24067e9085c VirtualProtect 99->112 113 24067e9083f-24067e90845 99->113 100->63 108 24067e90764-24067e90776 101->108 109 24067e90756-24067e90757 101->109 107 24067e9077b-24067e9078d 102->107 103->97 105->87 106->56 107->96 126 24067e9078f-24067e90794 107->126 108->107 118 24067e90759-24067e90762 109->118 119 24067e9064e-24067e90651 110->119 115 24067e906b9-24067e906bd 111->115 116 24067e906ce-24067e906d8 111->116 112->73 113->112 115->116 120 24067e906bf-24067e906c3 115->120 116->74 121 24067e906de-24067e906df 116->121 118->108 118->118 123 24067e9065b-24067e90666 119->123 124 24067e90653-24067e90659 119->124 120->116 125 24067e906c5 120->125 121->67 128 24067e90668-24067e90669 123->128 129 24067e90676-24067e90688 123->129 127 24067e9068d-24067e906a3 124->127 125->116 126->95 132 24067e906ac 127->132 133 24067e906a5-24067e906aa 127->133 130 24067e9066b-24067e90674 128->130 129->127 130->129 130->130 132->111 133->119
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.320482038.0000024067E90000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024067E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_24067e90000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                              • String ID: Cach$Flus$GetN$Libr$Load$RtlA$Slee$Virt$Virt$aryA$ativ$ct$ddFu$eSys$hIns$lloc$ncti$nf$o$onTa$rote$temI$tion$truc$ualA$ualP
                                                              • API String ID: 394283112-3605381585
                                                              • Opcode ID: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction ID: f9adef08228ddec26c5b7a567b556d2b527fd3600c6068bbede39bd45df5fad7
                                                              • Opcode Fuzzy Hash: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction Fuzzy Hash: 8462E231628F098BD768DF18C8897B9B3E5FB48300F51462DDA8BC7251DB34E596CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: AccessAllocateFindMemoryResourceResource_Virtual
                                                              • String ID: @$LXGUM$ad5zS&E7DS(ke9?+qbAC5tqx<Y<h0!QB4H3bk
                                                              • API String ID: 2485490239-3005932707
                                                              • Opcode ID: 72763dadedb1f7e12bf326a7682b4cc9f3b8809a7beac6fa455c8e22944c1181
                                                              • Instruction ID: 10e411743ffb1a55a6adb62272a00c62f4f605c25ab8d9ba5168281e261d5f46
                                                              • Opcode Fuzzy Hash: 72763dadedb1f7e12bf326a7682b4cc9f3b8809a7beac6fa455c8e22944c1181
                                                              • Instruction Fuzzy Hash: 0F41F976218B8486D795CB14F49039AB7B4F388794F505116FADA83BA8DF7DC608CB00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              C-Code - Quality: 37%
                                                              			E00000001180010AC0(long long _a8, intOrPtr _a16, long long _a24) {
                                                              				long long _v32;
                                                              				long long _v40;
                                                              				intOrPtr _v48;
                                                              				intOrPtr _v52;
                                                              				intOrPtr _v56;
                                                              				intOrPtr _t15;
                                                              				long long _t19;
                                                              				long long _t20;
                                                              
                                                              				_a24 = _t20;
                                                              				_a16 = _t15;
                                                              				_a8 = _t19;
                                                              				_v56 = _a16;
                                                              				if (_v56 == 1) goto 0x80010ae6;
                                                              				goto 0x80010bf4;
                                                              				 *0x80022ca0 = _a8;
                                                              				_v52 = 0x904;
                                                              				_v48 = 0xf9e;
                                                              				_v40 = 0;
                                                              				_v32 = 0;
                                                              				if (E00000001180010DB0(_a16) == 0) goto 0x80010b28;
                                                              				ExitProcess(??);
                                                              			}











                                                              0x180010ac0
                                                              0x180010ac5
                                                              0x180010ac9
                                                              0x180010ad6
                                                              0x180010adf
                                                              0x180010ae1
                                                              0x180010aeb
                                                              0x180010af2
                                                              0x180010afa
                                                              0x180010b02
                                                              0x180010b0b
                                                              0x180010b1b
                                                              0x180010b22

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess
                                                              • String ID:
                                                              • API String ID: 621844428-0
                                                              • Opcode ID: e7061396d7e3d43570edbd3d19f5eed90c055825c823b852da9f6b8b51899770
                                                              • Instruction ID: 35b30a5bd3bbc3bfa3955963e6b6c4c9d1147ff83b5bb424c40f1a31c42fa1fb
                                                              • Opcode Fuzzy Hash: e7061396d7e3d43570edbd3d19f5eed90c055825c823b852da9f6b8b51899770
                                                              • Instruction Fuzzy Hash: AE311671119B489AE782DF54F85438AB7A0F7983D4F608215F6A907BA4CFBDC24CCB40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 134 18000147c-180001482 135 180001484-180001487 134->135 136 1800014bd-1800014c7 134->136 138 1800014b1-1800014f0 call 180001268 135->138 139 180001489-18000148c 135->139 137 1800015e4-1800015f9 136->137 143 180001608-180001622 call 1800010fc 137->143 144 1800015fb 137->144 156 1800014f6-18000150b call 1800010fc 138->156 157 1800015be 138->157 141 1800014a4 __scrt_dllmain_crt_thread_attach 139->141 142 18000148e-180001491 139->142 145 1800014a9-1800014b0 141->145 147 180001493-18000149c 142->147 148 18000149d-1800014a2 call 1800011ac 142->148 154 180001624-180001659 call 180001224 call 180001e54 call 180001ed0 call 1800013d8 call 1800013fc call 180001254 143->154 155 18000165b-18000168c call 180001c48 143->155 149 1800015fd-180001607 144->149 148->145 154->149 166 18000169d-1800016a3 155->166 167 18000168e-180001694 155->167 169 180001511-180001522 call 18000116c 156->169 170 1800015d6-1800015e3 call 180001c48 156->170 160 1800015c0-1800015d5 157->160 172 1800016a5-1800016af 166->172 173 1800016ea-1800016f2 call 180010ac0 166->173 167->166 171 180001696-180001698 167->171 186 180001573-18000157d call 1800013d8 169->186 187 180001524-180001548 call 180001e94 call 180001e44 call 180001e70 call 180006da0 169->187 170->137 177 18000178b-180001798 171->177 178 1800016b1-1800016b9 172->178 179 1800016bb-1800016c9 172->179 188 1800016f7-180001700 173->188 184 1800016cf-1800016d7 call 18000147c 178->184 179->184 198 180001781-180001789 179->198 200 1800016dc-1800016e4 184->200 186->157 208 18000157f-18000158b call 180001e8c 186->208 187->186 234 18000154a-180001551 __scrt_dllmain_after_initialize_c 187->234 194 180001702-180001704 188->194 195 180001738-18000173a 188->195 194->195 203 180001706-180001728 call 180010ac0 call 1800015e4 194->203 196 180001741-180001756 call 18000147c 195->196 197 18000173c-18000173f 195->197 196->198 217 180001758-180001762 196->217 197->196 197->198 198->177 200->173 200->198 203->195 229 18000172a-18000172f 203->229 225 1800015b1-1800015bc 208->225 226 18000158d-180001597 call 180001340 208->226 222 180001764-18000176b 217->222 223 18000176d-18000177d 217->223 222->198 223->198 225->160 226->225 233 180001599-1800015a7 226->233 229->195 233->225 234->186 235 180001553-180001570 call 180006d5c 234->235 235->186
                                                              C-Code - Quality: 100%
                                                              			E0000000118000147C(void* __edx) {
                                                              				void* _t5;
                                                              
                                                              				_t5 = __edx;
                                                              				if (_t5 == 0) goto 0x800014bd;
                                                              				if (_t5 == 0) goto 0x800014b1;
                                                              				if (_t5 == 0) goto 0x800014a4;
                                                              				if (__edx == 1) goto 0x8000149d;
                                                              				return 1;
                                                              			}




                                                              0x180001480
                                                              0x180001482
                                                              0x180001487
                                                              0x18000148c
                                                              0x180001491
                                                              0x18000149c

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: f481a242433e045de9421f6a540d64c2f1c4067185df5e2b4ea36506bf633cb0
                                                              • Instruction ID: c036cf0e1e542974e7afb98f421e14e504817ee7e551922961311e630d73ddb8
                                                              • Opcode Fuzzy Hash: f481a242433e045de9421f6a540d64c2f1c4067185df5e2b4ea36506bf633cb0
                                                              • Instruction Fuzzy Hash: 5881C370A04A4DCEFBD7DB65A8413D932A0AB9D7C2F54C125B909477A6DF38C74D8700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,00006DC7C02D7798,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007F3F
                                                              • FlsSetValue.KERNEL32(?,?,00006DC7C02D7798,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007F75
                                                              • FlsSetValue.KERNEL32(?,?,00006DC7C02D7798,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FA2
                                                              • FlsSetValue.KERNEL32(?,?,00006DC7C02D7798,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FB3
                                                              • FlsSetValue.KERNEL32(?,?,00006DC7C02D7798,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FC4
                                                              • SetLastError.KERNEL32(?,?,00006DC7C02D7798,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000,000000018000A3A3,?,?,?), ref: 0000000180007FDF
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: eb8af4af359d96366aaa10eae491533e56ca08d7f11ac2249f998e933b1e40b3
                                                              • Instruction ID: b3640c739d53f521f3aff5ec24f9b4829142f54ff52cb57a8f227eaee239dcc8
                                                              • Opcode Fuzzy Hash: eb8af4af359d96366aaa10eae491533e56ca08d7f11ac2249f998e933b1e40b3
                                                              • Instruction Fuzzy Hash: 72115C3070964942FAEBE32195453F972926B9C7F0F18C625B83A077DBDE68C6498701
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              C-Code - Quality: 48%
                                                              			E0000000118000A234(void* __ebp, long long __rbx, long long __rdi, long long __rsi) {
                                                              				void* _t25;
                                                              				signed long long _t45;
                                                              				signed long long _t47;
                                                              				long long _t62;
                                                              				signed long long _t63;
                                                              				signed long long _t70;
                                                              				void* _t71;
                                                              				void* _t75;
                                                              				WCHAR* _t76;
                                                              
                                                              				_t45 = _t70;
                                                              				 *((long long*)(_t45 + 8)) = __rbx;
                                                              				 *((long long*)(_t45 + 0x10)) = _t62;
                                                              				 *((long long*)(_t45 + 0x18)) = __rsi;
                                                              				 *((long long*)(_t45 + 0x20)) = __rdi;
                                                              				_t71 = _t70 - 0x40; // executed
                                                              				GetEnvironmentStringsW(); // executed
                                                              				if (_t45 != 0) goto 0x8000a264;
                                                              				goto 0x8000a327;
                                                              				_t63 = _t45;
                                                              				if ( *_t45 == 0) goto 0x8000a289;
                                                              				_t47 = (_t45 | 0xffffffff) + 1;
                                                              				if ( *((intOrPtr*)(_t63 + _t47 * 2)) != 0) goto 0x8000a270;
                                                              				if ( *((intOrPtr*)(_t63 + _t47 * 2 + 2)) != 0) goto 0x8000a26c;
                                                              				 *((long long*)(_t71 + 0x38)) = __rsi;
                                                              				 *((long long*)(_t71 + 0x30)) = __rsi;
                                                              				r9d = __ebp;
                                                              				 *((intOrPtr*)(_t71 + 0x28)) = 0;
                                                              				 *(_t71 + 0x20) = __rsi;
                                                              				E0000000118000A154();
                                                              				if (0 != 0) goto 0x8000a2c7;
                                                              				FreeEnvironmentStringsW(_t76);
                                                              				goto 0x8000a25d;
                                                              				E0000000118000B4C4(_t47, 0, _t75); // executed
                                                              				_t57 = _t47;
                                                              				if (_t47 != 0) goto 0x8000a2e0;
                                                              				_t25 = E0000000118000878C(_t47, 0);
                                                              				goto 0x8000a2bc;
                                                              				 *((long long*)(_t71 + 0x38)) = __rsi;
                                                              				r9d = __ebp;
                                                              				 *((long long*)(_t71 + 0x30)) = __rsi;
                                                              				 *((intOrPtr*)(_t71 + 0x28)) = r14d;
                                                              				 *(_t71 + 0x20) = _t47;
                                                              				E0000000118000A154();
                                                              				if (_t25 != 0) goto 0x8000a311;
                                                              				E0000000118000878C(_t47, _t47);
                                                              				goto 0x8000a31b;
                                                              				E0000000118000878C(_t47, _t57);
                                                              				return FreeEnvironmentStringsW(??);
                                                              			}












                                                              0x18000a234
                                                              0x18000a237
                                                              0x18000a23b
                                                              0x18000a23f
                                                              0x18000a243
                                                              0x18000a249
                                                              0x18000a24d
                                                              0x18000a25b
                                                              0x18000a25f
                                                              0x18000a264
                                                              0x18000a26a
                                                              0x18000a270
                                                              0x18000a278
                                                              0x18000a287
                                                              0x18000a289
                                                              0x18000a291
                                                              0x18000a2a0
                                                              0x18000a2a3
                                                              0x18000a2a9
                                                              0x18000a2b0
                                                              0x18000a2ba
                                                              0x18000a2bf
                                                              0x18000a2c5
                                                              0x18000a2ca
                                                              0x18000a2cf
                                                              0x18000a2d5
                                                              0x18000a2d9
                                                              0x18000a2de
                                                              0x18000a2e0
                                                              0x18000a2e5
                                                              0x18000a2e8
                                                              0x18000a2f0
                                                              0x18000a2f9
                                                              0x18000a2fe
                                                              0x18000a305
                                                              0x18000a30a
                                                              0x18000a30f
                                                              0x18000a313
                                                              0x18000a341

                                                              APIs
                                                              • GetEnvironmentStringsW.KERNELBASE(?,?,?,?,?,?,?,0000000180006577), ref: 000000018000A24D
                                                              • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,0000000180006577), ref: 000000018000A2BF
                                                                • Part of subcall function 000000018000B4C4: RtlAllocateHeap.NTDLL(?,?,?,000000018000D071,?,?,00000000,000000018000A3A3,?,?,?,00000001800068CF,?,?,?,00000001800067C5), ref: 000000018000B502
                                                              • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,0000000180006577), ref: 000000018000A31E
                                                                • Part of subcall function 000000018000878C: HeapFree.KERNEL32(?,?,00000000,000000018000E6BE,?,?,?,000000018000E6FB,?,?,00000000,000000018000BED5,?,?,?,000000018000BE07), ref: 00000001800087A2
                                                                • Part of subcall function 000000018000878C: GetLastError.KERNEL32(?,?,00000000,000000018000E6BE,?,?,?,000000018000E6FB,?,?,00000000,000000018000BED5,?,?,?,000000018000BE07), ref: 00000001800087AC
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentFreeStrings$Heap$AllocateErrorLast
                                                              • String ID:
                                                              • API String ID: 1848424169-0
                                                              • Opcode ID: 3b5e9515b064aa3ec168be9b31d1f7c60d7c96a4ed281ecd250bb73b22c8c60a
                                                              • Instruction ID: 864329f4ba152f277f2adf48c891db3446df78698e664f4bc60f625a72c2a341
                                                              • Opcode Fuzzy Hash: 3b5e9515b064aa3ec168be9b31d1f7c60d7c96a4ed281ecd250bb73b22c8c60a
                                                              • Instruction Fuzzy Hash: 64318631608B5881FBA6DF2568403DA7794B78DFD4F48C229FA9A43BD5DF38C6498700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.320583141.0000024067ED1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000024067ED1000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_24067ed1000_rundll32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID: li
                                                              • API String ID: 963392458-3170889640
                                                              • Opcode ID: df447d1959c748b5d8cf34ebfef7c4b31b83bdbcb52bf56f40cb8f0245456118
                                                              • Instruction ID: 2d95810c2226d9bf128ad55fbfbdcb3cbc07daf665974aba6df51f5b9d42ea58
                                                              • Opcode Fuzzy Hash: df447d1959c748b5d8cf34ebfef7c4b31b83bdbcb52bf56f40cb8f0245456118
                                                              • Instruction Fuzzy Hash: 6841E77091CB848FDBA4DF18D0C97DAB7E0FB98315F10495DE589C7296CB789884CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 427 18000a990-18000a9ab 428 18000a9ae-18000a9d7 427->428 429 18000a9e3-18000a9ec 428->429 430 18000a9d9-18000a9de 428->430 432 18000aa04 429->432 433 18000a9ee-18000a9f1 429->433 431 18000aa6e-18000aa77 430->431 431->428 434 18000aa7d-18000aa97 431->434 437 18000aa09-18000aa1a GetStdHandle 432->437 435 18000a9f3-18000a9fb 433->435 436 18000a9fd-18000aa02 433->436 435->437 436->437 438 18000aa49-18000aa61 437->438 439 18000aa1c-18000aa27 GetFileType 437->439 438->431 441 18000aa63-18000aa67 438->441 439->438 440 18000aa29-18000aa34 439->440 442 18000aa36-18000aa3b 440->442 443 18000aa3d-18000aa40 440->443 441->431 442->431 443->431 444 18000aa42-18000aa47 443->444 444->431
                                                              C-Code - Quality: 37%
                                                              			E0000000118000A990(void* __ecx, long long __rbx, long long __rdi, long long __rsi, long long __rbp, void* _a8, void* _a16, void* _a24, void* _a32) {
                                                              				signed char _t53;
                                                              				signed int _t54;
                                                              				void* _t73;
                                                              				long long _t77;
                                                              				intOrPtr _t78;
                                                              				void* _t95;
                                                              				long _t98;
                                                              
                                                              				_t73 = _t95;
                                                              				 *((long long*)(_t73 + 8)) = __rbx;
                                                              				 *((long long*)(_t73 + 0x10)) = __rbp;
                                                              				 *((long long*)(_t73 + 0x18)) = __rsi;
                                                              				 *((long long*)(_t73 + 0x20)) = __rdi;
                                                              				r14d = 0;
                                                              				_t77 =  *((intOrPtr*)(0x180022818)) + 2;
                                                              				if (_t77 - 1 <= 0) goto 0x8000a9e3;
                                                              				 *0x180022828 =  *0x180022828 | 0x00000080;
                                                              				goto 0x8000aa6e;
                                                              				 *0x180022828 = 0x81;
                                                              				if (0 == 0) goto 0x8000aa04;
                                                              				if (0 == 0) goto 0x8000a9fd;
                                                              				goto 0x8000aa09;
                                                              				goto 0x8000aa09;
                                                              				GetStdHandle(_t98);
                                                              				_t21 = _t77 + 1; // 0x1
                                                              				if (_t21 - 1 <= 0) goto 0x8000aa49;
                                                              				_t53 = GetFileType(??); // executed
                                                              				if (_t53 == 0) goto 0x8000aa49;
                                                              				_t54 = _t53 & 0x000000ff;
                                                              				 *((long long*)(0x180022818)) = _t77;
                                                              				if (_t54 != 2) goto 0x8000aa3d;
                                                              				 *0x180022828 =  *0x180022828 | 0x00000040;
                                                              				goto 0x8000aa6e;
                                                              				if (_t54 != 3) goto 0x8000aa6e;
                                                              				 *0x180022828 =  *0x180022828 | 0x00000008;
                                                              				goto 0x8000aa6e;
                                                              				 *0x180022828 =  *0x180022828 | 0x00000040;
                                                              				 *((long long*)( *0x185D90558 + 0x28)) = 0xfffffffe;
                                                              				_t78 =  *0x80022c38; // 0x0
                                                              				if (_t78 == 0) goto 0x8000aa6e;
                                                              				 *((intOrPtr*)( *((intOrPtr*)(_t98 + _t78)) + 0x18)) = 0xfffffffe;
                                                              				if (1 != 3) goto 0x8000a9ae;
                                                              				return _t54;
                                                              			}










