Loading ...

Play interactive tourEdit tour

Windows Analysis Report executable.3496.exe

Overview

General Information

Sample Name:executable.3496.exe
Analysis ID:472876
MD5:829f581ea7ed786659c108d120b5b6a9
SHA1:4ae15eb539b2cd0e8fb24d8f3542c57a35771095
SHA256:2a3699b5ab055f7811ed19efbebd7e6774f27e5410303e7b82b80c72809f7793
Infos:

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Uses 32bit PE files
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found large amount of non-executed APIs
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • executable.3496.exe (PID: 6332 cmdline: 'C:\Users\user\Desktop\executable.3496.exe' MD5: 829F581EA7ED786659C108D120B5B6A9)
    • WerFault.exe (PID: 6392 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6332 -s 244 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: executable.3496.exeVirustotal: Detection: 58%Perma Link
Source: executable.3496.exeReversingLabs: Detection: 80%
Machine Learning detection for sampleShow sources
Source: executable.3496.exeJoe Sandbox ML: detected
Source: executable.3496.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_35012593 FindFirstFileExW,0_2_35012593
Source: executable.3496.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\executable.3496.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6332 -s 244
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_350177550_2_35017755
Source: executable.3496.exeVirustotal: Detection: 58%
Source: executable.3496.exeReversingLabs: Detection: 80%
Source: executable.3496.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\executable.3496.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\executable.3496.exe 'C:\Users\user\Desktop\executable.3496.exe'
Source: C:\Users\user\Desktop\executable.3496.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6332 -s 244
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6332
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER98C9.tmpJump to behavior
Source: classification engineClassification label: mal52.winEXE@2/4@0/0
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: executable.3496.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500E416 push ecx; ret 0_2_3500E429
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\executable.3496.exeAPI coverage: 3.0 %
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_35012593 FindFirstFileExW,0_2_35012593
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500E1CC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_3500E1CC
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500FC20 mov eax, dword ptr fs:[00000030h]0_2_3500FC20
Source: C:\Users\user\Desktop\executable.3496.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_35013F9E GetProcessHeap,0_2_35013F9E
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_35012CAC KiUserExceptionDispatcher,LdrInitializeThunk,0_2_35012CAC
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500E1CC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_3500E1CC
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500E5EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_3500E5EC
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500E31A SetUnhandledExceptionFilter,0_2_3500E31A
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_35011B2A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_35011B2A
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500E42B cpuid 0_2_3500E42B
Source: C:\Users\user\Desktop\executable.3496.exeCode function: 0_2_3500E0B5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_3500E0B5

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
executable.3496.exe59%VirustotalBrowse
executable.3496.exe81%ReversingLabsWin32.Ransomware.Ryuk
executable.3496.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:472876
Start date:27.08.2021
Start time:16:34:52
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 31s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:executable.3496.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal52.winEXE@2/4@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 100% (good quality ratio 90.8%)
  • Quality average: 76.9%
  • Quality standard deviation: 32.4%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 20.82.210.154, 23.54.113.53, 20.189.173.21
  • Excluded domains from analysis (whitelisted): www.bing.com, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, arc.msn.com, dual-a-0001.dc-msedge.net, e12564.dspb.akamaiedge.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, arc.trafficmanager.net, watson.telemetry.microsoft.com

Simulations

Behavior and APIs

TimeTypeDescription
16:35:47API Interceptor1x Sleep call for process: WerFault.exe modified

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_executable.3496._2f4d489d292467db7bb9c60377a24cefa18a9ce_c02d03de_18b9a0d7\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8434
Entropy (8bit):3.7656477668981436
Encrypted:false
SSDEEP:192:OpqrtRokIHBUZMXBgJjx/u7sAS274ItMtPY:tHkBUZMXojx/u7sAX4ItEY
MD5:A7FA68C449B035ED7FFD387E40BFD8B4
SHA1:2C2CCB292B5D5B5F2A76860EEDD96C0FE807F5B1
SHA-256:B303CE1A12BF2E1B02F59B032982EE3BA16DEA8BD3CF4D009C13D4B9F6AD7875
SHA-512:94C665CF53B780CDF4D8F38271EFBF5A046963BA4D948D69047C2E765138959A1D46DE0A2A7A4250F41F21D9BE0854F2488FE027435FAB27D99B0146F8A6C804
Malicious:false
Reputation:low
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.4.5.8.0.9.4.4.9.7.8.9.3.7.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.4.5.8.0.9.4.5.6.3.5.1.6.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.0.a.9.a.7.6.6.-.a.9.9.1.-.4.1.c.6.-.a.0.d.6.-.b.a.3.c.a.d.6.4.5.5.a.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.d.a.b.7.9.4.-.e.d.a.f.-.4.7.6.c.-.9.e.4.b.-.e.e.1.7.e.7.8.9.2.f.e.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.e.x.e.c.u.t.a.b.l.e...3.4.9.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.b.c.-.0.0.0.1.-.0.0.1.7.-.0.e.6.d.-.3.b.4.0.9.c.9.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.2.5.a.6.2.3.5.3.6.2.9.3.d.0.0.c.2.c.2.7.0.c.d.b.f.2.8.5.7.8.3.0.0.0.0.f.f.f.f.!.0.0.0.0.4.a.e.1.5.e.b.5.3.9.b.2.c.d.0.e.8.f.b.2.4.d.8.f.3.5.4.2.c.5.7.a.3.5.7.7.1.0.9.5.!.e.x.e.c.u.t.a.b.l.e...3.4.9.6...e.
C:\ProgramData\Microsoft\Windows\WER\Temp\WER98C9.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 27 23:35:45 2021, 0x1205a4 type
Category:dropped
Size (bytes):30934
Entropy (8bit):2.104562275316761
Encrypted:false
SSDEEP:192:sMzaQXSzA/i03wB4xHPh2nHpJ7HCWo1GDI3z3m:ssizAFgB4FPYvuW1I3jm
MD5:B128E8104287CEB29A6D5CFDF39F5CAC
SHA1:10D4041CAF5AA05DDBB5E8560FB6A9564EAD845C
SHA-256:6BE4D9588BE9BD564D951558F4273833B4EF882E0F80D10EE6D52A524CC01B1A
SHA-512:CA5892BB70679287BC4C0B3943C9D54020B9CFA1EC37DF27169FDEF04474F518F400B90A440DDB7BC554D40AEE943D123908A87E0E8B3FEA0EB79A32BC2DEDE4
Malicious:false
Reputation:low
Preview: MDMP....... ........v)a...................U...........B..............GenuineIntelW...........T............v)a.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99F3.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8302
Entropy (8bit):3.691949168889117
Encrypted:false
SSDEEP:192:Rrl7r3GLNi2sR6fSuJ6YSZSUVfSZywGgmfXIRSECprn89bAwsfDAm:RrlsNiF6fSuJ6YMSUVfXgmfSSkADfh
MD5:BE4C2DBD109FCCD2F1592E9AD7A90E10
SHA1:79E7F398EF3B33E8B73125DD84A44B2E65750EAA
SHA-256:D428B558A1B561A7D064A5AF87B0DF7CEB4C410E2AD75B55D9FD3226B912C6A5
SHA-512:E1C85C572960260C98BC064C36A1DF74B9F84CF53D28D98D7E72A4F92E2B5216F2B5EA6E7802D7B03CFEA6D0D554A55635985D4BDACF5DC6763ECC81CEE3DE55
Malicious:false
Reputation:low
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.3.2.<./.P.i.d.>.......
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9ABF.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4598
Entropy (8bit):4.452944670999602
Encrypted:false
SSDEEP:48:cvIwSD8zsTJgtWI96MWSC8B58fm8M4JnLEhFkm+q8aWEiFYdyd:uITftJlSN0JnAgm1WxYdyd
MD5:6DEB431831BD689040206BE6A2EB9BFA
SHA1:096372C9DD5E6BED47C9ACE20A620F4F55C63E19
SHA-256:08DCBBAF82998BF10158781C5FC96B716694947C95B1D32235655AF67E5F6AB5
SHA-512:394D6DBE9EB370E832A34F766E0DB6CFEEF0082A2886DF29DD0AAA2D25E9FFA62C428A8B1E4105F2A259D05D52BDF8C1D04D54F79DC4C5B25BF052B8A68B108C
Malicious:false
Reputation:low
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1141006" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.356513503075238
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:executable.3496.exe
File size:139776
MD5:829f581ea7ed786659c108d120b5b6a9
SHA1:4ae15eb539b2cd0e8fb24d8f3542c57a35771095
SHA256:2a3699b5ab055f7811ed19efbebd7e6774f27e5410303e7b82b80c72809f7793
SHA512:0f31f485ee4f5eea300dfe08bf320657936a662d7021b97663c365af8f25fe5d70f367266086c39f398dda63bbda42f5effc40e7022c4dfb19c8249eb7ead5f4
SSDEEP:1536:tpZd1G9590t6Kgc04DiMYdFETPHTcQUzRpl4PHOA14yLU0VeXA8W6QM88xRNiv:MKgSkEHezRpl4vOA19o26/883Ev
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........7.UgY.UgY.UgY.....\gY.....,gY.....MgY..9Z.FgY..9\.HgY..9].GgY.\...PgY.UgX.6gY..9\.WgY..9[.TgY.RichUgY.........PE..L.....k`...

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x3500de43
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x35000000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
Time Stamp:0x606BE28E [Tue Apr 6 04:24:46 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:cbfa324cd4feacb8ad7b2aeb97b2deec

Entrypoint Preview

Instruction
call 00007F9C2C800852h
jmp 00007F9C2C800473h
push ebp
mov ebp, esp
mov eax, dword ptr [ebp+08h]
push esi
mov ecx, dword ptr [eax+3Ch]
add ecx, eax
movzx eax, word ptr [ecx+14h]
lea edx, dword ptr [ecx+18h]
add edx, eax
movzx eax, word ptr [ecx+06h]
imul esi, eax, 28h
add esi, edx
cmp edx, esi
je 00007F9C2C8005FBh
mov ecx, dword ptr [ebp+0Ch]
cmp ecx, dword ptr [edx+0Ch]
jc 00007F9C2C8005ECh
mov eax, dword ptr [edx+08h]
add eax, dword ptr [edx+0Ch]
cmp ecx, eax
jc 00007F9C2C8005EEh
add edx, 28h
cmp edx, esi
jne 00007F9C2C8005CCh
xor eax, eax
pop esi
pop ebp
ret
mov eax, edx
jmp 00007F9C2C8005DBh
call 00007F9C2C800D1Eh
test eax, eax
jne 00007F9C2C8005E5h
xor al, al
ret
mov eax, dword ptr fs:[00000018h]
push esi
mov esi, 3502A420h
mov edx, dword ptr [eax+04h]
jmp 00007F9C2C8005E6h
cmp edx, eax
je 00007F9C2C8005F2h
xor eax, eax
mov ecx, edx
lock cmpxchg dword ptr [esi], ecx
test eax, eax
jne 00007F9C2C8005D2h
xor al, al
pop esi
ret
mov al, 01h
pop esi
ret
push ebp
mov ebp, esp
cmp dword ptr [ebp+08h], 00000000h
jne 00007F9C2C8005E9h
mov byte ptr [3502A43Ch], 00000001h
call 00007F9C2C800B35h
call 00007F9C2C80155Bh
test al, al
jne 00007F9C2C8005E6h
xor al, al
pop ebp
ret
call 00007F9C2C80363Eh
test al, al
jne 00007F9C2C8005ECh
push 00000000h
call 00007F9C2C80156Ch
pop ecx
jmp 00007F9C2C8005CBh
mov al, 01h
pop ebp
ret
push ebp
mov ebp, esp
sub esp, 0Ch
push esi
mov esi, dword ptr [ebp+08h]
test esi, esi

Rich Headers

Programming Language:
  • [IMP] VS2008 SP1 build 30729

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1e39c0x3c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x1dce00x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1dd180x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x190000x140.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x17dc70x17e00False0.41540207788data5.57319886808IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x190000x5a6e0x5c00False0.271144701087data3.8361973718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1f0000xbf440x4200False0.491714015152b.out overlay separate segmented standalone executable V2.3 V3.0 86 Large Data Huge Objects Enabled4.97072422041IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.gfids0x2b0000xac0x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Imports

DLLImport
KERNEL32.dllGetProcAddress, VirtualFree, GetCurrentProcess, CreateThread, GetCurrentThread, SetLastError, WaitForMultipleObjects, Sleep, SetEndOfFile, CloseHandle, WinExec, GetLocalTime, GetTickCount, LoadLibraryA, GetSystemDirectoryA, CreateFileW, DecodePointer, WriteConsoleW, SetFilePointerEx, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, TerminateProcess, RtlUnwind, GetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetModuleFileNameW, MultiByteToWideChar, WideCharToMultiByte, GetACP, HeapFree, HeapAlloc, GetStringTypeW, LCMapStringW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, RaiseException
WS2_32.dllhtons, htonl, bind, inet_addr

Network Behavior

Network Port Distribution

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Aug 27, 2021 16:35:38.169054031 CEST5128153192.168.2.38.8.8.8
Aug 27, 2021 16:35:38.204761028 CEST53512818.8.8.8192.168.2.3
Aug 27, 2021 16:35:38.212332964 CEST4919953192.168.2.38.8.8.8
Aug 27, 2021 16:35:38.247772932 CEST53491998.8.8.8192.168.2.3
Aug 27, 2021 16:35:40.967178106 CEST5062053192.168.2.38.8.8.8
Aug 27, 2021 16:35:40.998542070 CEST53506208.8.8.8192.168.2.3
Aug 27, 2021 16:35:46.327852964 CEST6493853192.168.2.38.8.8.8
Aug 27, 2021 16:35:46.347826958 CEST53649388.8.8.8192.168.2.3

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:16:35:42
Start date:27/08/2021
Path:C:\Users\user\Desktop\executable.3496.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\executable.3496.exe'
Imagebase:0x35000000
File size:139776 bytes
MD5 hash:829F581EA7ED786659C108D120B5B6A9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:16:35:44
Start date:27/08/2021
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6332 -s 244
Imagebase:0x120000
File size:434592 bytes
MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:3.4%
    Total number of Nodes:1647
    Total number of Limit Nodes:23