                                                              0x18000a990
                                                              0x18000a993
                                                              0x18000a997
                                                              0x18000a99b
                                                              0x18000a99f
                                                              0x18000a9ab
                                                              0x18000a9cf
                                                              0x18000a9d7
                                                              0x18000a9d9
                                                              0x18000a9de
                                                              0x18000a9e3
                                                              0x18000a9ec
                                                              0x18000a9f1
                                                              0x18000a9fb
                                                              0x18000aa02
                                                              0x18000aa09
                                                              0x18000aa12
                                                              0x18000aa1a
                                                              0x18000aa1f
                                                              0x18000aa27
                                                              0x18000aa29
                                                              0x18000aa2c
                                                              0x18000aa34
                                                              0x18000aa36
                                                              0x18000aa3b
                                                              0x18000aa40
                                                              0x18000aa42
                                                              0x18000aa47
                                                              0x18000aa49
                                                              0x18000aa4e
                                                              0x18000aa57
                                                              0x18000aa61
                                                              0x18000aa67
                                                              0x18000aa77
                                                              0x18000aa97

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: FileHandleType
                                                              • String ID:
                                                              • API String ID: 3000768030-0
                                                              • Opcode ID: 80ba5a8ef376f08fb786711adb48f3016d6d32676bbcc2ff4b8feed3f833e474
                                                              • Instruction ID: b796fa54aa9643fb7ba01a6ed1fec76df8915e221227f43cc089e28723c18302
                                                              • Opcode Fuzzy Hash: 80ba5a8ef376f08fb786711adb48f3016d6d32676bbcc2ff4b8feed3f833e474
                                                              • Instruction Fuzzy Hash: A6316132618B5891EBA2CB1596803A97750F34BBE0F68430AFB6A473E0CF34D6A5D341
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 445 18000d26c-18000d289 446 18000d2b4-18000d2c1 call 180008160 445->446 447 18000d28b-18000d29c call 1800086f4 call 1800085b8 445->447 452 18000d2c7-18000d2ce 446->452 460 18000d29e-18000d2b3 447->460 454 18000d306-18000d312 call 1800081b4 452->454 455 18000d2d0-18000d2db 452->455 454->460 457 18000d2dd 455->457 458 18000d2df call 18000d174 455->458 461 18000d301-18000d304 457->461 464 18000d2e4-18000d2eb 458->464 461->452 465 18000d2f2-18000d2fb 464->465 466 18000d2ed-18000d2f0 464->466 465->461 466->454
                                                              C-Code - Quality: 100%
                                                              			E0000000118000D26C(void* __ecx, intOrPtr* __rax, long long __rbx, long long __rdi, long long __rsi, long long _a8, long long _a16, long long _a24) {
                                                              
                                                              				_a8 = __rbx;
                                                              				_a16 = __rsi;
                                                              				_a24 = __rdi;
                                                              				if (__ecx - 0x2000 < 0) goto 0x8000d2b4;
                                                              				E000000011800086F4(__ecx - 0x2000, __rax);
                                                              				 *__rax = 9;
                                                              				E000000011800085B8();
                                                              				return 9;
                                                              			}



                                                              0x18000d26c
                                                              0x18000d271
                                                              0x18000d276
                                                              0x18000d289
                                                              0x18000d28b
                                                              0x18000d295
                                                              0x18000d297
                                                              0x18000d2b3

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: b2bec9f1c83fd2e5dff941a4990122d97467662781677e8ba2cfdbb0e4efa737
                                                              • Instruction ID: 290c2a04846c9b039a5155463e3184fcb060a742c36b4207bfb39a2b49eb85f2
                                                              • Opcode Fuzzy Hash: b2bec9f1c83fd2e5dff941a4990122d97467662781677e8ba2cfdbb0e4efa737
                                                              • Instruction Fuzzy Hash: 3911AC3210468C82F383DF14E8507D9B7A4FB5C7C0F058426FA9547BAADF38CA199B50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 467 180008714-180008723 468 180008733-180008743 467->468 469 180008725-180008731 467->469 471 18000875a-180008772 RtlAllocateHeap 468->471 469->468 470 180008776-180008781 call 1800086f4 469->470 476 180008783-180008788 470->476 472 180008774 471->472 473 180008745-18000874c call 18000c08c 471->473 472->476 473->470 479 18000874e-180008758 call 18000abf8 473->479 479->470 479->471
                                                              C-Code - Quality: 44%
                                                              			E00000001180008714(void* __eax, signed int __rcx, signed int __rdx) {
                                                              				void* __rbx;
                                                              				intOrPtr* _t22;
                                                              				signed int _t29;
                                                              
                                                              				_t29 = __rdx;
                                                              				if (__rcx == 0) goto 0x80008733;
                                                              				_t1 = _t29 - 0x20; // -32
                                                              				_t22 = _t1;
                                                              				if (_t22 - __rdx < 0) goto 0x80008776;
                                                              				_t25 =  ==  ? _t22 : __rcx * __rdx;
                                                              				goto 0x8000875a;
                                                              				if (E0000000118000C08C() == 0) goto 0x80008776;
                                                              				if (E0000000118000ABF8(_t22,  ==  ? _t22 : __rcx * __rdx,  ==  ? _t22 : __rcx * __rdx) == 0) goto 0x80008776;
                                                              				RtlAllocateHeap(??, ??, ??); // executed
                                                              				if (_t22 == 0) goto 0x80008745;
                                                              				goto 0x80008783;
                                                              				E000000011800086F4(_t22, _t22);
                                                              				 *_t22 = 0xc;
                                                              				return 0;
                                                              			}






                                                              0x180008714
                                                              0x180008723
                                                              0x180008727
                                                              0x180008727
                                                              0x180008731
                                                              0x18000873f
                                                              0x180008743
                                                              0x18000874c
                                                              0x180008758
                                                              0x180008769
                                                              0x180008772
                                                              0x180008774
                                                              0x180008776
                                                              0x18000877b
                                                              0x180008788

                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(?,?,00000000,0000000180007F92,?,?,00006DC7C02D7798,00000001800086FD,?,?,?,?,000000018000D08A,?,?,00000000), ref: 0000000180008769
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: c340c08eb01792afebc94c3cbbbb04e65d50e9c6a72745528ebd04769994fc4e
                                                              • Instruction ID: 66bea78d34406d615fa8c08e42eaa36a882f8058afe23dfc71e7ff7acb685faa
                                                              • Opcode Fuzzy Hash: c340c08eb01792afebc94c3cbbbb04e65d50e9c6a72745528ebd04769994fc4e
                                                              • Instruction Fuzzy Hash: A1F06D74309A0881FED7D7A599003D522D16F5CBC0F2CD4302D4E863DAEE1CC788A320
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 44%
                                                              			E0000000118000B4C4(intOrPtr* __rax, void* __rcx, void* __r10) {
                                                              				void* __rbx;
                                                              
                                                              				if (__rcx - 0xffffffe0 > 0) goto 0x8000b50f;
                                                              				_t16 =  ==  ? __rax : __rcx;
                                                              				goto 0x8000b4f6;
                                                              				if (E0000000118000C08C() == 0) goto 0x8000b50f;
                                                              				if (E0000000118000ABF8(__rax,  ==  ? __rax : __rcx,  ==  ? __rax : __rcx) == 0) goto 0x8000b50f;
                                                              				RtlAllocateHeap(??, ??, ??); // executed
                                                              				if (__rax == 0) goto 0x8000b4e1;
                                                              				goto 0x8000b51c;
                                                              				E000000011800086F4(__rax, __rax);
                                                              				 *__rax = 0xc;
                                                              				return 0;
                                                              			}




                                                              0x18000b4d1
                                                              0x18000b4db
                                                              0x18000b4df
                                                              0x18000b4e8
                                                              0x18000b4f4
                                                              0x18000b502
                                                              0x18000b50b
                                                              0x18000b50d
                                                              0x18000b50f
                                                              0x18000b514
                                                              0x18000b521

                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(?,?,?,000000018000D071,?,?,00000000,000000018000A3A3,?,?,?,00000001800068CF,?,?,?,00000001800067C5), ref: 000000018000B502
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 4ce8a77d3490294d8fe48757cb82fd14e8c5611eedce05584f392cb206084fbe
                                                              • Instruction ID: 74f3ff24332d423f289e94138037da3f2bd69dba3dd7fdbb0825d479653fc046
                                                              • Opcode Fuzzy Hash: 4ce8a77d3490294d8fe48757cb82fd14e8c5611eedce05584f392cb206084fbe
                                                              • Instruction Fuzzy Hash: 3DF0F86061564885FEE7AAA25C413E532819B4C7E1F09CA607D26862C2DE28C7888B20
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 71%
                                                              			E00000001180001268(void* __ecx) {
                                                              				void* __rbx;
                                                              				void* _t12;
                                                              				void* _t17;
                                                              				void* _t18;
                                                              				void* _t19;
                                                              				void* _t20;
                                                              				void* _t21;
                                                              
                                                              				_t2 =  ==  ? 1 :  *0x80021ae0 & 0x000000ff;
                                                              				 *0x80021ae0 =  ==  ? 1 :  *0x80021ae0 & 0x000000ff;
                                                              				E00000001180001A80(1, _t12, __ecx, _t17, _t18, _t19, _t20, _t21);
                                                              				if (E00000001180002A08() != 0) goto 0x80001297;
                                                              				goto 0x800012ab; // executed
                                                              				E00000001180006CDC(_t17); // executed
                                                              				if (0 != 0) goto 0x800012a9;
                                                              				E00000001180002A58(0);
                                                              				goto 0x80001293;
                                                              				return 1;
                                                              			}










                                                              0x18000127c
                                                              0x18000127f
                                                              0x180001285
                                                              0x180001291
                                                              0x180001295
                                                              0x180001297
                                                              0x18000129e
                                                              0x1800012a2
                                                              0x1800012a7
                                                              0x1800012b0

                                                              APIs
                                                              • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 000000018000128A
                                                                • Part of subcall function 0000000180002A08: __vcrt_initialize_locks.LIBVCRUNTIME ref: 0000000180002A0C
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: __scrt_dllmain_crt_thread_attach__vcrt_initialize_locks
                                                              • String ID:
                                                              • API String ID: 108617051-0
                                                              • Opcode ID: b3a5aff99e9bbd50fc4b4caf8482eddb7f62de2f1dfabb963a32cf9525c58297
                                                              • Instruction ID: 3927130d99c38a55cbe47f9f4b507d4a3e007974ffcd633e9ac0bb37393e6b58
                                                              • Opcode Fuzzy Hash: b3a5aff99e9bbd50fc4b4caf8482eddb7f62de2f1dfabb963a32cf9525c58297
                                                              • Instruction Fuzzy Hash: 66E01A30B0528C8EFEE7E6B525423F937501B1E3C2F40D068B892825838D0947AD5722
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: LoadString$ExitProcess
                                                              • String ID:
                                                              • API String ID: 80118013-0
                                                              • Opcode ID: 4511720a80b85894ed9872a941f45ad7e5906891a0c13688ba3e14c3fa3ec101
                                                              • Instruction ID: b62d2fb12763fda2a64a5ee64e5548852d899a580494aacca0011f8ebade0f7c
                                                              • Opcode Fuzzy Hash: 4511720a80b85894ed9872a941f45ad7e5906891a0c13688ba3e14c3fa3ec101
                                                              • Instruction Fuzzy Hash: E1D0C936625A4892E7A29B61F80578A2390B78C7D4F809111A98C42A24CF2CC2098B00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastShowWindow
                                                              • String ID:
                                                              • API String ID: 3252650109-0
                                                              • Opcode ID: 9a665b6fd1606399514c88e51871797ade4cb1dce934726ac272da09cbabfbb3
                                                              • Instruction ID: 20d447c0f35bcb8e3c3c297cfd2fae4a36a0868fd259666119818285c186e9df
                                                              • Opcode Fuzzy Hash: 9a665b6fd1606399514c88e51871797ade4cb1dce934726ac272da09cbabfbb3
                                                              • Instruction Fuzzy Hash: B522B976B00E0986FBDB9F72AC1439B22A2AB8CBD5F46C439E40689174DE7DC75D8305
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 1ffe1e744cccfe4686aba7d6a8aca853fc79a5f69e58afced9d2bc9442cc5b87
                                                              • Instruction ID: 43a781f402e08a9585d1bfd569913690a5560a40171371ec2054230cf506bc92
                                                              • Opcode Fuzzy Hash: 1ffe1e744cccfe4686aba7d6a8aca853fc79a5f69e58afced9d2bc9442cc5b87
                                                              • Instruction Fuzzy Hash: 1931FB72605B848AEBA1DF60E8507EE7365F788785F44842AEB4E47A99DF38C74CC710
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 65%
                                                              			E000000011800082EC(void* __ecx, intOrPtr __edx, long long __rbx, long long __rsi) {
                                                              				void* _t36;
                                                              				int _t38;
                                                              				signed long long _t60;
                                                              				long long _t63;
                                                              				_Unknown_base(*)()* _t82;
                                                              				void* _t86;
                                                              				void* _t87;
                                                              				void* _t89;
                                                              				signed long long _t90;
                                                              				struct _EXCEPTION_POINTERS* _t95;
                                                              
                                                              				 *((long long*)(_t89 + 0x10)) = __rbx;
                                                              				 *((long long*)(_t89 + 0x18)) = __rsi;
                                                              				_t87 = _t89 - 0x4f0;
                                                              				_t90 = _t89 - 0x5f0;
                                                              				_t60 =  *0x80021010; // 0x6dc7c02d7798
                                                              				 *(_t87 + 0x4e0) = _t60 ^ _t90;
                                                              				if (__ecx == 0xffffffff) goto 0x8000832b;
                                                              				E00000001180001C40(_t36);
                                                              				r8d = 0x98;
                                                              				E00000001180002680();
                                                              				r8d = 0x4d0;
                                                              				E00000001180002680();
                                                              				 *((long long*)(_t90 + 0x48)) = _t90 + 0x70;
                                                              				_t63 = _t87 + 0x10;
                                                              				 *((long long*)(_t90 + 0x50)) = _t63;
                                                              				__imp__RtlCaptureContext();
                                                              				r8d = 0;
                                                              				__imp__RtlLookupFunctionEntry();
                                                              				if (_t63 == 0) goto 0x800083be;
                                                              				 *(_t90 + 0x38) =  *(_t90 + 0x38) & 0x00000000;
                                                              				 *((long long*)(_t90 + 0x30)) = _t90 + 0x58;
                                                              				 *((long long*)(_t90 + 0x28)) = _t90 + 0x60;
                                                              				 *((long long*)(_t90 + 0x20)) = _t87 + 0x10;
                                                              				__imp__RtlVirtualUnwind();
                                                              				 *((long long*)(_t87 + 0x108)) =  *((intOrPtr*)(_t87 + 0x508));
                                                              				 *((intOrPtr*)(_t90 + 0x70)) = __edx;
                                                              				 *((long long*)(_t87 + 0xa8)) = _t87 + 0x510;
                                                              				 *((long long*)(_t87 - 0x80)) =  *((intOrPtr*)(_t87 + 0x508));
                                                              				 *((intOrPtr*)(_t90 + 0x74)) = r8d;
                                                              				_t38 = IsDebuggerPresent();
                                                              				SetUnhandledExceptionFilter(_t82, _t86);
                                                              				if (UnhandledExceptionFilter(_t95) != 0) goto 0x80008420;
                                                              				if (_t38 != 0) goto 0x80008420;
                                                              				if (__ecx == 0xffffffff) goto 0x80008420;
                                                              				return E000000011800010B0(E00000001180001C40(_t40), __ecx,  *(_t87 + 0x4e0) ^ _t90);
                                                              			}













                                                              0x1800082ec
                                                              0x1800082f1
                                                              0x1800082fa
                                                              0x180008302
                                                              0x180008309
                                                              0x180008313
                                                              0x180008324
                                                              0x180008326
                                                              0x180008332
                                                              0x180008338
                                                              0x180008343
                                                              0x180008349
                                                              0x180008353
                                                              0x18000835c
                                                              0x180008360
                                                              0x180008365
                                                              0x18000837a
                                                              0x18000837d
                                                              0x180008386
                                                              0x180008388
                                                              0x18000839b
                                                              0x1800083a8
                                                              0x1800083b1
                                                              0x1800083b8
                                                              0x1800083c5
                                                              0x1800083d7
                                                              0x1800083db
                                                              0x1800083e9
                                                              0x1800083ed
                                                              0x1800083f1
                                                              0x1800083fb
                                                              0x18000840e
                                                              0x180008412
                                                              0x180008417
                                                              0x180008446

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: d0fc5085bf44c4937be082645d9f0fd030d92464e7166f1adeb9fe9a04ad5cc9
                                                              • Instruction ID: d6e40695d6015e5c843dff92317e70983bbd332ebd8c23179410134a75d63e3d
                                                              • Opcode Fuzzy Hash: d0fc5085bf44c4937be082645d9f0fd030d92464e7166f1adeb9fe9a04ad5cc9
                                                              • Instruction Fuzzy Hash: 7E315032604F8486DBA1CF25E8407DE73A4F788798F544116FA9D43B59DF38C259CB00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: GestureInfo$CloseHandle
                                                              • String ID: 8
                                                              • API String ID: 372500805-4194326291
                                                              • Opcode ID: fdc52a30d4232624ee8151016c0fb58607a1878d599af251dc45c002f5d40a09
                                                              • Instruction ID: 9b1c06a3f3b833ac3e132f42adadd70dae9d03e82ad46587f4b990887cf4d8b3
                                                              • Opcode Fuzzy Hash: fdc52a30d4232624ee8151016c0fb58607a1878d599af251dc45c002f5d40a09
                                                              • Instruction Fuzzy Hash: B8D1DD76608F888AD765CB29E45439EB7A0F7C9BD0F508116EACE83768DF78C545CB01
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: PaintProcWindow$BeginMessagePostQuit
                                                              • String ID: i
                                                              • API String ID: 3181456275-3865851505
                                                              • Opcode ID: fcb843795d6400421a4bb60a8f9f2442e166c0b7f90a62d720e089610d409317
                                                              • Instruction ID: 3856721ac4770c8f636c1cd384f04675dc9eeb63fc6bf43fe2054305ebc0c00e
                                                              • Opcode Fuzzy Hash: fcb843795d6400421a4bb60a8f9f2442e166c0b7f90a62d720e089610d409317
                                                              • Instruction Fuzzy Hash: FA51ED32518AC8C6E7B2DB55E4543DEB360F788784F609516F6CA52A98CFBCC548DF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Object$LineMoveSelect$CreateDeletePolyline
                                                              • String ID:
                                                              • API String ID: 1917832262-0
                                                              • Opcode ID: 6075ceb34f4407423de1dccbff4bd8bdfe60344340a25c122dca44a040083570
                                                              • Instruction ID: 377a05cc6cc4517dbb54ffd3f6057de865f15df1cc6264ad20f86e3ae03f80f6
                                                              • Opcode Fuzzy Hash: 6075ceb34f4407423de1dccbff4bd8bdfe60344340a25c122dca44a040083570
                                                              • Instruction Fuzzy Hash: CDB12276604B848AD766CB38E05135AF7A5F7C9784F108216EACE53B69DF3CD5498F00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 66%
                                                              			E00000001180003328(intOrPtr __ecx, void* __edx, void* __esi, intOrPtr* __rcx, long long __rdx, long long __r8, long long __r9, void* __r10) {
                                                              				void* __rbx;
                                                              				void* __rdi;
                                                              				void* __rsi;
                                                              				void* __rbp;
                                                              				signed int* _t128;
                                                              				void* _t145;
                                                              				intOrPtr _t146;
                                                              				intOrPtr _t154;
                                                              				void* _t173;
                                                              				intOrPtr _t176;
                                                              				signed int _t177;
                                                              				signed int _t178;
                                                              				void* _t209;
                                                              				signed long long _t219;
                                                              				signed long long _t220;
                                                              				signed long long _t226;
                                                              				long long _t228;
                                                              				signed int _t235;
                                                              				intOrPtr* _t236;
                                                              				intOrPtr* _t237;
                                                              				signed long long _t246;
                                                              				long long _t267;
                                                              				signed int* _t280;
                                                              				long long _t281;
                                                              				void* _t282;
                                                              				void* _t283;
                                                              				signed long long _t284;
                                                              				long long _t296;
                                                              				signed int _t307;
                                                              				unsigned long long _t313;
                                                              
                                                              				_t180 = __esi;
                                                              				_t282 = _t283 - 0x28;
                                                              				_t284 = _t283 - 0x128;
                                                              				_t219 =  *0x80021010; // 0x6dc7c02d7798
                                                              				_t220 = _t219 ^ _t284;
                                                              				 *(_t282 + 0x10) = _t220;
                                                              				_t280 =  *((intOrPtr*)(_t282 + 0x90));
                                                              				_t307 =  *((intOrPtr*)(_t282 + 0xa8));
                                                              				 *((long long*)(_t284 + 0x68)) = __r8;
                                                              				_t236 = __rcx;
                                                              				 *((long long*)(_t284 + 0x78)) = __rdx;
                                                              				 *(_t282 - 0x68) = _t307;
                                                              				 *((char*)(_t284 + 0x60)) = 0;
                                                              				_t281 = __r9;
                                                              				_t128 = E0000000118000427C(__ecx, __esi, __rcx, __rdx, __r9, __r9, _t282, _t280, __r9);
                                                              				r14d = _t128;
                                                              				if (_t128 - 0xffffffff < 0) goto 0x800037f7;
                                                              				if (_t128 - _t280[1] >= 0) goto 0x800037f7;
                                                              				if ( *_t236 != 0xe06d7363) goto 0x80003474;
                                                              				if ( *((intOrPtr*)(_t236 + 0x18)) != 4) goto 0x80003474;
                                                              				if ( *((intOrPtr*)(_t236 + 0x20)) - 0x19930520 - 2 > 0) goto 0x80003474;
                                                              				if ( *((long long*)(_t236 + 0x30)) != 0) goto 0x80003474;
                                                              				E00000001180002D40(_t220);
                                                              				if ( *((long long*)(_t220 + 0x20)) == 0) goto 0x80003790;
                                                              				E00000001180002D40(_t220);
                                                              				_t237 =  *((intOrPtr*)(_t220 + 0x20));
                                                              				E00000001180002D40(_t220);
                                                              				 *((char*)(_t284 + 0x60)) = 1;
                                                              				 *((long long*)(_t284 + 0x68)) =  *((intOrPtr*)(_t220 + 0x28));
                                                              				E00000001180002448(_t220,  *((intOrPtr*)(_t237 + 0x38)));
                                                              				if ( *_t237 != 0xe06d7363) goto 0x8000342c;
                                                              				if ( *((intOrPtr*)(_t237 + 0x18)) != 4) goto 0x8000342c;
                                                              				if ( *((intOrPtr*)(_t237 + 0x20)) - 0x19930520 - 2 > 0) goto 0x8000342c;
                                                              				if ( *((long long*)(_t237 + 0x30)) == 0) goto 0x800037f7;
                                                              				E00000001180002D40(_t220);
                                                              				if ( *(_t220 + 0x38) == 0) goto 0x80003474;
                                                              				E00000001180002D40(_t220);
                                                              				E00000001180002D40(_t220);
                                                              				 *(_t220 + 0x38) =  *(_t220 + 0x38) & 0x00000000;
                                                              				if (E00000001180004314(_t220, _t237, _t237,  *(_t220 + 0x38), __r9) != 0) goto 0x8000346f;
                                                              				if (E00000001180004404(_t220, _t237,  *(_t220 + 0x38), __r9, _t282) == 0) goto 0x800037d4;
                                                              				goto 0x800037b0;
                                                              				 *((long long*)(_t282 - 0x40)) =  *((intOrPtr*)(__r9 + 8));
                                                              				 *(_t282 - 0x48) = _t280;
                                                              				if ( *_t237 != 0xe06d7363) goto 0x80003747;
                                                              				if ( *((intOrPtr*)(_t237 + 0x18)) != 4) goto 0x80003747;
                                                              				if ( *((intOrPtr*)(_t237 + 0x20)) - 0x19930520 - 2 > 0) goto 0x80003747;
                                                              				r15d = 0;
                                                              				if (_t280[3] - r15d <= 0) goto 0x80003678;
                                                              				 *(_t284 + 0x28) =  *(_t282 + 0xa0);
                                                              				 *(_t284 + 0x20) = _t280;
                                                              				r8d = r14d;
                                                              				_t145 = E00000001180002134(_t237, _t282 - 0x28, _t282 - 0x48, __r9, _t282, _t280, __r9, __r10);
                                                              				asm("movups xmm0, [ebp-0x28]");
                                                              				asm("movdqu [ebp-0x38], xmm0");
                                                              				asm("psrldq xmm0, 0x8");
                                                              				asm("movd eax, xmm0");
                                                              				if (_t145 -  *((intOrPtr*)(_t282 - 0x10)) >= 0) goto 0x80003678;
                                                              				_t296 =  *((intOrPtr*)(_t282 - 0x28));
                                                              				r13d =  *((intOrPtr*)(_t282 - 0x30));
                                                              				 *((long long*)(_t282 - 0x80)) = _t296;
                                                              				_t146 = r13d;
                                                              				asm("inc ecx");
                                                              				 *((intOrPtr*)(_t282 - 0x50)) = __ecx;
                                                              				asm("movd eax, xmm0");
                                                              				asm("movups [ebp-0x60], xmm0");
                                                              				if (_t146 - r14d > 0) goto 0x8000366b;
                                                              				_t226 =  *(_t282 - 0x60) >> 0x20;
                                                              				if (r14d - _t146 > 0) goto 0x8000366b;
                                                              				r12d = r15d;
                                                              				_t267 =  *((intOrPtr*)( *((intOrPtr*)( *( *(_t282 - 0x38)) + 0x10)) + ( *( *(_t282 - 0x38)) +  *( *(_t282 - 0x38)) * 4) * 4 +  *((intOrPtr*)(_t296 + 8)) + 0x10)) +  *((intOrPtr*)(__r9 + 8));
                                                              				_t313 =  *(_t282 - 0x58) >> 0x20;
                                                              				 *((long long*)(_t282 - 0x70)) = _t267;
                                                              				if (r15d == 0) goto 0x80003658;
                                                              				_t246 = _t226 + _t226 * 4;
                                                              				asm("movups xmm0, [edx+ecx*4]");
                                                              				asm("movups [ebp-0x8], xmm0");
                                                              				_t59 = _t246 * 4; // 0x48ccccc35f40c483
                                                              				 *((intOrPtr*)(_t282 + 8)) =  *((intOrPtr*)(_t267 + _t59 + 0x10));
                                                              				E0000000118000241C(_t226);
                                                              				_t228 = _t226 + 4 +  *((intOrPtr*)( *((intOrPtr*)(_t237 + 0x30)) + 0xc));
                                                              				 *((long long*)(_t284 + 0x70)) = _t228;
                                                              				E0000000118000241C(_t228);
                                                              				_t176 =  *((intOrPtr*)(_t228 +  *((intOrPtr*)( *((intOrPtr*)(_t237 + 0x30)) + 0xc))));
                                                              				 *((intOrPtr*)(_t284 + 0x64)) = _t176;
                                                              				if (_t176 <= 0) goto 0x800035e8;
                                                              				E0000000118000241C(_t228);
                                                              				 *((long long*)(_t282 - 0x78)) = _t228 +  *((intOrPtr*)( *((intOrPtr*)(_t284 + 0x70))));
                                                              				if (E00000001180003A1C(_t180, _t237, _t282 - 8, _t228 +  *((intOrPtr*)( *((intOrPtr*)(_t284 + 0x70)))), _t280, __r9,  *((intOrPtr*)(_t237 + 0x30))) != 0) goto 0x800035f9;
                                                              				 *((long long*)(_t284 + 0x70)) =  *((long long*)(_t284 + 0x70)) + 4;
                                                              				_t154 =  *((intOrPtr*)(_t284 + 0x64)) - 1;
                                                              				 *((intOrPtr*)(_t284 + 0x64)) = _t154;
                                                              				if (_t154 > 0) goto 0x800035ac;
                                                              				r12d = r12d + 1;
                                                              				if (r12d == r15d) goto 0x8000365f;
                                                              				goto 0x80003565;
                                                              				 *((char*)(_t284 + 0x58)) =  *((intOrPtr*)(_t282 + 0x98));
                                                              				 *(_t284 + 0x50) =  *((intOrPtr*)(_t284 + 0x60));
                                                              				 *((long long*)(_t284 + 0x48)) =  *(_t282 - 0x68);
                                                              				 *(_t284 + 0x40) =  *(_t282 + 0xa0);
                                                              				 *(_t284 + 0x38) = _t282 - 0x60;
                                                              				 *(_t284 + 0x30) =  *((intOrPtr*)(_t282 - 0x78));
                                                              				 *(_t284 + 0x28) = _t282 - 8;
                                                              				 *(_t284 + 0x20) = _t280;
                                                              				E00000001180003254(_t180, _t237, _t237,  *((intOrPtr*)(_t284 + 0x78)),  *((intOrPtr*)(_t284 + 0x68)), _t281);
                                                              				goto 0x80003664;
                                                              				goto 0x80003668;
                                                              				r15d = 0;
                                                              				r13d = r13d + 1;
                                                              				if (r13d -  *((intOrPtr*)(_t282 - 0x10)) < 0) goto 0x800034fd;
                                                              				if (( *_t280 & 0x1fffffff) - 0x19930521 < 0) goto 0x80003784;
                                                              				_t209 = _t280[8] - r15d;
                                                              				if (_t209 == 0) goto 0x8000369e;
                                                              				E00000001180002408(_t282 - 8);
                                                              				if (_t209 != 0) goto 0x800036bf;
                                                              				if ((_t280[9] >> 0x00000002 & 0x00000001) == 0) goto 0x80003784;
                                                              				if (E00000001180001FD8(_t280[9] >> 0x00000002 & 0x00000001, _t282 - 8 + _t280[8], _t281, _t280) != 0) goto 0x80003784;
                                                              				if ((_t280[9] >> 0x00000002 & 0x00000001) != 0) goto 0x800037da;
                                                              				if (_t280[8] == r15d) goto 0x800036e4;
                                                              				E00000001180002408(_t282 - 8 + _t280[8]);
                                                              				_t235 = _t280[8];
                                                              				goto 0x800036e7;
                                                              				if (E00000001180004314(_t235, _t237, _t237, _t313, _t281) != 0) goto 0x80003784;
                                                              				E00000001180002068(_t237,  *((intOrPtr*)(_t284 + 0x78)), _t281, _t282, _t280, _t282 - 0x78);
                                                              				_t177 =  *((intOrPtr*)(_t282 + 0x98));
                                                              				 *(_t284 + 0x50) = _t177;
                                                              				_t178 = _t177 | 0xffffffff;
                                                              				 *((long long*)(_t284 + 0x48)) = _t281;
                                                              				 *(_t284 + 0x40) = _t313;
                                                              				 *(_t284 + 0x38) = _t178;
                                                              				 *(_t284 + 0x30) = _t178;
                                                              				 *(_t284 + 0x28) = _t280;
                                                              				 *(_t284 + 0x20) = _t313;
                                                              				E00000001180002274( *((intOrPtr*)(_t284 + 0x78)), _t237,  *((intOrPtr*)(_t284 + 0x68)), _t235);
                                                              				goto 0x80003784;
                                                              				if (_t280[3] <= 0) goto 0x80003784;
                                                              				if ( *((char*)(_t282 + 0x98)) != 0) goto 0x800037f7;
                                                              				 *(_t284 + 0x38) = _t307;
                                                              				 *(_t284 + 0x30) =  *(_t282 + 0xa0);
                                                              				 *(_t284 + 0x28) = r14d;
                                                              				 *(_t284 + 0x20) = _t280;
                                                              				E00000001180003800(_t237, _t237,  *((intOrPtr*)(_t284 + 0x78)), _t313, _t281);
                                                              				_t173 = E00000001180002D40(_t235);
                                                              				if ( *((long long*)(_t235 + 0x38)) != 0) goto 0x800037f7;
                                                              				return E000000011800010B0(_t173, _t178,  *(_t282 + 0x10) ^ _t284);
                                                              			}

































                                                              0x180003328
                                                              0x180003335
                                                              0x18000333a
                                                              0x180003341
                                                              0x180003348
                                                              0x18000334b
                                                              0x18000334f
                                                              0x180003359
                                                              0x180003363
                                                              0x180003368
                                                              0x18000336b
                                                              0x180003376
                                                              0x18000337d
                                                              0x180003382
                                                              0x180003385
                                                              0x18000338a
                                                              0x180003390
                                                              0x180003399
                                                              0x1800033a5
                                                              0x1800033af
                                                              0x1800033c0
                                                              0x1800033cb
                                                              0x1800033d1
                                                              0x1800033db
                                                              0x1800033e1
                                                              0x1800033e6
                                                              0x1800033ea
                                                              0x1800033f3
                                                              0x1800033fc
                                                              0x180003401
                                                              0x18000340c
                                                              0x180003412
                                                              0x18000341f
                                                              0x180003426
                                                              0x18000342c
                                                              0x180003436
                                                              0x180003438
                                                              0x180003441
                                                              0x18000344c
                                                              0x180003458
                                                              0x180003464
                                                              0x18000346a
                                                              0x180003478
                                                              0x18000347c
                                                              0x180003486
                                                              0x180003490
                                                              0x1800034a1
                                                              0x1800034a7
                                                              0x1800034ae
                                                              0x1800034be
                                                              0x1800034c9
                                                              0x1800034ce
                                                              0x1800034d1
                                                              0x1800034d6
                                                              0x1800034da
                                                              0x1800034df
                                                              0x1800034e4
                                                              0x1800034eb
                                                              0x1800034f1
                                                              0x1800034f5
                                                              0x1800034f9
                                                              0x180003508
                                                              0x180003517
                                                              0x180003521
                                                              0x180003524
                                                              0x180003528
                                                              0x18000352f
                                                              0x180003539
                                                              0x180003540
                                                              0x180003546
                                                              0x18000354c
                                                              0x180003554
                                                              0x180003558
                                                              0x18000355f
                                                              0x180003568
                                                              0x18000356c
                                                              0x180003570
                                                              0x180003574
                                                              0x180003578
                                                              0x18000357b
                                                              0x18000358c
                                                              0x18000358f
                                                              0x180003594
                                                              0x1800035a1
                                                              0x1800035a4
                                                              0x1800035aa
                                                              0x1800035ac
                                                              0x1800035c7
                                                              0x1800035d2
                                                              0x1800035d8
                                                              0x1800035de
                                                              0x1800035e0
                                                              0x1800035e6
                                                              0x1800035e8
                                                              0x1800035ee
                                                              0x1800035f4
                                                              0x180003612
                                                              0x18000361a
                                                              0x180003622
                                                              0x18000362d
                                                              0x180003635
                                                              0x18000363e
                                                              0x180003647
                                                              0x18000364c
                                                              0x180003651
                                                              0x180003656
                                                              0x18000365d
                                                              0x180003668
                                                              0x18000366b
                                                              0x180003672
                                                              0x180003684
                                                              0x18000368a
                                                              0x18000368e
                                                              0x180003690
                                                              0x18000369c
                                                              0x1800036a6
                                                              0x1800036b9
                                                              0x1800036c7
                                                              0x1800036d1
                                                              0x1800036d3
                                                              0x1800036db
                                                              0x1800036e2
                                                              0x1800036f1
                                                              0x180003704
                                                              0x180003709
                                                              0x18000371a
                                                              0x18000371e
                                                              0x180003721
                                                              0x180003726
                                                              0x18000372b
                                                              0x18000372f
                                                              0x180003736
                                                              0x18000373b
                                                              0x180003740
                                                              0x180003745
                                                              0x18000374b
                                                              0x180003754
                                                              0x180003763
                                                              0x18000376b
                                                              0x180003772
                                                              0x18000377a
                                                              0x18000377f
                                                              0x180003784
                                                              0x18000378e
                                                              0x1800037af