    Graph

    execution_graph 7077 3500de00 7080 350100b6 7077->7080 7081 350115c0 __dosmaperr 20 API calls 7080->7081 7084 350100cd 7081->7084 7082 3500e5db _ValidateLocalCookies 5 API calls 7083 3500de11 7082->7083 7084->7082 7572 35017183 7573 35017199 7572->7573 7574 3501718d 7572->7574 7574->7573 7575 35017192 CloseHandle 7574->7575 7575->7573 7085 35014a02 7086 35014a0f 7085->7086 7087 350110d0 _abort 20 API calls 7086->7087 7088 35014a29 7087->7088 7089 35011005 ___free_lconv_mon 20 API calls 7088->7089 7090 35014a35 7089->7090 7091 350110d0 _abort 20 API calls 7090->7091 7095 35014a5b 7090->7095 7092 35014a4f 7091->7092 7094 35011005 ___free_lconv_mon 20 API calls 7092->7094 7093 35012049 11 API calls 7093->7095 7094->7095 7095->7093 7096 35014a67 7095->7096 7576 35016b85 7578 35016bad 7576->7578 7577 35016be5 7578->7577 7579 35016bd7 7578->7579 7580 35016bde 7578->7580 7585 35016c57 7579->7585 7589 35016c40 7580->7589 7586 35016c60 7585->7586 7593 3501732f 7586->7593 7590 35016c60 7589->7590 7591 3501732f __startOneArgErrorHandling 21 API calls 7590->7591 7592 35016be3 7591->7592 7595 3501736e __startOneArgErrorHandling 7593->7595 7599 350173f0 __startOneArgErrorHandling 7595->7599 7603 35017732 7595->7603 7596 3501741a 7598 35017426 7596->7598 7610 35017a46 7596->7610 7600 3500e5db _ValidateLocalCookies 5 API calls 7598->7600 7599->7596 7606 3501026b 7599->7606 7602 35016bdc 7600->7602 7617 35017755 7603->7617 7607 35010293 7606->7607 7608 3500e5db _ValidateLocalCookies 5 API calls 7607->7608 7609 350102b0 7608->7609 7609->7596 7611 35017a53 7610->7611 7612 35017a68 7610->7612 7613 35017a6d 7611->7613 7615 35011856 __dosmaperr 20 API calls 7611->7615 7614 35011856 __dosmaperr 20 API calls 7612->7614 7613->7598 7614->7613 7616 35017a60 7615->7616 7616->7598 7618 35017780 __raise_exc 7617->7618 7619 35017979 RaiseException 7618->7619 7620 35017750 7619->7620 7620->7599 7097 3500fc06 7100 35010fc9 7097->7100 7101 35010fd5 _abort 7100->7101 7102 3501153c _abort 38 API calls 7101->7102 7105 35010fda 7102->7105 7103 3501108d _abort 38 API calls 7104 35011004 7103->7104 7105->7103 7106 35016406 IsProcessorFeaturePresent 7621 3501078b 7622 350107a3 7621->7622 7623 3501079d 7621->7623 7624 3501071c 20 API calls 7623->7624 7624->7622 7107 3501280c 7112 35012841 7107->7112 7110 35012828 7111 35011005 ___free_lconv_mon 20 API calls 7111->7110 7113 35012853 7112->7113 7114 3501281a 7112->7114 7115 35012883 7113->7115 7116 35012858 7113->7116 7114->7110 7114->7111 7115->7114 7123 35013f26 7115->7123 7117 350110d0 _abort 20 API calls 7116->7117 7118 35012861 7117->7118 7120 35011005 ___free_lconv_mon 20 API calls 7118->7120 7120->7114 7121 3501289e 7122 35011005 ___free_lconv_mon 20 API calls 7121->7122 7122->7114 7124 35013f31 7123->7124 7125 35013f59 7124->7125 7126 35013f4a 7124->7126 7127 35013f68 7125->7127 7132 3501511f 7125->7132 7128 35011856 __dosmaperr 20 API calls 7126->7128 7139 35015152 7127->7139 7131 35013f4f ___scrt_fastfail 7128->7131 7131->7121 7133 3501512a 7132->7133 7134 3501513f HeapSize 7132->7134 7135 35011856 __dosmaperr 20 API calls 7133->7135 7134->7127 7136 3501512f 7135->7136 7137 35011cf4 _abort 26 API calls 7136->7137 7138 3501513a 7137->7138 7138->7127 7140 3501516a 7139->7140 7141 3501515f 7139->7141 7143 35015172 7140->7143 7149 3501517b _abort 7140->7149 7142 3501103f __onexit 21 API calls 7141->7142 7147 35015167 7142->7147 7144 35011005 ___free_lconv_mon 20 API calls 7143->7144 7144->7147 7145 35015180 7148 35011856 __dosmaperr 20 API calls 7145->7148 7146 350151a5 HeapReAlloc 7146->7147 7146->7149 7147->7131 7148->7147 7149->7145 7149->7146 7150 3501409d _abort 7 API calls 7149->7150 7150->7149 7625 3501008c 7626 350100a5 7625->7626 7629 3500fe21 7626->7629 7647 35010071 7629->7647 7631 3500fe6e 7632 3500f607 __fassign 38 API calls 7631->7632 7639 3500fe7a 7632->7639 7633 3500fe33 7633->7631 7634 3500fe48 7633->7634 7646 3500fe58 7633->7646 7635 35011856 __dosmaperr 20 API calls 7634->7635 7636 3500fe4d 7635->7636 7638 35011cf4 _abort 26 API calls 7636->7638 7637 3500f806 42 API calls 7637->7639 7638->7646 7639->7637 7640 3500fea9 7639->7640 7643 3500ff15 7640->7643 7654 35010049 7640->7654 7641 35010049 26 API calls 7644 3500ffdc 7641->7644 7643->7641 7645 35011856 __dosmaperr 20 API calls 7644->7645 7644->7646 7645->7646 7648 35010076 7647->7648 7649 35010089 7647->7649 7650 35011856 __dosmaperr 20 API calls 7648->7650 7649->7633 7651 3501007b 7650->7651 7652 35011cf4 _abort 26 API calls 7651->7652 7653 35010086 7652->7653 7653->7633 7655 3501006d 7654->7655 7656 35010059 7654->7656 7655->7643 7656->7655 7657 35011856 __dosmaperr 20 API calls 7656->7657 7658 35010062 7657->7658 7659 35011cf4 _abort 26 API calls 7658->7659 7659->7655 7151 35015110 7154 35012dad 7151->7154 7155 35012db6 7154->7155 7157 35012dbf 7154->7157 7156 35012cac 51 API calls 7155->7156 7156->7157 7158 3500de14 7159 3500fc61 _abort GetModuleHandleW 7158->7159 7160 3500de1c 7159->7160 7161 3500de28 7160->7161 7162 3500fd3c _abort 28 API calls 7160->7162 7164 3500de33 ___scrt_is_nonwritable_in_current_image 7161->7164 7165 3500fd1e 7161->7165 7162->7161 7166 3500fb07 _abort 28 API calls 7165->7166 7167 3500fd29 7166->7167 7167->7164 7168 3500fa18 7169 3500fa30 7168->7169 7170 3500fa26 7168->7170 7172 3500f9fe 7170->7172 7175 3500f897 7172->7175 7176 3500f607 __fassign 38 API calls 7175->7176 7177 3500f8ab 7176->7177 7178 3500f901 7177->7178 7179 3500f8b6 7177->7179 7180 3500f928 7178->7180 7190 35011869 7178->7190 7187 3500f9e1 7179->7187 7183 35011856 __dosmaperr 20 API calls 7180->7183 7184 3500f92e 7180->7184 7183->7184 7185 35011abf 43 API calls 7184->7185 7186 3500f8c0 7185->7186 7186->7169 7193 3500f806 7187->7193 7191 3500f607 __fassign 38 API calls 7190->7191 7192 3501187c 7191->7192 7192->7180 7194 3500f812 7193->7194 7195 3500f828 7193->7195 7194->7195 7196 3500f81a 7194->7196 7209 3500f766 7195->7209 7200 3501170b 7196->7200 7199 3500f826 7199->7186 7201 3500f607 __fassign 38 API calls 7200->7201 7202 3501172c 7201->7202 7203 35011869 __fassign 38 API calls 7202->7203 7208 35011736 7202->7208 7204 35011756 7203->7204 7207 35013a78 42 API calls 7204->7207 7205 3500e5db _ValidateLocalCookies 5 API calls 7206 350117d9 7205->7206 7206->7199 7207->7208 7208->7205 7210 3500f77f 7209->7210 7211 3500f772 7209->7211 7213 350116e5 7210->7213 7211->7199 7214 3501153c _abort 38 API calls 7213->7214 7215 350116f0 7214->7215 7216 3501168b __fassign 38 API calls 7215->7216 7217 35011700 7216->7217 7217->7211 7218 3500c41d 7219 3500ca75 7218->7219 7221 3500c42a ___scrt_fastfail 7218->7221 7221->7218 7222 3500c6e9 ___scrt_fastfail 7221->7222 7223 3500fda0 7221->7223 7222->7222 7224 3501153c _abort 38 API calls 7223->7224 7225 3500fda5 7224->7225 7225->7221 7226 3500dc1d 7227 3500dc25 pre_c_initialization 7226->7227 7244 35010915 7227->7244 7229 3500dc30 pre_c_initialization 7251 3500deff 7229->7251 7231 3500dcb9 7232 3500e1cc ___scrt_fastfail 4 API calls 7231->7232 7234 3500dcc0 ___scrt_initialize_default_local_stdio_options 7232->7234 7233 3500dc45 __RTC_Initialize 7233->7231 7256 3500e0a0 7233->7256 7236 3500dc5e pre_c_initialization 7236->7231 7237 3500dc6f 7236->7237 7259 3500e15e InitializeSListHead 7237->7259 7239 3500dc74 pre_c_initialization __except_handler4 7260 3500e16a 7239->7260 7241 3500dc97 pre_c_initialization 7266 350109af 7241->7266 7243 3500dca2 pre_c_initialization 7245 35010924 7244->7245 7246 35010947 7244->7246 7245->7246 7247 35011856 __dosmaperr 20 API calls 7245->7247 7246->7229 7248 35010937 7247->7248 7249 35011cf4 _abort 26 API calls 7248->7249 7250 35010942 7249->7250 7250->7229 7252 3500df0d 7251->7252 7255 3500df12 ___scrt_initialize_onexit_tables ___scrt_release_startup_lock 7251->7255 7253 3500e1cc ___scrt_fastfail 4 API calls 7252->7253 7252->7255 7254 3500df95 7253->7254 7255->7233 7273 3500e065 7256->7273 7259->7239 7311 35010f6a 7260->7311 7262 3500e17b 7263 3500e182 7262->7263 7264 3500e1cc ___scrt_fastfail 4 API calls 7262->7264 7263->7241 7265 3500e18a 7264->7265 7267 3501153c _abort 38 API calls 7266->7267 7268 350109ba 7267->7268 7269 350109f2 7268->7269 7270 35011856 __dosmaperr 20 API calls 7268->7270 7269->7243 7271 350109e7 7270->7271 7272 35011cf4 _abort 26 API calls 7271->7272 7272->7269 7274 3500e082 7273->7274 7275 3500e089 7273->7275 7279 35010dbe 7274->7279 7282 35010e2e 7275->7282 7278 3500e087 7278->7236 7280 35010e2e __onexit 29 API calls 7279->7280 7281 35010dd0 7280->7281 7281->7278 7285 35010b16 7282->7285 7288 35010a4c 7285->7288 7287 35010b3a 7287->7278 7289 35010a58 ___scrt_is_nonwritable_in_current_image 7288->7289 7296 35011d78 EnterCriticalSection 7289->7296 7291 35010a66 7297 35010c7d 7291->7297 7293 35010a73 7307 35010a91 7293->7307 7295 35010a84 ___scrt_is_nonwritable_in_current_image 7295->7287 7296->7291 7298 35010c9b 7297->7298 7305 35010c93 pre_c_initialization __crt_fast_encode_pointer 7297->7305 7299 35010cf4 7298->7299 7300 35013f26 __onexit 29 API calls 7298->7300 7298->7305 7301 35013f26 __onexit 29 API calls 7299->7301 7299->7305 7302 35010cea 7300->7302 7303 35010d0a 7301->7303 7304 35011005 ___free_lconv_mon 20 API calls 7302->7304 7306 35011005 ___free_lconv_mon 20 API calls 7303->7306 7304->7299 7305->7293 7306->7305 7310 35011dc0 LeaveCriticalSection 7307->7310 7309 35010a9b 7309->7295 7310->7309 7312 35010f88 pre_c_initialization 7311->7312 7314 35010fa8 pre_c_initialization 7311->7314 7313 35011856 __dosmaperr 20 API calls 7312->7313 7315 35010f9e 7313->7315 7314->7262 7316 35011cf4 _abort 26 API calls 7315->7316 7316->7314 7660 35013f9e GetProcessHeap 7661 35015fa1 7662 35015fc1 7661->7662 7665 35015ff8 7662->7665 7664 35015feb 7666 35015fff 7665->7666 7667 35016060 7666->7667 7671 3501601f 7666->7671 7668 35016c57 21 API calls 7667->7668 7669 35016b4e 7667->7669 7670 350160ae 7668->7670 7669->7664 7670->7664 7671->7669 7672 35016c57 21 API calls 7671->7672 7673 35016b7e 7672->7673 7673->7664 7317 35016420 7320 3501643e 7317->7320 7319 35016436 7324 35016443 7320->7324 7322 350164d8 7322->7319 7324->7322 7325 35016c93 7324->7325 7326 35016cc0 7325->7326 7327 35016cb0 DecodePointer 7325->7327 7330 35016d4d 7326->7330 7331 35016d42 7326->7331 7333 35016cf7 7326->7333 7327->7326 7328 3500e5db _ValidateLocalCookies 5 API calls 7329 3501666f 7328->7329 7329->7319 7330->7331 7332 35011856 __dosmaperr 20 API calls 7330->7332 7331->7328 7332->7331 7333->7331 7334 35011856 __dosmaperr 20 API calls 7333->7334 7334->7331 7335 35011427 7336 35011432 7335->7336 7337 35011442 7335->7337 7341 35011448 7336->7341 7340 35011005 ___free_lconv_mon 20 API calls 7340->7337 7342 3501145b 7341->7342 7345 35011461 7341->7345 7343 35011005 ___free_lconv_mon 20 API calls 7342->7343 7343->7345 7344 35011005 ___free_lconv_mon 20 API calls 7346 3501146d 7344->7346 7345->7344 7347 35011005 ___free_lconv_mon 20 API calls 7346->7347 7348 35011478 7347->7348 7349 35011005 ___free_lconv_mon 20 API calls 7348->7349 7350 35011483 7349->7350 7351 35011005 ___free_lconv_mon 20 API calls 7350->7351 7352 3501148e 7351->7352 7353 35011005 ___free_lconv_mon 20 API calls 7352->7353 7354 35011499 7353->7354 7355 35011005 ___free_lconv_mon 20 API calls 7354->7355 7356 350114a4 7355->7356 7357 35011005 ___free_lconv_mon 20 API calls 7356->7357 7358 350114af 7357->7358 7359 35011005 ___free_lconv_mon 20 API calls 7358->7359 7360 350114ba 7359->7360 7361 35011005 ___free_lconv_mon 20 API calls 7360->7361 7362 350114c8 7361->7362 7367 3501130e 7362->7367 7373 3501121a 7367->7373 7369 35011332 7370 3501135e 7369->7370 7386 3501127b 7370->7386 7372 35011382 7372->7340 7374 35011226 ___scrt_is_nonwritable_in_current_image 7373->7374 7381 35011d78 EnterCriticalSection 7374->7381 7376 3501125a 7382 3501126f 7376->7382 7378 35011230 7378->7376 7380 35011005 ___free_lconv_mon 20 API calls 7378->7380 7379 35011267 ___scrt_is_nonwritable_in_current_image 7379->7369 7380->7376 7381->7378 7385 35011dc0 LeaveCriticalSection 7382->7385 7384 35011279 7384->7379 7385->7384 7387 35011287 ___scrt_is_nonwritable_in_current_image 7386->7387 7394 35011d78 EnterCriticalSection 7387->7394 7389 35011291 7395 350114f1 7389->7395 7391 350112a4 7399 350112ba 7391->7399 7393 350112b2 ___scrt_is_nonwritable_in_current_image 7393->7372 7394->7389 7396 35011500 __fassign 7395->7396 7397 35011527 __fassign 7395->7397 7396->7397 7398 35013c12 __fassign 20 API calls 7396->7398 7397->7391 7398->7397 7402 35011dc0 LeaveCriticalSection 7399->7402 7401 350112c4 7401->7393 7402->7401 7403 3500e326 7404 3500e35b 7403->7404 7406 3500e336 7403->7406 7405 35010fc9 38 API calls 7407 3500e366 7405->7407 7406->7404 7406->7405 7678 35016eab 7679 35016ec4 __startOneArgErrorHandling 7678->7679 7681 35016eed __startOneArgErrorHandling 7679->7681 7682 35017484 7679->7682 7683 350174bd __startOneArgErrorHandling 7682->7683 7684 350174e4 __startOneArgErrorHandling 7683->7684 7685 35017755 __raise_exc RaiseException 7683->7685 7686 35017527 7684->7686 7687 35017502 7684->7687 7685->7684 7688 35017a46 __startOneArgErrorHandling 20 API calls 7686->7688 7693 35017a75 7687->7693 7690 35017522 __startOneArgErrorHandling 7688->7690 7691 3500e5db _ValidateLocalCookies 5 API calls 7690->7691 7692 3501754b 7691->7692 7692->7681 7694 35017a84 7693->7694 7695 35017aa3 __startOneArgErrorHandling 7694->7695 7696 35017af8 __startOneArgErrorHandling 7694->7696 7698 3501026b __startOneArgErrorHandling 5 API calls 7695->7698 7697 35017a46 __startOneArgErrorHandling 20 API calls 7696->7697 7701 35017af1 7697->7701 7699 35017ae4 7698->7699 7700 35017a46 __startOneArgErrorHandling 20 API calls 7699->7700 7699->7701 7700->7701 7701->7690 6751 35012dae 6752 35012dbf 6751->6752 6754 35012cac 6751->6754 6755 3501153c _abort 38 API calls 6754->6755 6756 35012cb9 6755->6756 6776 35012dcb 6756->6776 6758 35012cc1 6785 35012a40 6758->6785 6761 35012cd8 6761->6752 6762 35012cdc 6792 3501103f 6762->6792 6765 35012d1b 6768 35011005 ___free_lconv_mon 20 API calls 6765->6768 6770 35012d29 6768->6770 6769 35012d16 6771 35011856 __dosmaperr 20 API calls 6769->6771 6770->6761 6771->6765 6772 35012d5f 6772->6765 6809 35012916 6772->6809 6773 35012d33 6773->6772 6774 35011005 ___free_lconv_mon 20 API calls 6773->6774 6774->6772 6777 35012dd7 ___scrt_is_nonwritable_in_current_image 6776->6777 6778 3501153c _abort 38 API calls 6777->6778 6780 35012de1 6778->6780 6781 35012e65 ___scrt_is_nonwritable_in_current_image 6780->6781 6783 3501108d _abort 38 API calls 6780->6783 6784 35011005 ___free_lconv_mon 20 API calls 6780->6784 6812 35011d78 EnterCriticalSection 6780->6812 6813 35012e5c 6780->6813 6781->6758 6783->6780 6784->6780 6817 3500f607 6785->6817 6788 35012a61 GetOEMCP 6790 35012a8a 6788->6790 6789 35012a73 6789->6790 6791 35012a78 GetACP 6789->6791 6790->6761 6790->6762 6791->6790 6793 3501107d 6792->6793 6797 3501104d _abort 6792->6797 6794 35011856 __dosmaperr 20 API calls 6793->6794 6796 3501107b 6794->6796 6795 35011068 HeapAlloc 6795->6796 6795->6797 6796->6765 6799 35012e6d 6796->6799 6797->6793 6797->6795 6798 3501409d _abort 7 API calls 6797->6798 6798->6797 6800 35012a40 40 API calls 6799->6800 6803 35012e8c 6800->6803 6801 35012e93 6804 3500e5db _ValidateLocalCookies 5 API calls 6801->6804 6802 35012f02 ___scrt_fastfail 6968 35012b18 GetCPInfo 6802->6968 6803->6801 6803->6802 6806 35012edd IsValidCodePage 6803->6806 6805 35012d0e 6804->6805 6805->6769 6805->6773 6806->6801 6807 35012eef GetCPInfo 6806->6807 6807->6801 6807->6802 7041 350128d3 6809->7041 6811 3501293a 6811->6765 6812->6780 6816 35011dc0 LeaveCriticalSection 6813->6816 6815 35012e63 6815->6780 6816->6815 6818 3500f624 6817->6818 6824 3500f61a 6817->6824 6819 3501153c _abort 38 API calls 6818->6819 6818->6824 6820 3500f645 6819->6820 6825 3501168b 6820->6825 6824->6788 6824->6789 6826 3500f65e 6825->6826 6827 3501169e 6825->6827 6829 350116b8 6826->6829 6827->6826 6833 35013e5f 6827->6833 6830 350116e0 6829->6830 6831 350116cb 6829->6831 6830->6824 6831->6830 6832 35012dcb __fassign 38 API calls 6831->6832 6832->6830 6834 35013e6b ___scrt_is_nonwritable_in_current_image 6833->6834 6835 3501153c _abort 38 API calls 6834->6835 6836 35013e74 6835->6836 6837 35013ec2 ___scrt_is_nonwritable_in_current_image 6836->6837 6845 35011d78 EnterCriticalSection 6836->6845 6837->6826 6839 35013e92 6846 35013ed6 6839->6846 6844 3501108d _abort 38 API calls 6844->6837 6845->6839 6847 35013ee4 __fassign 6846->6847 6849 35013ea6 6846->6849 6847->6849 6853 35013c12 6847->6853 6850 35013ec5 6849->6850 6967 35011dc0 LeaveCriticalSection 6850->6967 6852 35013eb9 6852->6837 6852->6844 6855 35013c92 6853->6855 6856 35013c28 6853->6856 6857 35011005 ___free_lconv_mon 20 API calls 6855->6857 6880 35013ce0 6855->6880 6856->6855 6861 35011005 ___free_lconv_mon 20 API calls 6856->6861 6863 35013c5b 6856->6863 6858 35013cb4 6857->6858 6859 35011005 ___free_lconv_mon 20 API calls 6858->6859 6864 35013cc7 6859->6864 6860 35011005 ___free_lconv_mon 20 API calls 6865 35013c87 6860->6865 6867 35013c50 6861->6867 6862 35013cee 6866 35013d4e 6862->6866 6875 35011005 20 API calls ___free_lconv_mon 6862->6875 6868 35011005 ___free_lconv_mon 20 API calls 6863->6868 6879 35013c7d 6863->6879 6869 35011005 ___free_lconv_mon 20 API calls 6864->6869 6872 35011005 ___free_lconv_mon 20 API calls 6865->6872 6873 35011005 ___free_lconv_mon 20 API calls 6866->6873 6881 350135f5 6867->6881 6870 35013c72 6868->6870 6871 35013cd5 6869->6871 6909 350136f3 6870->6909 6877 35011005 ___free_lconv_mon 20 API calls 6871->6877 6872->6855 6878 35013d54 6873->6878 6875->6862 6877->6880 6878->6849 6879->6860 6921 35013d85 6880->6921 6882 35013606 6881->6882 6908 350136ef 6881->6908 6883 35013617 6882->6883 6885 35011005 ___free_lconv_mon 20 API calls 6882->6885 6884 35013629 6883->6884 6886 35011005 ___free_lconv_mon 20 API calls 6883->6886 6887 3501363b 6884->6887 6888 35011005 ___free_lconv_mon 20 API calls 6884->6888 6885->6883 6886->6884 6889 3501364d 6887->6889 6890 35011005 ___free_lconv_mon 20 API calls 6887->6890 6888->6887 6891 3501365f 6889->6891 6892 35011005 ___free_lconv_mon 20 API calls 6889->6892 6890->6889 6893 35011005 ___free_lconv_mon 20 API calls 6891->6893 6894 35013671 6891->6894 6892->6891 6893->6894 6895 35011005 ___free_lconv_mon 20 API calls 6894->6895 6897 35013683 6894->6897 6895->6897 6896 35013695 6899 350136a7 6896->6899 6901 35011005 ___free_lconv_mon 20 API calls 6896->6901 6897->6896 6898 35011005 ___free_lconv_mon 20 API calls 6897->6898 6898->6896 6900 350136b9 6899->6900 6902 35011005 ___free_lconv_mon 20 API calls 6899->6902 6903 350136cb 6900->6903 6904 35011005 ___free_lconv_mon 20 API calls 6900->6904 6901->6899 6902->6900 6905 350136dd 6903->6905 6906 35011005 ___free_lconv_mon 20 API calls 6903->6906 6904->6903 6907 35011005 ___free_lconv_mon 20 API calls 6905->6907 6905->6908 6906->6905 6907->6908 6908->6863 6910 35013700 6909->6910 6911 35013758 6909->6911 6912 35013710 6910->6912 6913 35011005 ___free_lconv_mon 20 API calls 6910->6913 6911->6879 6914 35013722 6912->6914 6915 35011005 ___free_lconv_mon 20 API calls 6912->6915 6913->6912 6916 35013734 6914->6916 6917 35011005 ___free_lconv_mon 20 API calls 6914->6917 6915->6914 6918 35013746 6916->6918 6919 35011005 ___free_lconv_mon 20 API calls 6916->6919 6917->6916 6918->6911 6920 35011005 ___free_lconv_mon 20 API calls 6918->6920 6919->6918 6920->6911 6922 35013db0 6921->6922 6923 35013d92 6921->6923 6922->6862 6923->6922 6927 35013798 6923->6927 6926 35011005 ___free_lconv_mon 20 API calls 6926->6922 6928 35013876 6927->6928 6929 350137a9 6927->6929 6928->6926 6963 3501375c 6929->6963 6932 3501375c __fassign 20 API calls 6933 350137bc 6932->6933 6934 3501375c __fassign 20 API calls 6933->6934 6935 350137c7 6934->6935 6936 3501375c __fassign 20 API calls 6935->6936 6937 350137d2 6936->6937 6938 3501375c __fassign 20 API calls 6937->6938 6939 350137e0 6938->6939 6940 35011005 ___free_lconv_mon 20 API calls 6939->6940 6941 350137eb 6940->6941 6942 35011005 ___free_lconv_mon 20 API calls 6941->6942 6943 350137f6 6942->6943 6944 35011005 ___free_lconv_mon 20 API calls 6943->6944 6945 35013801 6944->6945 6946 3501375c __fassign 20 API calls 