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: c5cb584b42303ba0487f6165d6a87fd0925b167c864d6dc5e0e4dfcc66ed1f25
                                                              • Instruction ID: 68369fba8b053f101f7a0a57f2a328d7db6ec17b1fffbc4fe0a5b608d0144455
                                                              • Opcode Fuzzy Hash: c5cb584b42303ba0487f6165d6a87fd0925b167c864d6dc5e0e4dfcc66ed1f25
                                                              • Instruction Fuzzy Hash: C0E1B272604B888AEBA6DF66D4423DD77A4F749BC8F008116FE8957B96CF34D698C700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 77%
                                                              			E0000000118000A3DC(void* __ecx, long long __rbx, void* __rdx, signed int __rsi, void* __r8, void* __r9) {
                                                              				void* _t35;
                                                              				signed long long _t56;
                                                              				intOrPtr _t60;
                                                              				void* _t71;
                                                              				signed long long _t72;
                                                              				long long _t78;
                                                              				void* _t82;
                                                              				signed long long _t88;
                                                              				signed long long _t89;
                                                              				signed long long _t90;
                                                              				WCHAR* _t91;
                                                              				long _t94;
                                                              				void* _t97;
                                                              				WCHAR* _t102;
                                                              
                                                              				 *((long long*)(_t82 + 8)) = __rbx;
                                                              				 *((long long*)(_t82 + 0x10)) = _t78;
                                                              				 *((long long*)(_t82 + 0x18)) = __rsi;
                                                              				r15d = __ecx;
                                                              				_t72 = _t71 | 0xffffffff;
                                                              				_t89 =  *0x80021010; // 0x6dc7c02d7798
                                                              				_t88 =  *(0x180000000 + 0x226f0 + _t102 * 8) ^ _t89;
                                                              				asm("dec ecx");
                                                              				if (_t88 == _t72) goto 0x8000a51f;
                                                              				if (_t88 == 0) goto 0x8000a441;
                                                              				_t56 = _t88;
                                                              				goto 0x8000a521;
                                                              				if (__r8 == __r9) goto 0x8000a504;
                                                              				_t60 =  *((intOrPtr*)(0x180000000 + 0x22640 + __rsi * 8));
                                                              				if (_t60 == 0) goto 0x8000a469;
                                                              				if (_t60 != _t72) goto 0x8000a55e;
                                                              				goto 0x8000a4f0;
                                                              				r8d = 0x800;
                                                              				LoadLibraryExW(_t102, _t97, _t94);
                                                              				if (_t56 != 0) goto 0x8000a53e;
                                                              				if (GetLastError() != 0x57) goto 0x8000a4de;
                                                              				_t14 = _t56 - 0x50; // -80
                                                              				_t35 = _t14;
                                                              				r8d = _t35;
                                                              				if (E00000001180007070(__r8) == 0) goto 0x8000a4de;
                                                              				r8d = _t35;
                                                              				if (E00000001180007070(__r8) == 0) goto 0x8000a4de;
                                                              				r8d = 0;
                                                              				LoadLibraryExW(_t91, _t71);
                                                              				if (_t56 != 0) goto 0x8000a53e;
                                                              				 *((intOrPtr*)(0x180000000 + 0x22640 + __rsi * 8)) = _t72;
                                                              				if (__r8 + 4 != __r9) goto 0x8000a44a;
                                                              				_t90 =  *0x80021010; // 0x6dc7c02d7798
                                                              				asm("dec eax");
                                                              				 *(0x180000000 + 0x226f0 + _t102 * 8) = _t72 ^ _t90;
                                                              				return 0;
                                                              			}

















                                                              0x18000a3dc
                                                              0x18000a3e1
                                                              0x18000a3e6
                                                              0x18000a3f8
                                                              0x18000a402
                                                              0x18000a418
                                                              0x18000a41f
                                                              0x18000a428
                                                              0x18000a42e
                                                              0x18000a437
                                                              0x18000a439
                                                              0x18000a43c
                                                              0x18000a444
                                                              0x18000a44d
                                                              0x18000a459
                                                              0x18000a45e
                                                              0x18000a464
                                                              0x18000a476
                                                              0x18000a47c
                                                              0x18000a488
                                                              0x18000a497
                                                              0x18000a499
                                                              0x18000a499
                                                              0x18000a49f
                                                              0x18000a4b0
                                                              0x18000a4b2
                                                              0x18000a4c6
                                                              0x18000a4c8
                                                              0x18000a4d0
                                                              0x18000a4dc
                                                              0x18000a4e8
                                                              0x18000a4f7
                                                              0x18000a4fd
                                                              0x18000a511
                                                              0x18000a517
                                                              0x18000a53d

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 4973cf4a17c5a6c0ea837db478b6f4f53bca8011a61d94df8f11c1c7fa6ad517
                                                              • Instruction ID: 4cb29e05f73c92bcfdeebd25cdbb701ff5eb44b215489781f60aaecc25d2491e
                                                              • Opcode Fuzzy Hash: 4973cf4a17c5a6c0ea837db478b6f4f53bca8011a61d94df8f11c1c7fa6ad517
                                                              • Instruction Fuzzy Hash: ED41D032715A0856FBA7CB16AC047D53391B78EBE0F09C225BD1D47798EE38C64D8300
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 50%
                                                              			E000000011800045BC(void* __ecx, long long __rbx, void* __rdx, signed int __rsi, void* __r8, void* __r9) {
                                                              				intOrPtr _t61;
                                                              				intOrPtr _t65;
                                                              				intOrPtr _t67;
                                                              				intOrPtr _t68;
                                                              				struct HINSTANCE__* _t81;
                                                              				long long _t85;
                                                              				void* _t89;
                                                              				struct HINSTANCE__* _t94;
                                                              				long _t97;
                                                              				void* _t100;
                                                              				signed long long _t101;
                                                              				WCHAR* _t104;
                                                              
                                                              				 *((long long*)(_t89 + 8)) = __rbx;
                                                              				 *((long long*)(_t89 + 0x10)) = _t85;
                                                              				 *((long long*)(_t89 + 0x18)) = __rsi;
                                                              				_t101 = _t100 | 0xffffffff;
                                                              				_t61 =  *((intOrPtr*)(0x180000000 + 0x22208 + _t81 * 8));
                                                              				if (_t61 == _t101) goto 0x800046eb;
                                                              				if (_t61 != 0) goto 0x800046ed;
                                                              				if (__r8 == __r9) goto 0x800046e3;
                                                              				_t67 =  *((intOrPtr*)(0x180000000 + 0x221f0 + __rsi * 8));
                                                              				if (_t67 == 0) goto 0x8000462e;
                                                              				if (_t67 != _t101) goto 0x800046c5;
                                                              				goto 0x80004699;
                                                              				r8d = 0x800;
                                                              				LoadLibraryExW(_t104, _t100, _t97);
                                                              				_t68 = _t61;
                                                              				if (_t61 != 0) goto 0x800046a5;
                                                              				if (GetLastError() != 0x57) goto 0x80004687;
                                                              				_t14 = _t68 + 7; // 0x7
                                                              				r8d = _t14;
                                                              				if (E00000001180007070(__r8) == 0) goto 0x80004687;
                                                              				r8d = 0;
                                                              				LoadLibraryExW(??, ??, ??);
                                                              				if (_t61 != 0) goto 0x800046a5;
                                                              				 *((intOrPtr*)(0x180000000 + 0x221f0 + __rsi * 8)) = _t101;
                                                              				goto 0x8000460c;
                                                              				_t21 = 0x180000000 + 0x221f0 + __rsi * 8;
                                                              				_t65 =  *_t21;
                                                              				 *_t21 = _t61;
                                                              				if (_t65 == 0) goto 0x800046c5;
                                                              				FreeLibrary(_t94);
                                                              				GetProcAddress(_t81);
                                                              				if (_t65 == 0) goto 0x800046e3;
                                                              				 *((intOrPtr*)(0x180000000 + 0x22208 + _t81 * 8)) = _t65;
                                                              				goto 0x800046ed;
                                                              				 *((intOrPtr*)(0x180000000 + 0x22208 + _t81 * 8)) = _t101;
                                                              				return 0;
                                                              			}















                                                              0x1800045bc
                                                              0x1800045c1
                                                              0x1800045c6
                                                              0x1800045e1
                                                              0x1800045ee
                                                              0x1800045fa
                                                              0x180004603
                                                              0x18000460c
                                                              0x180004615
                                                              0x180004621
                                                              0x180004626
                                                              0x18000462c
                                                              0x18000463b
                                                              0x180004641
                                                              0x180004647
                                                              0x18000464d
                                                              0x180004658
                                                              0x18000465a
                                                              0x18000465a
                                                              0x18000466f
                                                              0x180004671
                                                              0x180004679
                                                              0x180004685
                                                              0x180004691
                                                              0x1800046a0
                                                              0x1800046af
                                                              0x1800046af
                                                              0x1800046af
                                                              0x1800046ba
                                                              0x1800046bf
                                                              0x1800046cb
                                                              0x1800046d4
                                                              0x1800046d9
                                                              0x1800046e1
                                                              0x1800046e3
                                                              0x180004709

                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 0000000180004641
                                                              • GetLastError.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 000000018000464F
                                                              • LoadLibraryExW.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 0000000180004679
                                                              • FreeLibrary.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 00000001800046BF
                                                              • GetProcAddress.KERNEL32(?,?,00000000,00000001800047C3,?,?,?,0000000180002D8E,?,?,?,0000000180002A39), ref: 00000001800046CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: d92b391dc074c551f2fff15d3caa28434169fc5b46989934520673f65e9ea010
                                                              • Instruction ID: a281eee05f5572a15ea3fe0403c4f12dabc44bbec878773a6143b276462e3048
                                                              • Opcode Fuzzy Hash: d92b391dc074c551f2fff15d3caa28434169fc5b46989934520673f65e9ea010
                                                              • Instruction Fuzzy Hash: 9F31F276302B48A1EE93DB02A8007D533E4B70DBE4F598625BE2D0B3A0EF39C24C8705
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 5bc48b536716d6500d6b4fd732b8b14869dbb673373b5a9a242e628548633fb8
                                                              • Instruction ID: c3c6b15d1e2a8e36adeeaa1ee2c0ab8803bf36c1bad1bc725f34006b2089cb00
                                                              • Opcode Fuzzy Hash: 5bc48b536716d6500d6b4fd732b8b14869dbb673373b5a9a242e628548633fb8
                                                              • Instruction Fuzzy Hash: A5214F3470668C42FAE7E73195553ED72926B6C7F0F58C624B83A07BDBDE6C8A494700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: 5f84935fb18113dc5388fb9af56135c4a8d61c8a22428d4b494f05fe971ce8aa
                                                              • Instruction ID: 0de398e34c1669cec19602a54f8a011ae7faefe96049ea3591aa14d2bab58b4a
                                                              • Opcode Fuzzy Hash: 5f84935fb18113dc5388fb9af56135c4a8d61c8a22428d4b494f05fe971ce8aa
                                                              • Instruction Fuzzy Hash: 7F115B31610F4886E7939B52F85439A73A0F79CBE4F048225FA5E87BA4CF78CA488740
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: LoadMessage$StringTranslate$AcceleratorClassCreateCursorDispatchRegisterWindow
                                                              • String ID:
                                                              • API String ID: 1967609040-0
                                                              • Opcode ID: 75c1782b7f7e477433b17d4cbabed80ab7ba6ec157a4fc5f42b14144684d98ab
                                                              • Instruction ID: 677205889e0bc738131920ca4d71d6e0d0c6d5bcb4ac294ec7d30bf60c9b59c6
                                                              • Opcode Fuzzy Hash: 75c1782b7f7e477433b17d4cbabed80ab7ba6ec157a4fc5f42b14144684d98ab
                                                              • Instruction Fuzzy Hash: 8611B932614E89D2E7A2DB61F8517DA7361F7D8784F508121FA8947A79DF3CC7198B00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 63%
                                                              			E00000001180003B5C(void* __esi, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, void* __r8, void* __r9, void* _a8, void* _a16, void* _a24, void* _a32, signed int* _a40, char _a48, signed int _a56, signed int _a64) {
                                                              				signed int _v32;
                                                              				long long _v40;
                                                              				char _v48;
                                                              				signed int* _v56;
                                                              				void* _t55;
                                                              				intOrPtr _t60;
                                                              				signed int _t101;
                                                              				void* _t109;
                                                              				intOrPtr _t111;
                                                              				signed int* _t115;
                                                              				intOrPtr* _t136;
                                                              				void* _t139;
                                                              				void* _t142;
                                                              				void* _t144;
                                                              				void* _t158;
                                                              				void* _t159;
                                                              
                                                              				_t109 = _t144;
                                                              				 *((long long*)(_t109 + 8)) = __rbx;
                                                              				 *((long long*)(_t109 + 0x10)) = __rbp;
                                                              				 *((long long*)(_t109 + 0x18)) = __rsi;
                                                              				 *((long long*)(_t109 + 0x20)) = __rdi;
                                                              				_t136 = __rcx;
                                                              				_t139 = __r9;
                                                              				_t159 = __r8;
                                                              				_t142 = __rdx;
                                                              				E00000001180004584(_t55, __r8);
                                                              				E00000001180002D40(_t109);
                                                              				_t115 = _a40;
                                                              				if ( *((intOrPtr*)(_t109 + 0x40)) != 0) goto 0x80003bde;
                                                              				if ( *__rcx == 0xe06d7363) goto 0x80003bde;
                                                              				if ( *__rcx != 0x80000029) goto 0x80003bc2;
                                                              				if ( *((intOrPtr*)(__rcx + 0x18)) != 0xf) goto 0x80003bc6;
                                                              				if ( *((long long*)(__rcx + 0x60)) == 0x19930520) goto 0x80003bde;
                                                              				if ( *__rcx == 0x80000026) goto 0x80003bde;
                                                              				if (( *_t115 & 0x1fffffff) - 0x19930522 < 0) goto 0x80003bde;
                                                              				if ((_t115[9] & 0x00000001) != 0) goto 0x80003d6d;
                                                              				if (( *(__rcx + 4) & 0x00000066) == 0) goto 0x80003c76;
                                                              				if (_t115[1] == 0) goto 0x80003d6d;
                                                              				if (_a48 != 0) goto 0x80003d6d;
                                                              				if (( *(__rcx + 4) & 0x00000020) == 0) goto 0x80003c63;
                                                              				if ( *__rcx != 0x80000026) goto 0x80003c41;
                                                              				_t60 = E00000001180002F2C(_t115, __r9,  *((intOrPtr*)(__r9 + 0x20)), __r9);
                                                              				if (_t60 - 0xffffffff < 0) goto 0x80003d8d;
                                                              				if (_t60 - _t115[1] >= 0) goto 0x80003d8d;
                                                              				r9d = _t60;
                                                              				E000000011800040F0(_t109, _t142, __r9, _t115);
                                                              				goto 0x80003d6d;
                                                              				if ( *_t136 != 0x80000029) goto 0x80003c63;
                                                              				r9d =  *((intOrPtr*)(_t136 + 0x38));
                                                              				if (r9d - 0xffffffff < 0) goto 0x80003d8d;
                                                              				if (r9d - _t115[1] >= 0) goto 0x80003d8d;
                                                              				goto 0x80003c31;
                                                              				E00000001180002004(r9d - _t115[1], _t109, _t115, __r9, __r9, _t115);
                                                              				goto 0x80003d6d;
                                                              				if (_t115[3] != 0) goto 0x80003cbe;
                                                              				if (( *_t115 & 0x1fffffff) - 0x19930521 < 0) goto 0x80003c9e;
                                                              				_t101 = _t115[8];
                                                              				if (_t101 == 0) goto 0x80003c9e;
                                                              				E00000001180002408(_t109);
                                                              				if (_t101 != 0) goto 0x80003cbe;
                                                              				if (( *_t115 & 0x1fffffff) - 0x19930522 < 0) goto 0x80003d6d;
                                                              				if ((_t115[9] >> 0x00000002 & 0x00000001) == 0) goto 0x80003d6d;
                                                              				if ( *_t136 != 0xe06d7363) goto 0x80003d34;
                                                              				if ( *((intOrPtr*)(_t136 + 0x18)) - 3 < 0) goto 0x80003d34;
                                                              				if ( *((intOrPtr*)(_t136 + 0x20)) - 0x19930522 <= 0) goto 0x80003d34;
                                                              				_t111 =  *((intOrPtr*)(_t136 + 0x30));
                                                              				if ( *((intOrPtr*)(_t111 + 8)) == 0) goto 0x80003d34;
                                                              				E0000000118000241C(_t111);
                                                              				if (_t111 +  *((intOrPtr*)( *((intOrPtr*)(_t136 + 0x30)) + 8)) == 0) goto 0x80003d34;
                                                              				_v32 = _a64 & 0x000000ff;
                                                              				_v40 = _a56;
                                                              				_v48 = _a48;
                                                              				_v56 = _t115;
                                                              				 *0x80016370(_t158);
                                                              				goto 0x80003d72;
                                                              				_v32 = _a56;
                                                              				_v40 = _a48;
                                                              				_v48 = _a64;
                                                              				_v56 = _t115;
                                                              				E00000001180003328(_a64 & 0x000000ff, 0x80000026, __esi, _t136, _t142, _t159, _t139, _t111 +  *((intOrPtr*)( *((intOrPtr*)(_t136 + 0x30)) + 8)));
                                                              				return 1;
                                                              			}



















                                                              0x180003b5c
                                                              0x180003b5f
                                                              0x180003b63
                                                              0x180003b67
                                                              0x180003b6b
                                                              0x180003b75
                                                              0x180003b78
                                                              0x180003b7e
                                                              0x180003b81
                                                              0x180003b84
                                                              0x180003b89
                                                              0x180003b8e
                                                              0x180003ba4
                                                              0x180003bac
                                                              0x180003bb0
                                                              0x180003bb6
                                                              0x180003bc0
                                                              0x180003bc4
                                                              0x180003bd2
                                                              0x180003bd8
                                                              0x180003be2
                                                              0x180003bec
                                                              0x180003bfa
                                                              0x180003c04
                                                              0x180003c08
                                                              0x180003c14
                                                              0x180003c1c
                                                              0x180003c25
                                                              0x180003c2b
                                                              0x180003c37
                                                              0x180003c3c
                                                              0x180003c43
                                                              0x180003c45
                                                              0x180003c4d
                                                              0x180003c57
                                                              0x180003c61
                                                              0x180003c6c
                                                              0x180003c71
                                                              0x180003c7a
                                                              0x180003c88
                                                              0x180003c8a
                                                              0x180003c8e
                                                              0x180003c90
                                                              0x180003c9c
                                                              0x180003caa
                                                              0x180003cb8
                                                              0x180003cc4
                                                              0x180003cca
                                                              0x180003cd3
                                                              0x180003cd5
                                                              0x180003cdd
                                                              0x180003cdf
                                                              0x180003cf2
                                                              0x180003d09
                                                              0x180003d18
                                                              0x180003d20
                                                              0x180003d27
                                                              0x180003d2c
                                                              0x180003d32
                                                              0x180003d3f
                                                              0x180003d51
                                                              0x180003d5f
                                                              0x180003d63
                                                              0x180003d68
                                                              0x180003d8c