6945->6946 6947 3501380f 6946->6947 6948 3501375c __fassign 20 API calls 6947->6948 6949 3501381d 6948->6949 6950 3501375c __fassign 20 API calls 6949->6950 6951 3501382e 6950->6951 6952 3501375c __fassign 20 API calls 6951->6952 6953 3501383c 6952->6953 6954 3501375c __fassign 20 API calls 6953->6954 6955 3501384a 6954->6955 6956 35011005 ___free_lconv_mon 20 API calls 6955->6956 6957 35013855 6956->6957 6958 35011005 ___free_lconv_mon 20 API calls 6957->6958 6959 35013860 6958->6959 6960 35011005 ___free_lconv_mon 20 API calls 6959->6960 6961 3501386b 6960->6961 6962 35011005 ___free_lconv_mon 20 API calls 6961->6962 6962->6928 6964 35013793 6963->6964 6965 35013783 6963->6965 6964->6932 6965->6964 6966 35011005 ___free_lconv_mon 20 API calls 6965->6966 6966->6965 6967->6852 6969 35012bfc 6968->6969 6970 35012b52 6968->6970 6973 3500e5db _ValidateLocalCookies 5 API calls 6969->6973 6978 35013a78 6970->6978 6975 35012ca8 6973->6975 6975->6801 6977 35011abf 43 API calls 6977->6969 6979 3500f607 __fassign 38 API calls 6978->6979 6980 35013a98 MultiByteToWideChar 6979->6980 6982 35013ad6 6980->6982 6990 35013b6e 6980->6990 6983 35013af7 ___scrt_fastfail 6982->6983 6987 3501103f __onexit 21 API calls 6982->6987 6986 35013b68 6983->6986 6989 35013b3c MultiByteToWideChar 6983->6989 6984 3500e5db _ValidateLocalCookies 5 API calls 6985 35012bb3 6984->6985 6992 35011abf 6985->6992 6997 35011b0a 6986->6997 6987->6983 6989->6986 6991 35013b58 GetStringTypeW 6989->6991 6990->6984 6991->6986 6993 3500f607 __fassign 38 API calls 6992->6993 6994 35011ad2 6993->6994 7001 350118a2 6994->7001 6998 35011b16 6997->6998 6999 35011b27 6997->6999 6998->6999 7000 35011005 ___free_lconv_mon 20 API calls 6998->7000 6999->6990 7000->6999 7003 350118bd 7001->7003 7002 350118e3 MultiByteToWideChar 7004 35011a97 7002->7004 7005 3501190d 7002->7005 7003->7002 7006 3500e5db _ValidateLocalCookies 5 API calls 7004->7006 7008 3501103f __onexit 21 API calls 7005->7008 7011 3501192e 7005->7011 7007 35011aaa 7006->7007 7007->6977 7008->7011 7009 35011977 MultiByteToWideChar 7010 350119e3 7009->7010 7012 35011990 7009->7012 7014 35011b0a __freea 20 API calls 7010->7014 7011->7009 7011->7010 7028 350120ab 7012->7028 7014->7004 7016 350119f2 7020 3501103f __onexit 21 API calls 7016->7020 7023 35011a13 7016->7023 7017 350119ba 7017->7010 7019 350120ab 11 API calls 7017->7019 7018 35011a88 7022 35011b0a __freea 20 API calls 7018->7022 7019->7010 7020->7023 7021 350120ab 11 API calls 7024 35011a67 7021->7024 7022->7010 7023->7018 7023->7021 7024->7018 7025 35011a76 WideCharToMultiByte 7024->7025 7025->7018 7026 35011ab6 7025->7026 7027 35011b0a __freea 20 API calls 7026->7027 7027->7010 7029 35011dd7 _abort 5 API calls 7028->7029 7030 350120d2 7029->7030 7033 350120db 7030->7033 7036 35012133 7030->7036 7034 3500e5db _ValidateLocalCookies 5 API calls 7033->7034 7035 350119a7 7034->7035 7035->7010 7035->7016 7035->7017 7037 35011dd7 _abort 5 API calls 7036->7037 7038 3501215a 7037->7038 7039 3500e5db _ValidateLocalCookies 5 API calls 7038->7039 7040 3501211b LCMapStringW 7039->7040 7040->7033 7042 350128df ___scrt_is_nonwritable_in_current_image 7041->7042 7049 35011d78 EnterCriticalSection 7042->7049 7044 350128e9 7050 3501293e 7044->7050 7048 35012902 ___scrt_is_nonwritable_in_current_image 7048->6811 7049->7044 7062 3501305e 7050->7062 7052 3501298c 7053 3501305e 26 API calls 7052->7053 7054 350129a8 7053->7054 7055 3501305e 26 API calls 7054->7055 7056 350129c6 7055->7056 7057 350128f6 7056->7057 7058 35011005 ___free_lconv_mon 20 API calls 7056->7058 7059 3501290a 7057->7059 7058->7057 7076 35011dc0 LeaveCriticalSection 7059->7076 7061 35012914 7061->7048 7063 3501306f 7062->7063 7067 3501306b 7062->7067 7064 35013076 7063->7064 7069 35013089 ___scrt_fastfail 7063->7069 7065 35011856 __dosmaperr 20 API calls 7064->7065 7066 3501307b 7065->7066 7068 35011cf4 _abort 26 API calls 7066->7068 7067->7052 7068->7067 7069->7067 7070 350130b7 7069->7070 7072 350130c0 7069->7072 7071 35011856 __dosmaperr 20 API calls 7070->7071 7073 350130bc 7071->7073 7072->7067 7074 35011856 __dosmaperr 20 API calls 7072->7074 7075 35011cf4 _abort 26 API calls 7073->7075 7074->7073 7075->7067 7076->7061 7408 3500f12f 7409 3500f146 7408->7409 7410 3500f139 7408->7410 7410->7409 7411 35011005 ___free_lconv_mon 20 API calls 7410->7411 7411->7409 7702 350160b1 7703 350160d5 7702->7703 7704 350160ee 7703->7704 7706 35016eab __startOneArgErrorHandling 7703->7706 7705 35016c93 21 API calls 7704->7705 7707 35016138 7704->7707 7705->7707 7708 35017484 21 API calls 7706->7708 7709 35016eed __startOneArgErrorHandling 7706->7709 7708->7709 7412 35014d30 7413 35014d69 7412->7413 7414 35014d6d 7413->7414 7425 35014d95 7413->7425 7415 35011856 __dosmaperr 20 API calls 7414->7415 7416 35014d72 7415->7416 7418 35011cf4 _abort 26 API calls 7416->7418 7417 350150b9 7419 3500e5db _ValidateLocalCookies 5 API calls 7417->7419 7420 35014d7d 7418->7420 7421 350150c6 7419->7421 7422 3500e5db _ValidateLocalCookies 5 API calls 7420->7422 7424 35014d89 7422->7424 7425->7417 7426 35014c50 7425->7426 7427 35014c6b 7426->7427 7428 3500e5db _ValidateLocalCookies 5 API calls 7427->7428 7429 35014ce2 7428->7429 7429->7425 7710 35013fb0 7711 35013fd6 7710->7711 7714 35013fd2 7710->7714 7711->7714 7715 35013573 31 API calls 7711->7715 7712 3500e5db _ValidateLocalCookies 5 API calls 7713 35014038 7712->7713 7714->7712 7715->7711 7430 35011d37 7431 35011d42 7430->7431 7432 35012049 11 API calls 7431->7432 7433 35011d6b 7431->7433 7434 35011d67 7431->7434 7432->7431 7436 35011d8f 7433->7436 7437 35011dbb 7436->7437 7438 35011d9c 7436->7438 7437->7434 7439 35011da6 DeleteCriticalSection 7438->7439 7439->7437 7439->7439 7440 3500f839 7441 3500f855 7440->7441 7442 3500f847 7440->7442 7445 3500f790 7442->7445 7446 3500f607 __fassign 38 API calls 7445->7446 7447 3500f7a3 7446->7447 7448 3500f806 42 API calls 7447->7448 7449 3500f7b4 7448->7449 7450 3501223c 7451 35012247 7450->7451 7452 3501226d 7450->7452 7451->7452 7453 35012257 FreeLibrary 7451->7453 7453->7451 7716 35010ec3 7717 3500ee7f ___vcrt_uninitialize 8 API calls 7716->7717 7718 35010eca 7717->7718 7454 3500de43 7457 3500e0b5 7454->7457 7456 3500de48 7456->7456 7458 3500e0e5 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7457->7458 7459 3500e0d8 7457->7459 7460 3500e0dc 7458->7460 7459->7458 7459->7460 7460->7456 7461 35011645 7469 35011eee 7461->7469 7464 350115c0 __dosmaperr 20 API calls 7465 35011661 7464->7465 7466 3501166e 7465->7466 7476 35011671 7465->7476 7468 35011659 7470 35011dd7 _abort 5 API calls 7469->7470 7471 35011f15 7470->7471 7472 35011f2d TlsAlloc 7471->7472 7475 35011f1e 7471->7475 7472->7475 7473 3500e5db _ValidateLocalCookies 5 API calls 7474 3501164f 7473->7474 7474->7464 7474->7468 7475->7473 7477 35011681 7476->7477 7478 3501167b 7476->7478 7477->7468 7480 35011f44 7478->7480 7481 35011dd7 _abort 5 API calls 7480->7481 7482 35011f6b 7481->7482 7483 35011f83 TlsFree 7482->7483 7484 35011f77 7482->7484 7483->7484 7485 3500e5db _ValidateLocalCookies 5 API calls 7484->7485 7486 35011f94 7485->7486 7486->7477 7719 350123c6 7720 350123e6 7719->7720 7731 350123fc 7719->7731 7721 35011856 __dosmaperr 20 API calls 7720->7721 7722 350123eb 7721->7722 7723 35011cf4 _abort 26 API calls 7722->7723 7725 350123f5 7723->7725 7728 3500e5db _ValidateLocalCookies 5 API calls 7725->7728 7727 350124e8 7729 35011005 ___free_lconv_mon 20 API calls 7727->7729 7730 35012582 7728->7730 7732 3501256a 7729->7732 7731->7732 7733 35012471 7731->7733 7739 35012593 7731->7739 7754 350127e7 7732->7754 7748 3501056e 7733->7748 7735 350124df 7735->7727 7736 35012586 7735->7736 7737 35011d04 _abort 11 API calls 7736->7737 7738 35012592 7737->7738 7740 350125a3 7739->7740 7740->7740 7741 350110d0 _abort 20 API calls 7740->7741 7742 350125d5 7741->7742 7743 35011d04 _abort 11 API calls 7742->7743 7744 35012630 ___scrt_fastfail 7743->7744 7745 350126f2 FindFirstFileExW 7744->7745 7746 35012741 7745->7746 7747 35012593 26 API calls 7746->7747 7749 35010583 7748->7749 7750 3501057f 7748->7750 7749->7750 7751 350110d0 _abort 20 API calls 7749->7751 7750->7735 7752 350105b1 7751->7752 7753 35011005 ___free_lconv_mon 20 API calls 7752->7753 7753->7750 7758 350127f1 7754->7758 7755 35012801 7757 35011005 ___free_lconv_mon 20 API calls 7755->7757 7756 35011005 ___free_lconv_mon 20 API calls 7756->7758 7759 35012808 7757->7759 7758->7755 7758->7756 7759->7725 7760 350135c9 7761 350135ce 7760->7761 7763 350135f1 7761->7763 7764 350131f9 7761->7764 7765 35013206 7764->7765 7766 35013228 7764->7766 7767 35013222 7765->7767 7768 35013214 DeleteCriticalSection 7765->7768 7766->7761 7769 35011005 ___free_lconv_mon 20 API calls 7767->7769 7768->7767 7768->7768 7769->7766 7770 350102c9 7771 350102f4 GetModuleFileNameW 7770->7771 7772 350102d8 7770->7772 7777 3501031a 7771->7777 7772->7771 7773 350102de 7772->7773 7774 35011856 __dosmaperr 20 API calls 7773->7774 7775 350102e3 7774->7775 7776 35011cf4 _abort 26 API calls 7775->7776 7778 350102ed 7776->7778 7779 3501056e 20 API calls 7777->7779 7780 35010344 7779->7780 7781 3501034d 7780->7781 7784 35010359 7780->7784 7782 35011856 __dosmaperr 20 API calls 7781->7782 7786 35010352 7782->7786 7783 35011005 ___free_lconv_mon 20 API calls 7783->7778 7784->7784 7785 35011005 ___free_lconv_mon 20 API calls 7784->7785 7784->7786 7785->7786 7786->7783 7787 3500dcc9 7792 3500e31a SetUnhandledExceptionFilter 7787->7792 7789 3500dcce pre_c_initialization 7793 35010a17 7789->7793 7791 3500dcd9 7792->7789 7794 35010a3d 7793->7794 7795 35010a23 7793->7795 7794->7791 7795->7794 7796 35011856 __dosmaperr 20 API calls 7795->7796 7797 35010a2d 7796->7797 7798 35011cf4 _abort 26 API calls 7797->7798 7799 35010a38 7798->7799 7799->7791 7800 35014aca 7810 350152be 7800->7810 7804 35014ad7 7823 35015561 7804->7823 7807 35014b01 7808 35011005 ___free_lconv_mon 20 API calls 7807->7808 7809 35014b0c 7808->7809 7827 350152c7 7810->7827 7812 35014ad2 7813 350154c1 7812->7813 7814 350154cd ___scrt_is_nonwritable_in_current_image 7813->7814 7847 35011d78 EnterCriticalSection 7814->7847 7816 35015543 7861 35015558 7816->7861 7818 350154d8 7818->7816 7820 35015517 DeleteCriticalSection 7818->7820 7848 350162dc 7818->7848 7819 3501554f ___scrt_is_nonwritable_in_current_image 7819->7804 7821 35011005 ___free_lconv_mon 20 API calls 7820->7821 7821->7818 7824 35015577 7823->7824 7825 35014ae6 DeleteCriticalSection 7823->7825 7824->7825 7826 35011005 ___free_lconv_mon 20 API calls 7824->7826 7825->7804 7825->7807 7826->7825 7828 350152d3 ___scrt_is_nonwritable_in_current_image 7827->7828 7837 35011d78 EnterCriticalSection 7828->7837 7830 35015376 7842 35015396 7830->7842 7834 35015382 ___scrt_is_nonwritable_in_current_image 7834->7812 7835 350152e2 7835->7830 7836 35015277 66 API calls 7835->7836 7838 35014b16 EnterCriticalSection 7835->7838 7839 3501536c 7835->7839 7836->7835 7837->7835 7838->7835 7845 35014b2a LeaveCriticalSection 7839->7845 7841 35015374 7841->7835 7846 35011dc0 LeaveCriticalSection 7842->7846 7844 3501539d 7844->7834 7845->7841 7846->7844 7847->7818 7849 350162e8 ___scrt_is_nonwritable_in_current_image 7848->7849 7850 350162f9 7849->7850 7851 3501630e 7849->7851 7852 35011856 __dosmaperr 20 API calls 7850->7852 7859 35016309 ___scrt_is_nonwritable_in_current_image 7851->7859 7864 35014b16 EnterCriticalSection 7851->7864 7853 350162fe 7852->7853 7855 35011cf4 _abort 26 API calls 7853->7855 7855->7859 7856 3501632a 7865 35016266 7856->7865 7858 35016335 7881 35016352 7858->7881 7859->7818 8124 35011dc0 LeaveCriticalSection 7861->8124 7863 3501555f 7863->7819 7864->7856 7866 35016273 7865->7866 7867 35016288 7865->7867 7868 35011856 __dosmaperr 20 API calls 7866->7868 7873 35016283 7867->7873 7884 35015211 7867->7884 7870 35016278 7868->7870 7872 35011cf4 _abort 26 API calls 7870->7872 7872->7873 7873->7858 7874 35015561 20 API calls 7875 350162a4 7874->7875 7890 350149dc 7875->7890 7877 350162aa 7897 3501700e 7877->7897 7880 35011005 ___free_lconv_mon 20 API calls 7880->7873 8123 35014b2a LeaveCriticalSection 7881->8123 7883 3501635a 7883->7859 7885 35015229 7884->7885 7889 35015225 7884->7889 7886 350149dc 26 API calls 7885->7886 7885->7889 7887 35015249 7886->7887 7912 35015c5e 7887->7912 7889->7874 7891 350149e8 7890->7891 7892 350149fd 7890->7892 7893 35011856 __dosmaperr 20 API calls 7891->7893 7892->7877 7894 350149ed 7893->7894 7895 35011cf4 _abort 26 API calls 7894->7895 7896 350149f8 7895->7896 7896->7877 7898 35017032 7897->7898 7899 3501701d 7897->7899 7900 3501706d 7898->7900 7904 35017059 7898->7904 7901 35011843 __dosmaperr 20 API calls 7899->7901 7902 35011843 __dosmaperr 20 API calls 7900->7902 7903 35017022 7901->7903 7905 35017072 7902->7905 7906 35011856 __dosmaperr 20 API calls 7903->7906 8080 35016fe6 7904->8080 7908 35011856 __dosmaperr 20 API calls 7905->7908 7909 350162b0 7906->7909 7910 3501707a 7908->7910 7909->7873 7909->7880 7911 35011cf4 _abort 26 API calls 7910->7911 7911->7909 7913 35015c6a ___scrt_is_nonwritable_in_current_image 7912->7913 7914 35015c72 7913->7914 7915 35015c8a 7913->7915 7937 35011843 7914->7937 7917 35015d28 7915->7917 7921 35015cbf 7915->7921 7919 35011843 __dosmaperr 20 API calls 7917->7919 7922 35015d2d 7919->7922 7920 35011856 __dosmaperr 20 API calls 7930 35015c7f ___scrt_is_nonwritable_in_current_image 7920->7930 7940 350132c6 EnterCriticalSection 7921->7940 7924 35011856 __dosmaperr 20 API calls 7922->7924 7926 35015d35 7924->7926 7925 35015cc5 7927 35015ce1 7925->7927 7928 35015cf6 7925->7928 7929 35011cf4 _abort 26 API calls 7926->7929 7932 35011856 __dosmaperr 20 API calls 7927->7932 7941 35015d49 7928->7941 7929->7930 7930->7889 7934 35015ce6 7932->7934 7933 35015cf1 7992 35015d20 7933->7992 7935 35011843 __dosmaperr 20 API calls 7934->7935 7935->7933 7938 350115c0 __dosmaperr 20 API calls 7937->7938 7939 35011848 7938->7939 7939->7920 7940->7925 7942 35015d77 7941->7942 7980 35015d70 7941->7980 7943 35015d7b 7942->7943 7944 35015d9a 7942->7944 7946 35011843 __dosmaperr 20 API calls 7943->7946 7947 35015deb 7944->7947 7948 35015dce 7944->7948 7945 3500e5db _ValidateLocalCookies 5 API calls 7949 35015f51 7945->7949 7950 35015d80 7946->7950 7953 35015e01 7947->7953 7995 3501624b 7947->7995 7951 35011843 __dosmaperr 20 API calls 7948->7951 7949->7933 7952 35011856 __dosmaperr 20 API calls 7950->7952 7954 35015dd3 7951->7954 7955 35015d87 7952->7955 7998 350158ee 7953->7998 7958 35011856 __dosmaperr 20 API calls 7954->7958 7959 35011cf4 _abort 26 API calls 7955->7959 7961 35015ddb 7958->7961 7959->7980 7966 35011cf4 _abort 26 API calls 7961->7966 7962 35015e48 7967 35015ea2 WriteFile 7962->7967 7968 35015e5c 7962->7968 7963 35015e0f 7964 35015e13 7963->7964 7965 35015e35 7963->7965 7969 35015f09 7964->7969 8005 35015881 7964->8005 8010 350156ce GetConsoleCP 7965->8010 7966->7980 7971 35015ec5 GetLastError 7967->7971 7976 35015e2b 7967->7976 7972 35015e92 7968->7972 7973 35015e64 7968->7973 7969->7980 7981 35011856 __dosmaperr 20 API calls 7969->7981 7971->7976 8036 35015964 7972->8036 7977 35015e82 7973->7977 7978 35015e69 7973->7978 7976->7969 7976->7980 7983 35015ee5 7976->7983 8028 35015b31 7977->8028 7978->7969 8021 35015a43 7978->8021 7980->7945 7982 35015f2e 7981->7982 7985 35011843 __dosmaperr 20 API calls 7982->7985 7986 35015f00 7983->7986 7987 35015eec 7983->7987 7985->7980 8043 35011820 7986->8043 7989 35011856 __dosmaperr 20 API calls 7987->7989 7990 35015ef1 7989->7990 7991 35011843 __dosmaperr 20 API calls 7990->7991 7991->7980 8079 350132e9 LeaveCriticalSection 7992->8079 7994 35015d26 7994->7930 8048 350161cd 7995->8048 8070 350151bb 7998->8070 8000 350158fe 8001 35015903 8000->8001 8002 3501153c _abort 38 API calls 8000->8002 8001->7962 8001->7963 8003 35015926 8002->8003 8003->8001 8004 35015944 GetConsoleMode 8003->8004 8004->8001 8006 350158db 8005->8006 8009 350158a6 8005->8009 8006->7976 8007 350163c1 WriteConsoleW CreateFileW 8007->8009 8008 350158dd GetLastError 8008->8006 8009->8006 8009->8007 8009->8008 8011 35015843 8010->8011 8015 35015731 8010->8015 8012 3500e5db _ValidateLocalCookies 5 API calls 8011->8012 8014 3501587d 8012->8014 8013 350116e5 38 API calls 8013->8015 8014->7976 8015->8011 8015->8013 8016 350157b7 WideCharToMultiByte 8015->8016 8018 350149c2 40 API calls __fassign 8015->8018 8020 3501580e WriteFile 8015->8020 8016->8011 8017 350157dd WriteFile 8016->8017 8017->8015 8019 35015866 GetLastError 8017->8019 8018->8015 8019->8011 8020->8015 8020->8019 8023 35015a52 8021->8023 8022 35015b14 8024 3500e5db _ValidateLocalCookies 5 API calls 8022->8024 8023->8022 8025 35015ad0 WriteFile 8023->8025 8026 35015b2d 8024->8026 8025->8023 8027 35015b16 GetLastError 8025->8027 8026->7976 8027->8022 8033 35015b40 8028->8033 8029 35015c4b 8030 3500e5db _ValidateLocalCookies 5 API calls 8029->8030 8031 35015c5a 8030->8031 8031->7976 8032 35015bc2 WideCharToMultiByte 8034 35015c43 GetLastError 8032->8034 8035 35015bf7 WriteFile 8032->8035 8033->8029 8033->8032 8033->8035 8034->8029 8035->8033 8035->8034 8041 35015973 8036->8041 8037 35015a26 8038 3500e5db _ValidateLocalCookies 5 API calls 8037->8038 8040 35015a3f 8038->8040 8039 350159e5 WriteFile 8039->8041 8042 35015a28 GetLastError 8039->8042 8040->7976 8041->8037 8041->8039 8042->8037 8044 35011843 __dosmaperr 20 API calls 8043->8044 8045 3501182b __dosmaperr 8044->8045 8046 35011856 __dosmaperr 20 API calls 8045->8046 8047 3501183e 8046->8047 8047->7980 8057 3501339d 8048->8057 8050 350161df 8051 350161e7 8050->8051 8052 350161f8 SetFilePointerEx 8050->8052 8053 35011856 __dosmaperr 20 API calls 8051->8053 8054 35016210 GetLastError 8052->8054 8056 350161ec 8052->8056 8053->8056 8055 35011820 __dosmaperr 20 API calls 8054->8055 8055->8056 8056->7953 8058 350133aa 8057->8058 8059 350133bf 8057->8059 8060 35011843 __dosmaperr 20 API calls 8058->8060 8062 35011843 __dosmaperr 20 API calls 8059->8062 8064 350133e4 8059->8064 8061 350133af 8060->8061 8063 35011856 __dosmaperr 20 API calls 8061->8063 8065 350133ef 8062->8065 8066 350133b7 8063->8066 8064->8050 8067 35011856 __dosmaperr 20 API calls 8065->8067 8066->8050 8068 350133f7 8067->8068 8069 35011cf4 _abort 26 API calls 8068->8069 8069->8066 8071 350151d5 8070->8071 8072 350151c8 8070->8072 8075 350151e1 8071->8075 8076 35011856 __dosmaperr 20 API calls 8071->8076 8073 35011856 __dosmaperr 20 API calls 8072->8073 8074 350151cd 8073->8074 8074->8000 8075->8000 8077 35015202 8076->8077 8078 35011cf4 _abort 26 API calls 8077->8078 8078->8074 8079->7994 8083 35016f64 8080->8083 8082 3501700a 8082->7909 8084 35016f70 ___scrt_is_nonwritable_in_current_image 8083->8084 8094 350132c6 EnterCriticalSection 8084->8094 8086 35016f7e 8087 35016fb0 8086->8087 8088 35016fa5 8086->8088 8090 35011856 __dosmaperr 20 API calls 8087->8090 8095 3501708d 8088->8095 8091 35016fab 8090->8091 8110 35016fda 8091->8110 8093 35016fcd ___scrt_is_nonwritable_in_current_image 8093->8082 8094->8086 8096 3501339d 26 API calls 8095->8096 8099 3501709d 8096->8099 8097 350170a3 8113 3501330c 8097->8113 8099->8097 8100 350170d5 8099->8100 8103 3501339d 26 API calls 8099->8103 8100->8097 8101 3501339d 26 API calls 8100->8101 8105 350170e1 CloseHandle 8101->8105 8104 350170cc 8103->8104 8107 3501339d 26 API calls 8104->8107 8105->8097 8108 350170ed GetLastError 8105->8108 8106 3501711d 8106->8091 8107->8100 8108->8097 8109 35011820 __dosmaperr 20 API calls 8109->8106 8122 350132e9 LeaveCriticalSection 8110->8122 8112 35016fe4 8112->8093 8114 35013382 8113->8114 8115 3501331b 8113->8115 8116 35011856 __dosmaperr 20 API calls 8114->8116 8115->8114 8121 35013345 8115->8121 8117 35013387 8116->8117 8118 35011843 __dosmaperr 20 API calls 8117->8118 8119 35013372 8118->8119 8119->8106 8119->8109 8120 3501336c SetStdHandle 8120->8119 8121->8119 8121->8120 8122->8112 8123->7883 8124->7863 8129 35010ecc 8130 35010eef 8129->8130 8131 35010edb 8129->8131 8132 35011005 ___free_lconv_mon 20 API calls 8130->8132 8131->8130 8133 35011005 ___free_lconv_mon 20 API calls 8131->8133 8134 35010f01 8132->8134 8133->8130 8135 35011005 ___free_lconv_mon 20 API calls 8134->8135 8136 35010f14 8135->8136 