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record__std_exception_copy
                                                              • String ID: csm$csm
                                                              • API String ID: 851805269-3733052814
                                                              • Opcode ID: 331da2853384a2897df438fdd97cddea29f320d7e80858b21e324d8e27e74444
                                                              • Instruction ID: ef6ae88387dfa06c815bde898961dd69fb07e80911919095ce8a45e838d8869a
                                                              • Opcode Fuzzy Hash: 331da2853384a2897df438fdd97cddea29f320d7e80858b21e324d8e27e74444
                                                              • Instruction Fuzzy Hash: C5617F3220078886EBB6CF26E44539877A9F758BD4F18C116EB9847BD5CF38D699C701
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 30%
                                                              			E00000001180002A84(void* __rax, long long __rbx, long long __rcx, void* __rdx, long long __rsi, long long __r8, intOrPtr* __r9) {
                                                              				void* _t76;
                                                              				void* _t83;
                                                              				void* _t84;
                                                              				intOrPtr _t101;
                                                              				intOrPtr _t103;
                                                              				void* _t113;
                                                              				void* _t118;
                                                              				void* _t130;
                                                              				long long _t133;
                                                              				intOrPtr* _t135;
                                                              				signed long long _t144;
                                                              				void* _t150;
                                                              				signed long long _t154;
                                                              				void* _t156;
                                                              				long long _t158;
                                                              				intOrPtr* _t159;
                                                              				void* _t161;
                                                              				void* _t162;
                                                              				signed long long _t166;
                                                              				void* _t170;
                                                              				intOrPtr _t171;
                                                              				void* _t173;
                                                              				void* _t174;
                                                              				void* _t176;
                                                              				void* _t178;
                                                              				void* _t180;
                                                              				intOrPtr* _t181;
                                                              
                                                              				_t130 = __rax;
                                                              				 *((long long*)(_t161 + 8)) = __rbx;
                                                              				 *((long long*)(_t161 + 0x10)) = _t158;
                                                              				 *((long long*)(_t161 + 0x18)) = __rsi;
                                                              				_t162 = _t161 - 0x40;
                                                              				_t159 = __rcx;
                                                              				_t181 = __r9;
                                                              				_t174 = __rdx;
                                                              				E00000001180004584(_t76, __r8);
                                                              				_t171 =  *((intOrPtr*)(__r9 + 8));
                                                              				_t135 =  *((intOrPtr*)(__r9 + 0x38));
                                                              				_t178 =  *__r9 - _t171;
                                                              				_t103 =  *((intOrPtr*)(__r9 + 0x48));
                                                              				if (( *(__rcx + 4) & 0x00000066) != 0) goto 0x80002bac;
                                                              				 *((long long*)(_t162 + 0x30)) = __rcx;
                                                              				 *((long long*)(_t162 + 0x38)) = __r8;
                                                              				if (_t103 -  *_t135 >= 0) goto 0x80002c58;
                                                              				_t154 = __r8 + __r8;
                                                              				if (_t178 - _t130 < 0) goto 0x80002b9e;
                                                              				if (_t178 - _t130 >= 0) goto 0x80002b9e;
                                                              				if ( *((intOrPtr*)(_t135 + 0x10 + _t154 * 8)) == 0) goto 0x80002b9e;
                                                              				if ( *((intOrPtr*)(_t135 + 0xc + _t154 * 8)) == 1) goto 0x80002b2a;
                                                              				_t113 =  *((long long*)(_t130 + _t171))(_t180, _t176, _t173, _t170, _t150);
                                                              				if (_t113 < 0) goto 0x80002ba5;
                                                              				if (_t113 <= 0) goto 0x80002b9e;
                                                              				if ( *((intOrPtr*)(__rcx)) != 0xe06d7363) goto 0x80002b5b;
                                                              				if ( *0x800164f8 == 0) goto 0x80002b5b;
                                                              				if (E0000000118000F7F0(_t130 + _t171, _t135, 0x800164f8) == 0) goto 0x80002b5b;
                                                              				_t83 =  *0x800164f8();
                                                              				r8d = 1;
                                                              				_t84 = E00000001180004550(_t83, _t159 + _t171, _t174);
                                                              				_t101 =  *((intOrPtr*)(_t135 + 0x10 + _t154 * 8));
                                                              				r9d =  *_t159;
                                                              				 *((long long*)(_t162 + 0x28)) =  *((intOrPtr*)(_t181 + 0x40));
                                                              				_t133 =  *((intOrPtr*)(_t181 + 0x28));
                                                              				 *((long long*)(_t162 + 0x20)) = _t133;
                                                              				__imp__RtlUnwindEx();
                                                              				E00000001180004580(_t84);
                                                              				goto 0x80002ada;
                                                              				goto 0x80002c5d;
                                                              				_t156 =  *((intOrPtr*)(_t181 + 0x20)) - _t171;
                                                              				goto 0x80002c4e;
                                                              				_t144 = _t174 + _t174;
                                                              				if (_t178 - _t133 < 0) goto 0x80002c4c;
                                                              				_t118 = _t178 - _t133;
                                                              				if (_t118 >= 0) goto 0x80002c4c;
                                                              				r10d =  *(_t159 + 4);
                                                              				r10d = r10d & 0x00000020;
                                                              				if (_t118 == 0) goto 0x80002c21;
                                                              				r9d = 0;
                                                              				if (_t101 == 0) goto 0x80002c1c;
                                                              				r8d = r9d;
                                                              				_t166 = _t159 + _t159;
                                                              				if (_t156 - _t133 < 0) goto 0x80002c14;
                                                              				if (_t156 - _t133 >= 0) goto 0x80002c14;
                                                              				if ( *((intOrPtr*)(_t135 + 0x10 + _t166 * 8)) !=  *((intOrPtr*)(_t135 + 0x10 + _t144 * 8))) goto 0x80002c14;
                                                              				if ( *((intOrPtr*)(_t135 + 0xc + _t166 * 8)) ==  *((intOrPtr*)(_t135 + 0xc + _t144 * 8))) goto 0x80002c1c;
                                                              				r9d = r9d + 1;
                                                              				if (r9d - _t101 < 0) goto 0x80002be4;
                                                              				if (r9d != _t101) goto 0x80002c58;
                                                              				if ( *((intOrPtr*)(_t135 + 0x10 + _t144 * 8)) == 0) goto 0x80002c35;
                                                              				if (_t156 != _t133) goto 0x80002c4c;
                                                              				if (r10d != 0) goto 0x80002c58;
                                                              				goto 0x80002c4c;
                                                              				 *((intOrPtr*)(_t181 + 0x48)) = _t150 + 1;
                                                              				r8d =  *((intOrPtr*)(_t135 + 0xc + _t144 * 8));
                                                              				 *((long long*)(_t166 + _t171))();
                                                              				if (_t103 + 2 -  *_t135 < 0) goto 0x80002bb8;
                                                              				return 1;
                                                              			}






























                                                              0x180002a84
                                                              0x180002a84
                                                              0x180002a89
                                                              0x180002a8e
                                                              0x180002a9c
                                                              0x180002aa0
                                                              0x180002aa3
                                                              0x180002aac
                                                              0x180002aaf
                                                              0x180002ab4
                                                              0x180002abb
                                                              0x180002abf
                                                              0x180002ac6
                                                              0x180002aca
                                                              0x180002ad0
                                                              0x180002ad5
                                                              0x180002adc
                                                              0x180002ae4
                                                              0x180002aee
                                                              0x180002afb
                                                              0x180002b06
                                                              0x180002b11
                                                              0x180002b24
                                                              0x180002b26
                                                              0x180002b28
                                                              0x180002b31
                                                              0x180002b3b
                                                              0x180002b4b
                                                              0x180002b55
                                                              0x180002b5f
                                                              0x180002b6b
                                                              0x180002b77
                                                              0x180002b7e
                                                              0x180002b85
                                                              0x180002b8a
                                                              0x180002b8e
                                                              0x180002b93
                                                              0x180002b99
                                                              0x180002ba0
                                                              0x180002ba7
                                                              0x180002bb0
                                                              0x180002bb3
                                                              0x180002bba
                                                              0x180002bc4
                                                              0x180002bce
                                                              0x180002bd1
                                                              0x180002bd3
                                                              0x180002bd7
                                                              0x180002bdb
                                                              0x180002bdd
                                                              0x180002be2
                                                              0x180002be4
                                                              0x180002be7
                                                              0x180002bf2
                                                              0x180002bfc
                                                              0x180002c07
                                                              0x180002c12
                                                              0x180002c14
                                                              0x180002c1a
                                                              0x180002c1f
                                                              0x180002c27
                                                              0x180002c2c
                                                              0x180002c31
                                                              0x180002c33
                                                              0x180002c3b
                                                              0x180002c3f
                                                              0x180002c49
                                                              0x180002c52
                                                              0x180002c7a

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 070144b75550352a73c6d3aac74e800b407a2bb3a1770ad1b71378010d6fc6ef
                                                              • Instruction ID: 7da8602e18cf7747c8af8830ce248ccf40cfdad7849785c1bee6e388392e864c
                                                              • Opcode Fuzzy Hash: 070144b75550352a73c6d3aac74e800b407a2bb3a1770ad1b71378010d6fc6ef
                                                              • Instruction Fuzzy Hash: D551BD32601A588AEBAADF15E844B9D37A5F348BC8F51C121FE1A47789DF74DA89C700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 3e67b0d681e22ac900d5c80e1ecdae0369db7144e95d5d989468bf0ede8ba37c
                                                              • Instruction ID: 6c3fae355f4def66f2243ece08b04bf3b1533bf3e7ed4235295a513a2b2c2168
                                                              • Opcode Fuzzy Hash: 3e67b0d681e22ac900d5c80e1ecdae0369db7144e95d5d989468bf0ede8ba37c
                                                              • Instruction Fuzzy Hash: 62F06D75714E0891FB92CB24E8443EA6371EB8DBE1F588215FA6A462F6CF2CC24CC300
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 85%
                                                              			E000000011800077FC(signed int __ecx, long long __rbx, void* __rdx, long long __rsi, long long _a8, long long _a16) {
                                                              				signed int _t27;
                                                              				signed int _t28;
                                                              				signed int _t29;
                                                              				signed int _t30;
                                                              				signed int _t31;
                                                              				signed int _t42;
                                                              				signed int _t43;
                                                              				signed int _t44;
                                                              				signed int _t46;
                                                              				void* _t51;
                                                              
                                                              				_a8 = __rbx;
                                                              				_a16 = __rsi;
                                                              				_t27 = __ecx & 0x0000001f;
                                                              				if ((__ecx & 0x00000008) == 0) goto 0x8000782e;
                                                              				if (sil >= 0) goto 0x8000782e;
                                                              				E0000000118000BC4C(_t27, _t51);
                                                              				_t28 = _t27 & 0xfffffff7;
                                                              				goto 0x80007885;
                                                              				_t42 = 0x00000004 & dil;
                                                              				if (_t42 == 0) goto 0x80007849;
                                                              				asm("dec eax");
                                                              				if (_t42 >= 0) goto 0x80007849;
                                                              				E0000000118000BC4C(_t28, _t51);
                                                              				_t29 = _t28 & 0xfffffffb;
                                                              				goto 0x80007885;
                                                              				_t43 = dil & 0x00000001;
                                                              				if (_t43 == 0) goto 0x80007865;
                                                              				asm("dec eax");
                                                              				if (_t43 >= 0) goto 0x80007865;
                                                              				E0000000118000BC4C(_t29, _t51);
                                                              				_t30 = _t29 & 0xfffffffe;
                                                              				goto 0x80007885;
                                                              				_t44 = dil & 0x00000002;
                                                              				if (_t44 == 0) goto 0x80007885;
                                                              				asm("dec eax");
                                                              				if (_t44 >= 0) goto 0x80007885;
                                                              				if ((dil & 0x00000010) == 0) goto 0x80007882;
                                                              				E0000000118000BC4C(_t30, _t51);
                                                              				_t31 = _t30 & 0xfffffffd;
                                                              				_t46 = dil & 0x00000010;
                                                              				if (_t46 == 0) goto 0x8000789f;
                                                              				asm("dec eax");
                                                              				if (_t46 >= 0) goto 0x8000789f;
                                                              				E0000000118000BC4C(_t31, _t51);
                                                              				return 0 | (_t31 & 0xffffffef) == 0x00000000;
                                                              			}













                                                              0x1800077fc
                                                              0x180007801
                                                              0x180007810
                                                              0x180007818
                                                              0x18000781d
                                                              0x180007824
                                                              0x180007829
                                                              0x18000782c
                                                              0x180007833
                                                              0x180007836
                                                              0x180007838
                                                              0x18000783d
                                                              0x18000783f
                                                              0x180007844
                                                              0x180007847
                                                              0x180007849
                                                              0x18000784d
                                                              0x18000784f
                                                              0x180007854
                                                              0x18000785b
                                                              0x180007860
                                                              0x180007863
                                                              0x180007865
                                                              0x180007869
                                                              0x18000786b
                                                              0x180007870
                                                              0x180007876
                                                              0x18000787d
                                                              0x180007882
                                                              0x180007885
                                                              0x180007889
                                                              0x18000788b
                                                              0x180007890
                                                              0x180007897
                                                              0x1800078b5

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 2487fe653e5be7bd8020c0b0ea1e85e42b79556fc3c932490e66e5a61226e724
                                                              • Instruction ID: 766be9376166aa195c434f29f3971196c8b67f74f947fd55b9f7e9fcb960d4ba
                                                              • Opcode Fuzzy Hash: 2487fe653e5be7bd8020c0b0ea1e85e42b79556fc3c932490e66e5a61226e724
                                                              • Instruction Fuzzy Hash: 3D117736F90A0941F7EE9128D45A3E63141AB6C3F4F59C624B66E462E7CF2C4B59C305
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 0000000180008017
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 0000000180008036
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 000000018000805E
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 000000018000806F
                                                              • FlsSetValue.KERNEL32(?,?,?,000000018000827B,?,?,00000000,0000000180008516,?,?,?,?,?,00000001800084A2), ref: 0000000180008080
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: af6c01d4090da002bcf5badd4e251df8289266538696eb3987054211fa53e7a9
                                                              • Instruction ID: be0361fe5fc774fdb93e2323036551c88fb1abd5f2001d1ea80391924f68e359
                                                              • Opcode Fuzzy Hash: af6c01d4090da002bcf5badd4e251df8289266538696eb3987054211fa53e7a9
                                                              • Instruction Fuzzy Hash: 80115B7070924881FADBD32569553E932927F8C7F0F18C324B8B9067DADE69C64D5701
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 6a9b38bedb983d1569a9a36de067c28e809b7b465f559868364cdbc33de0c90b
                                                              • Instruction ID: 1e63756919ea820504c2c280bc0c9b8fbb4cbfe5ca1be2f3c00cf3ab00ed04ff
                                                              • Opcode Fuzzy Hash: 6a9b38bedb983d1569a9a36de067c28e809b7b465f559868364cdbc33de0c90b
                                                              • Instruction Fuzzy Hash: F111397070624D41FAEBE22594527F932826B6D3F0F58CB24B93A0A2C7DE2C9A4D4310
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 68%
                                                              			E00000001180003800(long long __rbx, intOrPtr* __rcx, long long __rdx, long long __r8, void* __r9) {
                                                              				void* _t19;
                                                              				void* _t27;
                                                              				void* _t36;
                                                              				void* _t39;
                                                              				void* _t42;
                                                              				void* _t43;
                                                              				void* _t45;
                                                              				void* _t46;
                                                              				void* _t52;
                                                              				void* _t54;
                                                              				void* _t56;
                                                              				void* _t59;
                                                              
                                                              				_t27 = _t45;
                                                              				 *((long long*)(_t27 + 0x20)) = __rbx;
                                                              				 *((long long*)(_t27 + 0x18)) = __r8;
                                                              				 *((long long*)(_t27 + 0x10)) = __rdx;
                                                              				_t43 = _t27 - 0x3f;
                                                              				_t46 = _t45 - 0xc0;
                                                              				if ( *__rcx == 0x80000003) goto 0x800038a4;
                                                              				E00000001180002D40(_t27);
                                                              				r12d =  *((intOrPtr*)(_t43 + 0x6f));
                                                              				if ( *((long long*)(_t27 + 0x10)) == 0) goto 0x800038bf;
                                                              				__imp__EncodePointer(_t59, _t56, _t54, _t52, _t36, _t39, _t42);
                                                              				E00000001180002D40(_t27);
                                                              				if ( *((intOrPtr*)(_t27 + 0x10)) == _t27) goto 0x800038bf;
                                                              				if ( *__rcx == 0xe0434f4d) goto 0x800038bf;
                                                              				r13d =  *((intOrPtr*)(_t43 + 0x77));
                                                              				if ( *__rcx == 0xe0434352) goto 0x800038c3;
                                                              				 *((intOrPtr*)(_t46 + 0x38)) = r12d;
                                                              				 *((long long*)(_t46 + 0x30)) =  *((intOrPtr*)(_t43 + 0x7f));
                                                              				 *((intOrPtr*)(_t46 + 0x28)) = r13d;
                                                              				 *((long long*)(_t46 + 0x20)) =  *((intOrPtr*)(_t43 + 0x67));
                                                              				_t19 = E00000001180001F20(__rcx,  *((intOrPtr*)(_t43 + 0x4f)), __r8, __r9);
                                                              				if (_t19 == 0) goto 0x800038c3;
                                                              				return _t19;
                                                              			}















                                                              0x180003800
                                                              0x180003803
                                                              0x180003807
                                                              0x18000380b
                                                              0x18000381a
                                                              0x18000381e
                                                              0x180003834
                                                              0x180003836
                                                              0x18000383b
                                                              0x180003848
                                                              0x18000384c
                                                              0x180003855
                                                              0x18000385e
                                                              0x180003867
                                                              0x180003870
                                                              0x180003874
                                                              0x180003884
                                                              0x18000388c
                                                              0x180003891
                                                              0x180003896
                                                              0x18000389b
                                                              0x1800038a2
                                                              0x1800038be