8137 35011005 ___free_lconv_mon 20 API calls 8136->8137 8138 35010f25 8137->8138 8139 35011005 ___free_lconv_mon 20 API calls 8138->8139 8140 35010f36 8139->8140 7487 3500cf4e 7488 3500cf57 ___scrt_fastfail 7487->7488 7495 3500d052 ___scrt_fastfail 7488->7495 7496 3500fdc1 7488->7496 7490 3500fd8a 28 API calls 7491 3500daa3 7490->7491 7492 3500fda0 38 API calls 7493 3500cfeb 7492->7493 7493->7492 7493->7495 7499 3500f868 7493->7499 7495->7490 7495->7495 7497 3501153c _abort 38 API calls 7496->7497 7498 3500fdcb 7497->7498 7498->7493 7500 3500f884 7499->7500 7501 3500f876 7499->7501 7500->7493 7504 3500f7cb 7501->7504 7505 3500f607 __fassign 38 API calls 7504->7505 7506 3500f7de 7505->7506 7507 3500f806 42 API calls 7506->7507 7508 3500f7ef 7507->7508 7508->7493 8141 350105cf 8150 3501312f GetEnvironmentStringsW 8141->8150 8145 35011005 ___free_lconv_mon 20 API calls 8146 3501061c 8145->8146 8147 350105f2 8148 35011005 ___free_lconv_mon 20 API calls 8147->8148 8149 350105e7 8148->8149 8149->8145 8151 35013143 8150->8151 8152 350105e1 8150->8152 8153 3501103f __onexit 21 API calls 8151->8153 8152->8149 8157 35010622 8152->8157 8155 35013157 8153->8155 8154 35011005 ___free_lconv_mon 20 API calls 8156 35013171 FreeEnvironmentStringsW 8154->8156 8155->8154 8156->8152 8158 35010640 8157->8158 8159 350110d0 _abort 20 API calls 8158->8159 8169 3501067a 8159->8169 8160 350106eb 8161 35011005 ___free_lconv_mon 20 API calls 8160->8161 8162 35010705 8161->8162 8162->8147 8163 350110d0 _abort 20 API calls 8163->8169 8164 350106ed 8165 3501071c 20 API calls 8164->8165 8167 350106f3 8165->8167 8168 35011005 ___free_lconv_mon 20 API calls 8167->8168 8168->8160 8169->8160 8169->8163 8169->8164 8170 3501070f 8169->8170 8172 35011005 ___free_lconv_mon 20 API calls 8169->8172 8174 35012272 8169->8174 8171 35011d04 _abort 11 API calls 8170->8171 8173 3501071b 8171->8173 8172->8169 8175 3501228d 8174->8175 8176 3501227f 8174->8176 8177 35011856 __dosmaperr 20 API calls 8175->8177 8176->8175 8179 350122a6 8176->8179 8182 35012297 8177->8182 8178 35011cf4 _abort 26 API calls 8180 350122a1 8178->8180 8179->8180 8181 35011856 __dosmaperr 20 API calls 8179->8181 8180->8169 8181->8182 8182->8178 8183 3500f4d0 RtlUnwind 7509 3500f753 7512 3500f68a 7509->7512 7513 3500f6a1 7512->7513 7516 3500f6b9 7512->7516 7514 3500f607 __fassign 38 API calls 7513->7514 7515 3500f6ac 7514->7515 7515->7516 7517 3500f717 7515->7517 7518 3500f6e7 7515->7518 7525 3501118c 7517->7525 7521 3501112d 7518->7521 7522 35011146 7521->7522 7524 35011142 7521->7524 7523 3501115e GetStringTypeW 7522->7523 7522->7524 7523->7524 7524->7516 7528 35011199 7525->7528 7526 350120ab 11 API calls 7527 350111c7 7526->7527 7527->7516 7528->7526 8184 350122d6 8188 350122e7 8184->8188 8185 350122eb 8186 350122f0 8185->8186 8187 35011856 __dosmaperr 20 API calls 8185->8187 8189 3501231b 8187->8189 8188->8185 8188->8186 8191 3501232c 8188->8191 8190 35011cf4 _abort 26 API calls 8189->8190 8190->8186 8191->8186 8192 35011856 __dosmaperr 20 API calls 8191->8192 8192->8189 6225 3500dcdb 6226 3500dce7 ___scrt_is_nonwritable_in_current_image 6225->6226 6249 3500dec6 6226->6249 6228 3500dcee 6230 3500dd17 6228->6230 6260 3500e1cc IsProcessorFeaturePresent 6228->6260 6235 3500dd56 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 6230->6235 6264 350108d0 6230->6264 6233 3500dd36 ___scrt_is_nonwritable_in_current_image 6236 3500ddb6 6235->6236 6238 3500ddaf 6235->6238 6279 3500e2e7 6236->6279 6272 3500fd52 6238->6272 6240 3500ddbc 6283 3500fc61 GetModuleHandleW 6240->6283 6243 3500dde2 6245 3500ddeb 6243->6245 6288 3500fd2d 6243->6288 6291 3500e03d 6245->6291 6250 3500decf 6249->6250 6297 3500e42b IsProcessorFeaturePresent 6250->6297 6254 3500dee0 6259 3500dee4 6254->6259 6308 35010f46 6254->6308 6257 3500defb 6257->6228 6259->6228 6261 3500e1e2 ___scrt_fastfail 6260->6261 6262 3500e28a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6261->6262 6263 3500e2d4 6262->6263 6263->6228 6267 350108e7 6264->6267 6265 3500e5db _ValidateLocalCookies 5 API calls 6266 3500dd30 6265->6266 6266->6233 6268 35010874 6266->6268 6267->6265 6271 350108a3 6268->6271 6269 3500e5db _ValidateLocalCookies 5 API calls 6270 350108cc 6269->6270 6270->6235 6271->6269 6273 3500fd7a pre_c_initialization 6272->6273 6274 35010fc9 _abort 6272->6274 6273->6236 6578 3501153c GetLastError 6274->6578 6278 35010fda 6598 3501108d 6278->6598 6742 3500cc80 6279->6742 6282 3500e30d 6282->6240 6284 3500ddd8 6283->6284 6284->6243 6285 3500fd8a 6284->6285 6286 3500fb07 _abort 28 API calls 6285->6286 6287 3500fd9b 6286->6287 6287->6243 6289 3500fb07 _abort 28 API calls 6288->6289 6290 3500fd38 6289->6290 6290->6245 6292 3500e049 6291->6292 6293 3500ddf3 6292->6293 6744 35010f58 6292->6744 6293->6233 6296 3500ee7f ___vcrt_uninitialize 8 API calls 6296->6293 6298 3500dedb 6297->6298 6299 3500ee56 6298->6299 6300 3500ee5b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 6299->6300 6319 3500f199 6300->6319 6302 3500ee69 6302->6254 6305 3500ee71 6306 3500ee7c 6305->6306 6333 3500f1d5 6305->6333 6306->6254 6374 35013fb9 6308->6374 6311 3500ee7f 6312 3500ee88 6311->6312 6313 3500ee99 6311->6313 6314 3500f17e ___vcrt_uninitialize_ptd 6 API calls 6312->6314 6313->6259 6315 3500ee8d 6314->6315 6316 3500f1d5 ___vcrt_uninitialize_locks DeleteCriticalSection 6315->6316 6317 3500ee92 6316->6317 6574 3500f473 6317->6574 6320 3500f1a2 6319->6320 6322 3500f1cb 6320->6322 6324 3500ee65 6320->6324 6337 3500f3f3 6320->6337 6323 3500f1d5 ___vcrt_uninitialize_locks DeleteCriticalSection 6322->6323 6323->6324 6324->6302 6325 3500f14b 6324->6325 6355 3500f342 6325->6355 6327 3500f155 6328 3500f160 6327->6328 6360 3500f3b6 6327->6360 6328->6305 6330 3500f16e 6331 3500f17b 6330->6331 6365 3500f17e 6330->6365 6331->6305 6334 3500f1ff 6333->6334 6335 3500f1e0 6333->6335 6334->6302 6336 3500f1ea DeleteCriticalSection 6335->6336 6336->6334 6336->6336 6342 3500f221 6337->6342 6339 3500f40d 6340 3500f42a InitializeCriticalSectionAndSpinCount 6339->6340 6341 3500f416 6339->6341 6340->6341 6341->6320 6346 3500f251 6342->6346 6347 3500f255 __crt_fast_encode_pointer 6342->6347 6343 3500f275 6345 3500f281 GetProcAddress 6343->6345 6343->6347 6345->6347 6346->6343 6346->6347 6348 3500f2c1 6346->6348 6347->6339 6349 3500f2e9 LoadLibraryExW 6348->6349 6353 3500f2de 6348->6353 6350 3500f305 GetLastError 6349->6350 6351 3500f31d 6349->6351 6350->6351 6354 3500f310 LoadLibraryExW 6350->6354 6352 3500f334 FreeLibrary 6351->6352 6351->6353 6352->6353 6353->6346 6354->6351 6356 3500f221 try_get_function 5 API calls 6355->6356 6357 3500f35c 6356->6357 6358 3500f374 TlsAlloc 6357->6358 6359 3500f365 6357->6359 6359->6327 6361 3500f221 try_get_function 5 API calls 6360->6361 6362 3500f3d0 6361->6362 6363 3500f3ea TlsSetValue 6362->6363 6364 3500f3df 6362->6364 6363->6364 6364->6330 6366 3500f18e 6365->6366 6367 3500f188 6365->6367 6366->6328 6369 3500f37c 6367->6369 6370 3500f221 try_get_function 5 API calls 6369->6370 6371 3500f396 6370->6371 6372 3500f3ad TlsFree 6371->6372 6373 3500f3a2 6371->6373 6372->6373 6373->6366 6377 35013fd6 6374->6377 6378 35013fd2 6374->6378 6376 3500deed 6376->6257 6376->6311 6377->6378 6380 35013573 6377->6380 6392 3500e5db 6378->6392 6381 3501357f ___scrt_is_nonwritable_in_current_image 6380->6381 6399 35011d78 EnterCriticalSection 6381->6399 6383 35013586 6400 3501322e 6383->6400 6385 35013595 6391 350135a4 6385->6391 6413 35013407 GetStartupInfoW 6385->6413 6390 350135b5 ___scrt_is_nonwritable_in_current_image 6390->6377 6424 350135c0 6391->6424 6393 3500e5e4 6392->6393 6394 3500e5e6 IsProcessorFeaturePresent 6392->6394 6393->6376 6396 3500e628 6394->6396 6573 3500e5ec SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6396->6573 6398 3500e70b 6398->6376 6399->6383 6401 3501323a ___scrt_is_nonwritable_in_current_image 6400->6401 6402 35013247 6401->6402 6403 3501325e 6401->6403 6435 35011856 6402->6435 6427 35011d78 EnterCriticalSection 6403->6427 6408 35013256 ___scrt_is_nonwritable_in_current_image 6408->6385 6409 35013296 6441 350132bd 6409->6441 6410 3501326a 6410->6409 6428 3501317f 6410->6428 6414 35013424 6413->6414 6416 350134b6 6413->6416 6415 3501322e 27 API calls 6414->6415 6414->6416 6417 3501344d 6415->6417 6419 350134bd 6416->6419 6417->6416 6418 3501347b GetFileType 6417->6418 6418->6417 6420 350134c4 6419->6420 6421 35013507 GetStdHandle 6420->6421 6422 3501356f 6420->6422 6423 3501351a GetFileType 6420->6423 6421->6420 6422->6391 6423->6420 6572 35011dc0 LeaveCriticalSection 6424->6572 6426 350135c7 6426->6390 6427->6410 6444 350110d0 6428->6444 6430 35013191 6434 3501319e 6430->6434 6451 35012049 6430->6451 6433 350131f0 6433->6410 6458 35011005 6434->6458 6492 350115c0 GetLastError 6435->6492 6438 35011cf4 6550 35011c79 6438->6550 6440 35011d00 6440->6408 6571 35011dc0 LeaveCriticalSection 6441->6571 6443 350132c4 6443->6408 6449 350110dd _abort 6444->6449 6445 3501111d 6448 35011856 __dosmaperr 19 API calls 6445->6448 6446 35011108 RtlAllocateHeap 6447 3501111b 6446->6447 6446->6449 6447->6430 6448->6447 6449->6445 6449->6446 6464 3501409d 6449->6464 6479 35011dd7 6451->6479 6453 35012070 6454 3501208e InitializeCriticalSectionAndSpinCount 6453->6454 6455 35012079 6453->6455 6454->6455 6456 3500e5db _ValidateLocalCookies 5 API calls 6455->6456 6457 350120a5 6456->6457 6457->6430 6459 35011010 HeapFree 6458->6459 6463 35011039 __dosmaperr 6458->6463 6460 35011025 6459->6460 6459->6463 6461 35011856 __dosmaperr 18 API calls 6460->6461 6462 3501102b GetLastError 6461->6462 6462->6463 6463->6433 6469 350140e1 6464->6469 6466 350140b3 6467 3500e5db _ValidateLocalCookies 5 API calls 6466->6467 6468 350140dd 6467->6468 6468->6449 6470 350140ed ___scrt_is_nonwritable_in_current_image 6469->6470 6475 35011d78 EnterCriticalSection 6470->6475 6472 350140f8 6476 3501412a 6472->6476 6474 3501411f ___scrt_is_nonwritable_in_current_image 6474->6466 6475->6472 6477 35011dc0 _abort LeaveCriticalSection 6476->6477 6478 35014131 6477->6478 6478->6474 6483 35011e03 6479->6483 6484 35011e07 __crt_fast_encode_pointer 6479->6484 6480 35011e27 6482 35011e33 GetProcAddress 6480->6482 6480->6484 6482->6484 6483->6480 6483->6484 6485 35011e73 6483->6485 6484->6453 6486 35011e94 LoadLibraryExW 6485->6486 6487 35011e89 6485->6487 6488 35011eb1 GetLastError 6486->6488 6491 35011ec9 6486->6491 6487->6483 6489 35011ebc LoadLibraryExW 6488->6489 6488->6491 6489->6491 6490 35011ee0 FreeLibrary 6490->6487 6491->6487 6491->6490 6493 350115d9 6492->6493 6496 350115df 6492->6496 6511 35011f9a 6493->6511 6495 350110d0 _abort 17 API calls 6497 350115f1 6495->6497 6496->6495 6498 35011636 SetLastError 6496->6498 6499 350115f9 6497->6499 6518 35011ff0 6497->6518 6501 3501163f 6498->6501 6502 35011005 ___free_lconv_mon 17 API calls 6499->6502 6501->6438 6504 350115ff 6502->6504 6506 3501162d SetLastError 6504->6506 6505 35011615 6525 350113ae 6505->6525 6506->6501 6509 35011005 ___free_lconv_mon 17 API calls 6510 35011626 6509->6510 6510->6498 6510->6506 6512 35011dd7 _abort 5 API calls 6511->6512 6513 35011fc1 6512->6513 6514 35011fd9 TlsGetValue 6513->6514 6515 35011fcd 6513->6515 6514->6515 6516 3500e5db _ValidateLocalCookies 5 API calls 6515->6516 6517 35011fea 6516->6517 6517->6496 6519 35011dd7 _abort 5 API calls 6518->6519 6520 35012017 6519->6520 6521 35012032 TlsSetValue 6520->6521 6524 35012026 6520->6524 6521->6524 6522 3500e5db _ValidateLocalCookies 5 API calls 6523 3501160e 6522->6523 6523->6499 6523->6505 6524->6522 6530 35011386 6525->6530 6536 350112c6 6530->6536 6532 350113aa 6533 35011336 6532->6533 6542 350111ca 6533->6542 6535 3501135a 6535->6509 6537 350112d2 ___scrt_is_nonwritable_in_current_image 6536->6537 6538 35011d78 _abort EnterCriticalSection 6537->6538 6539 350112dc 6538->6539 6540 35011302 _abort LeaveCriticalSection 6539->6540 6541 350112fa ___scrt_is_nonwritable_in_current_image 6540->6541 6541->6532 6543 350111d6 ___scrt_is_nonwritable_in_current_image 6542->6543 6544 35011d78 _abort EnterCriticalSection 6543->6544 6545 350111e0 6544->6545 6546 350114f1 _abort 20 API calls 6545->6546 6547 350111f8 6546->6547 6548 3501120e _abort LeaveCriticalSection 6547->6548 6549 35011206 ___scrt_is_nonwritable_in_current_image 6548->6549 6549->6535 6551 350115c0 __dosmaperr 20 API calls 6550->6551 6552 35011c8f 6551->6552 6553 35011c9d 6552->6553 6554 35011cee 6552->6554 6558 3500e5db _ValidateLocalCookies 5 API calls 6553->6558 6561 35011d04 IsProcessorFeaturePresent 6554->6561 6556 35011cf3 6557 35011c79 _abort 26 API calls 6556->6557 6559 35011d00 6557->6559 6560 35011cc4 6558->6560 6559->6440 6560->6440 6562 35011d0f 6561->6562 6565 35011b2a 6562->6565 6566 35011b46 _abort ___scrt_fastfail 6565->6566 6567 35011b72 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6566->6567 6570 35011c43 _abort 6567->6570 6568 3500e5db _ValidateLocalCookies 5 API calls 6569 35011c61 GetCurrentProcess TerminateProcess 6568->6569 6569->6556 6570->6568 6571->6443 6572->6426 6573->6398 6575 3500f47c 6574->6575 6577 3500f4a2 6574->6577 6576 3500f48c FreeLibrary 6575->6576 6575->6577 6576->6575 6577->6313 6579 35011552 6578->6579 6582 35011558 6578->6582 6580 35011f9a _abort 11 API calls 6579->6580 6580->6582 6581 350110d0 _abort 20 API calls 6583 3501156a 6581->6583 6582->6581 6584 350115a7 SetLastError 6582->6584 6585 35011572 6583->6585 6586 35011ff0 _abort 11 API calls 6583->6586 6584->6278 6587 35011005 ___free_lconv_mon 20 API calls 6585->6587 6588 35011587 6586->6588 6589 35011578 6587->6589 6588->6585 6590 3501158e 6588->6590 6591 350115b3 SetLastError 6589->6591 6592 350113ae _abort 20 API calls 6590->6592 6594 3501108d _abort 35 API calls 6591->6594 6593 35011599 6592->6593 6595 35011005 ___free_lconv_mon 20 API calls 6593->6595 6596 350115bf 6594->6596 6597 350115a0 6595->6597 6597->6584 6597->6591 6609 3501421f 6598->6609 6601 3501109d 6603 350110a7 IsProcessorFeaturePresent 6601->6603 6604 350110c5 6601->6604 6606 350110b2 6603->6606 6639 3500fd3c 6604->6639 6607 35011b2a _abort 8 API calls 6606->6607 6607->6604 6642 3501418d 6609->6642 6612 3501427a 6613 35014286 _abort 6612->6613 6614 350115c0 __dosmaperr 20 API calls 6613->6614 6618 350142b3 _abort 6613->6618 6619 350142ad _abort 6613->6619 6614->6619 6615 350142ff 6616 35011856 __dosmaperr 20 API calls 6615->6616 6617 35014304 6616->6617 6620 35011cf4 _abort 26 API calls 6617->6620 6624 3501432b 6618->6624 6656 35011d78 EnterCriticalSection 6618->6656 6619->6615 6619->6618 6638 350142e2 6619->6638 6620->6638 6625 3501438a 6624->6625 6627 35014382 6624->6627 6635 350143b5 6624->6635 6657 35011dc0 LeaveCriticalSection 6624->6657 6625->6635 6658 35014271 6625->6658 6630 3500fd3c _abort 28 API calls 6627->6630 6630->6625 6632 3501153c _abort 38 API calls 6636 35014418 6632->6636 6634 35014271 _abort 38 API calls 6634->6635 6661 3501443a 6635->6661 6637 3501153c _abort 38 API calls 6636->6637 6636->6638 6637->6638 6665 35017f69 6638->6665 6669 3500fb07 6639->6669 6645 35014133 6642->6645 6644 35011092 6644->6601 6644->6612 6646 3501413f ___scrt_is_nonwritable_in_current_image 6645->6646 6651 35011d78 EnterCriticalSection 6646->6651 6648 3501414d 6652 35014181 6648->6652 6650 35014174 ___scrt_is_nonwritable_in_current_image 6650->6644 6651->6648 6655 35011dc0 LeaveCriticalSection 6652->6655 6654 3501418b 6654->6650 6655->6654 6656->6624 6657->6627 6659 3501153c _abort 38 API calls 6658->6659 6660 35014276 6659->6660 6660->6634 6662 35014440 6661->6662 6663 35014409 6661->6663 6668 35011dc0 LeaveCriticalSection 6662->6668 6663->6632 6663->6636 6663->6638 6666 3500e5db _ValidateLocalCookies 5 API calls 6665->6666 6667 35017f74 6666->6667 6667->6667 6668->6663 6670 3500fb13 _abort 6669->6670 6671 3500fb2b 6670->6671 6673 3500fc61 _abort GetModuleHandleW 6670->6673 6698 35011d78 EnterCriticalSection 6671->6698 6674 3500fb1f 6673->6674 6674->6671 6691 3500fca5 GetModuleHandleExW 6674->6691 6678 3500fb33 6688 3500fba8 6678->6688 6690 3500fbd1 6678->6690 6699 35010dd4 6678->6699 6679 3500fbc0 6685 35010874 _abort 5 API calls 6679->6685 6680 3500fc1a 6683 35017f69 _abort 5 API calls 6680->6683 6681 3500fbee 6705 3500fc20 6681->6705 6689 3500fc1f 6683->6689 6684 35010874 _abort 5 API calls 6684->6679 6685->6690 6688->6679 6688->6684 6702 3500fc11 6690->6702 6692 3500fce4 6691->6692 6693 3500fccf GetProcAddress 6691->6693 6694 3500fd01 6692->6694 6695 3500fcf8 FreeLibrary 6692->6695 6693->6692 6696 3500e5db _ValidateLocalCookies 5 API calls 6694->6696 6695->6694 6697 3500fd0b 6696->6697 6697->6671 6698->6678 6713 35010aee 6699->6713 6735 35011dc0 LeaveCriticalSection 6702->6735 6704 3500fbea 6704->6680 6704->6681 6736 350121b5 6705->6736 6708 3500fc4e 6711 3500fca5 _abort 8 API calls 6708->6711 6709 3500fc2e GetPEB 6709->6708 6710 3500fc3e GetCurrentProcess TerminateProcess 6709->6710 6710->6708 6712 3500fc56 ExitProcess 6711->6712 6716 35010a9d 6713->6716 6715 35010b12 6715->6688 6717 35010aa9 ___scrt_is_nonwritable_in_current_image 6716->6717 6724 35011d78 EnterCriticalSection 6717->6724 6719 35010ab7 6725 35010b5d 6719->6725 6723 35010ad5 ___scrt_is_nonwritable_in_current_image 6723->6715 6724->6719 6726 35010b7d 6725->6726 6729 35010b85 6725->6729 6727 3500e5db _ValidateLocalCookies 5 API calls 6726->6727 6728 35010ac4 6727->6728 6731 35010ae2 6728->6731 6729->6726 6730 35011005 ___free_lconv_mon 20 API calls 6729->6730 6730->6726 6734 35011dc0 LeaveCriticalSection 6731->6734 6733 35010aec 6733->6723 6734->6733 6735->6704 6737 350121da 6736->6737 6740 350121d0 6736->6740 6738 35011dd7 _abort 5 API calls 6737->6738 6738->6740 6739 3500e5db _ValidateLocalCookies 5 API calls 6741 3500fc2a 6739->6741 6740->6739 6741->6708 6741->6709 6743 3500cc8c GetStartupInfoW 6742->6743 6743->6282 6747 3501403c 6744->6747 6750 35014055 6747->6750 6748 3500e5db _ValidateLocalCookies 5 API calls 6749 3500e057 6748->6749 6749->6296 6750->6748 7529 3501095d 7530 35010969 ___scrt_is_nonwritable_in_current_image 7529->7530 7531 350109a0 ___scrt_is_nonwritable_in_current_image 7530->7531 7537 35011d78 EnterCriticalSection 7530->7537 7533 3501097d 7534 35013ed6 __fassign 20 API calls 7533->7534 7535 3501098d 7534->7535 7538 350109a6 7535->7538 7537->7533 7541 35011dc0 LeaveCriticalSection 7538->7541 7540 350109ad 7540->7531 7541->7540 8193 350130df GetCommandLineA GetCommandLineW 7542 3500f060 7543 3500f072 7542->7543 7545 3500f080 @_EH4_CallFilterFunc@8 7542->7545 7544 3500e5db _ValidateLocalCookies 5 API calls 7543->7544 7544->7545 8194 3500cce6 8195 3500ccee 8194->8195 8199 3500d052 ___scrt_fastfail 8195->8199 8209 3500fabd 8195->8209 8198 3500cd55 ___scrt_fastfail 8198->8199 8205 3500fdc1 38 API calls 8198->8205 8200 3500fd8a 28 API calls 8199->8200 8201 3500daa3 8200->8201 8202 3500d409 ___scrt_fastfail 8202->8199 8203 3500d846 Sleep 8202->8203 8204 3500d85b Sleep 8203->8204 8204->8199 8207 3500cfeb 8205->8207 8206 3500fda0 38 API calls 8206->8207 8207->8199 8207->8206 8208 3500f868 42 API calls 8207->8208 8208->8207 8210 3500fac9 8209->8210 8213 3500fa48 8210->8213 8214 3500fa5f 8213->8214 8215 35011856 __dosmaperr 20 API calls 8214->8215 8217 3500cd48 8214->8217 8216 3500fa96 8215->8216 8218 35011cf4 _abort 26 API calls 8216->8218 8217->8198 8217->8202 8218->8217 7546 3500c56e 7548 3500c41d ___scrt_fastfail 7546->7548 7547 3500fda0 38 API calls 7547->7548 7548->7547 7549 3500c6e9 ___scrt_fastfail 7548->7549 8219 3500ecf0 8230 3500ecb0 8219->8230 8231 3500ecc2 8230->8231 8232 3500eccf 8230->8232 8233 3500e5db _ValidateLocalCookies 5 API calls 8231->8233 8233->8232 8238 35010ff5 8239 35010ff8 8238->8239 8240 3501108d _abort 38 API calls 8239->8240 8241 35011004 8240->8241 7550 35010e7e 7553 350107f2 7550->7553 7562 3501074b 7553->7562 7556 3501074b 5 API calls 7557 35010810 7556->7557 7566 3501071c 7557->7566 7560 3501071c 20 API calls 7561 35010826 7560->7561 7563 35010764 7562->7563 7564 3500e5db _ValidateLocalCookies 5 API calls 7563->7564 7565 35010785 7564->7565 7565->7556 7567 35010729 7566->7567 7568 35010746 7566->7568 7569 35010740 7567->7569 7570 35011005 ___free_lconv_mon 20 API calls 7567->7570 7568->7560 7571 35011005 ___free_lconv_mon 20 API calls 7569->7571 7570->7567 7571->7568

    Executed Functions

    Control-flow Graph

    C-Code - Quality: 95%
    			E35012CAC(signed int __ebx, void* __ecx, void* __edx, void* __eflags, intOrPtr _a4, char _a8) {
    				char _v8;
    				char _v16;
    				void* __edi;
    				void* __esi;
    				void* __ebp;
    				char _t31;
    				char _t40;
    				intOrPtr _t44;
    				char _t45;
    				signed int _t51;
    				void* _t64;
    				void* _t70;
    				signed int _t75;
    				void* _t81;
    
    				_t81 = __eflags;
    				_v8 = E3501153C(__ebx, __ecx, __edx);
    				E35012DCB(__ebx, __ecx, __edx, _t81); // executed
    				_t31 = E35012A40(_t81, _a4);
    				_v16 = _t31;
    				_t57 =  *(_v8 + 0x48);
    				if(_t31 ==  *((intOrPtr*)( *(_v8 + 0x48) + 4))) {
    					return 0;
    				}
    				_push(__ebx);
    				_t70 = E3501103F(_t57, 0x220);
    				_t51 = __ebx | 0xffffffff;
    				__eflags = _t70;
    				if(__eflags == 0) {
    					L5:
    					_t75 = _t51;
    					goto L6;
    				} else {
    					_t70 = memcpy(_t70,  *(_v8 + 0x48), 0x88 << 2);
    					 *_t70 =  *_t70 & 0x00000000;
    					_t75 = E35012E6D(_t51, _t70,  *(_v8 + 0x48), __eflags, _v16, _t70);
    					__eflags = _t75 - _t51;
    					if(_t75 != _t51) {
    						__eflags = _a8;
    						if(_a8 == 0) {
    							E35010952();
    						}
    						asm("lock xadd [eax], ebx");
    						__eflags = _t51 == 1;
    						if(_t51 == 1) {
    							_t45 = _v8;
    							__eflags =  *((intOrPtr*)(_t45 + 0x48)) - 0x35022cf8;
    							if( *((intOrPtr*)(_t45 + 0x48)) != 0x35022cf8) {
    								E35011005( *((intOrPtr*)(_t45 + 0x48)));
    							}
    						}
    						 *_t70 = 1;
    						_t64 = _t70;
    						_t70 = 0;
    						 *(_v8 + 0x48) = _t64;
    						_t40 = _v8;
    						__eflags =  *(_t40 + 0x350) & 0x00000002;
    						if(( *(_t40 + 0x350) & 0x00000002) == 0) {
    							__eflags =  *0x35022f78 & 0x00000001;
    							if(( *0x35022f78 & 0x00000001) == 0) {
    								_v16 =  &_v8;
    								E35012916("true",  &_v16);
    								__eflags = _a8;
    								if(_a8 != 0) {
    									_t44 =  *0x35022f18; // 0x5c8620
    									 *0x350229e4 = _t44;
    								}
    							}
    						}
    						L6:
    						E35011005(_t70);
    						return _t75;
    					} else {
    						 *((intOrPtr*)(E35011856())) = 0x16;
    						goto L5;
    					}
    				}
    			}

















    0x35012cac
    0x35012cb9
    0x35012cbc
    0x35012cc4
    0x35012ccd
    0x35012cd0
    0x35012cd6
    0x00000000
    0x35012cd8
    0x35012cdc
    0x35012ce9
    0x35012ceb
    0x35012cef
    0x35012cf1
    0x35012d21
    0x35012d21
    0x00000000
    0x35012cf3
    0x35012d00
    0x35012d06
    0x35012d0e
    0x35012d12
    0x35012d14
    0x35012d33
    0x35012d37
    0x35012d39
    0x35012d39
    0x35012d44
    0x35012d48
    0x35012d49
    0x35012d4b
    0x35012d4e
    0x35012d55
    0x35012d5a
    0x35012d5f
    0x35012d55
    0x35012d60
    0x35012d66
    0x35012d6b
    0x35012d6d
    0x35012d70
    0x35012d73
    0x35012d7a
    0x35012d7c
    0x35012d83
    0x35012d88
    0x35012d91
    0x35012d96
    0x35012d9c
    0x35012d9e
    0x35012da3
    0x35012da3
    0x35012d9c
    0x35012d83
    0x35012d23
    0x35012d24
    0x00000000
    0x35012d16
    0x35012d1b
    0x00000000
    0x35012d1b
    0x35012d14

    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: ErrorLast_abort
    • String ID:
    • API String ID: 933726692-0
    • Opcode ID: 27043c72e71ca26885eebab3e74a6255753ff24abc5661e008f4ddf01b024fb2
    • Instruction ID: 798316fb5f089618554b045157fd33217864361a5cf6ca9d6d52d02fca9c3d11
    • Opcode Fuzzy Hash: 27043c72e71ca26885eebab3e74a6255753ff24abc5661e008f4ddf01b024fb2
    • Instruction Fuzzy Hash: 2831A179A0424AAFE705DBAAE540B9977F5EF403A0F6100DAEC149B290DB739F418B52
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 95%
    			E350110D0(void* __ecx, signed int _a4, signed int _a8) {
    				void* __esi;
    				void* _t8;
    				void* _t12;
    				signed int _t13;
    				void* _t15;
    				signed int _t16;
    				signed int _t18;
    				long _t19;
    
    				_t15 = __ecx;
    				_t18 = _a4;
    				if(_t18 == 0) {
    					L2:
    					_t19 = _t18 * _a8;
    					if(_t19 == 0) {
    						_t19 = _t19 + 1;
    					}
    					while(1) {
    						_t8 = RtlAllocateHeap( *0x3502aefc, 8, _t19); // executed
    						if(_t8 != 0) {
    							break;
    						}
    						__eflags = E35010A11();
    						if(__eflags == 0) {
    							L8:
    							 *((intOrPtr*)(E35011856())) = 0xc;
    							__eflags = 0;
    							return 0;
    						}
    						_t12 = E3501409D(_t15, _t16, _t19, __eflags, _t19);
    						_pop(_t15);
    						__eflags = _t12;
    						if(_t12 == 0) {
    							goto L8;
    						}
    					}
    					return _t8;
    				}
    				_t13 = 0xffffffe0;
    				_t16 = _t13 % _t18;
    				if(_t13 / _t18 < _a8) {
    					goto L8;
    				}
    				goto L2;
    			}











    0x350110d0
    0x350110d6
    0x350110db
    0x350110e9
    0x350110e9
    0x350110ef
    0x350110f1
    0x350110f1
    0x35011108
    0x35011111
    0x35011119
    0x00000000
    0x00000000
    0x350110f9
    0x350110fb
    0x3501111d
    0x35011122
    0x35011128
    0x00000000
    0x35011128
    0x350110fe
    0x35011103
    0x35011104
    0x35011106
    0x00000000
    0x00000000
    0x35011106
    0x00000000
    0x35011108
    0x350110e1
    0x350110e2
    0x350110e7
    0x00000000
    0x00000000
    0x00000000

    APIs
    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,350115F1,00000001,00000364,?,35013F7A,?,00000004,00000000,?,?,?,35010D0A), ref: 35011111
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: 96c35d24764864b09ddc16096aede8b4bef4dc5e595a64a40a2a310f3fe212db
    • Instruction ID: b44d5f9f626fb2b2c4cee6695a15f86d1637b140f7a40536fb591e1a713ea73c
    • Opcode Fuzzy Hash: 96c35d24764864b09ddc16096aede8b4bef4dc5e595a64a40a2a310f3fe212db
    • Instruction Fuzzy Hash: 08F02B3DA082A067DB195A72FD05A4EB798BF406E0F548091AC05E6040CE73D60246E3
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions

    C-Code - Quality: 75%
    			E35011B2A(intOrPtr __ebx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
    				char _v0;
    				signed int _v8;
    				intOrPtr _v524;
    				intOrPtr _v528;
    				void* _v532;
    				intOrPtr _v536;
    				char _v540;
    				intOrPtr _v544;
    				intOrPtr _v548;
    				intOrPtr _v552;
    				intOrPtr _v556;
    				intOrPtr _v560;
    				intOrPtr _v564;
    				intOrPtr _v568;
    				intOrPtr _v572;
    				intOrPtr _v576;
    				intOrPtr _v580;
    				intOrPtr _v584;
    				char _v724;
    				intOrPtr _v792;
    				intOrPtr _v800;
    				char _v804;
    				struct _EXCEPTION_POINTERS _v812;
    				signed int _t40;
    				char* _t47;
    				char* _t49;
    				intOrPtr _t61;
    				intOrPtr _t62;
    				intOrPtr _t66;
    				intOrPtr _t67;
    				int _t68;
    				intOrPtr _t69;
    				signed int _t70;
    
    				_t69 = __esi;
    				_t67 = __edi;
    				_t66 = __edx;
    				_t61 = __ebx;
    				_t40 =  *0x350228f8; // 0x43699f2c
    				_t41 = _t40 ^ _t70;
    				_v8 = _t40 ^ _t70;
    				if(_a4 != 0xffffffff) {
    					_push(_a4);
    					E3500E367(_t41);
    					_pop(_t62);
    				}
    				E3500CC80( &_v804, 0, 0x50);
    				E3500CC80( &_v724, 0, 0x2cc);
    				_v812.ExceptionRecord =  &_v804;
    				_t47 =  &_v724;
    				_v812.ContextRecord = _t47;
    				_v548 = _t47;
    				_v552 = _t62;
    				_v556 = _t66;
    				_v560 = _t61;
    				_v564 = _t69;
    				_v568 = _t67;
    				_v524 = ss;
    				_v536 = cs;
    				_v572 = ds;
    				_v576 = es;
    				_v580 = fs;
    				_v584 = gs;
    				asm("pushfd");
    				_pop( *_t22);
    				_v540 = _v0;
    				_t49 =  &_v0;
    				_v528 = _t49;
    				_v724 = 0x10001;
    				_v544 =  *((intOrPtr*)(_t49 - 4));
    				_v804 = _a8;
    				_v800 = _a12;
    				_v792 = _v0;
    				_t68 = IsDebuggerPresent();
    				SetUnhandledExceptionFilter(0);
    				if(UnhandledExceptionFilter( &_v812) == 0 && _t68 == 0 && _a4 != 0xffffffff) {
    					_push(_a4);
    					E3500E367(_t57);
    				}
    				return E3500E5DB(_v8 ^ _t70);
    			}




































    0x35011b2a
    0x35011b2a
    0x35011b2a
    0x35011b2a
    0x35011b35
    0x35011b3a
    0x35011b3c
    0x35011b44
    0x35011b46
    0x35011b49
    0x35011b4e
    0x35011b4e
    0x35011b5a
    0x35011b6d
    0x35011b7b
    0x35011b81
    0x35011b87
    0x35011b8d
    0x35011b93
    0x35011b99
    0x35011b9f
    0x35011ba5
    0x35011bab
    0x35011bb1
    0x35011bb8
    0x35011bbf
    0x35011bc6
    0x35011bcd
    0x35011bd4
    0x35011bdb
    0x35011bdc
    0x35011be5
    0x35011beb
    0x35011bee
    0x35011bf4
    0x35011c01
    0x35011c0a
    0x35011c13
    0x35011c1c
    0x35011c2a
    0x35011c2c
    0x35011c41
    0x35011c4d
    0x35011c50
    0x35011c55
    0x35011c64

    APIs
    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 35011C22
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 35011C2C
    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 35011C39
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$DebuggerPresent
    • String ID:
    • API String ID: 3906539128-0
    • Opcode ID: ddb55360e348f0b6710b0a84a20256854a06445c3242247efbfee11cc51fe514
    • Instruction ID: e678cafd98e22da39f2939c2f6964c46e8559c9c067663ecf1758501a959a872
    • Opcode Fuzzy Hash: ddb55360e348f0b6710b0a84a20256854a06445c3242247efbfee11cc51fe514
    • Instruction Fuzzy Hash: 2931E7B490132C9BCB21DF64E988B8DBBB8BF08710F5041DAE81CA7250EB319B858F45
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E3500FC20(int _a4) {
    				void* _t14;
    				void* _t16;
    
    				if(E350121B5(_t14, _t16) != 0 && ( *( *[fs:0x30] + 0x68) >> 0x00000008 & 0x00000001) == 0) {
    					TerminateProcess(GetCurrentProcess(), _a4);
    				}
    				E3500FCA5(_t14, _t16, _a4);
    				ExitProcess(_a4);
    			}





    0x3500fc2c
    0x3500fc48
    0x3500fc48
    0x3500fc51
    0x3500fc5a

    APIs
    • GetCurrentProcess.KERNEL32(00000003,?,3500FBF6,00000003,3501E070,0000000C,3500FD4D,00000003,00000002,00000000,?,350110CF,00000003), ref: 3500FC41
    • TerminateProcess.KERNEL32(00000000,?,3500FBF6,00000003,3501E070,0000000C,3500FD4D,00000003,00000002,00000000,?,350110CF,00000003), ref: 3500FC48
    • ExitProcess.KERNEL32 ref: 3500FC5A
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: f122b7a1e158ca80bfe853631ca62b27d2261d48b7b076ccfc4ee845d63122aa
    • Instruction ID: 038f86b68f245557586d9740af52c6ef52d80e022127da3befaff8ef95912523
    • Opcode Fuzzy Hash: f122b7a1e158ca80bfe853631ca62b27d2261d48b7b076ccfc4ee845d63122aa
    • Instruction Fuzzy Hash: FAE0BF39120608AFDF065F65EB09E883B7AFB54291B054454FD4657121CB37EA43DA52
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 86%
    			E3500E42B(intOrPtr __edx) {
    				signed int _v8;
    				signed int _v12;
    				signed int _v16;
    				signed int _v20;
    				signed char _v24;
    				signed int _v28;
    				signed int _v32;
    				signed int _v36;
    				signed int _v40;
    				signed int _v44;
    				signed int _v48;
    				signed int _t59;
    				signed int _t62;
    				signed int _t63;
    				intOrPtr _t65;
    				signed int _t66;
    				signed int _t68;
    				intOrPtr _t73;
    				intOrPtr* _t75;
    				intOrPtr* _t77;
    				intOrPtr _t84;
    				intOrPtr* _t86;
    				signed int _t91;
    				signed int _t94;
    
    				_t84 = __edx;
    				 *0x3502a45c =  *0x3502a45c & 0x00000000;
    				 *0x350228f0 =  *0x350228f0 | 1;
    				if(IsProcessorFeaturePresent(0xa) == 0) {
    					L20:
    					return 0;
    				}
    				_v24 = _v24 & 0x00000000;
    				 *0x350228f0 =  *0x350228f0 | 0x00000002;
    				 *0x3502a45c = 1;
    				_t86 =  &_v48;
    				_push(1);
    				asm("cpuid");
    				_pop(_t73);
    				 *_t86 = 0;
    				 *((intOrPtr*)(_t86 + 4)) = 1;
    				 *((intOrPtr*)(_t86 + 8)) = 0;
    				 *((intOrPtr*)(_t86 + 0xc)) = _t84;
    				_v16 = _v48;
    				_v8 = _v36 ^ 0x49656e69;
    				_v12 = _v40 ^ 0x6c65746e;
    				_push(1);
    				asm("cpuid");
    				_t75 =  &_v48;
    				 *_t75 = 1;
    				 *((intOrPtr*)(_t75 + 4)) = _t73;
    				 *((intOrPtr*)(_t75 + 8)) = 0;
    				 *((intOrPtr*)(_t75 + 0xc)) = _t84;
    				if((_v44 ^ 0x756e6547 | _v8 | _v12) != 0) {
    					L9:
    					_t91 =  *0x3502a460; // 0x2
    					L10:
    					_v32 = _v36;
    					_t59 = _v40;
    					_v8 = _t59;
    					_v28 = _t59;
    					if(_v16 >= 7) {
    						_t65 = 7;
    						_push(_t75);
    						asm("cpuid");
    						_t77 =  &_v48;
    						 *_t77 = _t65;
    						 *((intOrPtr*)(_t77 + 4)) = _t75;
    						 *((intOrPtr*)(_t77 + 8)) = 0;
    						 *((intOrPtr*)(_t77 + 0xc)) = _t84;
    						_t66 = _v44;
    						_v24 = _t66;
    						_t59 = _v8;
    						if((_t66 & 0x00000200) != 0) {
    							 *0x3502a460 = _t91 | 0x00000002;
    						}
    					}
    					if((_t59 & 0x00100000) != 0) {
    						 *0x350228f0 =  *0x350228f0 | 0x00000004;
    						 *0x3502a45c = 2;
    						if((_t59 & 0x08000000) != 0 && (_t59 & 0x10000000) != 0) {
    							asm("xgetbv");
    							_v20 = _t59;
    							_v16 = _t84;
    							if((_v20 & 0x00000006) == 6 && 0 == 0) {
    								_t62 =  *0x350228f0; // 0x2f
    								_t63 = _t62 | 0x00000008;
    								 *0x3502a45c = 3;
    								 *0x350228f0 = _t63;
    								if((_v24 & 0x00000020) != 0) {
    									 *0x3502a45c = 5;
    									 *0x350228f0 = _t63 | 0x00000020;
    								}
    							}
    						}
    					}
    					goto L20;
    				}
    				_t68 = _v48 & 0x0fff3ff0;
    				if(_t68 == 0x106c0 || _t68 == 0x20660 || _t68 == 0x20670 || _t68 == 0x30650 || _t68 == 0x30660 || _t68 == 0x30670) {
    					_t94 =  *0x3502a460; // 0x2
    					_t91 = _t94 | 0x00000001;
    					 *0x3502a460 = _t91;
    					goto L10;
    				} else {
    					goto L9;
    				}
    			}



