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: 850d6d426b32ca2bcc659c65f0611ee9095a757703c065d3c36d87525356093f
                                                              • Instruction ID: 9ead3bcba03cb9e88f6155f8408b2a39bbeb34ce68d687e28d60bbf843815124
                                                              • Opcode Fuzzy Hash: 850d6d426b32ca2bcc659c65f0611ee9095a757703c065d3c36d87525356093f
                                                              • Instruction Fuzzy Hash: 74613A36A04B888AEB62CF66D4413DD77A4F748B88F148216EF4917B99CF78D299C700
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 32%
                                                              			E0000000118000D5B8(void* __eax, signed int __edx, void* __esi, void* __ebp, long long __rbx, intOrPtr* __rcx, long long __r8) {
                                                              				void* __rdi;
                                                              				void* __rsi;
                                                              				void* __rbp;
                                                              				intOrPtr _t183;
                                                              				signed int _t187;
                                                              				signed int _t194;
                                                              				signed int _t199;
                                                              				intOrPtr _t208;
                                                              				void* _t210;
                                                              				signed char _t211;
                                                              				void* _t261;
                                                              				signed long long _t262;
                                                              				long long _t267;
                                                              				long long _t269;
                                                              				void* _t270;
                                                              				long long _t272;
                                                              				intOrPtr* _t278;
                                                              				intOrPtr* _t285;
                                                              				long long _t287;
                                                              				long long _t313;
                                                              				void* _t321;
                                                              				long long _t322;
                                                              				void* _t323;
                                                              				long long _t324;
                                                              				long long _t326;
                                                              				signed char* _t327;
                                                              				signed char* _t328;
                                                              				signed char* _t329;
                                                              				void* _t330;
                                                              				void* _t331;
                                                              				void* _t332;
                                                              				signed long long _t333;
                                                              				intOrPtr _t336;
                                                              				intOrPtr _t339;
                                                              				void* _t341;
                                                              				signed long long _t343;
                                                              				signed long long _t345;
                                                              				long long _t354;
                                                              				void* _t358;
                                                              				long long _t359;
                                                              				signed long long _t362;
                                                              				char _t363;
                                                              				signed long long _t364;
                                                              				void* _t367;
                                                              				signed char* _t368;
                                                              				signed long long _t370;
                                                              
                                                              				_t261 = _t332;
                                                              				_t331 = _t261 - 0x57;
                                                              				_t333 = _t332 - 0xd0;
                                                              				 *((long long*)(_t331 - 9)) = 0xfffffffe;
                                                              				 *((long long*)(_t261 + 8)) = __rbx;
                                                              				_t262 =  *0x80021010; // 0x6dc7c02d7798
                                                              				 *(_t331 + 0x17) = _t262 ^ _t333;
                                                              				 *((long long*)(_t331 - 0x41)) = __r8;
                                                              				_t278 = __rcx;
                                                              				 *((long long*)(_t331 - 0x59)) =  *((intOrPtr*)(_t331 + 0x7f));
                                                              				_t362 = __edx >> 6;
                                                              				 *(_t331 - 0x39) = _t362;
                                                              				_t370 = __edx + __edx * 8;
                                                              				_t267 =  *((intOrPtr*)( *((intOrPtr*)(0x180000000 + 0x227f0 + _t362 * 8)) + 0x28 + _t370 * 8));
                                                              				 *((long long*)(_t331 - 0x19)) = _t267;
                                                              				r12d = r9d;
                                                              				_t359 = _t358 + __r8;
                                                              				 *((long long*)(_t331 - 0x61)) = _t359;
                                                              				 *((intOrPtr*)(_t331 - 0x49)) = GetConsoleOutputCP();
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)(_t331 - 0x59)) + 0x28)) != dil) goto 0x8000d658;
                                                              				0x80006f60();
                                                              				_t208 =  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t331 - 0x59)) + 0x18)) + 0xc));
                                                              				 *((intOrPtr*)(_t331 - 0x45)) = _t208;
                                                              				 *((long long*)(__rcx)) = _t267;
                                                              				 *((intOrPtr*)(__rcx + 8)) = 0;
                                                              				if ( *((intOrPtr*)(_t331 - 0x41)) - _t359 >= 0) goto 0x8000da03;
                                                              				_t343 = __edx >> 6;
                                                              				 *(_t331 - 0x11) = _t343;
                                                              				 *((char*)(_t331 - 0x71)) =  *((intOrPtr*)(__r8));
                                                              				 *((intOrPtr*)(_t331 - 0x6d)) = 0;
                                                              				r12d = 1;
                                                              				if (_t208 != 0xfde9) goto 0x8000d81d;
                                                              				_t285 = 0x3e + _t370 * 8 +  *((intOrPtr*)(0x180000000 + 0x227f0 + _t343 * 8));
                                                              				if ( *_t285 == dil) goto 0x8000d6ca;
                                                              				_t367 = _t324 + 1;
                                                              				if (_t367 - 5 < 0) goto 0x8000d6b7;
                                                              				if (_t367 <= 0) goto 0x8000d7b3;
                                                              				r12d =  *((char*)(_t285 + 0x1800218d1));
                                                              				r12d = r12d + 1;
                                                              				_t183 = r12d - 1;
                                                              				 *((intOrPtr*)(_t331 - 0x51)) = _t183;
                                                              				_t336 = _t183;
                                                              				if (_t336 -  *((intOrPtr*)(_t331 - 0x61)) - __r8 > 0) goto 0x8000d980;
                                                              				_t287 = _t324;
                                                              				 *((char*)(_t331 + _t287 - 1)) =  *((intOrPtr*)(0x3e + _t370 * 8 +  *((intOrPtr*)(0x180000000 + 0x227f0 + _t343 * 8))));
                                                              				if (_t287 + 1 - _t367 < 0) goto 0x8000d71b;
                                                              				if (_t336 <= 0) goto 0x8000d74b;
                                                              				0x80004b30();
                                                              				_t354 =  *((intOrPtr*)(_t331 - 0x59));
                                                              				_t313 = _t324;
                                                              				 *((intOrPtr*)( *((intOrPtr*)(0x180000000 + 0x227f0 + _t362 * 8)) + _t313 + 0x3e + _t370 * 8)) = dil;
                                                              				if (_t313 + 1 - _t367 < 0) goto 0x8000d74e;
                                                              				 *((long long*)(_t331 - 0x31)) = _t324;
                                                              				_t269 = _t331 - 1;
                                                              				 *((long long*)(_t331 - 0x29)) = _t269;
                                                              				_t187 = (0 | r12d == 0x00000004) + 1;
                                                              				r12d = _t187;
                                                              				r8d = _t187;
                                                              				 *((long long*)(_t333 + 0x20)) = _t354;
                                                              				E0000000118000E384(_t269, __rcx, _t331 - 0x6d, _t331 - 0x29, _t336, _t331 - 0x31);
                                                              				if (_t269 == 0xffffffff) goto 0x8000da03;
                                                              				_t326 = __r8 +  *((intOrPtr*)(_t331 - 0x51)) - 1;
                                                              				goto 0x8000d8ae;
                                                              				_t363 =  *((char*)(_t269 + 0x1800218d0));
                                                              				_t210 = _t363 + 1;
                                                              				_t270 = _t210;
                                                              				if (_t270 -  *((intOrPtr*)(_t331 - 0x61)) - _t326 > 0) goto 0x8000d9ae;
                                                              				 *((long long*)(_t331 - 0x51)) = _t324;
                                                              				 *((long long*)(_t331 - 0x21)) = _t326;
                                                              				_t194 = (0 | _t210 == 0x00000004) + 1;
                                                              				r14d = _t194;
                                                              				r8d = _t194;
                                                              				 *((long long*)(_t333 + 0x20)) = _t354;
                                                              				_t345 = _t331 - 0x51;
                                                              				E0000000118000E384(_t270, _t278, _t331 - 0x6d, _t331 - 0x21,  *((intOrPtr*)(_t331 - 0x61)) - _t326, _t345);
                                                              				if (_t270 == 0xffffffff) goto 0x8000da03;
                                                              				_t327 = _t326 + _t363;
                                                              				r12d = r14d;
                                                              				_t364 =  *(_t331 - 0x39);
                                                              				goto 0x8000d8ae;
                                                              				_t339 =  *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8));
                                                              				_t211 =  *(_t339 + 0x3d + _t370 * 8);
                                                              				if ((_t211 & 0x00000004) == 0) goto 0x8000d850;
                                                              				 *((char*)(_t331 + 7)) =  *((intOrPtr*)(_t339 + 0x3e + _t370 * 8));
                                                              				 *((char*)(_t331 + 8)) =  *_t327;
                                                              				 *(_t339 + 0x3d + _t370 * 8) = _t211 & 0x000000fb;
                                                              				r8d = 2;
                                                              				goto 0x8000d899;
                                                              				r9d =  *_t327 & 0x000000ff;
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t354 + 0x18)))) + _t345 * 2)) >= 0) goto 0x8000d893;
                                                              				_t368 =  &(_t327[1]);
                                                              				if (_t368 -  *((intOrPtr*)(_t331 - 0x61)) >= 0) goto 0x8000d9e0;
                                                              				r8d = 2;
                                                              				if (E0000000118000B5FC(_t211 & 0x000000fb, __ebp, _t278, _t331 - 0x6d, _t327, _t324, _t327, _t331, _t339, _t354) == 0xffffffff) goto 0x8000da03;
                                                              				_t328 = _t368;
                                                              				goto 0x8000d8ae;
                                                              				_t199 = E0000000118000B5FC(_t211 & 0x000000fb, __ebp, _t278, _t331 - 0x6d, _t328, _t324, _t328, _t331, _t359, _t354);
                                                              				if (_t199 == 0xffffffff) goto 0x8000da03;
                                                              				_t329 =  &(_t328[1]);
                                                              				 *((long long*)(_t333 + 0x38)) = _t324;
                                                              				 *((long long*)(_t333 + 0x30)) = _t324;
                                                              				 *((intOrPtr*)(_t333 + 0x28)) = 5;
                                                              				_t272 = _t331 + 0xf;
                                                              				 *((long long*)(_t333 + 0x20)) = _t272;
                                                              				r9d = r12d;
                                                              				_t341 = _t331 - 0x6d;
                                                              				E0000000118000A154();
                                                              				r14d = _t199;
                                                              				if (_t199 == 0) goto 0x8000da03;
                                                              				 *((long long*)(_t333 + 0x20)) = _t324;
                                                              				r8d = _t199;
                                                              				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x8000d9fb;
                                                              				 *((intOrPtr*)(_t278 + 4)) = __esi -  *((intOrPtr*)(_t331 - 0x41)) +  *((intOrPtr*)(_t278 + 8));
                                                              				if ( *((intOrPtr*)(_t331 - 0x69)) - r14d < 0) goto 0x8000da03;
                                                              				if ( *((char*)(_t331 - 0x71)) != 0xa) goto 0x8000d966;
                                                              				 *((short*)(_t331 - 0x71)) = 0xd;
                                                              				 *((long long*)(_t333 + 0x20)) = _t324;
                                                              				_t130 = _t272 - 0xc; // 0x1
                                                              				r8d = _t130;
                                                              				_t321 = _t331 - 0x71;
                                                              				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x8000d9fb;
                                                              				if ( *((intOrPtr*)(_t331 - 0x69)) - 1 < 0) goto 0x8000da03;
                                                              				 *((intOrPtr*)(_t278 + 8)) =  *((intOrPtr*)(_t278 + 8)) + 1;
                                                              				 *((intOrPtr*)(_t278 + 4)) =  *((intOrPtr*)(_t278 + 4)) + 1;
                                                              				if (_t329 -  *((intOrPtr*)(_t331 - 0x61)) >= 0) goto 0x8000da03;
                                                              				goto 0x8000d681;
                                                              				if (_t321 <= 0) goto 0x8000d9a9;
                                                              				_t330 = _t329 - _t368;
                                                              				 *((char*)( *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8)) + _t368 + 0x3e + _t370 * 8)) =  *((intOrPtr*)(_t330 + _t368));
                                                              				if (1 - _t321 < 0) goto 0x8000d988;
                                                              				 *((intOrPtr*)(_t278 + 4)) =  *((intOrPtr*)(_t278 + 4)) +  *((intOrPtr*)(_t278 + 4));
                                                              				goto 0x8000da03;
                                                              				if (_t341 <= 0) goto 0x8000d9da;
                                                              				_t322 = _t324;
                                                              				 *((char*)( *((intOrPtr*)(0x180000000 + 0x227f0 +  *(_t331 - 0x39) * 8)) + _t322 + 0x3e + _t370 * 8)) =  *((intOrPtr*)(_t322 + _t330));
                                                              				_t323 = _t322 + 1;
                                                              				if (2 - _t341 < 0) goto 0x8000d9ba;
                                                              				 *((intOrPtr*)(_t278 + 4)) =  *((intOrPtr*)(_t278 + 4)) + r8d;
                                                              				goto 0x8000da03;
                                                              				 *((intOrPtr*)(_t341 + 0x3e + _t370 * 8)) = r9b;
                                                              				 *( *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8)) + 0x3d + _t370 * 8) =  *( *((intOrPtr*)(0x180000000 + 0x227f0 + _t364 * 8)) + 0x3d + _t370 * 8) | 0x00000004;
                                                              				_t173 = _t323 + 1; // 0x1
                                                              				 *((intOrPtr*)(_t278 + 4)) = _t173;
                                                              				goto 0x8000da03;
                                                              				 *_t278 = GetLastError();
                                                              				return E000000011800010B0(_t206,  *((intOrPtr*)(_t331 - 0x45)),  *(_t331 + 0x17) ^ _t333);
                                                              			}

















































                                                              0x18000d5b8
                                                              0x18000d5c6
                                                              0x18000d5ca
                                                              0x18000d5d1
                                                              0x18000d5d9
                                                              0x18000d5dd
                                                              0x18000d5e7
                                                              0x18000d5ee
                                                              0x18000d5f5
                                                              0x18000d5fc
                                                              0x18000d606
                                                              0x18000d60a
                                                              0x18000d618
                                                              0x18000d624
                                                              0x18000d629
                                                              0x18000d62d
                                                              0x18000d630
                                                              0x18000d633
                                                              0x18000d63d
                                                              0x18000d64a
                                                              0x18000d64f
                                                              0x18000d65c
                                                              0x18000d65f
                                                              0x18000d664
                                                              0x18000d667
                                                              0x18000d66e
                                                              0x18000d677
                                                              0x18000d67b
                                                              0x18000d683
                                                              0x18000d686
                                                              0x18000d689
                                                              0x18000d69c
                                                              0x18000d6af
                                                              0x18000d6ba
                                                              0x18000d6be
                                                              0x18000d6c8
                                                              0x18000d6cd
                                                              0x18000d6e1
                                                              0x18000d6ea
                                                              0x18000d6f0
                                                              0x18000d6f2
                                                              0x18000d6fc
                                                              0x18000d702
                                                              0x18000d708
                                                              0x18000d71d
                                                              0x18000d72a
                                                              0x18000d72f
                                                              0x18000d73b
                                                              0x18000d740
                                                              0x18000d74b
                                                              0x18000d759
                                                              0x18000d764
                                                              0x18000d766
                                                              0x18000d76a
                                                              0x18000d76e
                                                              0x18000d77b
                                                              0x18000d77d
                                                              0x18000d780
                                                              0x18000d783
                                                              0x18000d794
                                                              0x18000d79d
                                                              0x18000d7ab
                                                              0x18000d7ae
                                                              0x18000d7b6
                                                              0x18000d7bf
                                                              0x18000d7ca
                                                              0x18000d7d0
                                                              0x18000d7d6
                                                              0x18000d7da
                                                              0x18000d7e6
                                                              0x18000d7e8
                                                              0x18000d7eb
                                                              0x18000d7ee
                                                              0x18000d7f3
                                                              0x18000d7ff
                                                              0x18000d808
                                                              0x18000d80e
                                                              0x18000d811
                                                              0x18000d814
                                                              0x18000d818
                                                              0x18000d81d
                                                              0x18000d825
                                                              0x18000d82d
                                                              0x18000d834
                                                              0x18000d839
                                                              0x18000d83f
                                                              0x18000d844
                                                              0x18000d84e
                                                              0x18000d850
                                                              0x18000d860
                                                              0x18000d862
                                                              0x18000d86a
                                                              0x18000d873
                                                              0x18000d888
                                                              0x18000d88e
                                                              0x18000d891
                                                              0x18000d8a0
                                                              0x18000d8a8
                                                              0x18000d8ae
                                                              0x18000d8b1
                                                              0x18000d8b6
                                                              0x18000d8bb
                                                              0x18000d8c3
                                                              0x18000d8c7
                                                              0x18000d8cc
                                                              0x18000d8cf
                                                              0x18000d8d8
                                                              0x18000d8dd
                                                              0x18000d8e2
                                                              0x18000d8e8
                                                              0x18000d8f1
                                                              0x18000d907
                                                              0x18000d915
                                                              0x18000d91c
                                                              0x18000d926
                                                              0x18000d92d
                                                              0x18000d931
                                                              0x18000d93a
                                                              0x18000d93a
                                                              0x18000d93e
                                                              0x18000d94d
                                                              0x18000d957
                                                              0x18000d95d
                                                              0x18000d960
                                                              0x18000d96a
                                                              0x18000d97b
                                                              0x18000d983
                                                              0x18000d985
                                                              0x18000d997
                                                              0x18000d9a7
                                                              0x18000d9a9
                                                              0x18000d9ac
                                                              0x18000d9b1
                                                              0x18000d9b3
                                                              0x18000d9c8
                                                              0x18000d9cf
                                                              0x18000d9d8
                                                              0x18000d9da
                                                              0x18000d9de
                                                              0x18000d9e0
                                                              0x18000d9ed
                                                              0x18000d9f3
                                                              0x18000d9f6
                                                              0x18000d9f9
                                                              0x18000da01
                                                              0x18000da2c

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 6feae5b9fbf0fd58da801fa267745876ae53b7eaab871f0ae10c7fb0fe539764
                                                              • Instruction ID: d53985ea959d49848d9070d6669198272c686acab0006873b77d48ca537a322a
                                                              • Opcode Fuzzy Hash: 6feae5b9fbf0fd58da801fa267745876ae53b7eaab871f0ae10c7fb0fe539764
                                                              • Instruction Fuzzy Hash: 1CD1E332B18A8889E752CFA9D4403EC3BB1F3597D8F148216EE5D97B99DE34C60AC750
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 28%
                                                              			E0000000118000DEE0(void* __ebx, signed int __ecx, void* __esi, void* __ebp, void* __rax, void* __rcx, signed short* __rdx, void* __r8, signed int __r9, void* __r10) {
                                                              				signed long long _v88;
                                                              				void* _v96;
                                                              				void* _v108;
                                                              				signed int _v112;
                                                              				intOrPtr _v120;
                                                              				signed int _v124;
                                                              				long _v128;
                                                              				signed int _v136;
                                                              				long long _v144;
                                                              				signed int _v152;
                                                              				void* __rbx;
                                                              				void* __rsi;
                                                              				void* __rbp;
                                                              				signed short _t99;
                                                              				void* _t107;
                                                              				long _t116;
                                                              				signed int _t117;
                                                              				void* _t122;
                                                              				signed short _t127;
                                                              				signed int _t130;
                                                              				signed short _t133;
                                                              				signed short _t159;
                                                              				signed short _t167;
                                                              				signed long long _t180;
                                                              				signed int _t184;
                                                              				signed short* _t197;
                                                              				signed int _t204;
                                                              				signed int _t205;
                                                              				signed short* _t206;
                                                              				void* _t208;
                                                              				signed long long _t220;
                                                              				void* _t221;
                                                              				signed long long _t222;
                                                              				signed long long _t223;
                                                              				void* _t224;
                                                              				signed short* _t226;
                                                              