    0x3500e42b
    0x3500e42e
    0x3500e43c
    0x3500e44b
    0x3500e5c8
    0x3500e5ce
    0x3500e5ce
    0x3500e451
    0x3500e457
    0x3500e462
    0x3500e468
    0x3500e46b
    0x3500e46c
    0x3500e470
    0x3500e471
    0x3500e473
    0x3500e476
    0x3500e47b
    0x3500e484
    0x3500e495
    0x3500e4a0
    0x3500e4a6
    0x3500e4a7
    0x3500e4af
    0x3500e4b5
    0x3500e4b7
    0x3500e4ba
    0x3500e4bd
    0x3500e4c0
    0x3500e505
    0x3500e505
    0x3500e50b
    0x3500e512
    0x3500e515
    0x3500e518
    0x3500e51b
    0x3500e51e
    0x3500e522
    0x3500e525
    0x3500e526
    0x3500e52b
    0x3500e52e
    0x3500e530
    0x3500e533
    0x3500e536
    0x3500e539
    0x3500e541
    0x3500e544
    0x3500e547
    0x3500e54c
    0x3500e54c
    0x3500e547
    0x3500e559
    0x3500e55b
    0x3500e562
    0x3500e571
    0x3500e57c
    0x3500e57f
    0x3500e582
    0x3500e593
    0x3500e599
    0x3500e59e
    0x3500e5a1
    0x3500e5af
    0x3500e5b4
    0x3500e5b9
    0x3500e5c3
    0x3500e5c3
    0x3500e5b4
    0x3500e593
    0x3500e571
    0x00000000
    0x3500e559
    0x3500e4c5
    0x3500e4cf
    0x3500e4f4
    0x3500e4fa
    0x3500e4fd
    0x00000000
    0x00000000
    0x00000000
    0x00000000

    APIs
    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 3500E444
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: FeaturePresentProcessor
    • String ID:
    • API String ID: 2325560087-3916222277
    • Opcode ID: 8822eef830f3b8352b8abd60221e82e487ca98a6b890e16e7162c8bb5b5231f3
    • Instruction ID: 2821575a53912d76fdf8d1660d157987aafe4b16b726f13f3e37b1cf988cb1e0
    • Opcode Fuzzy Hash: 8822eef830f3b8352b8abd60221e82e487ca98a6b890e16e7162c8bb5b5231f3
    • Instruction Fuzzy Hash: 345159B1D153098FEB04CFA9E58569ABBF4FB48715F6084AAD815F7240EB72E502CF90
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 72%
    			E35012593(void* __ebx, void* __ecx, void* __edi, void* __esi, intOrPtr* _a4, intOrPtr _a8, signed int _a12, intOrPtr _a16) {
    				intOrPtr _v8;
    				signed int _v12;
    				intOrPtr _v28;
    				signed int _v32;
    				WCHAR* _v36;
    				signed int _v48;
    				intOrPtr _v556;
    				intOrPtr _v558;
    				struct _WIN32_FIND_DATAW _v604;
    				intOrPtr* _v608;
    				signed int _v612;
    				signed int _v616;
    				intOrPtr _v644;
    				intOrPtr _v648;
    				signed int _t40;
    				signed int _t45;
    				signed int _t48;
    				signed int _t50;
    				signed int _t51;
    				signed char _t53;
    				signed int _t62;
    				void* _t64;
    				union _FINDEX_INFO_LEVELS _t66;
    				signed int _t71;
    				intOrPtr* _t72;
    				signed int _t75;
    				void* _t82;
    				void* _t84;
    				signed int _t85;
    				void* _t89;
    				WCHAR* _t90;
    				intOrPtr* _t94;
    				intOrPtr _t97;
    				void* _t99;
    				signed int _t100;
    				intOrPtr* _t104;
    				signed int _t107;
    				void* _t110;
    				intOrPtr _t111;
    				void* _t112;
    				void* _t114;
    				void* _t115;
    				signed int _t117;
    				void* _t118;
    				union _FINDEX_INFO_LEVELS _t119;
    				void* _t124;
    				void* _t125;
    				signed int _t126;
    				void* _t127;
    				signed int _t132;
    				void* _t133;
    				signed int _t134;
    				void* _t135;
    				void* _t136;
    
    				_push(__ecx);
    				_t94 = _a4;
    				_push(__ebx);
    				_push(__edi);
    				_t2 = _t94 + 2; // 0x2
    				_t110 = _t2;
    				do {
    					_t40 =  *_t94;
    					_t94 = _t94 + 2;
    				} while (_t40 != 0);
    				_t117 = _a12;
    				_t97 = (_t94 - _t110 >> 1) + 1;
    				_v8 = _t97;
    				if(_t97 <= (_t40 | 0xffffffff) - _t117) {
    					_push(__esi);
    					_t5 = _t117 + 1; // 0x1
    					_t89 = _t5 + _t97;
    					_t124 = E350110D0(_t97, _t89, 2);
    					_pop(_t99);
    					__eflags = _t117;
    					if(_t117 == 0) {
    						L6:
    						_push(_v8);
    						_t89 = _t89 - _t117;
    						_t45 = E350123A3(_t99, _t124 + _t117 * 2, _t89, _a4);
    						_t134 = _t133 + 0x10;
    						__eflags = _t45;
    						if(__eflags != 0) {
    							goto L9;
    						} else {
    							_t82 = E3501280C(_a16, _t110, __eflags, _t124);
    							E35011005(0);
    							_t84 = _t82;
    							goto L8;
    						}
    					} else {
    						_push(_t117);
    						_t85 = E350123A3(_t99, _t124, _t89, _a8);
    						_t134 = _t133 + 0x10;
    						__eflags = _t85;
    						if(_t85 != 0) {
    							L9:
    							_push(0);
    							_push(0);
    							_push(0);
    							_push(0);
    							_push(0);
    							E35011D04();
    							asm("int3");
    							_t132 = _t134;
    							_t135 = _t134 - 0x260;
    							_t48 =  *0x350228f8; // 0x43699f2c
    							_v48 = _t48 ^ _t132;
    							_t111 = _v28;
    							_t100 = _v32;
    							_push(_t89);
    							_t90 = _v36;
    							_push(_t124);
    							_push(_t117);
    							_t125 = 0x5c;
    							_v644 = _t111;
    							_v648 = 0x2f;
    							_t118 = 0x3a;
    							while(1) {
    								__eflags = _t100 - _t90;
    								if(_t100 == _t90) {
    									break;
    								}
    								_t50 =  *_t100 & 0x0000ffff;
    								__eflags = _t50 - _v612;
    								if(_t50 != _v612) {
    									__eflags = _t50 - _t125;
    									if(_t50 != _t125) {
    										__eflags = _t50 - _t118;
    										if(_t50 != _t118) {
    											_t100 = _t100 - 2;
    											__eflags = _t100;
    											continue;
    										}
    									}
    								}
    								break;
    							}
    							_t126 =  *_t100 & 0x0000ffff;
    							__eflags = _t126 - _t118;
    							if(_t126 != _t118) {
    								L19:
    								_t51 = _t126;
    								_t119 = 0;
    								_t112 = 0x2f;
    								__eflags = _t51 - _t112;
    								if(_t51 == _t112) {
    									L23:
    									_t53 = 1;
    									__eflags = 1;
    								} else {
    									_t114 = 0x5c;
    									__eflags = _t51 - _t114;
    									if(_t51 == _t114) {
    										goto L23;
    									} else {
    										_t115 = 0x3a;
    										__eflags = _t51 - _t115;
    										if(_t51 == _t115) {
    											goto L23;
    										} else {
    											_t53 = 0;
    										}
    									}
    								}
    								_t103 = (_t100 - _t90 >> 1) + 1;
    								asm("sbb eax, eax");
    								_v612 =  ~(_t53 & 0x000000ff) & (_t100 - _t90 >> 0x00000001) + 0x00000001;
    								E3500CC80( &_v604, _t119, 0x250);
    								_t136 = _t135 + 0xc;
    								_t127 = FindFirstFileExW(_t90, _t119,  &_v604, _t119, _t119, _t119);
    								__eflags = _t127 - 0xffffffff;
    								if(_t127 != 0xffffffff) {
    									_t104 = _v608;
    									_t62 =  *((intOrPtr*)(_t104 + 4)) -  *_t104;
    									__eflags = _t62;
    									_v616 = _t62 >> 2;
    									_t64 = 0x2e;
    									do {
    										__eflags = _v604.cFileName - _t64;
    										if(_v604.cFileName != _t64) {
    											L36:
    											_push(_t104);
    											_t66 = E35012593(_t90, _t104, _t119, _t127,  &(_v604.cFileName), _t90, _v612);
    											_t136 = _t136 + 0x10;
    											__eflags = _t66;
    											if(_t66 != 0) {
    												goto L26;
    											} else {
    												goto L37;
    											}
    										} else {
    											__eflags = _v558 - _t119;
    											if(_v558 == _t119) {
    												goto L37;
    											} else {
    												__eflags = _v558 - _t64;
    												if(_v558 != _t64) {
    													goto L36;
    												} else {
    													__eflags = _v556 - _t119;
    													if(_v556 == _t119) {
    														goto L37;
    													} else {
    														goto L36;
    													}
    												}
    											}
    										}
    										goto L40;
    										L37:
    										_t71 = FindNextFileW(_t127,  &_v604);
    										_t104 = _v608;
    										__eflags = _t71;
    										_t64 = 0x2e;
    									} while (_t71 != 0);
    									_t72 = _t104;
    									_t107 = _v616;
    									_t113 =  *_t72;
    									_t75 =  *((intOrPtr*)(_t72 + 4)) -  *_t72 >> 2;
    									__eflags = _t107 - _t75;
    									if(_t107 != _t75) {
    										E35014D30(_t90, _t119, _t127, _t113 + _t107 * 4, _t75 - _t107, 4, E350123AE);
    									}
    								} else {
    									_push(_v608);
    									_t66 = E35012593(_t90, _t103, _t119, _t127, _t90, _t119, _t119);
    									L26:
    									_t119 = _t66;
    								}
    								__eflags = _t127 - 0xffffffff;
    								if(_t127 != 0xffffffff) {
    									FindClose(_t127);
    								}
    							} else {
    								__eflags = _t100 -  &(_t90[1]);
    								if(_t100 ==  &(_t90[1])) {
    									goto L19;
    								} else {
    									_push(_t111);
    									E35012593(_t90, _t100, 0, _t126, _t90, 0, 0);
    								}
    							}
    							__eflags = _v12 ^ _t132;
    							return E3500E5DB(_v12 ^ _t132);
    						} else {
    							goto L6;
    						}
    					}
    				} else {
    					_t84 = 0xc;
    					L8:
    					return _t84;
    				}
    				L40:
    			}

























































    0x35012598
    0x35012599
    0x3501259c
    0x3501259d
    0x350125a0
    0x350125a0
    0x350125a3
    0x350125a3
    0x350125a6
    0x350125a9
    0x350125ae
    0x350125b8
    0x350125bb
    0x350125c0
    0x350125c7
    0x350125c8
    0x350125cb
    0x350125d5
    0x350125d8
    0x350125d9
    0x350125db
    0x350125ef
    0x350125ef
    0x350125f2
    0x350125fc
    0x35012601
    0x35012604
    0x35012606
    0x00000000
    0x35012608
    0x3501260c
    0x35012615
    0x3501261b
    0x00000000
    0x3501261d
    0x350125dd
    0x350125dd
    0x350125e3
    0x350125e8
    0x350125eb
    0x350125ed
    0x35012624
    0x35012626
    0x35012627
    0x35012628
    0x35012629
    0x3501262a
    0x3501262b
    0x35012630
    0x35012634
    0x35012636
    0x3501263c
    0x35012643
    0x35012646
    0x35012649
    0x3501264c
    0x3501264d
    0x35012650
    0x35012651
    0x35012654
    0x35012657
    0x3501265d
    0x35012667
    0x35012683
    0x35012683
    0x35012685
    0x00000000
    0x00000000
    0x3501266a
    0x3501266d
    0x35012674
    0x35012676
    0x35012679
    0x3501267b
    0x3501267e
    0x35012680
    0x35012680
    0x00000000
    0x35012680
    0x3501267e
    0x35012679
    0x00000000
    0x35012674
    0x35012687
    0x3501268a
    0x3501268d
    0x350126a9
    0x350126ab
    0x350126ad
    0x350126af
    0x350126b0
    0x350126b3
    0x350126c9
    0x350126cb
    0x350126cb
    0x350126b5
    0x350126b7
    0x350126b8
    0x350126bb
    0x00000000
    0x350126bd
    0x350126bf
    0x350126c0
    0x350126c3
    0x00000000
    0x350126c5
    0x350126c5
    0x350126c5
    0x350126c3
    0x350126bb
    0x350126d3
    0x350126db
    0x350126df
    0x350126ed
    0x350126f2
    0x35012707
    0x35012709
    0x3501270c
    0x35012741
    0x3501274c
    0x3501274c
    0x35012751
    0x35012757
    0x35012758
    0x35012758
    0x3501275f
    0x3501277c
    0x3501277c
    0x3501278b
    0x35012790
    0x35012793
    0x35012795
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x35012761
    0x35012761
    0x35012768
    0x00000000
    0x3501276a
    0x3501276a
    0x35012771
    0x00000000
    0x35012773
    0x35012773
    0x3501277a
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x3501277a
    0x35012771
    0x35012768
    0x00000000
    0x35012797
    0x3501279f
    0x350127a5
    0x350127ab
    0x350127af
    0x350127af
    0x350127b2
    0x350127b4
    0x350127ba
    0x350127c1
    0x350127c4
    0x350127c6
    0x350127da
    0x350127df
    0x3501270e
    0x35012714
    0x35012718
    0x35012720
    0x35012720
    0x35012720
    0x35012722
    0x35012725
    0x35012728
    0x35012728
    0x3501268f
    0x35012692
    0x35012694
    0x00000000
    0x35012696
    0x35012696
    0x3501269c
    0x350126a1
    0x35012694
    0x35012735
    0x35012740
    0x00000000
    0x00000000
    0x00000000
    0x350125ed
    0x350125c2
    0x350125c4
    0x3501261e
    0x35012623
    0x35012623
    0x00000000

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID:
    • String ID: /
    • API String ID: 0-2043925204
    • Opcode ID: 0183239ccd17daf80cb388206c410d6a07fe3ad3e33c625dfb95c034e53d4226
    • Instruction ID: 6db3704be8b142cdd0ade29d92b3d92abc96c60d35eb358df2a1f56619b96c48
    • Opcode Fuzzy Hash: 0183239ccd17daf80cb388206c410d6a07fe3ad3e33c625dfb95c034e53d4226
    • Instruction Fuzzy Hash: 6A413A7DA0021A6FDB149FBAEC88EAB77B9FB84354F5041A8FD05D7180E6729B41CB50
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E35017755(long _a4, signed int* _a8, signed char _a12, signed int _a16, intOrPtr* _a20, unsigned int* _a24, intOrPtr _a28) {
    				signed int _t172;
    				signed int _t175;
    				signed int _t178;
    				signed int* _t179;
    				signed int _t195;
    				signed int _t199;
    				signed int _t202;
    				void* _t203;
    				void* _t206;
    				signed int _t209;
    				void* _t210;
    				signed int _t225;
    				unsigned int* _t240;
    				signed char _t242;
    				signed int* _t250;
    				unsigned int* _t256;
    				signed int* _t257;
    				signed char _t259;
    				long _t262;
    				signed int* _t265;
    
    				 *(_a4 + 4) = 0;
    				_t262 = 0xc000000d;
    				 *(_a4 + 8) = 0;
    				 *(_a4 + 0xc) = 0;
    				_t242 = _a12;
    				if((_t242 & 0x00000010) != 0) {
    					_t262 = 0xc000008f;
    					 *(_a4 + 4) =  *(_a4 + 4) | 1;
    				}
    				if((_t242 & 0x00000002) != 0) {
    					_t262 = 0xc0000093;
    					 *(_a4 + 4) =  *(_a4 + 4) | 0x00000002;
    				}
    				if((_t242 & 0x00000001) != 0) {
    					_t262 = 0xc0000091;
    					 *(_a4 + 4) =  *(_a4 + 4) | 0x00000004;
    				}
    				if((_t242 & 0x00000004) != 0) {
    					_t262 = 0xc000008e;
    					 *(_a4 + 4) =  *(_a4 + 4) | 0x00000008;
    				}
    				if((_t242 & 0x00000008) != 0) {
    					_t262 = 0xc0000090;
    					 *(_a4 + 4) =  *(_a4 + 4) | 0x00000010;
    				}
    				_t265 = _a8;
    				 *(_a4 + 8) =  *(_a4 + 8) ^ ( !( *_t265 << 4) ^  *(_a4 + 8)) & 0x00000010;
    				 *(_a4 + 8) =  *(_a4 + 8) ^ ( !( *_t265 +  *_t265) ^  *(_a4 + 8)) & 0x00000008;
    				 *(_a4 + 8) =  *(_a4 + 8) ^ ( !( *_t265 >> 1) ^  *(_a4 + 8)) & 0x00000004;
    				 *(_a4 + 8) =  *(_a4 + 8) ^ ( !( *_t265 >> 3) ^  *(_a4 + 8)) & 0x00000002;
    				 *(_a4 + 8) =  *(_a4 + 8) ^ ( !( *_t265 >> 5) ^  *(_a4 + 8)) & 1;
    				_t259 = E350154AF(_a4);
    				if((_t259 & 0x00000001) != 0) {
    					 *(_a4 + 0xc) =  *(_a4 + 0xc) | 0x00000010;
    				}
    				if((_t259 & 0x00000004) != 0) {
    					 *(_a4 + 0xc) =  *(_a4 + 0xc) | 0x00000008;
    				}
    				if((_t259 & 0x00000008) != 0) {
    					 *(_a4 + 0xc) =  *(_a4 + 0xc) | 0x00000004;
    				}
    				if((_t259 & 0x00000010) != 0) {
    					 *(_a4 + 0xc) =  *(_a4 + 0xc) | 0x00000002;
    				}
    				if((_t259 & 0x00000020) != 0) {
    					 *(_a4 + 0xc) =  *(_a4 + 0xc) | 1;
    				}
    				_t172 =  *_t265 & 0x00000c00;
    				if(_t172 == 0) {
    					 *_a4 =  *_a4 & 0xfffffffc;
    				} else {
    					if(_t172 == 0x400) {
    						_t257 = _a4;
    						_t225 =  *_t257 & 0xfffffffd | 1;
    						L26:
    						 *_t257 = _t225;
    						L29:
    						_t175 =  *_t265 & 0x00000300;
    						if(_t175 == 0) {
    							_t250 = _a4;
    							_t178 =  *_t250 & 0xffffffeb | 0x00000008;
    							L35:
    							 *_t250 = _t178;
    							L36:
    							_t179 = _a4;
    							_t254 = (_a16 << 0x00000005 ^  *_t179) & 0x0001ffe0;
    							 *_t179 =  *_t179 ^ (_a16 << 0x00000005 ^  *_t179) & 0x0001ffe0;
    							 *(_a4 + 0x20) =  *(_a4 + 0x20) | 1;
    							if(_a28 == 0) {
    								 *(_a4 + 0x20) =  *(_a4 + 0x20) & 0xffffffe3 | 0x00000002;
    								 *((long long*)(_a4 + 0x10)) =  *_a20;
    								 *(_a4 + 0x60) =  *(_a4 + 0x60) | 1;
    								_t254 = _a4;
    								_t240 = _a24;
    								 *(_a4 + 0x60) =  *(_a4 + 0x60) & 0xffffffe3 | 0x00000002;
    								 *(_a4 + 0x50) =  *_t240;
    							} else {
    								 *(_a4 + 0x20) =  *(_a4 + 0x20) & 0xffffffe1;
    								 *((intOrPtr*)(_a4 + 0x10)) =  *_a20;
    								 *(_a4 + 0x60) =  *(_a4 + 0x60) | 1;
    								_t240 = _a24;
    								 *(_a4 + 0x60) =  *(_a4 + 0x60) & 0xffffffe1;
    								 *(_a4 + 0x50) =  *_t240;
    							}
    							E35015415(_t254);
    							RaiseException(_t262, 0, 1,  &_a4);
    							_t256 = _a4;
    							if((_t256[2] & 0x00000010) != 0) {
    								 *_t265 =  *_t265 & 0xfffffffe;
    							}
    							if((_t256[2] & 0x00000008) != 0) {
    								 *_t265 =  *_t265 & 0xfffffffb;
    							}
    							if((_t256[2] & 0x00000004) != 0) {
    								 *_t265 =  *_t265 & 0xfffffff7;
    							}
    							if((_t256[2] & 0x00000002) != 0) {
    								 *_t265 =  *_t265 & 0xffffffef;
    							}
    							if((_t256[2] & 0x00000001) != 0) {
    								 *_t265 =  *_t265 & 0xffffffdf;
    							}
    							_t195 =  *_t256 & 0x00000003;
    							if(_t195 == 0) {
    								 *_t265 =  *_t265 & 0xfffff3ff;
    							} else {
    								_t206 = _t195 - 1;
    								if(_t206 == 0) {
    									_t209 =  *_t265 & 0xfffff7ff | 0x00000400;
    									L55:
    									 *_t265 = _t209;
    									L58:
    									_t199 =  *_t256 >> 0x00000002 & 0x00000007;
    									if(_t199 == 0) {
    										_t202 =  *_t265 & 0xfffff3ff | 0x00000300;
    										L64:
    										 *_t265 = _t202;
    										L65:
    										if(_a28 == 0) {
    											 *_t240 = _t256[0x14];
    										} else {
    											 *_t240 = _t256[0x14];
    										}
    										return _t202;
    									}
    									_t203 = _t199 - 1;
    									if(_t203 == 0) {
    										_t202 =  *_t265 & 0xfffff3ff | 0x00000200;
    										goto L64;
    									}
    									_t202 = _t203 - 1;
    									if(_t202 == 0) {
    										 *_t265 =  *_t265 & 0xfffff3ff;
    									}
    									goto L65;
    								}
    								_t210 = _t206 - 1;
    								if(_t210 == 0) {
    									_t209 =  *_t265 & 0xfffffbff | 0x00000800;
    									goto L55;
    								}
    								if(_t210 == 1) {
    									 *_t265 =  *_t265 | 0x00000c00;
    								}
    							}
    							goto L58;
    						}
    						if(_t175 == 0x200) {
    							_t250 = _a4;
    							_t178 =  *_t250 & 0xffffffe7 | 0x00000004;
    							goto L35;
    						}
    						if(_t175 == 0x300) {
    							 *_a4 =  *_a4 & 0xffffffe3;
    						}
    						goto L36;
    					}
    					if(_t172 == 0x800) {
    						_t257 = _a4;
    						_t225 =  *_t257 & 0xfffffffe | 0x00000002;
    						goto L26;
    					}
    					if(_t172 == 0xc00) {
    						 *_a4 =  *_a4 | 0x00000003;
    					}
    				}
    			}