                                                              				_t197 = __rdx;
                                                              				_t122 = __ebx;
                                                              				r14d = r8d;
                                                              				_t184 = __r9;
                                                              				_t206 = __rdx;
                                                              				if (r8d == 0) goto 0x8000e1d3;
                                                              				if (__rdx != 0) goto 0x8000df47;
                                                              				 *((char*)(__r9 + 0x38)) = 1;
                                                              				r8d = 0;
                                                              				 *((intOrPtr*)(__r9 + 0x34)) = 0;
                                                              				 *((char*)(__r9 + 0x30)) = 1;
                                                              				 *((intOrPtr*)(__r9 + 0x2c)) = 0x16;
                                                              				r9d = 0;
                                                              				_v144 = __r9;
                                                              				_v152 = _t205;
                                                              				E000000011800084EC(__rax, __r9, __rcx, __rdx, __rdx, _t208, __r8);
                                                              				goto 0x8000e1d5;
                                                              				_t220 = __ecx >> 6;
                                                              				_v88 = _t220;
                                                              				_t223 = __ecx + __ecx * 8;
                                                              				_t99 =  *((intOrPtr*)(0x800227f0 + 0x39 + _t223 * 8));
                                                              				_v136 = _t99;
                                                              				if (_t99 - 1 - 1 > 0) goto 0x8000df7e;
                                                              				if (( !r14d & 0x00000001) == 0) goto 0x8000df10;
                                                              				if (( *( *((intOrPtr*)(0x800227f0 + _t220 * 8)) + 0x38 + _t223 * 8) & 0x00000020) == 0) goto 0x8000df94;
                                                              				_t23 = _t197 + 2; // 0x2
                                                              				r8d = _t23;
                                                              				E0000000118000E958(r15d);
                                                              				_v112 = _t205;
                                                              				if (E0000000118000E2E0(r15d, __ecx) == 0) goto 0x8000e0c3;
                                                              				if ( *( *((intOrPtr*)(0x800227f0 + _t220 * 8)) + 0x38 + _t223 * 8) - dil >= 0) goto 0x8000e0c3;
                                                              				if ( *((intOrPtr*)(__r9 + 0x28)) != dil) goto 0x8000dfd3;
                                                              				0x80006f60();
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)(__r9 + 0x18)) + 0x138)) != _t205) goto 0x8000dfef;
                                                              				_t180 =  *((intOrPtr*)(0x800227f0 + _t220 * 8));
                                                              				if ( *((intOrPtr*)(_t180 + 0x39 + _t223 * 8)) == dil) goto 0x8000e0c3;
                                                              				if (GetConsoleMode(??, ??) == 0) goto 0x8000e0bc;
                                                              				_t127 = _v136;
                                                              				_t159 = _t127;
                                                              				if (_t159 == 0) goto 0x8000e099;
                                                              				if (_t159 == 0) goto 0x8000e024;
                                                              				if (_t127 - 1 != 1) goto 0x8000e15d;
                                                              				_t221 = _t206 + _t224;
                                                              				_v128 = _t205;
                                                              				_t226 = _t206;
                                                              				if (_t206 - _t221 >= 0) goto 0x8000e090;
                                                              				r14d = _v124;
                                                              				_v136 =  *_t226 & 0x0000ffff;
                                                              				_t107 = E0000000118000E960( *_t226 & 0xffff);
                                                              				_t130 = _v136 & 0x0000ffff;
                                                              				if (_t107 != _t130) goto 0x8000e087;
                                                              				r14d = r14d + 2;
                                                              				_v124 = r14d;
                                                              				if (_t130 != 0xa) goto 0x8000e07c;
                                                              				if (E0000000118000E960(0xd) != 0xd) goto 0x8000e087;
                                                              				r14d = r14d + 1;
                                                              				_v124 = r14d;
                                                              				if ( &(_t226[1]) - _t221 >= 0) goto 0x8000e090;
                                                              				goto 0x8000e038;
                                                              				_v128 = GetLastError();
                                                              				_t222 = _v88;
                                                              				goto 0x8000e153;
                                                              				r9d = r14d;
                                                              				_v152 = __r9;
                                                              				E0000000118000D5B8(_t109, r15d, __esi, __ebp, __r9,  &_v128, _t206);
                                                              				asm("movsd xmm0, [eax]");
                                                              				goto 0x8000e158;
                                                              				if ( *((intOrPtr*)( *((intOrPtr*)(0x800227f0 + _t222 * 8)) + 0x38 + _t223 * 8)) - dil >= 0) goto 0x8000e120;
                                                              				_t133 = _v136;
                                                              				_t167 = _t133;
                                                              				if (_t167 == 0) goto 0x8000e10c;
                                                              				if (_t167 == 0) goto 0x8000e0f8;
                                                              				if (_t133 - 1 != 1) goto 0x8000e164;
                                                              				r9d = r14d;
                                                              				E0000000118000DB34(_t122, r15d, _t180, _t184,  &_v128, _t208, _t206);
                                                              				goto 0x8000e0b0;
                                                              				r9d = r14d;
                                                              				E0000000118000DC50(r15d,  *((intOrPtr*)(_t180 + 8)), _t180, _t184,  &_v128, _t208, _t206);
                                                              				goto 0x8000e0b0;
                                                              				r9d = r14d;
                                                              				E0000000118000DA30(_t122, r15d, _t180, _t184,  &_v128, _t208, _t206);
                                                              				goto 0x8000e0b0;
                                                              				r8d = r14d;
                                                              				_v152 = _v152 & _t180;
                                                              				_v128 = _t180;
                                                              				_v120 = 0;
                                                              				if (WriteFile(??, ??, ??, ??, ??) != 0) goto 0x8000e150;
                                                              				_t116 = GetLastError();
                                                              				_v128 = _t116;
                                                              				asm("movsd xmm0, [ebp-0x40]");
                                                              				asm("movsd [ebp-0x30], xmm0");
                                                              				if (_t116 != 0) goto 0x8000e1cc;
                                                              				_t117 = _v112;
                                                              				if (_t117 == 0) goto 0x8000e1a3;
                                                              				if (_t117 != 5) goto 0x8000e193;
                                                              				 *((char*)(_t184 + 0x30)) = 1;
                                                              				 *((intOrPtr*)(_t184 + 0x2c)) = 9;
                                                              				 *((char*)(_t184 + 0x38)) = 1;
                                                              				 *(_t184 + 0x34) = _t117;
                                                              				goto 0x8000df3f;
                                                              				_t204 = _t184;
                                                              				E000000011800086B0(_v112, _t204);
                                                              				goto 0x8000df3f;
                                                              				if (( *( *((intOrPtr*)(_t204 + _t222 * 8)) + 0x38 + _t223 * 8) & 0x00000040) == 0) goto 0x8000e1b4;
                                                              				if ( *_t206 == 0x1a) goto 0x8000e1d3;
                                                              				 *(_t184 + 0x34) =  *(_t184 + 0x34) & 0x00000000;
                                                              				 *((char*)(_t184 + 0x30)) = 1;
                                                              				 *((intOrPtr*)(_t184 + 0x2c)) = 0x1c;
                                                              				 *((char*)(_t184 + 0x38)) = 1;
                                                              				goto 0x8000df3f;
                                                              				goto 0x8000e1d5;
                                                              				return 0;
                                                              			}







































                                                              0x18000dee0
                                                              0x18000dee0
                                                              0x18000def6
                                                              0x18000defc
                                                              0x18000deff
                                                              0x18000df05
                                                              0x18000df0e
                                                              0x18000df10
                                                              0x18000df15
                                                              0x18000df18
                                                              0x18000df1e
                                                              0x18000df25
                                                              0x18000df2d
                                                              0x18000df30
                                                              0x18000df35
                                                              0x18000df3a
                                                              0x18000df42
                                                              0x18000df57
                                                              0x18000df5b
                                                              0x18000df5f
                                                              0x18000df67
                                                              0x18000df6c
                                                              0x18000df73
                                                              0x18000df7c
                                                              0x18000df84
                                                              0x18000df8b
                                                              0x18000df8b
                                                              0x18000df8f
                                                              0x18000df97
                                                              0x18000dfa9
                                                              0x18000dfb8
                                                              0x18000dfc2
                                                              0x18000dfc7
                                                              0x18000dfde
                                                              0x18000dfe0
                                                              0x18000dfe9
                                                              0x18000e004
                                                              0x18000e00a
                                                              0x18000e00e
                                                              0x18000e010
                                                              0x18000e019
                                                              0x18000e01e
                                                              0x18000e024
                                                              0x18000e028
                                                              0x18000e02c
                                                              0x18000e032
                                                              0x18000e034
                                                              0x18000e03f
                                                              0x18000e043
                                                              0x18000e048
                                                              0x18000e04f
                                                              0x18000e051
                                                              0x18000e055
                                                              0x18000e05d
                                                              0x18000e071
                                                              0x18000e073
                                                              0x18000e076
                                                              0x18000e083
                                                              0x18000e085
                                                              0x18000e08d
                                                              0x18000e090
                                                              0x18000e094
                                                              0x18000e099
                                                              0x18000e09c
                                                              0x18000e0ab
                                                              0x18000e0b0
                                                              0x18000e0b7
                                                              0x18000e0cc
                                                              0x18000e0ce
                                                              0x18000e0d2
                                                              0x18000e0d4
                                                              0x18000e0d9
                                                              0x18000e0de
                                                              0x18000e0e4
                                                              0x18000e0f1
                                                              0x18000e0f6
                                                              0x18000e0f8
                                                              0x18000e105
                                                              0x18000e10a
                                                              0x18000e10c
                                                              0x18000e119
                                                              0x18000e11e
                                                              0x18000e12b
                                                              0x18000e12e
                                                              0x18000e136
                                                              0x18000e13a
                                                              0x18000e145
                                                              0x18000e147
                                                              0x18000e14d
                                                              0x18000e153
                                                              0x18000e158
                                                              0x18000e16e
                                                              0x18000e170
                                                              0x18000e175
                                                              0x18000e17a
                                                              0x18000e17c
                                                              0x18000e180
                                                              0x18000e187
                                                              0x18000e18b
                                                              0x18000e18e
                                                              0x18000e196
                                                              0x18000e199
                                                              0x18000e19e
                                                              0x18000e1ad
                                                              0x18000e1b2
                                                              0x18000e1b4
                                                              0x18000e1b8
                                                              0x18000e1bc
                                                              0x18000e1c3
                                                              0x18000e1c7
                                                              0x18000e1d1
                                                              0x18000e1e5

                                                              APIs
                                                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000000018000DECB), ref: 000000018000DFFC
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,000000018000DECB), ref: 000000018000E087
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: 88bf0c22dda6b7219e4b6c12d26658204698ac38d331fc827850b635f9c01297
                                                              • Instruction ID: 0d257abc0b638f0f040665fb3b769d735b9bc0d803a768daaeded027fae08968
                                                              • Opcode Fuzzy Hash: 88bf0c22dda6b7219e4b6c12d26658204698ac38d331fc827850b635f9c01297
                                                              • Instruction Fuzzy Hash: 7291B13261469885F7A2CF6598403ED3BA0F749BC8F14C11AFE4A67A95DF74C68AC710
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 100%
                                                              			E00000001180001D98(long long __rbx, long long _a32) {
                                                              
                                                              				_a32 = __rbx;
                                                              			}



                                                              0x180001d98

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 435d845f9f5cdf73bfe4695b71b0048b28e79a424c4651dbd907605b843c4427
                                                              • Instruction ID: 8b5b8807919832646eb0d744692d73e0514a3f66bd27872d13ad1b0d2e18aa1e
                                                              • Opcode Fuzzy Hash: 435d845f9f5cdf73bfe4695b71b0048b28e79a424c4651dbd907605b843c4427
                                                              • Instruction Fuzzy Hash: E6113C32600F449AEB52CF61EC943D833A4F31D799F041A25FAAD477A4DF78C2A88340
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              C-Code - Quality: 29%
                                                              			E0000000118000DC50(signed int __edx, void* __edi, void* __rax, signed long long __rbx, intOrPtr* __rcx, long long __rbp, signed short* __r8, signed long long _a8, signed long long _a16, long long _a24, char _a40, char _a1744, char _a1752, signed int _a5176, void* _a5192) {
                                                              				intOrPtr _v0;
                                                              				signed long long _v8;
                                                              				signed int _t41;
                                                              				signed long long _t62;
                                                              				short* _t67;
                                                              				signed int* _t68;
                                                              				void* _t91;
                                                              				void* _t97;
                                                              				void* _t99;
                                                              				void* _t102;
                                                              				void* _t103;
                                                              
                                                              				_a8 = __rbx;
                                                              				_a24 = __rbp;
                                                              				E0000000118000F880(0x1470, __rax, _t97, _t99);
                                                              				_t62 =  *0x80021010; // 0x6dc7c02d7798
                                                              				_a5176 = _t62 ^ _t91 - __rax;
                                                              				r14d = r9d;
                                                              				r10d = r10d & 0x0000003f;
                                                              				_t103 = _t102 + __r8;
                                                              				 *((long long*)(__rcx)) =  *((intOrPtr*)(0x800227f0 + (__edx >> 6) * 8));
                                                              				 *((intOrPtr*)(__rcx + 8)) = 0;
                                                              				if (__r8 - _t103 >= 0) goto 0x8000dd91;
                                                              				_t67 =  &_a40;
                                                              				if (__r8 - _t103 >= 0) goto 0x8000dcfa;
                                                              				_t41 =  *__r8 & 0x0000ffff;
                                                              				if (_t41 != 0xa) goto 0x8000dce6;
                                                              				 *_t67 = 0xd;
                                                              				_t68 = _t67 + 2;
                                                              				 *_t68 = _t41;
                                                              				if ( &(_t68[0]) -  &_a1744 < 0) goto 0x8000dcc8;
                                                              				_a16 = _a16 & 0x00000000;
                                                              				_a8 = _a8 & 0x00000000;
                                                              				_v0 = 0xd55;
                                                              				_v8 =  &_a1752;
                                                              				r9d = 0;
                                                              				E0000000118000A154();
                                                              				if (0 == 0) goto 0x8000dd89;
                                                              				if (0 == 0) goto 0x8000dd79;
                                                              				_v8 = _v8 & 0x00000000;
                                                              				r8d = 0;
                                                              				r8d = r8d;
                                                              				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x8000dd89;
                                                              				if (0 + _a24 < 0) goto 0x8000dd46;
                                                              				 *((intOrPtr*)(__rcx + 4)) = __edi - r15d;
                                                              				goto 0x8000dcbd;
                                                              				 *((intOrPtr*)(__rcx)) = GetLastError();
                                                              				return E000000011800010B0(_t39, 0, _a5176 ^ _t91 - __rax);
                                                              			}














                                                              0x18000dc50
                                                              0x18000dc55
                                                              0x18000dc67
                                                              0x18000dc6f
                                                              0x18000dc79
                                                              0x18000dc8a
                                                              0x18000dc98
                                                              0x18000dc9c
                                                              0x18000dcb4
                                                              0x18000dcba
                                                              0x18000dcbd
                                                              0x18000dcc3
                                                              0x18000dccb
                                                              0x18000dccd
                                                              0x18000dcd8
                                                              0x18000dcdf
                                                              0x18000dce2
                                                              0x18000dce6
                                                              0x18000dcf8
                                                              0x18000dcfa
                                                              0x18000dd05
                                                              0x18000dd13
                                                              0x18000dd26
                                                              0x18000dd2b
                                                              0x18000dd35
                                                              0x18000dd3e
                                                              0x18000dd44
                                                              0x18000dd46
                                                              0x18000dd5b
                                                              0x18000dd64
                                                              0x18000dd6f
                                                              0x18000dd77
                                                              0x18000dd7e
                                                              0x18000dd84
                                                              0x18000dd8f
                                                              0x18000ddbf

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: bcf7ee1ea3ec2a9cc3b1d78a5d2c7ec9e62fd3dc134ebc80f67064554232c18b
                                                              • Instruction ID: c34ad0e7ff2d66e96fda8e7ac49a4eca9b2c2d7f4ff30b46897494357c1f583c
                                                              • Opcode Fuzzy Hash: bcf7ee1ea3ec2a9cc3b1d78a5d2c7ec9e62fd3dc134ebc80f67064554232c18b
                                                              • Instruction Fuzzy Hash: E441A472614A8886EBA2CF25E4447EA7761F79C7D4F408022EE4E87758DF7CC645C750
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 43dc2e1a8b3bf6a6ca3c7988f27fb1d1dbaf565cf4dd9104b15b21490a7c12b7
                                                              • Instruction ID: 9822ff17b0ce5fbc637df8732c669b6e85e1acb8a855211156653d926a5084e0
                                                              • Opcode Fuzzy Hash: 43dc2e1a8b3bf6a6ca3c7988f27fb1d1dbaf565cf4dd9104b15b21490a7c12b7
                                                              • Instruction Fuzzy Hash: 8D114C72614B4482EBA28F25F440399B7A0F788BD4F188220EE8C0B769DF38CA55CB04
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.319727337.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Offset: 0000000180000000, based on PE: true
                                                              • Associated: 00000004.00000002.319722031.0000000180000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319744619.0000000180016000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319757349.0000000180021000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.319778449.0000000180023000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: ClassCursorLoadRegister
                                                              • String ID: P
                                                              • API String ID: 1693014935-3110715001
                                                              • Opcode ID: 24b0b9f3c1b09ae8b28d8b77cab2a0cc8b6b471604828e0fcca638cf8f3030e2
                                                              • Instruction ID: c953b54a92ac3cc4e92e902e3110dd604cc2aeb839ef1ea803bcd24b7a7bdda6
                                                              • Opcode Fuzzy Hash: 24b0b9f3c1b09ae8b28d8b77cab2a0cc8b6b471604828e0fcca638cf8f3030e2
                                                              • Instruction Fuzzy Hash: 8501B232519F8486E7A18F00F89834BB7B4F388788F604119E6CD42B68DFBDC258CB40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:11.6%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:40
                                                              Total number of Limit Nodes:3
                                                              execution_graph 2528 1caef350000 2531 1caef35015a 2528->2531 2529 1caef35033f GetNativeSystemInfo 2530 1caef350377 VirtualAlloc 2529->2530 2533 1caef3508eb 2529->2533 2532 1caef350395 VirtualAlloc 2530->2532 2536 1caef3503aa 2530->2536 2531->2529 2531->2533 2532->2536 2534 1caef350873 2534->2533 2535 1caef3508c6 RtlAddFunctionTable 2534->2535 2535->2533 2536->2534 2537 1caef35084b VirtualProtect 2536->2537 2537->2536 2538 1caef394214 2539 1caef394256 2538->2539 2542 1caef3a3988 2539->2542 2541 1caef3944c6 2544 1caef3a3a29 2542->2544 2543 1caef3a3acc CreateProcessW 2543->2541 2544->2543 2556 1caef3933d4 2559 1caef393418 2556->2559 2558 1caef3939d9 2559->2558 2560 1caef394214 2559->2560 2561 1caef394256 2560->2561 2562 1caef3a3988 CreateProcessW 2561->2562 2563 1caef3944c6 2562->2563 2563->2559 2568 1caef394eb8 2571 1caef394eed 2568->2571 2569 1caef394214 CreateProcessW 2569->2571 2570 1caef3957a6 2571->2569 2571->2570 2545 1caef3980cc 2546 1caef3980f3 2545->2546 2547 1caef3982ba 2546->2547 2549 1caef3ae9e8 2546->2549 2552 1caef398bc8 2549->2552 2551 1caef3aeab4 2551->2546 2554 1caef398c02 2552->2554 2553 1caef398eb8 2553->2551 2554->2553 2555 1caef398d6f Process32FirstW 2554->2555 2555->2554 2572 1caef39ba2c 2573 1caef39ba53 2572->2573 2574 1caef394214 CreateProcessW 2573->2574 2575 1caef39bb2d 2573->2575 2574->2575

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 1caef350000-1caef35029a call 1caef35091c * 2 13 1caef3502a0-1caef3502a4 0->13 14 1caef350905 0->14 13->14 16 1caef3502aa-1caef3502ae 13->16 15 1caef350907-1caef35091a 14->15 16->14 17 1caef3502b4-1caef3502b8 16->17 17->14 18 1caef3502be-1caef3502c5 17->18 18->14 19 1caef3502cb-1caef3502dc 18->19 19->14 20 1caef3502e2-1caef3502eb 19->20 20->14 21 1caef3502f1-1caef3502fc 20->21 21->14 22 1caef350302-1caef350312 21->22 23 1caef35033f-1caef350371 GetNativeSystemInfo 22->23 24 1caef350314-1caef35031a 22->24 23->14 26 1caef350377-1caef350393 VirtualAlloc 23->26 25 1caef35031c-1caef350324 24->25 27 1caef35032c-1caef35032d 25->27 28 1caef350326-1caef35032a 25->28 29 1caef3503aa-1caef3503ae 26->29 30 1caef350395-1caef3503a8 VirtualAlloc 26->30 31 1caef35032f-1caef35033d 27->31 28->31 32 1caef3503b0-1caef3503c2 29->32 33 1caef3503dc-1caef3503e3 29->33 30->29 31->23 31->25 34 1caef3503d4-1caef3503d8 32->34 35 1caef3503fb-1caef350417 33->35 36 1caef3503e5-1caef3503f9 33->36 39 1caef3503da 34->39 40 1caef3503c4-1caef3503d1 34->40 37 1caef350419-1caef35041a 35->37 38 1caef350458-1caef350465 35->38 36->35 36->36 41 1caef35041c-1caef350422 37->41 42 1caef35046b-1caef350472 38->42 43 1caef350537-1caef350542 38->43 39->35 40->34 44 1caef350448-1caef350456 41->44 45 1caef350424-1caef350446 41->45 42->43 48 1caef350478-1caef350485 42->48 46 1caef3506e6-1caef3506ed 43->46 47 1caef350548-1caef350559 43->47 44->38 44->41 45->44 45->45 51 1caef3507ac-1caef3507c3 46->51 52 1caef3506f3-1caef350707 46->52 49 1caef350562-1caef350565 47->49 48->43 50 1caef35048b-1caef35048f 48->50 53 1caef35055b-1caef35055f 49->53 54 1caef350567-1caef350574 49->54 55 1caef35051b-1caef350525 50->55 58 1caef35087a-1caef35088d 51->58 59 1caef3507c9-1caef3507cd 51->59 56 1caef35070d 52->56 57 1caef3507a9-1caef3507aa 52->57 53->49 62 1caef35057a-1caef35057d 54->62 63 1caef35060d-1caef350619 54->63 60 1caef35052b-1caef350531 55->60 61 1caef350494-1caef3504a8 55->61 64 1caef350712-1caef350736 56->64 57->51 81 1caef35088f-1caef35089a 58->81 82 1caef3508b3-1caef3508ba 58->82 65 1caef3507d0-1caef3507d3 59->65 60->43 60->50 68 1caef3504cf-1caef3504d3 61->68 69 1caef3504aa-1caef3504cd 61->69 62->63 70 1caef350583-1caef35059b 62->70 66 1caef35061f 63->66 67 1caef3506e2-1caef3506e3 63->67 95 1caef350796-1caef35079f 64->95 96 1caef350738-1caef35073e 64->96 72 1caef35085f-1caef35086d 65->72 73 1caef3507d9-1caef3507e9 65->73 74 1caef350625-1caef350648 66->74 67->46 77 1caef3504e3-1caef3504e7 68->77 78 1caef3504d5-1caef3504e1 68->78 76 1caef350518-1caef350519 69->76 70->63 79 1caef35059d-1caef35059e 70->79 72->65 75 1caef350873-1caef350874 72->75 83 1caef3507eb-1caef3507ed 73->83 84 1caef35080d-1caef35080f 73->84 110 1caef35064a-1caef35064b 74->110 111 1caef3506b2-1caef3506b7 74->111 75->58 76->55 93 1caef3504fe-1caef350502 77->93 94 1caef3504e9-1caef3504fc 77->94 91 1caef350511-1caef350515 78->91 92 1caef3505a0-1caef350605 79->92 97 1caef3508ab-1caef3508b1 81->97 87 1caef3508eb-1caef350903 82->87 88 1caef3508bc-1caef3508c4 82->88 85 1caef3507ef-1caef3507f9 83->85 86 1caef3507fb-1caef35080b 83->86 89 1caef350811-1caef350820 84->89 90 1caef350822-1caef35082b 84->90 103 1caef35082e-1caef35083d 85->103 86->103 87->15 88->87 100 1caef3508c6-1caef3508e9 RtlAddFunctionTable 88->100 89->103 90->103 91->76 92->92 104 1caef350607 92->104 93->76 102 1caef350504-1caef35050e 93->102 94->91 95->64 101 1caef3507a5-1caef3507a6 95->101 105 1caef350740-1caef350746 96->105 106 1caef350748-1caef350754 96->106 97->82 98 1caef35089c-1caef3508a8 97->98 98->97 100->87 101->57 102->91 112 1caef35083f-1caef350845 103->112 113 1caef35084b-1caef35085c VirtualProtect 103->113 104->63 107 1caef35077b-1caef35078d 105->107 108 1caef350756-1caef350757 106->108 109 1caef350764-1caef350776 106->109 107->95 125 1caef35078f-1caef350794 107->125 116 1caef350759-1caef350762 108->116 109->107 117 1caef35064e-1caef350651 110->117 118 1caef3506ce-1caef3506d8 111->118 119 1caef3506b9-1caef3506bd 111->119 112->113 113->72 116->109 116->116 122 1caef35065b-1caef350666 117->122 123 1caef350653-1caef350659 117->123 118->74 124 1caef3506de-1caef3506df 118->124 119->118 120 1caef3506bf-1caef3506c3 119->120 120->118 129 1caef3506c5 120->129 127 1caef350676-1caef350688 122->127 128 1caef350668-1caef350669 122->128 126 1caef35068d-1caef3506a3 123->126 124->67 125->96 132 1caef3506ac 126->132 133 1caef3506a5-1caef3506aa 126->133 127->126 130 1caef35066b-1caef350674 128->130 129->118 130->127 130->130 132->111 133->117
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.320932194.000001CAEF350000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001CAEF350000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1caef350000_rundll32.jbxd
                                                              Similarity
                                                              • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                              • String ID: Cach$Flus$GetN$Libr$Load$RtlA$Slee$Virt$Virt$aryA$ativ$ct$ddFu$eSys$hIns$lloc$ncti$nf$o$onTa$rote$temI$tion$truc$ualA$ualP
                                                              • API String ID: 394283112-3605381585
                                                              • Opcode ID: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction ID: 2edca17a2db1753547f86ce320e58fc124353ac115e36a5a0c024e12682c0569
                                                              • Opcode Fuzzy Hash: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction Fuzzy Hash: 4062D170658A4A8BE719EF18CC89BADB3E4FF84304F54462DD89AC7251DB35E442CBC6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.320983303.000001CAEF391000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001CAEF391000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1caef391000_rundll32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID: li
                                                              • API String ID: 963392458-3170889640
                                                              • Opcode ID: df447d1959c748b5d8cf34ebfef7c4b31b83bdbcb52bf56f40cb8f0245456118
                                                              • Instruction ID: 11c0be17526c350355a01dfb7bbf641cf04bbfe05017b225e9aeb4fcc4375608
                                                              • Opcode Fuzzy Hash: df447d1959c748b5d8cf34ebfef7c4b31b83bdbcb52bf56f40cb8f0245456118
                                                              • Instruction Fuzzy Hash: 1241E97051CB848FEB64DF18D0C97DAB7E0FB98319F10495DE498C7296DB789884CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:16.4%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:42
                                                              Total number of Limit Nodes:4
                                                              execution_graph 3059 203a7f0 3061 203a80b 3059->3061 3062 203a8bc 3061->3062 3063 204020c 3061->3063 3064 204022b 3063->3064 3066 2040590 3064->3066 3067 204e310 3064->3067 3066->3062 3069 204e423 3067->3069 3068 204e5f6 3068->3064 3069->3068 3071 20340a0 3069->3071 3072 2034116 3071->3072 3073 20341ca GetVolumeInformationW 3072->3073 3073->3068 3091 2052ab0 3092 2052aea 3091->3092 3093 2052c51 3092->3093 3094 204e9e8 Process32FirstW 3092->3094 3094->3092 3084 205488c 3086 20548d6 3084->3086 3087 2054914 3086->3087 3088 204e9e8 3086->3088 3089 2038bc8 Process32FirstW 3088->3089 3090 204eab4 3089->3090 3090->3086 3052 204e9e8 3055 2038bc8 3052->3055 3054 204eab4 3057 2038c02 3055->3057 3056 2038eb8 3056->3054 3057->3056 3058 2038d6f Process32FirstW 3057->3058 3058->3057 3074 1fd0000 3079 1fd015a 3074->3079 3075 1fd08eb 3076 1fd033f GetNativeSystemInfo 3076->3075 3077 1fd0377 VirtualAlloc 3076->3077 3078 1fd0395 VirtualAlloc 3077->3078 3081 1fd03aa 3077->3081 3078->3081 3079->3075 3079->3076 3080 1fd0873 3080->3075 3082 1fd08c6 RtlAddFunctionTable 3080->3082 3081->3080 3083 1fd084b VirtualProtect 3081->3083 3082->3075 3083->3081 3095 20380cc 3097 20380f3 3095->3097 3096 20382ba 3097->3096 3098 204e9e8 Process32FirstW 3097->3098 3098->3097

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 1fd0000-1fd029a call 1fd091c * 2 13 1fd0905 0->13 14 1fd02a0-1fd02a4 0->14 15 1fd0907-1fd091a 13->15 14->13 16 1fd02aa-1fd02ae 14->16 16->13 17 1fd02b4-1fd02b8 16->17 17->13 18 1fd02be-1fd02c5 17->18 18->13 19 1fd02cb-1fd02dc 18->19 19->13 20 1fd02e2-1fd02eb 19->20 20->13 21 1fd02f1-1fd02fc 20->21 21->13 22 1fd0302-1fd0312 21->22 23 1fd033f-1fd0371 GetNativeSystemInfo 22->23 24 1fd0314-1fd031a 22->24 23->13 25 1fd0377-1fd0393 VirtualAlloc 23->25 26 1fd031c-1fd0324 24->26 27 1fd03aa-1fd03ae 25->27 28 1fd0395-1fd03a8 VirtualAlloc 25->28 29 1fd032c-1fd032d 26->29 30 1fd0326-1fd032a 26->30 31 1fd03dc-1fd03e3 27->31 32 1fd03b0-1fd03c2 27->32 28->27 33 1fd032f-1fd033d 29->33 30->33 35 1fd03fb-1fd0417 31->35 36 1fd03e5-1fd03f9 31->36 34 1fd03d4-1fd03d8 32->34 33->23 33->26 37 1fd03da 34->37 38 1fd03c4-1fd03d1 34->38 39 1fd0419-1fd041a 35->39 40 1fd0458-1fd0465 35->40 36->35 36->36 37->35 38->34 43 1fd041c-1fd0422 39->43 41 1fd046b-1fd0472 40->41 42 1fd0537-1fd0542 40->42 41->42 46 1fd0478-1fd0485 41->46 44 1fd0548-1fd0559 42->44 45 1fd06e6-1fd06ed 42->45 47 1fd0448-1fd0456 43->47 48 1fd0424-1fd0446 43->48 49 1fd0562-1fd0565 44->49 51 1fd07ac-1fd07c3 45->51 52 1fd06f3-1fd0707 45->52 46->42 50 1fd048b-1fd048f 46->50 47->40 47->43 48->47 48->48 53 1fd055b-1fd055f 49->53 54 1fd0567-1fd0574 49->54 55 1fd051b-1fd0525 50->55 58 1fd07c9-1fd07cd 51->58 59 1fd087a-1fd088d 51->59 56 1fd070d 52->56 57 1fd07a9-1fd07aa 52->57 53->49 60 1fd060d-1fd0619 54->60 61 1fd057a-1fd057d 54->61 64 1fd052b-1fd0531 55->64 65 1fd0494-1fd04a8 55->65 62 1fd0712-1fd0736 56->62 57->51 63 1fd07d0-1fd07d3 58->63 80 1fd088f-1fd089a 59->80 81 1fd08b3-1fd08ba 59->81 72 1fd061f 60->72 73 1fd06e2-1fd06e3 60->73 61->60 68 1fd0583-1fd059b 61->68 89 1fd0738-1fd073e 62->89 90 1fd0796-1fd079f 62->90 70 1fd085f-1fd086d 63->70 71 1fd07d9-1fd07e9 63->71 64->42 64->50 66 1fd04cf-1fd04d3 65->66 67 1fd04aa-1fd04cd 65->67 76 1fd04d5-1fd04e1 66->76 77 1fd04e3-1fd04e7 66->77 75 1fd0518-1fd0519 67->75 68->60 78 1fd059d-1fd059e 68->78 70->63 74 1fd0873-1fd0874 70->74 82 1fd080d-1fd080f 71->82 83 1fd07eb-1fd07ed 71->83 84 1fd0625-1fd0648 72->84 73->45 74->59 75->55 85 1fd0511-1fd0515 76->85 87 1fd04fe-1fd0502 77->87 88 1fd04e9-1fd04fc 77->88 86 1fd05a0-1fd0605 78->86 91 1fd08ab-1fd08b1 80->91 94 1fd08bc-1fd08c4 81->94 95 1fd08eb-1fd0903 81->95 96 1fd0811-1fd0820 82->96 97 1fd0822-1fd082b 82->97 92 1fd07ef-1fd07f9 83->92 93 1fd07fb-1fd080b 83->93 113 1fd064a-1fd064b 84->113 114 1fd06b2-1fd06b7 84->114 85->75 86->86 101 1fd0607 86->101 87->75 99 1fd0504-1fd050e 87->99 88->85 102 1fd0748-1fd0754 89->102 103 1fd0740-1fd0746 89->103 90->62 98 1fd07a5-1fd07a6 90->98 91->81 104 1fd089c-1fd08a8 91->104 100 1fd082e-1fd083d 92->100 93->100 94->95 106 1fd08c6-1fd08e9 RtlAddFunctionTable 94->106 95->15 96->100 97->100 98->57 99->85 107 1fd083f-1fd0845 100->107 108 1fd084b-1fd085c VirtualProtect 100->108 101->60 111 1fd0764-1fd0776 102->111 112 1fd0756-1fd0757 102->112 110 1fd077b-1fd078d 103->110 104->91 106->95 107->108 108->70 110->90 125 1fd078f-1fd0794 110->125 111->110 118 1fd0759-1fd0762 112->118 119 1fd064e-1fd0651 113->119 115 1fd06ce-1fd06d8 114->115 116 1fd06b9-1fd06bd 114->116 115->84 120 1fd06de-1fd06df 115->120 116->115 124 1fd06bf-1fd06c3 116->124 118->111 118->118 122 1fd065b-1fd0666 119->122 123 1fd0653-1fd0659 119->123 120->73 127 1fd0668-1fd0669 122->127 128 1fd0676-1fd0688 122->128 126 1fd068d-1fd06a3 123->126 124->115 129 1fd06c5 124->129 125->89 132 1fd06ac 126->132 133 1fd06a5-1fd06aa 126->133 130 1fd066b-1fd0674 127->130 128->126 129->115 130->128 130->130 132->114 133->119
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.839344126.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1fd0000_regsvr32.jbxd
                                                              Similarity
                                                              • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                              • String ID: Cach$Flus$GetN$Libr$Load$RtlA$Slee$Virt$Virt$aryA$ativ$ct$ddFu$eSys$hIns$lloc$ncti$nf$o$onTa$rote$temI$tion$truc$ualA$ualP
                                                              • API String ID: 394283112-3605381585
                                                              • Opcode ID: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction ID: c97f6c409a3d92c1dfef5f9cd4b2fbba575032abe8567430bb7932e6560136d7
                                                              • Opcode Fuzzy Hash: e9a861555d927ec3db92d1fa6852e06d9629cb263f7a81f544b384a165a1d9b2
                                                              • Instruction Fuzzy Hash: EC52F230A18B498BD719DF18D8857BAB7E2FB84304F18462DE88BC7251DF35E546CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 305 20340a0-2034136 call 2049f38 308 20341ca-2034202 GetVolumeInformationW 305->308 309 203413c-20341c4 call 203a940 305->309 309->308
                                                              APIs
                                                              • GetVolumeInformationW.KERNELBASE ref: 020341EB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.839406801.0000000002031000.00000020.00001000.00020000.00000000.sdmp, Offset: 02031000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2031000_regsvr32.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InformationVolume
                                                              • String ID: Ql$v[
                                                              • API String ID: 2039140958-138011117
                                                              • Opcode ID: 3a0f33469602c5b2414fed7c4f525ce4c0e953e4a15951e85aa6350d2a5935a1
                                                              • Instruction ID: 97f0d899d0d0ac43b34de4f63ceefcffd72c594681f2cb7d0bd0b8f6729b6828
                                                              • Opcode Fuzzy Hash: 3a0f33469602c5b2414fed7c4f525ce4c0e953e4a15951e85aa6350d2a5935a1
                                                              • Instruction Fuzzy Hash: 0F313A7051CB848BD7B8DF18D48579AB7E1FB88315F60895EE88CC7295CF789888CB42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%