    0x35017763
    0x3501776a
    0x3501776f
    0x35017775
    0x35017778
    0x3501777e
    0x35017783
    0x35017788
    0x35017788
    0x3501778e
    0x35017793
    0x35017798
    0x35017798
    0x3501779f
    0x350177a4
    0x350177a9
    0x350177a9
    0x350177b0
    0x350177b5
    0x350177ba
    0x350177ba
    0x350177c1
    0x350177c6
    0x350177cb
    0x350177cb
    0x350177d3
    0x350177e3
    0x350177f5
    0x35017807
    0x3501781a
    0x3501782c
    0x35017834
    0x35017839
    0x3501783e
    0x3501783e
    0x35017845
    0x3501784a
    0x3501784a
    0x35017851
    0x35017856
    0x35017856
    0x3501785d
    0x35017862
    0x35017862
    0x35017869
    0x3501786e
    0x3501786e
    0x35017878
    0x3501787a
    0x350178b4
    0x3501787c
    0x35017881
    0x350178a5
    0x350178ad
    0x350178a1
    0x350178a1
    0x350178b7
    0x350178be
    0x350178c0
    0x350178e2
    0x350178ea
    0x350178ed
    0x350178ed
    0x350178ef
    0x350178ef
    0x350178fa
    0x35017900
    0x35017905
    0x3501790c
    0x35017946
    0x35017951
    0x35017957
    0x3501795a
    0x3501795d
    0x35017969
    0x35017971
    0x3501790e
    0x35017911
    0x3501791d
    0x35017923
    0x35017929
    0x3501792c
    0x35017935
    0x35017935
    0x35017974
    0x35017982
    0x35017988
    0x3501798f
    0x35017991
    0x35017991
    0x35017998
    0x3501799a
    0x3501799a
    0x350179a1
    0x350179a3
    0x350179a3
    0x350179aa
    0x350179ac
    0x350179ac
    0x350179b3
    0x350179b5
    0x350179b5
    0x350179c2
    0x350179c5
    0x350179fc
    0x350179c7
    0x350179c7
    0x350179ca
    0x350179f5
    0x350179ea
    0x350179ea
    0x350179fe
    0x35017a06
    0x35017a09
    0x35017a28
    0x35017a2d
    0x35017a2d
    0x35017a2f
    0x35017a34
    0x35017a40
    0x35017a36
    0x35017a39
    0x35017a39
    0x35017a45
    0x35017a45
    0x35017a0b
    0x35017a0e
    0x35017a1d
    0x00000000
    0x35017a1d
    0x35017a10
    0x35017a13
    0x35017a15
    0x35017a15
    0x00000000
    0x35017a13
    0x350179cc
    0x350179cf
    0x350179e5
    0x00000000
    0x350179e5
    0x350179d4
    0x350179d6
    0x350179d6
    0x350179d4
    0x00000000
    0x350179c5
    0x350178c7
    0x350178d5
    0x350178dd
    0x00000000
    0x350178dd
    0x350178cb
    0x350178d0
    0x350178d0
    0x00000000
    0x350178cb
    0x35017888
    0x35017896
    0x3501789e
    0x00000000
    0x3501789e
    0x3501788c
    0x35017891
    0x35017891
    0x3501788c

    APIs
    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,35017750,?,?,00000008,?,?,350173F0,00000000), ref: 35017982
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: ExceptionRaise
    • String ID:
    • API String ID: 3997070919-0
    • Opcode ID: 55ac5d9566ac172992a11bcd9480047c1f8ff98aa51d1dde477ad61b49b72e01
    • Instruction ID: 052206e625d2e742678feaa4cfadf240921335b4db8da4e232e251268f9a564b
    • Opcode Fuzzy Hash: 55ac5d9566ac172992a11bcd9480047c1f8ff98aa51d1dde477ad61b49b72e01
    • Instruction Fuzzy Hash: D9B17C79610608DFE705CF28D486B547BE0FF45364F658698EC9ACF2A2C736EA81CB41
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E3500E31A() {
    
    				return SetUnhandledExceptionFilter(E3500E326);
    			}



    0x3500e325

    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0000E326,3500DCCE), ref: 3500E31F
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 721230703d49807b7d963db3f8141deac540b065f23f9fde6472140b42b96465
    • Instruction ID: 5fdfec83f4d7a9fad39c035f195b8b3129ec35469a2a65c95bfa9a947321522a
    • Opcode Fuzzy Hash: 721230703d49807b7d963db3f8141deac540b065f23f9fde6472140b42b96465
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E35013F9E() {
    				signed int _t3;
    
    				_t3 = GetProcessHeap();
    				 *0x3502aefc = _t3;
    				return _t3 & 0xffffff00 | _t3 != 0x00000000;
    			}




    0x35013f9e
    0x35013fa6
    0x35013fae

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: HeapProcess
    • String ID:
    • API String ID: 54951025-0
    • Opcode ID: 6ce8fabec0f71d34eb9dc0adbd5a4a386b3e3976ededef25a0d04d3f7726b5a3
    • Instruction ID: 9c974ec53546dd79d2679431e0e8f705bfce7e8cde00fe23c0c494ec4c0bad89
    • Opcode Fuzzy Hash: 6ce8fabec0f71d34eb9dc0adbd5a4a386b3e3976ededef25a0d04d3f7726b5a3
    • Instruction Fuzzy Hash: 2CA012305103018F4B004E32510820836A4A74558031880546401E0500DE6240C34F01
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 201 350156ce-3501572b GetConsoleCP 202 35015731-3501574d 201->202 203 3501586e-35015880 call 3500e5db 201->203 204 35015768-35015779 call 350116e5 202->204 205 3501574f-35015766 202->205 212 3501577b-3501577e 204->212 213 3501579f-350157a1 204->213 207 350157a2-350157b1 call 350149c2 205->207 207->203 217 350157b7-350157d7 WideCharToMultiByte 207->217 215 35015845-35015864 212->215 216 35015784-35015796 call 350149c2 212->216 213->207 215->203 216->203 224 3501579c-3501579d 216->224 217->203 218 350157dd-350157f3 WriteFile 217->218 220 350157f5-35015806 218->220 221 35015866-3501586c GetLastError 218->221 220->203 223 35015808-3501580c 220->223 221->203 225 3501583a-3501583d 223->225 226 3501580e-3501582c WriteFile 223->226 224->217 225->202 228 35015843 225->228 226->221 227 3501582e-35015832 226->227 227->203 229 35015834-35015837 227->229 228->203 229->225
    C-Code - Quality: 73%
    			E350156CE(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4, signed int _a8, signed char* _a12, intOrPtr _a16) {
    				signed int _v8;
    				signed char _v15;
    				char _v16;
    				void _v24;
    				short _v28;
    				char _v31;
    				void _v32;
    				long _v36;
    				intOrPtr _v40;
    				void* _v44;
    				signed int _v48;
    				signed char* _v52;
    				long _v56;
    				int _v60;
    				signed int _t78;
    				signed int _t80;
    				int _t86;
    				void* _t94;
    				long _t97;
    				void _t105;
    				void* _t112;
    				signed int _t116;
    				signed int _t118;
    				signed char _t123;
    				signed char _t128;
    				intOrPtr _t129;
    				signed int _t131;
    				signed char* _t133;
    				intOrPtr* _t135;
    				signed int _t136;
    				void* _t137;
    
    				_t78 =  *0x350228f8; // 0x43699f2c
    				_v8 = _t78 ^ _t136;
    				_t80 = _a8;
    				_t118 = _t80 >> 6;
    				_t116 = (_t80 & 0x0000003f) * 0x30;
    				_t133 = _a12;
    				_v52 = _t133;
    				_v48 = _t118;
    				_v44 =  *((intOrPtr*)( *((intOrPtr*)(0x3502acf0 + _t118 * 4)) + _t116 + 0x18));
    				_v40 = _a16 + _t133;
    				_t86 = GetConsoleCP();
    				_t135 = _a4;
    				_v60 = _t86;
    				 *_t135 = 0;
    				 *((intOrPtr*)(_t135 + 4)) = 0;
    				 *((intOrPtr*)(_t135 + 8)) = 0;
    				while(_t133 < _v40) {
    					_v28 = 0;
    					_v31 =  *_t133;
    					_t129 =  *((intOrPtr*)(0x3502acf0 + _v48 * 4));
    					_t123 =  *(_t129 + _t116 + 0x2d);
    					if((_t123 & 0x00000004) == 0) {
    						if(( *(E350116E5(_t116, _t129) + ( *_t133 & 0x000000ff) * 2) & 0x00008000) == 0) {
    							_push(1);
    							_push(_t133);
    							goto L8;
    						} else {
    							if(_t133 >= _v40) {
    								_t131 = _v48;
    								 *((char*)( *((intOrPtr*)(0x3502acf0 + _t131 * 4)) + _t116 + 0x2e)) =  *_t133;
    								 *( *((intOrPtr*)(0x3502acf0 + _t131 * 4)) + _t116 + 0x2d) =  *( *((intOrPtr*)(0x3502acf0 + _t131 * 4)) + _t116 + 0x2d) | 0x00000004;
    								 *((intOrPtr*)(_t135 + 4)) =  *((intOrPtr*)(_t135 + 4)) + 1;
    							} else {
    								_t112 = E350149C2( &_v28, _t133, 2);
    								_t137 = _t137 + 0xc;
    								if(_t112 != 0xffffffff) {
    									_t133 =  &(_t133[1]);
    									goto L9;
    								}
    							}
    						}
    					} else {
    						_t128 = _t123 & 0x000000fb;
    						_v16 =  *((intOrPtr*)(_t129 + _t116 + 0x2e));
    						_push(2);
    						_v15 = _t128;
    						 *(_t129 + _t116 + 0x2d) = _t128;
    						_push( &_v16);
    						L8:
    						_push( &_v28);
    						_t94 = E350149C2();
    						_t137 = _t137 + 0xc;
    						if(_t94 != 0xffffffff) {
    							L9:
    							_t133 =  &(_t133[1]);
    							_t97 = WideCharToMultiByte(_v60, 0,  &_v28, 1,  &_v24, "true", 0, 0);
    							_v56 = _t97;
    							if(_t97 != 0) {
    								if(WriteFile(_v44,  &_v24, _t97,  &_v36, 0) == 0) {
    									L19:
    									 *_t135 = GetLastError();
    								} else {
    									 *((intOrPtr*)(_t135 + 4)) =  *((intOrPtr*)(_t135 + 8)) - _v52 + _t133;
    									if(_v36 >= _v56) {
    										if(_v31 != 0xa) {
    											goto L16;
    										} else {
    											_t105 = 0xd;
    											_v32 = _t105;
    											if(WriteFile(_v44,  &_v32, 1,  &_v36, 0) == 0) {
    												goto L19;
    											} else {
    												if(_v36 >= 1) {
    													 *((intOrPtr*)(_t135 + 8)) =  *((intOrPtr*)(_t135 + 8)) + 1;
    													 *((intOrPtr*)(_t135 + 4)) =  *((intOrPtr*)(_t135 + 4)) + 1;
    													goto L16;
    												}
    											}
    										}
    									}
    								}
    							}
    						}
    					}
    					goto L20;
    					L16:
    				}
    				L20:
    				return E3500E5DB(_v8 ^ _t136);
    			}


































    0x350156d6
    0x350156dd
    0x350156e0
    0x350156e8
    0x350156ec
    0x350156f8
    0x350156fb
    0x350156fe
    0x35015705
    0x3501570d
    0x35015710
    0x35015716
    0x3501571c
    0x35015721
    0x35015723
    0x35015726
    0x3501572b
    0x35015735
    0x3501573c
    0x3501573f
    0x35015746
    0x3501574d
    0x35015779
    0x3501579f
    0x350157a1
    0x00000000
    0x3501577b
    0x3501577e
    0x35015845
    0x35015851
    0x3501585c
    0x35015861
    0x35015784
    0x3501578b
    0x35015790
    0x35015796
    0x3501579c
    0x00000000
    0x3501579c
    0x35015796
    0x3501577e
    0x3501574f
    0x35015753
    0x35015756
    0x3501575c
    0x3501575e
    0x35015761
    0x35015765
    0x350157a2
    0x350157a5
    0x350157a6
    0x350157ab
    0x350157b1
    0x350157b7
    0x350157c6
    0x350157cc
    0x350157d2
    0x350157d7
    0x350157f3
    0x35015866
    0x3501586c
    0x350157f5
    0x350157fd
    0x35015806
    0x3501580c
    0x00000000
    0x3501580e
    0x35015810
    0x35015813
    0x3501582c
    0x00000000
    0x3501582e
    0x35015832
    0x35015834
    0x35015837
    0x00000000
    0x35015837
    0x35015832
    0x3501582c
    0x3501580c
    0x35015806
    0x350157f3
    0x350157d7
    0x350157b1
    0x00000000
    0x3501583a
    0x3501583a
    0x3501586e
    0x35015880

    APIs
    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,35015E43,?,00000000,?,00000000,00000000), ref: 35015710
    • __fassign.LIBCMT ref: 3501578B
    • __fassign.LIBCMT ref: 350157A6
    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,?,00000000,00000000), ref: 350157CC
    • WriteFile.KERNEL32(?,?,00000000,35015E43,00000000,?,?,?,?,?,?,?,?,?,35015E43,?), ref: 350157EB
    • WriteFile.KERNEL32(?,?,00000001,35015E43,00000000,?,?,?,?,?,?,?,?,?,35015E43,?), ref: 35015824
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
    • String ID:
    • API String ID: 1324828854-0
    • Opcode ID: fb209abdda784d589e6b4ca3bf22124c4c0b4869ca6ad8465bed0c0039b810c4
    • Instruction ID: c24473b279848fc30f5744cff8fb360864e6e4020052cf49dd9f8dcb81084c36
    • Opcode Fuzzy Hash: fb209abdda784d589e6b4ca3bf22124c4c0b4869ca6ad8465bed0c0039b810c4
    • Instruction Fuzzy Hash: 6851B478A002459FDB00CFA4E881AEEBBF5FF18710F14415AE956F7281EB719641CF61
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 230 350118a2-350118bb 231 350118d1-350118d6 230->231 232 350118bd-350118cd call 35014b3e 230->232 234 350118e3-35011907 MultiByteToWideChar 231->234 235 350118d8-350118e0 231->235 232->231 239 350118cf 232->239 237 35011a9a-35011aad call 3500e5db 234->237 238 3501190d-35011919 234->238 235->234 240 3501191b-3501192c 238->240 241 3501196d 238->241 239->231 244 3501194b-35011951 240->244 245 3501192e-3501193d call 35017f80 240->245 243 3501196f-35011971 241->243 248 35011977-3501198a MultiByteToWideChar 243->248 249 35011a8f 243->249 247 35011952 call 3501103f 244->247 245->249 255 35011943-35011949 245->255 251 35011957-3501195c 247->251 248->249 252 35011990-350119ab call 350120ab 248->252 253 35011a91-35011a98 call 35011b0a 249->253 251->249 256 35011962 251->256 252->249 262 350119b1-350119b8 252->262 253->237 259 35011968-3501196b 255->259 256->259 259->243 263 350119f2-350119fe 262->263 264 350119ba-350119bf 262->264 265 35011a00-35011a11 263->265 266 35011a4a 263->266 264->253 267 350119c5-350119c7 264->267 268 35011a13-35011a22 call 35017f80 265->268 269 35011a2c-35011a32 265->269 270 35011a4c-35011a4e 266->270 267->249 271 350119cd-350119e7 call 350120ab 267->271 273 35011a88-35011a8e call 35011b0a 268->273 285 35011a24-35011a2a 268->285 276 35011a33 call 3501103f 269->276 272 35011a50-35011a69 call 350120ab 270->272 270->273 271->253 283 350119ed 271->283 272->273 287 35011a6b-35011a72 272->287 273->249 281 35011a38-35011a3d 276->281 281->273 286 35011a3f 281->286 283->249 288 35011a45-35011a48 285->288 286->288 289 35011a74-35011a75 287->289 290 35011aae-35011ab4 287->290 288->270 291 35011a76-35011a86 WideCharToMultiByte 289->291 290->291 291->273 292 35011ab6-35011abd call 35011b0a 291->292 292->253
    C-Code - Quality: 69%
    			E350118A2(void* __ebx, void* __ecx, void* __edi, void* __esi, intOrPtr* _a4, intOrPtr _a8, signed int _a12, char* _a16, int _a20, intOrPtr _a24, short* _a28, int _a32, intOrPtr _a36) {
    				signed int _v8;
    				int _v12;
    				void* _v24;
    				signed int _t49;
    				signed int _t54;
    				int _t58;
    				signed int _t60;
    				short* _t62;
    				signed int _t66;
    				short* _t70;
    				int _t71;
    				int _t78;
    				short* _t81;
    				signed int _t87;
    				signed int _t90;
    				void* _t95;
    				void* _t96;
    				int _t98;
    				short* _t101;
    				int _t103;
    				signed int _t106;
    				short* _t107;
    				void* _t110;
    
    				_push(__ecx);
    				_push(__ecx);
    				_t49 =  *0x350228f8; // 0x43699f2c
    				_v8 = _t49 ^ _t106;
    				_push(__esi);
    				_t103 = _a20;
    				if(_t103 > 0) {
    					_t78 = E35014B3E(_a16, _t103);
    					_t110 = _t78 - _t103;
    					_t4 = _t78 + 1; // 0x1
    					_t103 = _t4;
    					if(_t110 >= 0) {
    						_t103 = _t78;
    					}
    				}
    				_t98 = _a32;
    				if(_t98 == 0) {
    					_t98 =  *( *_a4 + 8);
    					_a32 = _t98;
    				}
    				_t54 = MultiByteToWideChar(_t98, 1 + (0 | _a36 != 0x00000000) * 8, _a16, _t103, 0, 0);
    				_v12 = _t54;
    				if(_t54 == 0) {
    					L38:
    					return E3500E5DB(_v8 ^ _t106);
    				} else {
    					_t95 = _t54 + _t54;
    					_t85 = _t95 + 8;
    					asm("sbb eax, eax");
    					if((_t95 + 0x00000008 & _t54) == 0) {
    						_t81 = 0;
    						__eflags = 0;
    						L14:
    						if(_t81 == 0) {
    							L36:
    							_t105 = 0;
    							L37:
    							E35011B0A(_t81);
    							goto L38;
    						}
    						_t58 = MultiByteToWideChar(_t98, 1, _a16, _t103, _t81, _v12);
    						_t121 = _t58;
    						if(_t58 == 0) {
    							goto L36;
    						}
    						_t100 = _v12;
    						_t60 = E350120AB(_t85, _t103, _t121, _a8, _a12, _t81, _v12, 0, 0, 0, 0, 0);
    						_t105 = _t60;
    						if(_t105 == 0) {
    							goto L36;
    						}
    						if((_a12 & 0x00000400) == 0) {
    							_t96 = _t105 + _t105;
    							_t87 = _t96 + 8;
    							__eflags = _t96 - _t87;
    							asm("sbb eax, eax");
    							__eflags = _t87 & _t60;
    							if((_t87 & _t60) == 0) {
    								_t101 = 0;
    								__eflags = 0;
    								L30:
    								__eflags = _t101;
    								if(__eflags == 0) {
    									L35:
    									E35011B0A(_t101);
    									goto L36;
    								}
    								_t62 = E350120AB(_t87, _t105, __eflags, _a8, _a12, _t81, _v12, _t101, _t105, 0, 0, 0);
    								__eflags = _t62;
    								if(_t62 == 0) {
    									goto L35;
    								}
    								_push(0);
    								_push(0);
    								__eflags = _a28;
    								if(_a28 != 0) {
    									_push(_a28);
    									_push(_a24);
    								} else {
    									_push(0);
    									_push(0);
    								}
    								_t105 = WideCharToMultiByte(_a32, 0, _t101, _t105, ??, ??, ??, ??);
    								__eflags = _t105;
    								if(_t105 != 0) {
    									E35011B0A(_t101);
    									goto L37;
    								} else {
    									goto L35;
    								}
    							}
    							_t90 = _t96 + 8;
    							__eflags = _t96 - _t90;
    							asm("sbb eax, eax");
    							_t66 = _t60 & _t90;
    							_t87 = _t96 + 8;
    							__eflags = _t66 - 0x400;
    							if(_t66 > 0x400) {
    								__eflags = _t96 - _t87;
    								asm("sbb eax, eax");
    								_t101 = E3501103F(_t87, _t66 & _t87);
    								_pop(_t87);
    								__eflags = _t101;
    								if(_t101 == 0) {
    									goto L35;
    								}
    								 *_t101 = 0xdddd;
    								L28:
    								_t101 =  &(_t101[4]);
    								goto L30;
    							}
    							__eflags = _t96 - _t87;
    							asm("sbb eax, eax");
    							E35017F80();
    							_t101 = _t107;
    							__eflags = _t101;
    							if(_t101 == 0) {
    								goto L35;
    							}
    							 *_t101 = 0xcccc;
    							goto L28;
    						}
    						_t70 = _a28;
    						if(_t70 == 0) {
    							goto L37;
    						}
    						_t125 = _t105 - _t70;
    						if(_t105 > _t70) {
    							goto L36;
    						}
    						_t71 = E350120AB(0, _t105, _t125, _a8, _a12, _t81, _t100, _a24, _t70, 0, 0, 0);
    						_t105 = _t71;
    						if(_t71 != 0) {
    							goto L37;
    						}
    						goto L36;
    					}
    					asm("sbb eax, eax");
    					_t72 = _t54 & _t95 + 0x00000008;
    					_t85 = _t95 + 8;
    					if((_t54 & _t95 + 0x00000008) > 0x400) {
    						__eflags = _t95 - _t85;
    						asm("sbb eax, eax");
    						_t81 = E3501103F(_t85, _t72 & _t85);
    						_pop(_t85);
    						__eflags = _t81;
    						if(__eflags == 0) {
    							goto L36;
    						}
    						 *_t81 = 0xdddd;
    						L12:
    						_t81 =  &(_t81[4]);
    						goto L14;
    					}
    					asm("sbb eax, eax");
    					E35017F80();
    					_t81 = _t107;
    					if(_t81 == 0) {
    						goto L36;
    					}
    					 *_t81 = 0xcccc;
    					goto L12;
    				}
    			}


























    0x350118a7
    0x350118a8
    0x350118a9
    0x350118b0
    0x350118b4
    0x350118b5
    0x350118bb
    0x350118c1
    0x350118c7
    0x350118ca
    0x350118ca
    0x350118cd
    0x350118cf
    0x350118cf
    0x350118cd
    0x350118d1
    0x350118d6
    0x350118dd
    0x350118e0
    0x350118e0
    0x350118fc
    0x35011902
    0x35011907
    0x35011a9a
    0x35011aad
    0x3501190d
    0x3501190d
    0x35011910
    0x35011915
    0x35011919
    0x3501196d
    0x3501196d
    0x3501196f
    0x35011971
    0x35011a8f
    0x35011a8f
    0x35011a91
    0x35011a92
    0x00000000
    0x35011a98
    0x35011982
    0x35011988
    0x3501198a
    0x00000000
    0x00000000
    0x35011990
    0x350119a2
    0x350119a7
    0x350119ab
    0x00000000
    0x00000000
    0x350119b8
    0x350119f2
    0x350119f5
    0x350119f8
    0x350119fa
    0x350119fc
    0x350119fe
    0x35011a4a
    0x35011a4a
    0x35011a4c
    0x35011a4c
    0x35011a4e
    0x35011a88
    0x35011a89
    0x00000000
    0x35011a8e
    0x35011a62
    0x35011a67
    0x35011a69
    0x00000000
    0x00000000
    0x35011a6d
    0x35011a6e
    0x35011a6f
    0x35011a72
    0x35011aae
    0x35011ab1
    0x35011a74
    0x35011a74
    0x35011a75
    0x35011a75
    0x35011a82
    0x35011a84
    0x35011a86
    0x35011ab7
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x35011a86
    0x35011a00
    0x35011a03
    0x35011a05
    0x35011a07
    0x35011a09
    0x35011a0c
    0x35011a11
    0x35011a2c
    0x35011a2e
    0x35011a38
    0x35011a3a
    0x35011a3b
    0x35011a3d
    0x00000000
    0x00000000
    0x35011a3f
    0x35011a45
    0x35011a45
    0x00000000
    0x35011a45
    0x35011a13
    0x35011a15
    0x35011a19
    0x35011a1e
    0x35011a20
    0x35011a22
    0x00000000
    0x00000000
    0x35011a24
    0x00000000
    0x35011a24
    0x350119ba
    0x350119bf
    0x00000000
    0x00000000
    0x350119c5
    0x350119c7
    0x00000000
    0x00000000
    0x350119de
    0x350119e3
    0x350119e7
    0x00000000
    0x00000000
    0x00000000
    0x350119ed
    0x35011920
    0x35011922
    0x35011924
    0x3501192c
    0x3501194b
    0x3501194d
    0x35011957
    0x35011959
    0x3501195a
    0x3501195c
    0x00000000
    0x00000000
    0x35011962
    0x35011968
    0x35011968
    0x00000000
    0x35011968
    0x35011930
    0x35011934
    0x35011939
    0x3501193d
    0x00000000
    0x00000000
    0x35011943
    0x00000000
    0x35011943

    APIs
    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,35011AF3,?,?,00000003), ref: 350118FC
    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,?,?,?,35011AF3,?,?,00000003), ref: 35011982
    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000003,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 35011A7C
    • __freea.LIBCMT ref: 35011A89
      • Part of subcall function 3501103F: HeapAlloc.KERNEL32(00000000,?,00000004,?,35015167,?,00000000,?,35013F7A,?,00000004,00000000,?,?,?,35010D0A), ref: 35011071
    • __freea.LIBCMT ref: 35011A92
    • __freea.LIBCMT ref: 35011AB7
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: ByteCharMultiWide__freea$AllocHeap
    • String ID:
    • API String ID: 3147120248-0
    • Opcode ID: b363928003026e63c13a05783eee67d3811b8e740b4e02b3bf4bdb82c83bcae7
    • Instruction ID: 2163c32e41c917ae99f0f817a88c9325b1ab5a920b9f80903e25fa590e7a029e
    • Opcode Fuzzy Hash: b363928003026e63c13a05783eee67d3811b8e740b4e02b3bf4bdb82c83bcae7
    • Instruction Fuzzy Hash: A551E67A610356AEEB198E60EC40EAF3BFAFB44650F9146A8FD05D7140EB72DE40C752
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 295 3500fca5-3500fccd GetModuleHandleExW 296 3500fcf2-3500fcf6 295->296 297 3500fccf-3500fce2 GetProcAddress 295->297 300 3500fd01-3500fd0e call 3500e5db 296->300 301 3500fcf8-3500fcfb FreeLibrary 296->301 298 3500fcf1 297->298 299 3500fce4-3500fcef 297->299 298->296 299->298 301->300
    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,3500FC56,00000003,?,3500FBF6,00000003,3501E070,0000000C,3500FD4D,00000003,00000002), ref: 3500FCC5
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 3500FCD8
    • FreeLibrary.KERNEL32(00000000,?,?,?,3500FC56,00000003,?,3500FBF6,00000003,3501E070,0000000C,3500FD4D,00000003,00000002,00000000), ref: 3500FCFB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: 5e230ce3bdd230496745a70b6a8f79930ae950e090d1ffcaca4df18efb5c5fe2
    • Instruction ID: 82fdcd75ce45bdfddd9470f063fe21ce40b8eedb81c3c6049bea178be89e6534
    • Opcode Fuzzy Hash: 5e230ce3bdd230496745a70b6a8f79930ae950e090d1ffcaca4df18efb5c5fe2
    • Instruction Fuzzy Hash: 53F04478524219BFDB019BA0E949B9DBBB5FF08751F5144A4FC07B3140DF329A42DE91
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 490 35013a78-35013a9d call 3500f607 493 35013aaa-35013ad0 MultiByteToWideChar 490->493 494 35013a9f-35013aa7 490->494 495 35013ad6-35013ae2 493->495 496 35013b6f-35013b73 493->496 494->493 497 35013ae4-35013af5 495->497 498 35013b2e 495->498 499 35013b75-35013b78 496->499 500 35013b7f-35013b94 call 3500e5db 496->500 502 35013b10-35013b16 497->502 503 35013af7-35013b06 call 35017f80 497->503 501 35013b30-35013b32 498->501 499->500 506 35013b34-35013b56 call 3500cc80 MultiByteToWideChar 501->506 507 35013b68-35013b6e call 35011b0a 501->507 509 35013b17 call 3501103f 502->509 503->507 517 35013b08-35013b0e 503->517 506->507 519 35013b58-35013b66 GetStringTypeW 506->519 507->496 510 35013b1c-35013b21 509->510 510->507 514 35013b23 510->514 518 35013b29-35013b2c 514->518 517->518 518->501 519->507
    C-Code - Quality: 81%
    			E35013A78(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags, intOrPtr _a4, int _a8, char* _a12, int _a16, short* _a20, int _a24, intOrPtr _a28) {
    				signed int _v8;
    				int _v12;
    				char _v16;
    				intOrPtr _v24;
    				char _v28;
    				void* _v40;
    				signed int _t34;
    				signed int _t40;
    				int _t46;
    				int _t53;
    				void* _t55;
    				int _t57;
    				signed int _t63;
    				int _t67;
    				short* _t69;
    				signed int _t70;
    				short* _t71;
    
    				_t34 =  *0x350228f8; // 0x43699f2c
    				_v8 = _t34 ^ _t70;
    				E3500F607(__ebx,  &_v28, __edx, _a4);
    				_t57 = _a24;
    				if(_t57 == 0) {
    					_t53 =  *(_v24 + 8);
    					_t57 = _t53;
    					_a24 = _t53;
    				}
    				_t67 = 0;
    				_t40 = MultiByteToWideChar(_t57, 1 + (0 | _a28 != 0x00000000) * 8, _a12, _a16, 0, 0);
    				_v12 = _t40;
    				if(_t40 == 0) {
    					L15:
    					if(_v16 != 0) {
    						 *(_v28 + 0x350) =  *(_v28 + 0x350) & 0xfffffffd;
    					}
    					return E3500E5DB(_v8 ^ _t70);
    				}
    				_t55 = _t40 + _t40;
    				_t17 = _t55 + 8; // 0x10f
    				asm("sbb eax, eax");
    				if((_t17 & _t40) == 0) {
    					_t69 = 0;
    					L11:
    					if(_t69 != 0) {
    						E3500CC80(_t69, _t67, _t55);
    						_t46 = MultiByteToWideChar(_a24, 1, _a12, _a16, _t69, _v12);
    						if(_t46 != 0) {
    							_t67 = GetStringTypeW(_a8, _t69, _t46, _a20);
    						}
    					}
    					L14:
    					E35011B0A(_t69);
    					goto L15;
    				}
    				_t20 = _t55 + 8; // 0x10f
    				asm("sbb eax, eax");
    				_t48 = _t40 & _t20;
    				_t21 = _t55 + 8; // 0x10f
    				_t63 = _t21;
    				if((_t40 & _t20) > 0x400) {
    					asm("sbb eax, eax");
    					_t69 = E3501103F(_t63, _t48 & _t63);
    					if(_t69 == 0) {
    						goto L14;
    					}
    					 *_t69 = 0xdddd;
    					L9:
    					_t69 =  &(_t69[4]);
    					goto L11;
    				}
    				asm("sbb eax, eax");
    				E35017F80();
    				_t69 = _t71;
    				if(_t69 == 0) {
    					goto L14;
    				}
    				 *_t69 = 0xcccc;
    				goto L9;
    			}




















    0x35013a80
    0x35013a87
    0x35013a93
    0x35013a98
    0x35013a9d
    0x35013aa2
    0x35013aa5
    0x35013aa7
    0x35013aa7
    0x35013aac
    0x35013ac5
    0x35013acb
    0x35013ad0
    0x35013b6f
    0x35013b73
    0x35013b78
    0x35013b78
    0x35013b94
    0x35013b94
    0x35013ad6
    0x35013ad9
    0x35013ade
    0x35013ae2
    0x35013b2e
    0x35013b30
    0x35013b32
    0x35013b37
    0x35013b4e
    0x35013b56
    0x35013b66
    0x35013b66
    0x35013b56
    0x35013b68
    0x35013b69
    0x00000000
    0x35013b6e
    0x35013ae4
    0x35013ae9
    0x35013aeb
    0x35013aed
    0x35013aed
    0x35013af5
    0x35013b12
    0x35013b1c
    0x35013b21
    0x00000000
    0x00000000
    0x35013b23
    0x35013b29
    0x35013b29
    0x00000000
    0x35013b29
    0x35013af9
    0x35013afd
    0x35013b02
    0x35013b06
    0x00000000
    0x00000000
    0x35013b08
    0x00000000

    APIs
    • MultiByteToWideChar.KERNEL32(00000107,00000000,?,00000001,00000000,00000000,?,?,00000107,3500F7B4,00000001,?,?,00000001,?,3500F826), ref: 35013AC5
    • MultiByteToWideChar.KERNEL32(00000107,00000001,?,00000001,00000000,00000001,?,?,00000107,3500F7B4,00000001,?,?,00000001,?,3500F826), ref: 35013B4E
    • GetStringTypeW.KERNEL32(?,00000000,00000000,3500F7B4,?,?,00000107,3500F7B4,00000001,?,?,00000001,?,3500F826,00000107,?), ref: 35013B60
    • __freea.LIBCMT ref: 35013B69
      • Part of subcall function 3501103F: HeapAlloc.KERNEL32(00000000,?,00000004,?,35015167,?,00000000,?,35013F7A,?,00000004,00000000,?,?,?,35010D0A), ref: 35011071
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: ByteCharMultiWide$AllocHeapStringType__freea
    • String ID:
    • API String ID: 573072132-0
    • Opcode ID: 3c260f152014c3cd71b206d9219e8a3d6617e2951a693a530221a201484b45a6
    • Instruction ID: 9152acde5e1518218b3a8762608a7092c647da57b88e1aba40dd92453bede919
    • Opcode Fuzzy Hash: 3c260f152014c3cd71b206d9219e8a3d6617e2951a693a530221a201484b45a6
    • Instruction Fuzzy Hash: C731C0BAA1020AABDB158F74ED81DEF3BB5FB40650F4002A8FD05D7190EB36DA51CB91
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 95%
    			E35011E73(signed int _a4) {
    				signed int _t9;
    				void* _t13;
    				signed int _t15;
    				WCHAR* _t22;
    				signed int _t24;
    				signed int* _t25;
    				void* _t27;
    
    				_t9 = _a4;
    				_t25 = 0x3502abe0 + _t9 * 4;
    				_t24 =  *_t25;
    				if(_t24 == 0) {
    					_t22 =  *(0x3501aa90 + _t9 * 4);
    					_t27 = LoadLibraryExW(_t22, 0, 0x800);
    					if(_t27 != 0) {
    						L8:
    						 *_t25 = _t27;
    						if( *_t25 != 0) {
    							FreeLibrary(_t27);
    						}
    						_t13 = _t27;
    						L11:
    						return _t13;
    					}
    					_t15 = GetLastError();
    					if(_t15 != 0x57) {
    						_t27 = 0;
    					} else {
    						_t15 = LoadLibraryExW(_t22, _t27, _t27);
    						_t27 = _t15;
    					}
    					if(_t27 != 0) {
    						goto L8;
    					} else {
    						 *_t25 = _t15 | 0xffffffff;
    						_t13 = 0;
    						goto L11;
    					}
    				}
    				_t4 = _t24 + 1; // 0x43699f2d
    				asm("sbb eax, eax");
    				return  ~_t4 & _t24;
    			}










    0x35011e78
    0x35011e7c
    0x35011e83
    0x35011e87
    0x35011e95
    0x35011eab
    0x35011eaf
    0x35011ed8
    0x35011eda
    0x35011ede
    0x35011ee1
    0x35011ee1
    0x35011ee7
    0x35011ee9
    0x00000000
    0x35011eea
    0x35011eb1
    0x35011eba
    0x35011ec9
    0x35011ebc
    0x35011ebf
    0x35011ec5
    0x35011ec5
    0x35011ecd
    0x00000000
    0x35011ecf
    0x35011ed2
    0x35011ed4
    0x00000000
    0x35011ed4
    0x35011ecd
    0x35011e89
    0x35011e8e
    0x00000000

    APIs
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,35011E1A,00000000,00000000,00000000,00000000,?,35012017,00000006,FlsSetValue), ref: 35011EA5
    • GetLastError.KERNEL32(?,35011E1A,00000000,00000000,00000000,00000000,?,35012017,00000006,FlsSetValue,3501AF48,3501AF50,00000000,00000364,?,3501160E), ref: 35011EB1
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,35011E1A,00000000,00000000,00000000,00000000,?,35012017,00000006,FlsSetValue,3501AF48,3501AF50,00000000), ref: 35011EBF
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: LibraryLoad$ErrorLast
    • String ID:
    • API String ID: 3177248105-0
    • Opcode ID: d4b87ccdf4485cad9bbe24aa3ae87242f27b5a5ca1a4d1284dc322f96c9a895b
    • Instruction ID: 5afaf8a9c19edeaec032985d97870c9a2b67fcfbac91f623d49ca9142914f4e6
    • Opcode Fuzzy Hash: d4b87ccdf4485cad9bbe24aa3ae87242f27b5a5ca1a4d1284dc322f96c9a895b
    • Instruction Fuzzy Hash: 9301F53E621322AFD7168DF9FC44E8777E8AF08AA0B100560FD06E3140DB23C602C6E6
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 72%
    			E3501153C(void* __ebx, void* __ecx, void* __edx) {
    				void* __edi;
    				void* __esi;
    				intOrPtr _t2;
    				void* _t3;
    				void* _t4;
    				intOrPtr _t9;
    				void* _t11;
    				void* _t20;
    				void* _t21;
    				void* _t23;
    				void* _t25;
    				void* _t27;
    				void* _t29;
    				void* _t31;
    				void* _t32;
    				long _t36;
    				long _t37;
    				void* _t40;
    
    				_t29 = __edx;
    				_t23 = __ecx;
    				_t20 = __ebx;
    				_t36 = GetLastError();
    				_t2 =  *0x35022924; // 0x2
    				_t42 = _t2 - 0xffffffff;
    				if(_t2 == 0xffffffff) {
    					L2:
    					_t3 = E350110D0(_t23, 1, 0x364);
    					_t31 = _t3;
    					_pop(_t25);
    					if(_t31 != 0) {
    						_t4 = E35011FF0(_t25, _t36, __eflags,  *0x35022924, _t31);
    						__eflags = _t4;
    						if(_t4 != 0) {
    							E350113AE(_t25, _t31, 0x3502aa94);
    							E35011005(0);
    							_t40 = _t40 + 0xc;
    							__eflags = _t31;
    							if(_t31 == 0) {
    								goto L9;
    							} else {
    								goto L8;
    							}
    						} else {
    							_push(_t31);
    							goto L4;
    						}
    					} else {
    						_push(_t3);
    						L4:
    						E35011005();
    						_pop(_t25);
    						L9:
    						SetLastError(_t36);
    						E3501108D(_t20, _t29, _t31, _t36);
    						asm("int3");
    						_push(_t20);
    						_push(_t36);
    						_push(_t31);
    						_t37 = GetLastError();
    						_t21 = 0;
    						_t9 =  *0x35022924; // 0x2
    						_t45 = _t9 - 0xffffffff;
    						if(_t9 == 0xffffffff) {
    							L12:
    							_t32 = E350110D0(_t25, 1, 0x364);
    							_pop(_t27);
    							if(_t32 != 0) {
    								_t11 = E35011FF0(_t27, _t37, __eflags,  *0x35022924, _t32);
    								__eflags = _t11;
    								if(_t11 != 0) {
    									E350113AE(_t27, _t32, 0x3502aa94);
    									E35011005(_t21);
    									__eflags = _t32;
    									if(_t32 != 0) {
    										goto L19;
    									} else {
    										goto L18;
    									}
    								} else {
    									_push(_t32);
    									goto L14;
    								}
    							} else {
    								_push(_t21);
    								L14:
    								E35011005();
    								L18:
    								SetLastError(_t37);
    							}
    						} else {
    							_t32 = E35011F9A(_t25, _t37, _t45, _t9);
    							if(_t32 != 0) {
    								L19:
    								SetLastError(_t37);
    								_t21 = _t32;
    							} else {
    								goto L12;
    							}
    						}
    						return _t21;
    					}
    				} else {
    					_t31 = E35011F9A(_t23, _t36, _t42, _t2);
    					if(_t31 != 0) {
    						L8:
    						SetLastError(_t36);
    						return _t31;
    					} else {
    						goto L2;
    					}
    				}
    			}





















    0x3501153c
    0x3501153c
    0x3501153c
    0x35011546
    0x35011548
    0x3501154d
    0x35011550
    0x3501155e
    0x35011565
    0x3501156a
    0x3501156d
    0x35011570
    0x35011582
    0x35011587
    0x35011589
    0x35011594
    0x3501159b
    0x350115a0
    0x350115a3
    0x350115a5
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x3501158b
    0x3501158b
    0x00000000
    0x3501158b
    0x35011572
    0x35011572
    0x35011573
    0x35011573
    0x35011578
    0x350115b3
    0x350115b4
    0x350115ba
    0x350115bf
    0x350115c2
    0x350115c3
    0x350115c4
    0x350115cb
    0x350115cd
    0x350115cf
    0x350115d4
    0x350115d7
    0x350115e5
    0x350115f1
    0x350115f4
    0x350115f7
    0x35011609
    0x3501160e
    0x35011610
    0x3501161b
    0x35011621
    0x35011629
    0x3501162b
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x35011612
    0x35011612
    0x00000000
    0x35011612
    0x350115f9
    0x350115f9
    0x350115fa
    0x350115fa
    0x3501162d
    0x3501162e
    0x3501162e
    0x350115d9
    0x350115df
    0x350115e3
    0x35011636
    0x35011637
    0x3501163d
    0x00000000
    0x00000000
    0x00000000
    0x350115e3
    0x35011644
    0x35011644
    0x35011552
    0x35011558
    0x3501155c
    0x350115a7
    0x350115a8
    0x350115b2
    0x00000000
    0x00000000
    0x00000000
    0x3501155c

    APIs
    • GetLastError.KERNEL32(?,?,35010FDA,3501E0F8,0000000C,3500E366), ref: 35011540
    • SetLastError.KERNEL32(00000000), ref: 350115A8
    • SetLastError.KERNEL32(00000000), ref: 350115B4
    • _abort.LIBCMT ref: 350115BA
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: ErrorLast$_abort
    • String ID:
    • API String ID: 88804580-0
    • Opcode ID: 0f287474e4161ce5a5d4078c8e418205cb32e42c1bac0a85d22ddf9256a5b659
    • Instruction ID: b1675671f5664fda7cd8bb914803ab694c0e304d08791b0532bdc80c8739b47a
    • Opcode Fuzzy Hash: 0f287474e4161ce5a5d4078c8e418205cb32e42c1bac0a85d22ddf9256a5b659
    • Instruction Fuzzy Hash: FBF0863EB08685AAD70F5674FE05B1A36B7AFD56A1B220594FD16A2180EF6387035123
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E3500EE56() {
    				void* _t4;
    				void* _t8;
    
    				E3500F4A5();
    				E3500F439();
    				if(E3500F199() != 0) {
    					_t4 = E3500F14B(_t8, __eflags);
    					__eflags = _t4;
    					if(_t4 != 0) {
    						return 1;
    					} else {
    						E3500F1D5();
    						goto L1;
    					}
    				} else {
    					L1:
    					return 0;
    				}
    			}





    0x3500ee56
    0x3500ee5b
    0x3500ee67
    0x3500ee6c
    0x3500ee71
    0x3500ee73
    0x3500ee7e
    0x3500ee75
    0x3500ee75
    0x00000000
    0x3500ee75
    0x3500ee69
    0x3500ee69
    0x3500ee6b
    0x3500ee6b

    APIs
    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 3500EE56
    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 3500EE5B
    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 3500EE60
      • Part of subcall function 3500F199: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 3500F1AA
    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 3500EE75
    Memory Dump Source
    • Source File: 00000000.00000002.217126058.000000003500C000.00000020.00020000.sdmp, Offset: 35000000, based on PE: true
    • Associated: 00000000.00000002.217106555.0000000035000000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217109610.0000000035002000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217113234.0000000035004000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217116503.0000000035006000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217119478.0000000035008000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217122613.000000003500A000.00000020.00020000.sdmp Download File
    • Associated: 00000000.00000002.217135653.0000000035019000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217139047.000000003501D000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.217142134.000000003501F000.00000008.00020000.sdmp Download File
    • Associated: 00000000.00000002.217145363.0000000035022000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.217148176.000000003502A000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_35000000_executable.jbxd
    Similarity
    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
    • String ID:
    • API String ID: 1761009282-0
    • Opcode ID: 8c67abd60f9a6ca8c6b1d0b004b65b0f0d130c5a0190c72de743de95ecb48f1a
    • Instruction ID: 31c58eb4d88e0ddef436963cf016af817b16956068048b8eb3ec4e4a4f2d26cb
    • Opcode Fuzzy Hash: 8c67abd60f9a6ca8c6b1d0b004b65b0f0d130c5a0190c72de743de95ecb48f1a
    • Instruction Fuzzy Hash: 18C0016834838A503C906EB0B3109DE53BA2AB6AD4BA814C58CA0274029B87000A3E22
    Uniqueness

    Uniqueness Score: -1.00%